Is there a way to avoid miscreants?
Alessandro Vesely
vesely at tana.it
Sun Apr 5 17:29:45 UTC 2026
On Sun 05/Apr/2026 19:06:47 +0200 Grant Taylor wrote:
> On 4/4/26 6:50 AM, Alessandro Vesely wrote:
>
>> yesterday I got 124,646 queries in ten minutes, between 1:50 and 2:00 AM UTC,
>> from 4,287 different IPs. The top IP was
>> 2001:19f0:5401:2e01:5400:3ff:fed1:9863 with 47,304 queries for 5,261
>> subdomains, e.g. serverselect.tana.it, nu.tana.it, ll.tana.it,
>> ghsms.tana.it, dragoner.tana.it, cinemathe.tana.it, bluefire.tana.it,
>> umk.tana.it, tyche.tana.it, tsvb.tana.it.
>
> I'm not sure how to filter for sub-domains.
>
> In the distant past I've used iptables' L7 filtering capability to filter out
> queries for a fixed domain name. In short, I constructed the hexadecimal
> sequence at a position to look for and dropped the packet.
I don't think it's worth to bring up the kernel when named can do it. Now I've
rate limited nxdomains-per-second to 2. (Perhaps I should've set 1.)
>> When I designed the firewall, I didn't bother monitoring UDP connections to
>> port 53. It seemed to me like named could take care of itself. However, I
>> didn't configure any intrusion prevention features either. Are there any I
>> should enable?
>
> response rate limiting (see Nick's reply).
>
> I'm surprised that the queries came from so many different (likely spoofed)
> IPs. It seems like if it was a reflected attack (to likely spoofed IPs) there
> wouldn't be that many sources. Was there any commonality to the source IPs?
> Aggregate network? ASN?
They taste like DoS attacks, only they're too weak to be effective. I'd guess
something like keeping fit for it. I usually get swarms of connections to 443,
without querying anything, from bunch of hosts of the same ISP, and cannot find
any other explanation for this activity.
Best
Ale
--
More information about the bind-users
mailing list