Is there a way to avoid miscreants?
Fred Morris
m3047 at m3047.net
Sun Apr 5 19:32:31 UTC 2026
On Sun, 5 Apr 2026, Alessandro Vesely wrote:
> On Sun 05/Apr/2026 19:06:47 +0200 Grant Taylor wrote:
>> On 4/4/26 6:50 AM, Alessandro Vesely wrote:
>>
>>> yesterday I got 124,646 queries in ten minutes, between 1:50 and 2:00 AM
>>> UTC, from 4,287 different IPs. The top IP was
>>> 2001:19f0:5401:2e01:5400:3ff:fed1:9863 with 47,304 queries for 5,261
>>> subdomains, e.g. serverselect.tana.it, nu.tana.it, ll.tana.it,
>>> ghsms.tana.it, dragoner.tana.it, cinemathe.tana.it, bluefire.tana.it,
>>> umk.tana.it, tyche.tana.it, tsvb.tana.it.
>>
>> I'm not sure how to filter for sub-domains.
A response policy zone can do it:
*.TANA.IT CNAME rpz-drop.
I don't know what your operational environment is: authoritative,
recursive, two or two million domains, known clients or world+dog, etc.
There is dogma that authoritatives should never drop queries, seemingly in
the interests of DNS service providers (recursive and auth). As a small
auth operator if you know your clients (and their recursors) maybe you
just don't care. When I started dropping industrial quantities of this
garbage the overall volume decreased by literal orders of magnitude,
although it took a few months.
I see you've set up response rate limiting. Good.
You could do behavioral things, if you have behaviors you understand and
expect. I have good luck (not just with BIND, but with several publicly
exposed services / apps) with a combination of custom firewall logging, a
tailer that reads various logs (including e.g. BIND logs or dnstap) and
updates counters in Redis, and cron jobs which run frequently & read the
counters and write new logs tailored for fail2ban, along with some custom
fail2ban actions. Sounds complicated but in practice it's not. Off topic
for the BIND list and don't intend to put specific TTPs out here in public
but you're welcome to introduce yourself and we can discuss further
privately.
--
Fred Morris, internet plumber
More information about the bind-users
mailing list