<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta content="text/html;charset=UTF-8" http-equiv="Content-Type"></head><body ><div dir='auto' style='font-size:10pt;font-family:Verdana,Arial,Helvetica,sans-serif;'><div id="message" dir="auto"><div>Dear admin & devs,</div><div dir="auto"><br></div><div dir="auto">I have been using bind for recursive resolving for quite few years, while recently noticed for experimentation while performing TCP dump and compared it for bind's working functionality, it's been noted that it tries to resolve from nearby peer recursive resolvers for queried domains which resulted in a flooding type of attack. It was simulated in a controlled environment setup to understand security of the software. So the actual help need is to find answer:</div><div dir="auto"><br></div><div dir="auto">1. Do BIND identifies & uses peer resolvers for fast resolution instead of following the DNS hierarchical lookup? If no why this happened in my case even with proper rate limiting in place / If yes, how does it identifies peer resolver?</div><div dir="auto"><br></div><div dir="auto">2. Is there any way to strictly say the bind to resolve hierarchically so that the TCP dump doesn't raise any anomaly, considering the fact that both of the mentioned versions exhibited this behaviour.</div><div dir="auto"><br></div><div dir="auto">Thank you in Advance for helping out!!!<br id="br3"><br id="br3"><br id="br3"></div></div><div id="signature" dir="auto"><p style="color:#2a2a2a;" font-family:="" lucida="" grande="" ,="" sans="" unicode="" arial="" helvetica="" verdana="" sans-serif;="" font-size:13px;="" font-style:normal;="">Sent using <a style="color:#598fde;" text-decoration:underline;="" href="{0}" target="_blank">Zoho Mail</a></p></div><div id="content" dir="auto"></div></div><br></body></html>