[153572] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open DNS Resolver reflection attack Mitigation

daemon@ATHENA.MIT.EDU (Owen DeLong)
Fri Jun 8 16:01:52 2012

From: Owen DeLong <owen@delong.com>
In-Reply-To: <20120608192605.GA19427@sources.org>
Date: Fri, 8 Jun 2012 12:56:23 -0700
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>
Cc: North American Networking and Offtopic Gripes List <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jun 8, 2012, at 12:26 PM, Stephane Bortzmeyer wrote:

> On Fri, Jun 08, 2012 at 03:09:04PM -0400,
> Joe Maimon <jmaimon@ttec.com> wrote=20
> a message of 7 lines which said:
>=20
>> Is there any publicly available rate limiting for BIND?
>=20
> Not as far as I know. I'm not sure it would be a good idea. BIND is
> feature-rich enough.
>=20
>> How about host-based IDS that can be used to trigger rtbh or =
iptables?
>=20
> What I do (I manage a small and experimental open resolver) is to use
> iptables this way (porting it to IPv6 is left as an exercice):
>=20
> iptables -A INPUT -p udp --dport 53 -m hashlimit \
>   --hashlimit-name DNS --hashlimit-above 20/second --hashlimit-mode =
srcip \
>   --hashlimit-burst 100 --hashlimit-srcmask 28 -j DROP
>=20

IPv6 should be a simple matter of putting the same line in your =
ip6tables file.

Owen



home help back first fref pref prev next nref lref last post