http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5768





------- Additional Comments From [EMAIL PROTECTED]  2008-01-08 02:03 -------
more details on the symptoms; this may be useful if it happens again with
another BL, etc.:

'The situation applies to at least 2 recursive DNS servers at $WORK, that query 
on
behalf of just a handful of customers making queries into the zone
(and I see them querying reversed IP addresses instead of domain names, yikes!
 that'll be addressed).

This does not happen from my personal systems, and makes me wonder:
- do you have a DDoS-protection system gone-very-bad running over there?

Problem: our recursive server(s) are seemingly flooding your servers with a 
GREAT
amplification factor for customer queries, via both UDP and TCP queries.

Reason:
Your *single( nameserver for the zone (69.59.189.68) is returning "TC" (reply
truncated)
for every UDP-based query sent from us, amplified by 2 because
a.support-intelligence.net
and b.support-intelligence.net are the same IP, but when our resolvers fall back
to TCP
(as it is just and proper when encountering a TC response), your server is 
refusing
connections on that port, creating a SERVFAIL situation.

That "SERVFAIL" situation is NOT NEGATIVE-CACHEABLE (unlike an NXDOMAIN *answer*
actually
provided by your servers), hence resolvers will continue to hammer your server
for the same thing - I've seen it retry your servers 20+ times for a single 
query!

I've reproduced something interesting from 2 of my personal system(s):

     $ dig +tcp  @69.59.189.68
bounces.amazon.com.dob.sibl.support-intelligence.net any
     ; <<>> DiG 9.2.4 <<>> +tcp @69.59.189.68
bounces.amazon.com.dob.sibl.support-intelligence.net any
     ;; global options:  printcmd
     ;; Got answer:
     ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20417
     ;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
     ;; QUESTION SECTION:
     ;bounces.amazon.com.dob.sibl.support-intelligence.net. IN ANY
     ;; AUTHORITY SECTION:
     dob.sibl.support-intelligence.net. 900 IN SOA   a.support-intelligence.net.
zone.support-intelligence.com. 2006122100 900 900 604800 900
     ;; Query time: 313 msec
     ;; SERVER: 69.59.189.68#53(69.59.189.68)
     ;; WHEN: Mon Jan  7 12:55:18 2008
     ;; MSG SIZE  rcvd: 137

Followed immediately by:

      $ dig +tcp  @69.59.189.68
bounces.amazon.com.dob.sibl.support-intelligence.net any
      ;; Connection to 69.59.189.68#53(69.59.189.68) for
bounces.amazon.com.dob.sibl.support-intelligence.net failed: connection refused.
      $

E.g.: This returned a proper NXDOMAIN back for the FIRST query only - every
subsequent
53/tcp connection is refused, suggesting this is some sort of very misguided
DDoS defense.

I can still query via UDP afterwards, but maybe my systems are now well on the 
way
of getting dropped into the same "deny all service" pool as the resolvers at 
$WORK.

Clearly, this is not how you want to control a DDoS situation and make querying
clients go away, for any reason.

Thank you.'



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to