Kapetanakis Giannis <bil...@edu.physics.uoc.gr> writes:

> On 09/06/12 18:58, Kostas Zorbadelos wrote:
>
> Hi,
>

Hi Giannis,

> My understanding so far is that the queries hit your DNS servers from 
> your ISP network/clients

Yes.

> and are not spoofed. 

I didn't say that.

> Also those queries hit the recursive/caching DNS 
> servers (open only to ISP network)
> and they are of type ANY for a specific domain (example.com).
>

Yes.

> If this is true then why not try to 'filter' on the application layer 
> than on the network?
>

I agree that this is the proper layer to address the issue. However this
is not easy.

> As far as I know BIND cannot block specific queries. You might want to 
> check unbound and local-data.
>

You can't just reimplement a very busy commercial setup overnight,
especially in such a critical service.

> Maybe you could try some kind of DNS-proxy to filter out the unwanted 
> queries, since there is a pattern.
> Check http://thesprawl.org/projects/dnschef/ (haven't tested it).
>

I will take a look at it.

> Alternatively you would want to implement that pf helper/'proxy' as 
> Henning suggested
> which without doubt would be faster but you have to develop it.
>

Yes.

> Last, run the iptables matching filter on the DNS's firewall itself (if 
> they run linux)
> and not on the external firewalls.
>

This is what we did and what we will do again.

> good luck,
>
> Giannis
>

Kostas

Reply via email to