Re: DNS NXDOMAIN flood

2023-11-02 Thread Carlos Horowicz
Hi you might use in /etc/bind/named.conf.options e.g. rate-limit { responses-per-second 10; nxdomains-per-second 2; errors-per-second 5; }; that is, with values below default as your bind is already rate limiting as shown in the logs You might also shorten the default window of observance

Re: DNS NXDOMAIN flood

2023-11-02 Thread Marco M.
Am 02.11.2023 um 12:02:00 Uhr schrieb Mosharaf Hossain: > We are receiving the traffic form random IP addresses to DNS servers. Even when those IP addresses change, can you verify in any way that those are not spoofed, so the traffic originates rom that networks? -- Visit