The OP mentions it's only one "domain" being queried with random
subdomains, being easier to match the possible queries like described here:

https://stackoverflow.com/questions/14096966/can-iptables-allow-dns-queries-only-for-a-certain-domain-name

I think this is effective to prevent this attack right now if it's
affecting the OP, it should not be used for long, just until the attack
comes to a halt. It's important to use a LOG flag before, to know when the
attack stops because the CPU hit can be heavy if the kernel table gets too
inflated.

On Tue, Apr 30, 2019 at 11:22 AM Brian Candler <b.cand...@pobox.com> wrote:

> On 30/04/2019 14:57, Filipe Cifali wrote:
> > Other than that you can put a DNS cache in front of the authoritative
> > to hold off those aggressive queries and give it a nice slab of RAM.
>
> pdns has its own packetcache layer which works very well, but if every
> query is a different <randomstring>.<yourdomain> then any cache would be
> forced to pass the query through.
>
> There might be some ways to deal with this.  e.g. if <randomstring> is
> always more than a certain number of characters, dnsdist could filter
> them out (whilst explicitly whitelisting any other valid names which
> happen to be the same length)
>
> The trouble is, you do still want to return NXDOMAIN normally to regular
> typos.
>
>

-- 
[ ]'s

Filipe Cifali Stangler
_______________________________________________
Pdns-users mailing list
Pdns-users@mailman.powerdns.com
https://mailman.powerdns.com/mailman/listinfo/pdns-users

Reply via email to