Ah I see you are in provider situation. Shows my assumption you were in an
enclosed enterprise environment.
On Feb 27, 2014 10:57 AM, "Ivo" wrote:
> Ben,
>
> No, our server is not an open resolver, we have a large user community
> and the problem is that users install their own wifi box like Z
Ben,
No, our server is not an open resolver, we have a large user community
and the problem is that users install their own wifi box like Zyxel or
similar which may have open resolver by default.
Ivo
On 2/27/14 5:18 PM, Ben Croswell wrote:
>
> I guess I am missing why anyone on the internet sho
Doesn't this look like a DDOS attack on the spoofed origin of the queries?
On 27/02/14 16:18, Ben Croswell wrote:
> I guess I am missing why anyone on the internet should be able to open
> queries against your caching resolver.
>
> Why would in bound queries be allowed to servers that are for y
I guess I am missing why anyone on the internet should be able to open
queries against your caching resolver.
Why would in bound queries be allowed to servers that are for your people
to get out?
On Feb 27, 2014 10:13 AM, "Ivo" wrote:
> Hi Dmitry,
>
> We observed that similar requests are landi
Hi Dmitry,
We observed that similar requests are landing on our cache resolver
mostly from various home routers running dns server as open resolver and
that also masquerades the original request source.
We have a collection of ~60 domains involved and most of them are
related to China. The problem
Hi Markus,
"Markus Weber" writes:
>>
>> Choose sane SOA values. refresh and retry << expire
>
> I will check these values, i thought they were kind of standard values
>
the default SOA values on a MS DNS Server are well and good for
dynamic, internal, AD integrated DNS zones.
For use in
6 matches
Mail list logo