dns-operations AT lists.opennicproject.org
Subject: Dns-operations mailing list
List archive
[opennic-dns-operations] using bind9's rate-limit to protect againts ddos against isc.org
Chronological Thread
- From: Paladin <paladin AT jstation.cz>
- To: dns-operations AT lists.opennicproject.org
- Subject: [opennic-dns-operations] using bind9's rate-limit to protect againts ddos against isc.org
- Date: Thu, 2 May 2013 07:33:56 +0200
Hi all,
as many of you, I am experiencing DDoS attack againts isc.org
and none of guides to defend againts them is applicable
to my situation because my server is only VPS based on OpenVZ
platform and therefore my iptables does not have matches
string or recent.
So I decided to use bind9's rate-limit option. I wanted to ask
if someone has experience with it and what are best options
to mitigate DDoS againts isc.org. So far I am using defaults
and it seems to kinda work but I am curious if there is something
better. There's not much about this topic on google.
Or if there is completely different way of protection..
Thanks in advance ^_^ ,
Paladin
Attachment:
pgpRMtZatpa4B.pgp
Description: PGP signature
- [opennic-dns-operations] using bind9's rate-limit to protect againts ddos against isc.org, Paladin, 05/02/2013
Archive powered by MHonArc 2.6.19.