Skip to Content.
Sympa Menu

dns-operations - [opennic-dns-operations] using bind9's rate-limit to protect againts ddos against isc.org

dns-operations AT lists.opennicproject.org

Subject: Dns-operations mailing list

List archive

[opennic-dns-operations] using bind9's rate-limit to protect againts ddos against isc.org


Chronological Thread 
  • From: Paladin <paladin AT jstation.cz>
  • To: dns-operations AT lists.opennicproject.org
  • Subject: [opennic-dns-operations] using bind9's rate-limit to protect againts ddos against isc.org
  • Date: Thu, 2 May 2013 07:33:56 +0200

Hi all,

as many of you, I am experiencing DDoS attack againts isc.org
and none of guides to defend againts them is applicable
to my situation because my server is only VPS based on OpenVZ
platform and therefore my iptables does not have matches
string or recent.

So I decided to use bind9's rate-limit option. I wanted to ask
if someone has experience with it and what are best options
to mitigate DDoS againts isc.org. So far I am using defaults
and it seems to kinda work but I am curious if there is something
better. There's not much about this topic on google.

Or if there is completely different way of protection..

Thanks in advance ^_^ ,
Paladin

Attachment: pgpRMtZatpa4B.pgp
Description: PGP signature



  • [opennic-dns-operations] using bind9's rate-limit to protect againts ddos against isc.org, Paladin, 05/02/2013

Archive powered by MHonArc 2.6.19.

Top of Page