Wpis z mikrobloga

Mireczki taka sytuacja, sporo procka mi #bind zżera takim czymś

27-Sep-2018 21:37:07.961 queries: info: client 58.218.66.225#57391 (USADF.GOV): query: USADF.GOV IN ANY +E (192.168.0.200)
27-Sep-2018 21:37:07.965 queries: info: client 58.218.66.225#57391 (USADF.GOV): query: USADF.GOV IN ANY +E (192.168.0.200)
27-Sep-2018 21:37:07.976 queries: info: client 58.218.66.225#57391 (USADF.GOV): query: USADF.GOV IN ANY +E (192.168.0.200)
27-Sep-2018 21:37:07.978 queries: info: client 122.114.207.223#80 (aids.gov): query: aids.gov IN ANY +E (192.168.0.200)
27-Sep-2018 21:37:07.993 queries: info: client 104.13.223.83#80 (aids.gov): query: aids.gov IN ANY +E (192.168.0.200)

jak temu zaradzić?
#linux #serwery
  • 13
@Barricade If your DNS server is a local caching server, set

allow-query { ; };

in options. And, in each zone:

allow-query { any; };

If you are not using it as a caching server, set it on options to none;

allow-query { none; };

Basically, you don't want your server answering to domains you are not authoritative.
@BuMRK: no właśnie ten sposób coś mi pokrzaczył całego fail2ban
Teraz cały czas w logach f2b mam napisane, że adres już został dodany do listy zbanowanych, więc skoro znowu się pojawia to iptables wcale go nie wycina