Bind Configuration
der.hans
PLUGd at LuftHans.com
Sun Dec 7 22:42:11 MST 2014
Am 07. Dez, 2014 schwätzte Michael Butash so:
> You'll want to allow tcp/53 if doing any sort of public dns - anything
> greater than 1500 bytes (ie most domain-keys//spf records), and also any
True, if you're doing those things, you might have large dns payloads and
need tcp. If you think they cause problems rather than fixing them, then
...
> anomaly mitigation gear (the things that keep 400gb DDoS at bay) use that to
What would anomaly mitigation gear be doing to cause large dns payloads?
That's a serious question as I don't even know what anomaly mitigation
gear is.
> figure our if you're real or not. Blocking tcp for dns is not a good idea as
> a whole, it's just RFC-compliant behavior things expect.
As I recall, the RFC only specifies tcp for large payloads. Don't allow
them and tcp isn't necessary.
ciao,
der.hans
> -mb
>
>
> On 12/07/2014 09:17 PM, der.hans wrote:
>> BTW, also firewall TCP port 53 to only allow connections from your slaves
>> unless you're certain you really want it open.
>>
>> ciao,
>>
>> der.hans
>
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss at lists.phxlinux.org
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>
--
# http://www.LuftHans.com/ http://www.PhxLinux.org/
# Don't step in front of speeding cars, don't eat explosives
# and don't use m$ LookOut :). - der.hans
More information about the PLUG-discuss
mailing list