<p dir="ltr"><br>
El feb 25, 2015 5:25 AM, "Michael Ströder" <<a href="mailto:michael@stroeder.com">michael@stroeder.com</a>> escribió:<br>
><br>
> Ciro Iriarte wrote:<br>
> > 2015-02-24 17:49 GMT-03:00 Ciro Iriarte <<a href="mailto:cyruspy@gmail.com">cyruspy@gmail.com</a>>:<br>
> ><br>
> >> Hi!, I'm seeing a lot of messages of type "Timeout from remote TCP client<br>
> >> 10.XXX.XXX.XXX", it seems to be an attack given we have "any-to-tcp = yes".<br>
> >><br>
> >> Is this usual?, is there anyway to identify the attackers?. The service is<br>
> >> working fine and we have in our roadmap constant packed capture for data<br>
> >> mining but I find this behaviour new/interesting today :)<br>
> >><br>
> >> Any comments?<br>
> >><br>
> >> Regards,<br>
> ><br>
> > Well, never mind. After all, those are legitimate clients and there seems<br>
> > to be a firewall with connection tracking issues. What's unexpected to me<br>
> > is having TCP requests, I was expecting only UDP traffic from end users.<br>
><br>
> DNSSEC used?<br>
><br>
> Ciao, Michael.<br>
><br>
As far as I remember, pdns-recursor doesn't support DNSSEC.</p>
<p dir="ltr">Regards,<br>
Ciro</p>