<div dir="auto"><div>Thanks.</div><div dir="auto"><br></div><div dir="auto">I will read-in on dnsdist this week.</div><div dir="auto">In the past i have treid it but dit something wrong in the config. I had pdns and dnsdig on one server. I think it would be better to use a sepperste vps for it.<br><br><div data-smartmail="gmail_signature" dir="auto">Met vriendelijke groet,<br><br>Steffan Noord</div><br><div class="gmail_quote" dir="auto"><div dir="ltr" class="gmail_attr">Op ma 23 okt. 2023 10:00 schreef Andreas Danzer via Pdns-users <<a href="mailto:pdns-users@mailman.powerdns.com" target="_blank" rel="noreferrer">pdns-users@mailman.powerdns.com</a>>:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hello Steffan,<br>
<br>
that kind of attack is quite common these days. I would recommend <br>
putting your authoriative nameservers behind dnsdist. Dnsdist acts as a <br>
DNS firewall, proxy and loadbalancer.<br>
<br>
We're running some rulesets on dnsdist, that e.g. dynamically block IPs <br>
that "produce" unusual high numbers of NXDOMAIN answers with their <br>
queries (which is usually the case with IPs taking part in PRSD <br>
attacks). You can also limit the number of queries per IP or loadbalance <br>
queries to more than one backend DNS node. dnsdist is extreme powerfull <br>
and versatile and the perfect tool to protect your DNS nodes.<br>
<br>
To be able to see, which domains are actually attacked, you should not <br>
use pdns query logging - it has a big performance impact which makes the <br>
situation even worse during an attack. Better use some traffic <br>
capturing/sampling tools like pktvisor. It feeds data about the dns <br>
queries to prometheus, which can be visualized with grafana. You can use <br>
that same setup (prometheus & grafana) to monitor your dndist and pdns <br>
installations.<br>
<br>
Am 20.10.2023 um 15:52 schrieb Steffan via Pdns-users:<br>
> Well the problem was a small attack targeting a lot of subdomains of a client.<br>
> <br>
> Oct 18 21:40:47 ns1 pdns_server[2135429]: Remote 117.54.16.252 wants '<a href="http://payments.xxx.com" rel="noreferrer noreferrer noreferrer" target="_blank">payments.xxx.com</a>|A', do = 1, bufsize = 1232 (4096): packetcache MISS<br>
> Oct 18 21:40:47 ns1 pdns_server[2135429]: Remote 2a02:2f0e:5fff:ffff::2 wants '<a href="http://skyline.xxx.com" rel="noreferrer noreferrer noreferrer" target="_blank">skyline.xxx.com</a>|A', do = 1, bufsize = 1232 (4096): packetcache MISS<br>
> Oct 18 21:40:47 ns1 pdns_server[2135429]: Remote 2a04:c602:409:fe::27 wants '<a href="http://app3.xxx.com" rel="noreferrer noreferrer noreferrer" target="_blank">app3.xxx.com</a>|A', do = 1, bufsize = 1232: packetcache MISS<br>
> <br>
> I comes from many different ips and only 3 minutes 150mb/s<br>
> <br>
> I forgot on that time that I had logging on. So it could be that without the logging the dns would be fast enough to handle it<br>
> <br>
> Average bandwith load is abouth 160k/s so no big deal.<br>
> <br>
> <br>
> Met vriendelijke groet,<br>
> <br>
> Steffan Noord<br>
> <br>
> <br>
> <br>
> <br>
> <br>
> <br>
> -----Oorspronkelijk bericht-----<br>
> Van: Victor Hugo dos Santos <<a href="mailto:listas.vhs@gmail.com" rel="noreferrer noreferrer" target="_blank">listas.vhs@gmail.com</a>><br>
> Verzonden: vrijdag 20 oktober 2023 15:45<br>
> Aan: All about using and deploying powerdns <<a href="mailto:pdns-users@mailman.powerdns.com" rel="noreferrer noreferrer" target="_blank">pdns-users@mailman.powerdns.com</a>><br>
> CC: <a href="mailto:steffannoord@gmail.com" rel="noreferrer noreferrer" target="_blank">steffannoord@gmail.com</a><br>
> Onderwerp: Re: [Pdns-users] multi dns server<br>
> <br>
> Hello there,<br>
> <br>
> The quantity of the domain, not necessarily reflect the quantity of queries/load.<br>
> you can have 5.000 domains with 1.000 QPS or you can have 1 domain with 15.000 QPS !! :-)<br>
> <br>
> Anyway, you should monitor your servers and see if this issue is some kind of "normal" stuff or some kind of problem (attack, data leak, misconfiguration, etc). When you detect the problem, then you can decide what to do.<br>
> <br>
> About NS3, NS4, it is a totally valid option, not only to balance the queries between servers, but to improve your HA too !!! Nevertheless, you still need to detect where the problem is, if not, you are only going to spend time with the new NS server but the problem will still occur.<br>
> <br>
> Let us know what you find.<br>
> <br>
> Good luck<br>
> <br>
> <br>
> <br>
> <br>
> <br>
> <br>
> <br>
> On Fri, 20 Oct 2023 at 12:01, Steffan via Pdns-users <<a href="mailto:pdns-users@mailman.powerdns.com" rel="noreferrer noreferrer" target="_blank">pdns-users@mailman.powerdns.com</a>> wrote:<br>
>><br>
>> Hello,<br>
>><br>
>><br>
>><br>
>> 2 days ago my 2 dns servers has 150mbit of data to process and the dns went down.<br>
>> After the flood was stopped it came up again.<br>
>><br>
>><br>
>><br>
>> Im using pdns 4.8.3 on centos with mysql backends<br>
>><br>
>><br>
>> I just wondering what will the best idee to spread the risk<br>
>><br>
>> It is handling about 5000 domains so not a very big system.<br>
>><br>
>> is it better to use a ns3, ns4 to spread the loads on multi servers Or<br>
>> some kind of load balancing or multi ip setup on ns1 and ns2 on multi<br>
>> servers<br>
>><br>
>><br>
>><br>
>> Any other idees are welcome<br>
>><br>
>><br>
>><br>
>> With regard<br>
>><br>
>><br>
>><br>
>> Steffan<br>
>><br>
>><br>
>><br>
>><br>
>><br>
>><br>
>><br>
>><br>
>><br>
>> _______________________________________________<br>
>> Pdns-users mailing list<br>
>> <a href="mailto:Pdns-users@mailman.powerdns.com" rel="noreferrer noreferrer" target="_blank">Pdns-users@mailman.powerdns.com</a><br>
>> <a href="https://mailman.powerdns.com/mailman/listinfo/pdns-users" rel="noreferrer noreferrer noreferrer" target="_blank">https://mailman.powerdns.com/mailman/listinfo/pdns-users</a><br>
> <br>
> <br>
> <br>
> --<br>
> --<br>
> Victor Hugo dos Santos<br>
> <a href="http://www.vhsantos.net" rel="noreferrer noreferrer noreferrer" target="_blank">http://www.vhsantos.net</a><br>
> Linux Counter #224399<br>
> <br>
> _______________________________________________<br>
> Pdns-users mailing list<br>
> <a href="mailto:Pdns-users@mailman.powerdns.com" rel="noreferrer noreferrer" target="_blank">Pdns-users@mailman.powerdns.com</a><br>
> <a href="https://mailman.powerdns.com/mailman/listinfo/pdns-users" rel="noreferrer noreferrer noreferrer" target="_blank">https://mailman.powerdns.com/mailman/listinfo/pdns-users</a><br>
_______________________________________________<br>
Pdns-users mailing list<br>
<a href="mailto:Pdns-users@mailman.powerdns.com" rel="noreferrer noreferrer" target="_blank">Pdns-users@mailman.powerdns.com</a><br>
<a href="https://mailman.powerdns.com/mailman/listinfo/pdns-users" rel="noreferrer noreferrer noreferrer" target="_blank">https://mailman.powerdns.com/mailman/listinfo/pdns-users</a><br>
</blockquote></div></div></div>