[Pdns-users] Mitigating / stopping recent Denial of Service Attacks
okTurtles
hi at okturtles.com
Wed Jun 4 16:49:05 UTC 2014
I figured out the issue, cloudflare was blocking my server's primary IP (for no reason that I can tell of).
They might be blocking all of the IPs on that particular block (maybe someone was misbehaving on another VPS?). So far as I know they've never received queries from my IP before.
Switching to another IP via query-local-address fixed the problem.
Thank you for your help!
Cheers,
Greg
--
Please do not email me anything that you are not comfortable also sharing with the NSA.
On Jun 4, 2014, at 11:04 AM, bert hubert <bert.hubert at netherlabs.nl> wrote:
>
> On 04 Jun 2014, at 17:20, okTurtles <hi at okturtles.com> wrote:
>
>> I tried commenting out `forward-zones-recurse`, but that made things worse. Loading pastebin.com and ycombinator.com failed with SERVFAIL.
>>
>> I did manage to get the trace-regex for them though: http://pastebin.com/bvsRQc81
>
> It mentions four timeouts reaching required servers. If your link is actually congested, you could try raising the timeout ‘network-timeout=5000’.
>
> Bert
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.powerdns.com/pipermail/pdns-users/attachments/20140604/644db2c0/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 841 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://mailman.powerdns.com/pipermail/pdns-users/attachments/20140604/644db2c0/attachment-0001.sig>
More information about the Pdns-users
mailing list