[Pdns-users] Mitigating / stopping recent Denial of Service Attacks

okTurtles hi at okturtles.com
Wed Jun 4 16:49:05 UTC 2014

I figured out the issue, cloudflare was blocking my server's primary IP (for no reason that I can tell of).

They might be blocking all of the IPs on that particular block (maybe someone was misbehaving on another VPS?). So far as I know they've never received queries from my IP before.

Switching to another IP via query-local-address fixed the problem.

Thank you for your help!


Please do not email me anything that you are not comfortable also sharing with the NSA.

On Jun 4, 2014, at 11:04 AM, bert hubert <bert.hubert at netherlabs.nl> wrote:

> On 04 Jun 2014, at 17:20, okTurtles <hi at okturtles.com> wrote:
>> I tried commenting out `forward-zones-recurse`, but that made things worse. Loading pastebin.com and ycombinator.com failed with SERVFAIL.
>> I did manage to get the trace-regex for them though: http://pastebin.com/bvsRQc81
> It mentions four timeouts reaching required servers. If your link is actually congested, you could try raising the timeout  ‘network-timeout=5000’.
> 	Bert

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.powerdns.com/pipermail/pdns-users/attachments/20140604/644db2c0/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 841 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://mailman.powerdns.com/pipermail/pdns-users/attachments/20140604/644db2c0/attachment-0001.sig>

More information about the Pdns-users mailing list