[Pdns-users] Ongoing DNS Denial of Service attacks & 3.6.0
cyruspy at gmail.com
Sat Jan 3 04:53:52 UTC 2015
El may 30, 2014 6:08 AM, "bert hubert" <bert.hubert at netherlabs.nl> escribió:
> Hi everybody,
> To add some context to the RC1 release, many large scale resolver
> are currently seeing high levels of DNS-based denial of service attacks.
> 3.6.0 contains specific countermeaures for the current wave of attacks,
> comes with a more generic Lua feature to rapidly filter malicious traffic
> . Together these mean that the deployments that have upgraded already
> weathering the current wave of attacks with no problems at all.
> 3.6.0 is in full production in a number of large places. If you are
> currently suffering degraded performance because of DoS in 3.5 or earlier
> versions, your upgrade to RC1 will help you and your users tremendously.
> We consider RC1 production grade and will quickly follow up with the
> 3.6.0. If you upgrade now and have issues, please be assured that we will
> help you swiftly.
> Good luck!
>  As an example, see http://pastie.org/9238804 based on the new
> > Release Candidate 1 of the PowerDNS Recursor 3.6.0 is available from:
> > source: http://powerdnssec.org/downloads/pdns-recursor-3.6.0-rc1.tar.bz2
> > semistatic packages: http://powerdnssec.org/downloads/packages/
> > RHEL5/6 native:
> > You are cordially invited to (carefully) test this Release Candidate for
> > correct behaviour.
> > Full release notes, with clickable links, are available from:
> > http://doc.powerdns.com/html/changelog.html#changelog-recursor-3.6.0
> Pdns-users mailing list
> Pdns-users at mailman.powerdns.com
Hi Bert!, did the example made it to the documentation?, unluckily the
provided link is dead now.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Pdns-users