<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
<title></title>
</head>
<body bgcolor="#ffffff" text="#333333">
Arnt Gulbrandsen wrote:
<blockquote cite="midQFOucWjlKt6iTe8bo9m1Dg.md5@libertango.oryx.com"
type="cite">
<pre wrap="">Miek Gieben writes:
</pre>
<blockquote type="cite">
<pre wrap="">[On 26 Jan, @18:32, Peter Koch wrote in "message ``sendto failed: Inval ..."]
</pre>
<blockquote type="cite">
<pre wrap=""> So, nsd could (silently) ignore DNS packets with src port 0 or log
the error with more detail or both. Opinions?
</pre>
</blockquote>
<pre wrap="">Hmm... the current behavoir of NSD should be changed IMO. The danger
is that if we log such queries we create a small DOS attack (which is
also present now).
</pre>
</blockquote>
<pre wrap=""><!---->
Since the DOS is present, does it matter if it's extended a bit? As long
as the log message doesn't fill the logs in the the absence of attacks,
I mean?
After all, anyone with access to the source can DOS nsd perfectly well
as it is.
Arnt
</pre>
</blockquote>
Set your logs so that multiple instances in succession will just be
dropped for say 10 seconds or something.<br>
<br>
C.<br>
</body>
</html>