Select Your Language

Infrastructure and Management

Cloud Computing

Storage

Runtimes

Integration and Automation

  • Comments
  • TAM Tip: Secure your DNS Servers!

    Posted on
    A recent DDoS attack [1] directed to SpamHaus generated close to 300 Gbps of internet traffic, and a significative amount of traffic was generated by open DNS servers [2]. US-CERT issued an alert [3], in order to reduce the surface attack, as there are approximately 25 million misconfigured exploitable DNS servers [4]. Check if your DNS server only allows recursive queries from your target networks. Also, an interesting new feature in BIND, is the Response Rate Limiting (RRL) option [5,6], which limits how much similar queries a given zone can reply to a remote host in an interval. This feature is available in the latest (bind-9.8.2-0.17.rc1.el6_4.4) RHEL6 BIND server. For more information about DNS recursion, refer to this Red Hat knowledgebase article.
     
    References:

    by

    points

    Responses

    Red Hat LinkedIn YouTube Facebook X, formerly Twitter

    Quick Links

    Help

    Site Info

    Related Sites

    © 2026 Red Hat