<div class="gmail_quote">On Mon, Sep 17, 2012 at 3:55 PM, Gilbert E. Detillieux <span dir="ltr"><<a href="mailto:gedetil@cs.umanitoba.ca" target="_blank">gedetil@cs.umanitoba.ca</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im"><br></div>
Sean, do you have a working iptables example that you've used? I've used the "recent" module on services like SSH, POP, and IMAP, but not for DNS.</blockquote><div><br></div><div>No, I've always avoided the problem by using someone else's servers or ACL'ing things to my network.</div>
<div><br></div><div>-m recent is how I'd start, too. Just log the violations instead of dropping them to start.</div><div><br></div><div>Depending on what the impact would be to your network, policing/shaping your DNS traffic to an arbitrary limit might also work. Could be done with iptables, the Linux shaper, or an upstream router.</div>
<div><br></div><div>Sean</div><div><br></div></div>-- <br>Sean Walberg <<a href="mailto:sean@ertw.com" target="_blank">sean@ertw.com</a>> <a href="http://ertw.com/" target="_blank">http://ertw.com/</a><br>