Hi,
i have just received an email from Zen Abuse saying that i have an "open recursive DNS server" running and it may be able to contribute to a DDOS attack.
within the network we do run bind but only for DNS caching services - no DNS records are hosted and its not accessible from outside the network. Bind also has custom zones so that www.mydomain.com redirects to 192.168.2.x rather than an external IP.
Bind has the Zen DNS servers as forwarders. Our router blocks any incoming requests so its not like anyone can use our internal BIND server if theyre not within the network.
As far as i can see its not actually a risk, am i right? Is there anything i can do to stop it being an open recursive DNS server?
thanks
i have just received an email from Zen Abuse saying that i have an "open recursive DNS server" running and it may be able to contribute to a DDOS attack.
within the network we do run bind but only for DNS caching services - no DNS records are hosted and its not accessible from outside the network. Bind also has custom zones so that www.mydomain.com redirects to 192.168.2.x rather than an external IP.
Bind has the Zen DNS servers as forwarders. Our router blocks any incoming requests so its not like anyone can use our internal BIND server if theyre not within the network.
As far as i can see its not actually a risk, am i right? Is there anything i can do to stop it being an open recursive DNS server?
thanks