- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
RFC 8482 implementation - minimizing Query Type ANY
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-26-2019 02:22 AM
Hello,
A new RFC (rfc 8482) tries to minimize the DDOS risk of the ANY query.
Is it currently possible to change the ANY query return value or block the query altogether? Or do we need to post a feature request with Infoblox.
Reference:
https://tools.ietf.org/html/rfc8482
https://blog.cloudflare.com/rfc8482-saying-goodbye-to-any/
Cesare
Solved! Go to Solution.
Re: RFC 8482 implementation - minimizing Query Type ANY
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-28-2019 04:47 PM
Advanced DNS Protection allows you to block or rate limit use of the ANY query in multiple ways.
- By default rule 130400100 under DNS Amplification and Reflection will rate limit at 5 reflection/amplifcation queries per second. Type ANY queries will trigger this rate limit. This rule can be tuned more aggresively if needed.
- Rule 130502800 under DNS Message types can be used to block Type ANY queries.
- Type ANY queries can be blocked and rate limited by fqdn or overall using custom ADP rules as well.
Re: RFC 8482 implementation - minimizing Query Type ANY
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-10-2024 06:34 AM
so there is no other way then buying a new license for ADP to block Any queries ?