03-26-2019 02:22 AM
A new RFC (rfc 8482) tries to minimize the DDOS risk of the ANY query.
Is it currently possible to change the ANY query return value or block the query altogether? Or do we need to post a feature request with Infoblox.
Solved! Go to Solution.
03-28-2019 04:47 PM
Advanced DNS Protection allows you to block or rate limit use of the ANY query in multiple ways.
- By default rule 130400100 under DNS Amplification and Reflection will rate limit at 5 reflection/amplifcation queries per second. Type ANY queries will trigger this rate limit. This rule can be tuned more aggresively if needed.
- Rule 130502800 under DNS Message types can be used to block Type ANY queries.
- Type ANY queries can be blocked and rate limited by fqdn or overall using custom ADP rules as well.