Yes, it is. The idiots at hackforums discovered dns amplification attacks a few months ago and now they're attacking my customers often, most are from public open resolvers.
'Any' public service is usually a 'bad idea'. There are always people out there that get a kick out of abusing stuff. Whether it's a gameserver, DNS server or even a mis-configured mod_proxy apache module cough.
What's your purpose for doing so? I'd say if you're doing it for a thesis or an experiment on DDoS / DNS amplification attacks and how to prevent them, then I think it's a great idea and you're in the right direction. Go for it.
Comments
Yes, it is. The idiots at hackforums discovered dns amplification attacks a few months ago and now they're attacking my customers often, most are from public open resolvers.
Few providers ban the use of recursive DNS queries now...
'Any' public service is usually a 'bad idea'. There are always people out there that get a kick out of abusing stuff. Whether it's a gameserver, DNS server or even a mis-configured mod_proxy apache module cough.
Unless you're Google,
don't
make one.
The quadruple combo means you're serious. H1 + B + I + U makes an extreme combination.
Long story short, there is already plenty of them run by large corps that do the job way better then you could.
What's your purpose for doing so? I'd say if you're doing it for a thesis or an experiment on DDoS / DNS amplification attacks and how to prevent them, then I think it's a great idea and you're in the right direction. Go for it.
I dont be so drunken that i would run them public, i was only thinking about it.
Other question, its possible to add a black/whitelist to bind9?
Yes you can.
LOL...