[dns-operations] maybe a small tcp flood
Stefan Ubbink
Stefan.Ubbink at sidn.nl
Wed Jun 23 03:25:09 UTC 2021
On Tue, 22 Jun 2021 15:56:16 -0700
Randy Bush <randy at psg.com> wrote:
> >> tcp query flood for cctlds and sec.cctlds, could be others
> >> being sent via popular open servers: goog, neustar, ...
> >> O(100)qps or higher
> >
> > - What was the duration of the event (UTC time start and end)?
>
> after a short break, it is ongoing
>
> > - Any stats on the mix of qnames?
> > * Repeated or distinct?
> > * Extant, NODATA or NXDOMAIN?
>
> i am just running dnstop from cli.
Does your dnstop support TCP? The man page on my machine has the
following mentioned under BUGS:
Does not support TCP at this time.
--
Stefan Ubbink
DNS & Systems Engineer
Present: Mon, Tue, Wed, Fri
SIDN | Meander 501 | 6825 MD | ARNHEM | The Netherlands
T +31 (0)26 352 55 00
https://www.sidn.nl
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20210623/7b7f8a67/attachment.sig>
More information about the dns-operations
mailing list