22-Nov-2012 10:50:22.612 client 184.168.72.113#26636 (isc.org): query: isc.org IN ANY +ED (192.168.200.12)
22-Nov-2012 10:50:23.372 client 93.170.127.96#55471 (isc.org): query: isc.org IN ANY +ED (192.168.200.12)
# Fail2Ban configuration file for named (bind9). Trying to generalize the
# structure which is general to capture general patterns in log
# lines to cover different configurations/distributions
#
# Author: Yaroslav Halchenko
#
# $Revision: 730 $
#
[Definition]
#
# Daemon name
_daemon=named
#
# Shortcuts for easier comprehension of the failregex
__pid_re=(?:\[\d+\])
__daemon_re=\(?%(_daemon)s(?:\(\S+\))?\)?:?
__daemon_combs_re=(?:%(__pid_re)s?:\s+%(__daemon_re)s|%(__daemon_re)s%(__pid_re)s?:)
# hostname daemon_id spaces
# this can be optional (for instance if we match named native log files)
__line_prefix=(?:\s\S+ %(__daemon_combs_re)s\s+)?
# Option: failregex
# Notes.: regex to match the password failures messages in the logfile.
# Values: TEXT
#
failregex = %(__line_prefix)sclient <HOST>#.+: query: (ripe.net|isc.org) IN ANY \+ED*
# Option: ignoreregex
# Notes.: regex to ignore. If this regex matches, the line is ignored.
# Values: TEXT
#
ignoreregex =
Are these servers used by (internal) clients to resolve? If not, turn off recursion.parcival said:and recursion is acceptable and expected for all other zones.
# "bantime" is the number of seconds that a host is banned.
bantime = 600
# A host is banned if it has generated "maxretry" during the last "findtime"
# seconds.
findtime = 600
# "maxretry" is the number of failures before a host get banned.
maxretry = 8
Doesn't matter, I can still use you as an amplifier if I used freebsd.org (or any of the millions of other domains) instead of ripe.net or isc.org.parcival said:I block not generally everything immediately (ripe.net or isc.org).
With these parameters of fail2ban, i can control that "normal users" can reach also ripe.net or isc.org.