We host two public DNS servers.
Lately, we've had some minor stability problems on them that we've never had before. Namely, pings (as monitored by Whatsup Gold) will fail sometimes, and DNS lookups can also fail.
I looked at the router port (Cisco 7206 Ethernet port) that connects to the switch that the DNS servers are plugged in to, and there are lots of collisions and dropped packets. I probably shouldn't be seeing these, at least not as many as I am.
Working back up the line, I installed wireshark on one of the DNS servers. Immediately, I saw a LOT of DNS requests for .cn domains originating from IP addresses on my public subnet that are not in use. I see the ARP requests from the DNS server, which of course go unanswered. Also, all of these packets have ridiculously low TTLs, like 2 and 3.
It's a weird problem that I'm not sure where to look.
Anyone have any ideas where to go next in potentially filtering out these spoofed IPs?
Lately, we've had some minor stability problems on them that we've never had before. Namely, pings (as monitored by Whatsup Gold) will fail sometimes, and DNS lookups can also fail.
I looked at the router port (Cisco 7206 Ethernet port) that connects to the switch that the DNS servers are plugged in to, and there are lots of collisions and dropped packets. I probably shouldn't be seeing these, at least not as many as I am.
Working back up the line, I installed wireshark on one of the DNS servers. Immediately, I saw a LOT of DNS requests for .cn domains originating from IP addresses on my public subnet that are not in use. I see the ARP requests from the DNS server, which of course go unanswered. Also, all of these packets have ridiculously low TTLs, like 2 and 3.
It's a weird problem that I'm not sure where to look.
Anyone have any ideas where to go next in potentially filtering out these spoofed IPs?