Malicious DNS request?

Hi,

thanks for your help.

I noticed that the requests of those non-exist domain
name disappeared yesterday. But the NXDOMAIN record in
named.stats keep increasing. ( see attachment)
I'm using BIND9.2.5 & BIND9.3.1 on two Solaris box,
each box has two CPUs installed. it's found BIND8.4.6
running on one CPU could reach the throughput of
BIND9.*.* running on two CPUs.

Could we improve server throughput or lower lower the
effect of those requests on NXDOMAIN?

Joe

joe_hznm@yahoo.com.sg (Joe Shen) writes:

I'm using BIND9.2.5 & BIND9.3.1 on two Solaris box,
each box has two CPUs installed. it's found BIND8.4.6
running on one CPU could reach the throughput of
BIND9.*.* running on two CPUs.

Could we improve server throughput or lower lower the
effect of those requests on NXDOMAIN?

yes. but "we" isn't nanog. can you take your bind-specific questions
to a bind-related mailing list or newsgroup? www.isc.org has pointers.

Has anyone had any experience using Network Mitigation devices like the
Cisco Guard XT 5650? I am looking to install one in our network and would
like to know if anyone has used the Cisco device?

thanks

Do you have amny information about last Microsoft problems with security
patches? We can see, how
one of last updates broke MTU discovery (not totally, but it restricts
number of discovered pathes so servers tsop working in a few days). And,
amazingly, no one published this problem.

There is discussion on ntbugtraq

http://www.ntbugtraq.com/default.aspx?pid=36&sid=1&A2=ind0505&L=ntbugtraq&T=0&O=D&F=N&P=192

         ---Mike