this post was submitted on 19 Nov 2025
43 points (95.7% liked)

Linux

63552 readers
478 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] hendrik@palaver.p3x.de 1 points 3 months ago* (last edited 3 months ago) (1 children)

Seems knot-dns has DNSSEC turned on per default. But what's all the IP addresses in the config for, if not to offer recursive lookup? ~~That enables an amplification attack. I think they'll do lookups to put strain on other servers, not necessarily your zones.~~

[–] non_burglar@lemmy.world 2 points 3 months ago* (last edited 3 months ago) (1 children)

That enables an amplification attack.

Technically, you're right.

An amplification attack is just telling the server to respond to a different/wrong ip with the response to a query than the actual asking request. This is solved generally with DNSSEC verifying the origin and requester ips match, if not, the request is dumped.

However, if your authoritative server doesn't have records for the request, it will simply forward it (if configured to do so) to an upstream and probably hardened server, or drop the request. Either way, it becomes not your problem.

So unless the amplification attack is asking for records your server is actually hosting and for which your server is authoritative, this isn't a huge concern.

[–] hendrik@palaver.p3x.de 2 points 3 months ago* (last edited 3 months ago)

Thanks! Learned something today. Last time I opened port 53 to the public it didn't take long and I was sending out several Megabits per second in DNS traffic. Constantly. Mostly querying the same few things. But I guess I had it the wrong way round and that wasn't the target. Or I've seen a different attack type... Guess I can now try again with the new knowledge.