The latest attacks: loads and loads of queries for the root nameservers,
which gives amplification in resolvers with not completely perfect
configurations (a complete list of root nameservers) and the same amount of
traffic for resolvers which are completely closed to resolving for
the outside world. These are probably an attempt to flood an IP using
faked queries.
Samples:
Jan 19 06:41:04 greenblatt named[6377]: client 69.50.142.110#53930: query (cache) './NS/IN' denied
Jan 19 06:41:13 greenblatt named[6377]: client 69.50.142.110#15557: query (cache) './NS/IN' denied
Jan 20 16:31:47 greenblatt named[6377]: client 66.230.160.1#32412: query (cache) './NS/IN' denied
Jan 20 16:31:59 greenblatt named[6377]: client 66.230.160.1#8478: query (cache) './NS/IN' denied
Already noted at sans:
DNS queries for "." isc handler's dairy where the active IPs are listed.
And suddenly I see in the logs:
Jan 20 08:36:13 greenblatt named[6377]: client 208.37.177.62#46265: query (cache) './NS/IN' denied
Jan 20 11:50:48 greenblatt named[6377]: client 208.37.177.62#46265: query (cache) './NS/IN' denied
I noticed
that IP doing weird DNS stuff before. So 'being attacked' is the right conclusion.