Paul Vlaar写了一封邮件,描述了RRL的一次DDoS防护效果。RRL发挥作用后将18万每秒的DNS查询量降低了80%,将2.3G每秒的攻击流量降低到70M。如下是邮件全文:

Hi all,

I just wanted to share this graph showing the effect of RRL during an
attack that we were seeing to a node of ours not doing RRL yet on that
particular nameserver.

We're still seeing spikes of up to 180k DNS queries per second, but due
to the RRL we're now at a rather steady rate of 80% query drop. Biggest
percentage I've seen so far. It does appear that for this particular
attack the source (probably spoofed) addresses are a relatively small
subset, so RRL is particularly effective at keeping traction here.

We went from ~2.3Gb/s to less than 70Mb/s on the outbound after we
turned on RRL. We're running BIND 9.8.3-vjs197.16-P4 here, and these are
the RRL config settings:

        rate-limit {
                responses-per-second 5;
                errors-per-second 5;
                window 15;
                slip 5;

Obviously this is a huge improvement for everyone involved.

I hope this is of interest or inspiration to anyone. If anyone wants to
know more details, let me know.

Much thanks goes to the developers!

注意这个Paul不是RRL的作者Paul Vixie。DNS RRL目前以BIND的补丁形式存在,该项目一直想获取BIND的官方认可,但ISC似乎没这个意向。他们担心RRL在发挥作用的同时,也制造了新的漏洞被黑客利用。