[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#396618: ITP: dns-flood-detector -- DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting the use of one's nameserver to facilitate spam.



Package: wnpp
Severity: wishlist
Owner: Jan Wagner <waja@cyconet.org>

* Package name    : dns-flood-detector
  Version         : 1.12
  Upstream Author : Dennis Opacki <dopacki@adotout.com>
* URL             : http://www.adotout.com/
* License         : GPL 2
  Programming Lang: C
  Description     : DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting the use of one's nameserver to facilitate spam.

DNS Flood Detector uses libpcap (in non-promiscuous mode) to monitor incoming dns queries to a nameserver. The tool may be run in one 
of two modes, either daemon mode or "bindsnap" mode. In daemon mode, the tool will alarm via syslog. In bindsnap mode, the user is 
able to get near-real-time stats on usage to aid in more detailed troubleshooting.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-2-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)



Reply to: