summaryrefslogtreecommitdiffstats
path: root/network/dnsflood/dns_flood_detector.1
diff options
context:
space:
mode:
author Menno E. Duursma <druiloor@zonnet.nl>2010-05-11 22:54:43 +0200
committer Robby Workman <rworkman@slackbuilds.org>2010-05-11 22:54:43 +0200
commitd12891f9e75139ed1eadb243574ce5cf4b2a60cb (patch)
tree6a7b2a265d388178dca877de78ad595f55cf0a39 /network/dnsflood/dns_flood_detector.1
parent56562396e7a7d0b151cdb1ef2442a85d30a38957 (diff)
downloadslackbuilds-d12891f9e75139ed1eadb243574ce5cf4b2a60cb.tar.gz
slackbuilds-d12891f9e75139ed1eadb243574ce5cf4b2a60cb.tar.xz
network/dnsflood: Added to 12.1 repository
Diffstat (limited to 'network/dnsflood/dns_flood_detector.1')
-rw-r--r--network/dnsflood/dns_flood_detector.157
1 files changed, 57 insertions, 0 deletions
diff --git a/network/dnsflood/dns_flood_detector.1 b/network/dnsflood/dns_flood_detector.1
new file mode 100644
index 0000000000..cb98d07af9
--- /dev/null
+++ b/network/dnsflood/dns_flood_detector.1
@@ -0,0 +1,57 @@
+.TH dns_flood_detector 1 "Tuesday, September 2, 2003" "GNU/Linux" ""
+.SH NAME
+dns_flood_detector \- a tool to detect abusive usage levels on high traffic nameservers.
+.SH SYNOPSIS
+
+.B dns_flood_detector
+[-i <IFNAME>] [-t N] [-a N] [-w N] [-x N] [-bdvh]
+
+.SH DESCRIPTION
+.B dns_flood_detector
+was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting the use of ones nameserver to facilitate spam. DNS Flood Detector uses libpcap (in non-promiscuous mode) to monitor incoming dns queries to a nameserver. The tool may be run in one of two modes, either daemon mode or "bindsnap" mode. In daemon mode, the tool will alarm via syslog. In bindsnap mode, the user is able to get near-real-time stats on usage to aid in more detailed troubleshooting.
+
+.SH OPTIONS
+.TP
+.I -i <IFNAME>
+specify ethernet device name to listen on
+.TP
+.I -t N
+alarm at >N queries per second
+.TP
+.I -a N
+reset alarm after N seconds
+.TP
+.I -w N
+calculate stats every N seconds
+.TP
+.I -x N
+create N buckets
+.TP
+.I -b
+run in foreground in bindsnap mode
+.TP
+.I -d
+run in background in daemon mode
+.TP
+.I -v
+verbose output - use again for more verbosity
+.TP
+.I -h
+display help information
+
+.SH EXAMPLE
+.B /dns_flood_detector -v -v -b -t10
+
+[15:14:56] source [192.168.1.45] - 0 qps tcp : 24 qps udp [8 qps A] [16 qps PTR]
+
+[15:14:56] source [10.0.24.2] - 0 qps tcp : 15 qps udp [15 qps A]
+
+[15:15:06] source [192.168.1.45] - 0 qps tcp : 24 qps udp [8 qps A] [16 qps PTR]
+
+[15:15:06] source [10.0.24.2] - 0 qps tcp : 15 qps udp [14 qps A]
+
+[15:15:16] source [192.168.1.45] - 0 qps tcp : 23 qps udp [7 qps A] [15 qps PTR]
+.SH AUTHOR
+Dennis Opacki
+.B <dopacki@adotout.com> http://www.adotout.com/dnsflood.html
+