This script is for Slackware 13.0 and may be outdated.

SlackBuilds Repository

13.0 > Network > dnsflood (1.12)

DNS Flood Detector was developed to detect abusive usage levels on high traffic 
nameservers and to enable quick response in halting the use of one's nameserver
to facilitate spam.

DNS Flood Detector uses libpcap (in non-promiscuous mode) to monitor incoming
dns queries to a nameserver. The tool may be run in one of two modes, either
daemon mode or "bindsnap" mode. In daemon mode, the tool will alarm via syslog.
In bindsnap mode, the user is able to get near-real-time stats on usage to aid
in more detailed troubleshooting.

A /etc/rc.d/rc.dnsflood daemon control script is aditionally included.

Maintained by: Menno E. Duursma
Keywords: dns,security,anti-spam
ChangeLog: dnsflood


Source Downloads:
dnsflood-1.12.tgz (ab893e3278e3569bc3d5beab7fb98d3f)

Download SlackBuild:
dnsflood.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Validated for Slackware 13.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2018 Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications