Debugging a DNSmasq server using it's logs, I find a LOT of:
dnsmasq: query[ANY] . from RANDOM-IP
dnsmasq: query[ANY] . from RANDOM-IP
dnsmasq: query[ANY] . from RANDOM-IP
dnsmasq: query[ANY] . from RANDOM-IP
All legitimate queries seem to be more specific, like:
dnsmasq: query[A] specificdomain.com from KNOWN-IP
EDIT: This is NOT intended as a public DNS service
We want to create a white-list DNS filter, it should ONLY answer to a list of specified domains. Typical amplification attacks would only affect our server, nobody else. We just want a cleaner log to be able to operate better.
The intended operation is:
- Client uses this DNS for their internet connection.
- Client requests domain resolution
- If the domain is in the white-list, we resolve, if not, we don't reply.
How can we achieve this? Only process request that match our white-list, discard anything else.
ANYqueries directed at the root zone doesn't make much sense. I'll remove the dupe flag, but it sounds like you need to provide as much detail as possible in regards to your atypical setup. – Andrew B Apr 06 '17 at 22:29