While setting up blackholes in BIND works fine when I did this on Linux I found 
that setting up iptables to do drops for known bad IPs/ranges was slightly 
better as the traffic never gets to BIND in the first place as it is stopped at 
kernel level.  It simply DROPs the packet without telling the bad guys why 
packets didn't go through.

Example rules for various IPs that have annoyed me in the past:
-A RH-Firewall-1-INPUT -s 68.222.240.22 -j DROP
-A RH-Firewall-1-INPUT -s 203.142.82.222 -j DROP
-A RH-Firewall-1-INPUT -s 217.54.97.137 -j DROP
-A RH-Firewall-1-INPUT -s 217.219.20.226 -j DROP
-A RH-Firewall-1-INPUT -s 218.212.248.7 -j DROP

Of course you can do ranges as well in iptables.

Also you should be sure that you're restricting things like recursion and cache 
to trusted environments (i.e. internal lookups) while still allowing lookups 
for domains you're authoritative for to the outside.





-----Original Message-----
From: bind-users-bounces+jlightner=water....@lists.isc.org 
[mailto:bind-users-bounces+jlightner=water....@lists.isc.org] On Behalf Of 
TCPWave Customer Care
Sent: Sunday, October 16, 2011 7:43 PM
To: babu dheen
Cc: bind-users@lists.isc.org
Subject: Re: DNS Sinkhole in BIND

Babu

The following example defines two access control lists and uses an
options statement to define how they are treated by the nameserver:

acl black-hats { 10.0.2.0/24; 192.168.0.0/24; };
acl red-hats { 10.0.1.0/24;  };

options {
        blackhole { black-hats; };
        allow-query { red-hats; };
        allow-recursion { red-hats; };
}

This example contains two access control lists, black-hats and red-hats.
Hosts in the black-hats list are denied access to the nameserver, while
hosts in the red-hats list are given normal access.

Regards
TCPWave Customer Care


On Sun, 2011-10-16 at 23:30 +0530, babu dheen wrote:
> Hi,
>
>  Can anyone help me how to setup DNS Sinkhole in BIND on Linux 32 bit
> edition.
>
> Regards
> babu
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users


_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users




Athena(r), Created for the Cause(tm)
Making a Difference in the Fight Against Breast Cancer

---------------------------------
CONFIDENTIALITY NOTICE: This e-mail may contain privileged or confidential 
information and is for the sole use of the intended recipient(s). If you are 
not the intended recipient, any disclosure, copying, distribution, or use of 
the contents of this information is prohibited and may be unlawful. If you have 
received this electronic transmission in error, please reply immediately to the 
sender that you have received the message in error, and delete it. Thank you.
----------------------------------

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to