Single machine VPS

2011-10-17 Thread Nico Aragón
Hello, I'm new to Bind. My previous registrar (or was it the hosting provider?) was so kind to manage DNS for me. But now I'm required to configure a DNS server in the very same VPS that hosts the HTTP and mail server. I've managed to set it running and (apparently) working after reading some

Re: CNAME record for the root of the domain

2011-10-17 Thread Chris Thompson
On Oct 16 2011, Kevin Oberman wrote: 2011/10/16 Niccolò Belli darkba...@linuxsystems.it: I'm sorry but I still didn't understand if it's possible to do it with some workaround, and if yes HOW to do it. No, you can' have a CNAME at the top of a zone. A zone requires an SOA and CNAMEs cannot

RE: DNS Sinkhole in BIND

2011-10-17 Thread Lightner, Jeff
While setting up blackholes in BIND works fine when I did this on Linux I found that setting up iptables to do drops for known bad IPs/ranges was slightly better as the traffic never gets to BIND in the first place as it is stopped at kernel level. It simply DROPs the packet without telling

Re: DNS Sinkhole in BIND

2011-10-17 Thread babu dheen
YOu are obsolutely correct Chris.. I want to block/redirect all malware domain request intiated by clients by setting up DNS SINKHOLE in Redhat BIND server.   --- On Mon, 17/10/11, Chris Thompson c...@cam.ac.uk wrote: From: Chris Thompson c...@cam.ac.uk Subject: Re: DNS Sinkhole in BIND To:

Re: CNAME record for the root of the domain

2011-10-17 Thread Niccolò Belli
Il 17/10/2011 17:09, Matt Rowley ha scritto: but if you're ok with all of the records in the zone being identical, you could point both zones to the same file in your named.conf If I am the one who host the name server for example.com :) ___ Please

Re: DNS Sinkhole in BIND

2011-10-17 Thread Phil Mayers
On 10/17/2011 06:38 PM, babu dheen wrote: YOu are obsolutely correct Chris.. I want to block/redirect all malware domain request intiated by clients by setting up DNS SINKHOLE in Redhat BIND server. In older versions of bind, you needed to create a local zone per malware domain (or hostname).

Re: DNS Sinkhole in BIND

2011-10-17 Thread Ryan Novosielski
I do this. There may now be a smarter way, but I have a small number so this is manageable for me: configure zones for each of the evil zones. Your server will appear authoritative and you can direct clients wherever you like. I direct some of mine to a virtualhost handing out 503 errors. --

RE: DNS Sinkhole in BIND

2011-10-17 Thread Lightner, Jeff
I’m confused – does the OP want to block or does he want to redirect. “block/redirect” are two different things. What I wrote will block. If he wants to redirect that’s fine but I don’t think he’d want to redirect to his real webserver – why send bogus traffic there and also take the risk

Re: DNS Sinkhole in BIND

2011-10-17 Thread Fr34k
http://www.sans.org/reading_room/whitepapers/dns/dns-sinkhole_33523 Perhaps the above link target may help. Thanks. From: Lightner, Jeff jlight...@water.com To: Ryan Novosielski novos...@umdnj.edu; babu dheen babudh...@yahoo.co.in; Bind Users Mailing List

Re: DNS Sinkhole in BIND

2011-10-17 Thread Phil Mayers
On 10/17/2011 09:05 PM, Lightner, Jeff wrote: I’m confused – does the OP want to block or does he want to redirect. “block/redirect” are two different things. What I wrote will block. If It'll block IPs, and whole IPs at that. If the server is shared, you block all traffic to it, not just the

intermittent bad horizontal referral?

2011-10-17 Thread Karl Auer
Hi there. I have three domains, biplane.com.au, nullarbor.com.au and footprint.org.au. All are show intermittent but frequent bad horizontal referral. It happens at the .com.au level. To see it, do (for example): dig+trace biplane.com.au ns Some such queries return correctly, some end up in

Re: intermittent bad horizontal referral?

2011-10-17 Thread Chuck Swiger
Hi-- On Oct 17, 2011, at 3:37 PM, Karl Auer wrote: To see it, do (for example): dig+trace biplane.com.au ns Some such queries return correctly, some end up in a BHR loop. I don't see a bad horizontal referral being returned anywhere, but I do get errors against ppsdns6.pps.com.au since