Hello,
I'm new to Bind. My previous registrar (or was it the hosting
provider?) was so kind to manage DNS for me. But now I'm required to
configure a DNS server in the very same VPS that hosts the HTTP and
mail server.
I've managed to set it running and (apparently) working after reading
some
On Oct 16 2011, Kevin Oberman wrote:
2011/10/16 Niccolò Belli darkba...@linuxsystems.it:
I'm sorry but I still didn't understand if it's possible to do it with some
workaround, and if yes HOW to do it.
No, you can' have a CNAME at the top of a zone. A zone requires an SOA
and CNAMEs cannot
While setting up blackholes in BIND works fine when I did this on Linux I found
that setting up iptables to do drops for known bad IPs/ranges was slightly
better as the traffic never gets to BIND in the first place as it is stopped at
kernel level. It simply DROPs the packet without telling
YOu are obsolutely correct Chris.. I want to block/redirect all malware domain
request intiated by clients by setting up DNS SINKHOLE in Redhat BIND server.
--- On Mon, 17/10/11, Chris Thompson c...@cam.ac.uk wrote:
From: Chris Thompson c...@cam.ac.uk
Subject: Re: DNS Sinkhole in BIND
To:
Il 17/10/2011 17:09, Matt Rowley ha scritto:
but if you're ok with all of the records in the zone being identical, you could
point both zones to the same file in your named.conf
If I am the one who host the name server for example.com :)
___
Please
On 10/17/2011 06:38 PM, babu dheen wrote:
YOu are obsolutely correct Chris.. I want to block/redirect all malware
domain request intiated by clients by setting up DNS SINKHOLE in Redhat
BIND server.
In older versions of bind, you needed to create a local zone per malware
domain (or hostname).
I do this. There may now be a smarter way, but I have a small number so this is
manageable for me: configure zones for each of the evil zones. Your server will
appear authoritative and you can direct clients wherever you like. I direct
some of mine to a virtualhost handing out 503 errors.
--
I’m confused – does the OP want to block or does he want to redirect.
“block/redirect” are two different things. What I wrote will block. If he
wants to redirect that’s fine but I don’t think he’d want to redirect to his
real webserver – why send bogus traffic there and also take the risk
http://www.sans.org/reading_room/whitepapers/dns/dns-sinkhole_33523
Perhaps the above link target may help.
Thanks.
From: Lightner, Jeff jlight...@water.com
To: Ryan Novosielski novos...@umdnj.edu; babu dheen babudh...@yahoo.co.in;
Bind Users Mailing List
On 10/17/2011 09:05 PM, Lightner, Jeff wrote:
I’m confused – does the OP want to block or does he want to redirect.
“block/redirect” are two different things. What I wrote will block. If
It'll block IPs, and whole IPs at that. If the server is shared, you
block all traffic to it, not just the
Hi there.
I have three domains, biplane.com.au, nullarbor.com.au and
footprint.org.au. All are show intermittent but frequent bad horizontal
referral. It happens at the .com.au level.
To see it, do (for example):
dig+trace biplane.com.au ns
Some such queries return correctly, some end up in
Hi--
On Oct 17, 2011, at 3:37 PM, Karl Auer wrote:
To see it, do (for example):
dig+trace biplane.com.au ns
Some such queries return correctly, some end up in a BHR loop.
I don't see a bad horizontal referral being returned anywhere, but I do get
errors against ppsdns6.pps.com.au since
12 matches
Mail list logo