On 8/30/2012 10:33 AM, Rick Coloccia wrote:
add this line to /etc/named.conf

include "locallyblockeddomains.zones";


contents of locallyblockeddomains.zones:

// This bind zone is intended to be included in a running dns server for a local net
//
// It will return a 127.0.0.1 for the domains listed as malware
//
//  This is for locally determined domains we want blocked
//
//
zone "r.im"  {type master; file "/etc/namedb/blockeddomain.hosts";};
<snipped many more out>
zone "emailupgrader.clan.su" {type master;file "/etc/named/blockeddomain.hosts";};




this is the /etc/namedb/blockeddomain.hosts file:

$TTL    86400   ; one day

@       IN      SOA     ns1.geneseo.edu coloccia.geneseo.edu (
                        2007112601      ; serial
                        28800           ; refresh  8 hours
                        7200            ; retry    2 hours
                        864000          ; expire  10 days
                        86400 )         ; min ttl  1 day

                IN      NS      ns1.geneseo.edu.
                A       127.0.0.1
*               IN      A       127.0.0.1
*               IN      AAAA    ::1
; This zone will kill all traffic to a listed domain




Done.

Add domains you want blocked to the locallyblockeddomains.zones file.
The null or "unspecified" address -- "0.0.0.0" in IPv4, "::" in IPv6 -- is generally considered the more polite and "proper" way to express "don't ever try to connect to this".

If you put a loopback address in there, a poorly-coded app might end up spinning, connecting to itself. But the unspecified address gets stopped cold at the OS level so it's the preferred choice.

            - Kevin
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to