On Thursday, May 22, 2025 4:23:05 PM CEST Karol Nowicki via bind-users wrote:
> Does ISC Bind software by native has any dns tunneling prevention embedded?
> Thanks

BIND on its own does not do this. Assuming that you are running it on a LAN as 
a resolver meanwhile, you can make it the only thing that can communicate on 
port 53 to the Internet. That is the job of your firewall, and yours to 
configure. You'll probably also want to prevent DoT (853) from going out at 
all, though its sibling DoH will be a lot harder to filter for.

As you've probably already realized by now, security is by no means a "slap 
software X or Y on it and call it a day" type of ordeal. One could argue that 
if you have a piece of malware attempting to make a DNS tunnel to get commands 
from a C2 or whatever, you (or whoever else owns that machine) shouldn't be 
running that software in the first place. Which in itself is a multifaceted 
policy question.

-- 
Met vriendelijke groet,
Michael De Roover

Mail: i...@nixmagic.com
Web: michael.de.roover.eu.org


-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to