You need to manage this with some sort of URL filtering, whether a
stand-alone device or integrated in a firewall/IPS.

This is not a job for DNS...

* *

*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Mon, Feb 13, 2012 at 8:53 PM, Kennedy, Jim
<[email protected]>wrote:

>
> I really appreciate this and hate to impose more but....did anyone have
> any ideas how to skin this cat. Bottom line is I need to CNAME
> www.google.com to nosslsearch.google.com without having to run all of
> Google's DNS in house manually. I skin this cat or I kill Google Docs for
> our students, and it actually is really helpful for them, it helps a LOT.
> And I like to deliver stuff to users that helps, minus the demons flying
> out of my nose of course. Or I allow Google Docs and block Google search,
> that would be even worse.
>
> I am even open to putting up another DNS server that can CNAME this record
> and fall over to root for the rest of google...then direct my AD DNS to
> that on a conditional forwarder. The original suggestion to do this came
> from Google specifically for the situation I am in. Get search off SSL so
> the filter can append the request with safe search mode. I would be
> surprised if their solution totally misses the mark.
>
> Again, I really appreciate your help on this. Free ticket to Derbycon this
> fall if you want to go, just ping me. Ticket to get in, not an airplane
> ticket. :)
>
>
> ________________________________________
> From: Ben Scott [[email protected]]
> Sent: Monday, February 13, 2012 5:48 PM
> To: NT System Admin Issues
> Subject: Re: DNS Partial zone CNAMEs?
>
>  Okay, the consensus on dns-ops is that this is broken and shouldn't work.
>
>  Specifically, a construct of the following form is invalid:
>
> www.example.com<http://www.example.com>.     SOA     blah blah blah
> www.example.com<http://www.example.com>.     NS      ns1.example.com<
> http://ns1.example.com>.
> www.example.com<http://www.example.com>.     DNAME   elsewhere.example.net
> <http://elsewhere.example.net>.
>
>  The problem is that DNAME is intended to apply to child names of the LHS
> name ("record owner").  It should not apply to the owner name itself.
>
>   This is made explict in the next draft of the DNAME specification, which
> states: "a DNAME RR redirects DNS names subordinate to its owner name; the
> owner name of a DNAME is not redirected itself" (emphasis added).
>  (draft-ietf-dnsext-rfc2672bis-dname-25, section 2.3<
> http://tools.ietf.org/html/draft-ietf-dnsext-rfc2672bis-dname-25#section-2.3
> >)
>
>  So, while you're of course free to do this anyway, it may cause demons to
> fly out of your nose<http://catb.org/jargon/html/N/nasal-demons.html>.
>  More likely, some future hotfix or Service Pack may take it away.   That's
> especially likely if the proposed client-side support for DNAME ever makes
> it out of committee.
>
>  You Have Been Warned(TM).  :-)
>
> -- Ben
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to