Also note that other workarounds will solve the same problem in a
better
way.
Care to enlighten me as to what those workarounds would be?
If all the use cases for the CNAME are for http traffic, just configure
an http server/load balancer/etc. under your control to return a 302 or
301
I would like to know if I can block hosts doing that at the level of
/etc/hosts.allow or should I do it at the level of Bind itself ?
Use IPTables or add rules to your firewall. I don't believe that BIND
pays any attention to /etc/hosts.allow
BIND has a blackhole option that will essentially
This is an external option. Still good one, for sure.
I was just thinking if there is a way to do it on BIND options.
Thank you,
Julian
See the documentation on using the blackhole option in the BIND ARM
blackhole Specifies a list of addresses that the server will not accept
queries from or
Hello BIND users,
I have setup a new Ubuntu 9.04 server with BIND9.
I have looked at a few tutorial and how to's like this one:
https://help.ubuntu.com/community/BIND9ServerHowto
but would like to get your tips and tricks to secure
Hi,
We have two sets of customer IP ranges, for example first one is
10.0.0.0 and second one is 20.0.0.0
I want to know is it possible that I have one DNS Server with two IP
addresses in each range and whenever a client from 10.0.0.0 range send a
DNS query, my DNS server uses it's 10.0.0.0 IP to
5 matches
Mail list logo