Hi Everyone,

I'm a brand new user of the mailing list. I work for ThreatSTOP which makes 
RPZ's available on a variety of DNS platforms.

Recently we've been asked to support unbound.

Several years ago I looked at this and, at the time, there was no way to use a 
TSIG key to secure zone transfers and looking at the documentation today that 
seems to still be the case.

I have an ubuntu based example server running that I am able to get RPZ into by 
means of an external shell script that does a dig and sed pipeline. Is this the 
preferred method? And/or has someone got clear documentation on how to do this 
better?

I will be happy to contribute my example configs (and RPZ update script) back 
to the project if there are no better ones around.

I have two questions, assuming that the shell script method is the correct 
approach

  1.  Once I have updated the rpz zonefile, should I use "unbound-control 
reload" to get the new RPZ in or is there a better alternative 
(auth_zone_reload )?
  2.  I think I'm correct that unbound-control log_reopen should be called in 
the postrotate stanza of a logroate.d config ?

Thanks in advance for any and all assistance

Regards

Francis
Francis Turner
Threat STOP Global SE
JP Cell: +81-8080404701 | US Cell: +1-760-402-7676
Office: +1-760-542-1550 | Line: francisturner
fran...@threatstop.com<mailto:fran...@threatstop.com> | 
www.threatstop.com<http://www.threatstop.com/>
Weaponize Your Threat Intelligence
"If You Don't Build It, They Definitely Will Not Come" - P. Vixie


  • Unbound and RPZ Francis Turner via Unbound-users

Reply via email to