On 10/17/2011 06:38 PM, babu dheen wrote:
YOu are obsolutely correct Chris.. I want to block/redirect all malware
domain request intiated by clients by setting up DNS SINKHOLE in Redhat
BIND server.

In older versions of bind, you needed to create a local zone per malware domain (or hostname). There's no special config - just a really big, long, list of zones. One problem - there can be hundreds or thousands, even tens of thousands of zones - and this makes bind slow to start, and use more RAM.

Example:

zone "www.badstuff.com" {
  type master;
  file "data/malware-common";
};

...and in data/malware-common:

$TTL 3H
@       IN SOA  @ rname.invalid. (
                                        0       ; serial
                                        1D      ; refresh
                                        1H      ; retry
                                        1W      ; expire
                                        3H )    ; minimum
        NS      @
        A       127.0.0.1
        AAAA    ::1

...adjust the A/AAAA records if you want to redirect.

In newer versions of bind, there is RPZ - response policy zone - where you create a zone e.g. "malware-list.example.com" and put policy records in it e.g. "www.badstuff.com.malware-list.example.com". Bind honours the RPZ when clients make a query

Example - see section 6.2.16.20 of the Bind 9.8 ARM:

http://ftp.isc.org/isc/bind9/cur/9.8/doc/arm/Bv9ARM.pdf
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to