I do this. There may now be a smarter way, but I have a small number so this is manageable for me: configure zones for each of the evil zones. Your server will appear authoritative and you can direct clients wherever you like. I direct some of mine to a virtualhost handing out 503 errors.
-- Sent from my Palm Pre On Oct 17, 2011 13:46, babu dheen <babudh...@yahoo.co.in> wrote: YOu are obsolutely correct Chris.. I want to block/redirect all malware domain request intiated by clients by setting up DNS SINKHOLE in Redhat BIND server. --- On Mon, 17/10/11, Chris Thompson <c...@cam.ac.uk> wrote: From: Chris Thompson <c...@cam.ac.uk> Subject: Re: DNS Sinkhole in BIND To: "Bind Users Mailing List" <bind-users@lists.isc.org> Cc: "babu dheen" <babudh...@yahoo.co.in> Date: Monday, 17 October, 2011, 8:19 PM On Oct 16 2011, babu dheen wrote: > Can anyone help me how to setup DNS Sinkhole in BIND on Linux 32 bit edition. All the replies to this so far seem to assume that he wants to block evil entities from using his nameservers. But Google seems to suggest that "DNS Sinkhole" usually refers to redirecting names that are being used for evil purposes to e.g. a local monitoring station - not the same thing at all. -- Chris Thompson Email: c...@cam.ac.uk
_______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users