I do this. There may now be a smarter way, but I have a small number so this is 
manageable for me: configure zones for each of the evil zones. Your server will 
appear authoritative and you can direct clients wherever you like. I direct 
some of mine to a virtualhost handing out 503 errors.

-- Sent from my Palm Pre
On Oct 17, 2011 13:46, babu dheen <babudh...@yahoo.co.in> wrote: 

YOu are obsolutely correct Chris.. I want to block/redirect all malware domain 
request intiated by clients by setting up DNS SINKHOLE in Redhat BIND server.
 


--- On Mon, 17/10/11, Chris Thompson <c...@cam.ac.uk> wrote:


From: Chris Thompson <c...@cam.ac.uk>
Subject: Re: DNS Sinkhole in BIND
To: "Bind Users Mailing List" <bind-users@lists.isc.org>
Cc: "babu dheen" <babudh...@yahoo.co.in>
Date: Monday, 17 October, 2011, 8:19 PM


On Oct 16 2011, babu dheen wrote:

> Can anyone help me how to setup DNS Sinkhole in BIND on Linux 32 bit 
edition.

All the replies to this so far seem to assume that he wants to block evil
entities from using his nameservers. But Google seems to suggest that
"DNS Sinkhole" usually refers to redirecting names that are being used
for evil purposes to e.g. a local monitoring station - not the same thing
at all.

-- Chris Thompson
Email: c...@cam.ac.uk



_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to