I have the following issue: * A domain name which our organization does not control is used for authentication. It returns 40 A records which point to various MS Active Directory servers throughout the company.
* A few of these A records point to non-functioning hosts and cause delays for clients which have the bad luck to encounter a bad server as the first A record in their DNS response. The BIND 9.9.1 ARM describes two methods of content filtering: deny-answer-addresses --------------------- This is an all-or-nothing feature that returns a SERVFAIL response if *any* address in its match list is returned in the answer section. No selective filtering seems possible. response-policy --------------- I configured a simple RPZ as follows: options { ... response-policy (zone "hpl-rpz"; }; }; zone "hpl-rpz" { type master; file "db.hpl-rpz"; allow-query { localhost; }; }; The RPS zone has the following policy records: 32.121.184.205.16.rpz-ip CNAME *. ; NODATA 32.24.52.228.16.rpz-ip CNAME *. 8.0.0.0.16.rpz-ip CNAME 8.0.0.0.16. ; PASSTHRU Again, this functions as an all-or-nothing filter with or without the passthru record. A NODATA response is returned for the domain name instead of an answer with 38 good A records. I don't want to go down the road of hardcoding my resolvers to be authoritative for this domain name. Is RPZ or some other BIND feature capable of telling little white lies of omission or just big whoppers when it comes to domain names with multiple addresses? ------ Andris _______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users