Brian Keifer <br...@valinor.net> wrote:
>
> The architecture I've been working with so far is a pair of front-end proxy
> servers running keepalived to share a virtual IP and PowerDNS's dnsdist as
> the actual proxy.  The proxies set ECS to the client's IP address and pass
> the request to one of four back-end caching BIND 9.12 servers.

I've sort of been waiting to see if Ray will reply to this question, since
the general opinion seems to be that using ECS in this situation isn't a
great idea, so it should be replaced by a different option:
https://tools.ietf.org/html/draft-bellis-dnsop-xpf

But that doesn't help with your immediate problem.

> That all works beautifully, but when a client has one of their requests
> rewritten based on a threat feed, we want to know about it so that we can
> investigate/remediate that client.

There are a couple of non-BIND ways that you might accomplish this:

(1) Do the logging on the RPZ redirection target server.

(2) Get dnsdist to log responses that have been rewritten by RPZ.

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
public services available on equal terms to all
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to