Hi Felipe, You do need to do that. You may configure redirect action on a zone level. Just add "policy cname domain"
[ response-policy { zone zone_name [ policy ( given | disabled | passthru | drop | tcp-only | nxdomain | nodata | cname domain ) ] [ recursive-only yes_or_no ] [ max-policy-ttl number ] ; ... } E.g. response-policy {zone "badlist" cname www.wgarden.com;}; BR, Vadim > On 04 Aug 2018, at 06:52, Felipe Arturo Polanco <felipeapola...@gmail.com> > wrote: > > Hi, > > I have a question regarding BIND and its RPZ functionality. > > We are using a DNS provider that blocks malware by returning an NXDOMAIN > response back whenever a match is found. > > The way they differentiate between real non-existent websites vs malware > sites is by turning off the 'recursion available' bit in the NXDOMAIN > response, non-existent sites do have this bit turned on. > > Is there a way to match this flag in an RPZ policy to redirect malware sites > response to a wall garden website while not matching real non-existent > websites? > > Thanks, > _______________________________________________ > Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe > from this list > > bind-users mailing list > bind-users@lists.isc.org > https://lists.isc.org/mailman/listinfo/bind-users
_______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users