Hi Felipe,

You do need to do that. You may configure redirect action on a zone level. Just 
add "policy cname domain"

  [ response-policy {
        zone zone_name
      [ policy ( given | disabled | passthru | drop |
                 tcp-only | nxdomain | nodata | cname domain ) ]
      [ recursive-only yes_or_no ]
      [ max-policy-ttl number ] ;
         ...
    }

E.g. 
response-policy {zone "badlist" cname www.wgarden.com;};

BR,
Vadim
> On 04 Aug 2018, at 06:52, Felipe Arturo Polanco <felipeapola...@gmail.com> 
> wrote:
> 
> Hi,
> 
> I have a question regarding BIND and its RPZ functionality.
> 
> We are using a DNS provider that blocks malware by returning an NXDOMAIN 
> response back whenever a match is found.
> 
> The way they differentiate between real non-existent websites vs malware 
> sites is by turning off the 'recursion available' bit in the NXDOMAIN 
> response, non-existent sites do have this bit turned on.
> 
> Is there a way to match this flag in an RPZ policy to redirect malware sites 
> response to a wall garden website while not matching real non-existent 
> websites?
> 
> Thanks,
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to