On Wed, 2008-09-10 at 16:35 +0200, mouss wrote:
> Jorey Bump wrote:
> > Jason Noble wrote, at 09/10/2008 08:51 AM:
> >> It was my DNS.
> >> I am using a black list from here:
> >> http://pgl.yoyo.org/adservers/
> >> to block ad-servers at the dns level.
> >>
> >> I'll have to remember this next time I have weird mail issues.
> > 
> > Your mail server should use a reliable, honest DNS server.
> > 
> > Set up a separate DNS server if you want to block ad sites for your your
> > LAN users. I do this, but I simply make the local DNS server
> > authoritative for the offensive domains (or subdomains) and point them
> > all to the same zone file, which has no A records defined. Why anyone
> > would point these to 127.0.0.1 or any other IP address is beyond me.
> > 
> 
> 
> and is even dangerous. it allows a stranger to make you do a query on a 
> local service. with FCSR and XSS attacks being so common these days, 
> this is unwise. What would happens if say you get to click on
>       http://127.0.0.1:1234/disable_firewall
> ?
> 
> this is also the reason why it is not recommended to put private IPs in 
> public dns zones (foo.example.com -> 192.168.1.2).
> 
> 

What about just pointing to 0.0.0.0



Reply via email to