[ *policy* ( given | disabled | passthru | drop |
> tcp-only | nxdomain | nodata | cname *domain* ) ]
> [ *recursive-only* *yes_or_no* ]
> [ *max-policy-ttl* *number* ] ;
> ...
> *}*
>
>
> E.g.
> response-policy {zone "badlist" cname
Hi,
I have a question regarding BIND and its RPZ functionality.
We are using a DNS provider that blocks malware by returning an NXDOMAIN
response back whenever a match is found.
The way they differentiate between real non-existent websites vs malware
sites is by turning off the 'recursion availa
2 matches
Mail list logo