This is actually standard practice, it is very easy and common for administrators to configure their firewalls to redirect all 53 tcp/udp requests to a specific host to prevent those people and/or malicious applications which may be smart enough to change their dns server settings in an attempt to bypass a dns based filtering solution.

A solution to your problem would seem obvious to some but, I think that you may consider redirecting all requests to udp/tcp 53 from the host running Squid to your intended destination port using firewall rules.ssentially, you use a firewall to forward requests destined for port 53 to whatever port you want. ( yes  you can do this without forwarding to a specific host )

I hope that helps.

--
Signed,

Benjamin E. Nichols
Founder & Chief Architect
1-(405)-301-9516
http://www.squidblacklist.org

_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to