Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.protocols.dns.bind > #15976
| From | Grant Taylor <gtaylor@tnetconsulting.net> |
|---|---|
| Newsgroups | comp.protocols.dns.bind |
| Subject | Re: scripts-to-block-domains |
| Date | 2020-07-13 13:44 -0600 |
| Message-ID | <mailman.703.1594669450.942.bind-users@lists.isc.org> (permalink) |
| References | <117301d658e1$0f6966a0$2e3c33e0$@cyberia.net.sa> <7f14c6fc-804e-bca2-96f0-eb4c71d088e1@tnetconsulting.net> |
[Multipart message — attachments visible in raw view] - view raw
On 7/13/20 12:44 AM, MEjaz wrote: > Hell all, Hi, > I have an requirement from our national Cyber security to block several > thousand forged domains from our recursive servers, Is there any way we > can add clause in named.conf to scan such bogus domain list without > impacting the performance of the servers. $RPZ++ If you can't use RPZ, then you /can/ create skeleton zones to make your server authoritative for the zones in question. However, there are drawbacks to this regarding performance based on the number and size of all the additional zones. I would strongly recommend RPZ, or the new Response Policy Service, which there are a few commercial implementations of. RPS is for DNS what milters are for mail servers. RPZ is a ""static list. RPS is an active / dynamic service. Note: Response Policy Zones can be updated via normal dynamic DNS methods. -- Grant. . . . unix || die
Back to comp.protocols.dns.bind | Previous | Next | Find similar
Re: scripts-to-block-domains Grant Taylor <gtaylor@tnetconsulting.net> - 2020-07-13 13:44 -0600
csiph-web