Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.protocols.dns.bind > #15980

Re: scripts-to-block-domains

From Grant Taylor <gtaylor@tnetconsulting.net>
Newsgroups comp.protocols.dns.bind
Subject Re: scripts-to-block-domains
Date 2020-07-14 22:18 -0600
Organization TNet Consulting
Message-ID <mailman.713.1594786666.942.bind-users@lists.isc.org> (permalink)
References <117301d658e1$0f6966a0$2e3c33e0$@cyberia.net.sa> <7f14c6fc-804e-bca2-96f0-eb4c71d088e1@tnetconsulting.net> <134f01d659a5$3cbf3c50$b63db4f0$@cyberia.net.sa> <72026e3c-713d-5999-4eee-6f4a408400b6@spamtrap.tnetconsulting.net>

Show all headers | View raw


[Multipart message — attachments visible in raw view] - view raw

On 7/14/20 12:08 AM, MEjaz wrote:
> Thanks for every one’s  contribution.  I use RPZ and listed 5000  forged 
> domain to block it in  a particular zone  without having addiotnal 
> zones, I hope that’s the feature of  RPZ, Seems good.

You might want to look through those domains and see if there are any 
name servers that stick out significantly more than others.

Presuming that there are some believed to be bad name servers, you can 
also use RPZ to filter traffic to said name servers carte blanch, even 
if the names aren't listed in the RPZ, yet.  ;-)



-- 
Grant. . . .
unix || die

Back to comp.protocols.dns.bind | Previous | Next | Find similar


Thread

Re: scripts-to-block-domains Grant Taylor <gtaylor@tnetconsulting.net> - 2020-07-14 22:18 -0600

csiph-web