Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.protocols.dns.bind > #15980
| From | Grant Taylor <gtaylor@tnetconsulting.net> |
|---|---|
| Newsgroups | comp.protocols.dns.bind |
| Subject | Re: scripts-to-block-domains |
| Date | 2020-07-14 22:18 -0600 |
| Organization | TNet Consulting |
| Message-ID | <mailman.713.1594786666.942.bind-users@lists.isc.org> (permalink) |
| References | <117301d658e1$0f6966a0$2e3c33e0$@cyberia.net.sa> <7f14c6fc-804e-bca2-96f0-eb4c71d088e1@tnetconsulting.net> <134f01d659a5$3cbf3c50$b63db4f0$@cyberia.net.sa> <72026e3c-713d-5999-4eee-6f4a408400b6@spamtrap.tnetconsulting.net> |
[Multipart message — attachments visible in raw view] - view raw
On 7/14/20 12:08 AM, MEjaz wrote: > Thanks for every one’s contribution. I use RPZ and listed 5000 forged > domain to block it in a particular zone without having addiotnal > zones, I hope that’s the feature of RPZ, Seems good. You might want to look through those domains and see if there are any name servers that stick out significantly more than others. Presuming that there are some believed to be bad name servers, you can also use RPZ to filter traffic to said name servers carte blanch, even if the names aren't listed in the RPZ, yet. ;-) -- Grant. . . . unix || die
Back to comp.protocols.dns.bind | Previous | Next | Find similar
Re: scripts-to-block-domains Grant Taylor <gtaylor@tnetconsulting.net> - 2020-07-14 22:18 -0600
csiph-web