From Newsgroup: comp.protocols.dns.bind
This is a multipart message in MIME format.
------=_NextPart_000_1174_01D658FA.34B7D720
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
Hell all,
I have an requirement from our national Cyber security to block several thousand forged domains from our recursive servers, Is there any way we can
add clause in named.conf to scan such bogus domain list without impacting
the performance of the servers.
Thanks in advance.. for the usual contribution.
Thanks,
Mohammed Ejaz
Asst. Operation Director of Systems.
Cyberia SAUDI ARABIA
P.O.Box: 301079, Riyadh 11372
Phone: (+966) 11 464 7114 Ext. 140
Mobile: (+966) 562311787
Fax: (+966) 11 465 4735
Website:
http://www.cyberia.net.sa
------=_NextPart_000_1174_01D658FA.34B7D720
Content-Type: text/html;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<html xmlns:v=3D"urn:schemas-microsoft-com:vml" = xmlns:o=3D"urn:schemas-microsoft-com:office:office" = xmlns:w=3D"urn:schemas-microsoft-com:office:word" = xmlns:m=3D"
http://schemas.microsoft.com/office/2004/12/omml" = xmlns=3D"
http://www.w3.org/TR/REC-html40"><head><meta = http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 = (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
</style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" /> </o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p = class=3DMsoNormal>Hell all, <o:p></o:p></p><p = class=3DMsoNormal><o:p> </o:p></p><p = class=3DMsoNormal><o:p> </o:p></p><p class=3DMsoNormal>I have an = requirement from our national Cyber security to block several =
thousand forged domains from our recursive servers, Is there any way we =
can add clause in named.conf to scan such bogus domain list without =
impacting the performance of the servers. <o:p></o:p></p><p = class=3DMsoNormal><o:p> </o:p></p><p class=3DMsoNormal>Thanks in = advance.. for the usual contribution.<o:p></o:p></p><p = class=3DMsoNormal><o:p> </o:p></p><p = class=3DMsoNormal><o:p> </o:p></p><p = class=3DMsoNormal>Thanks,<o:p></o:p></p><p class=3DMsoNormal>Mohammed = Ejaz<o:p></o:p></p><p class=3DMsoNormal>Asst. Operation Director of = Systems.<o:p></o:p></p><p class=3DMsoNormal>Cyberia SAUDI = ARABIA<o:p></o:p></p><p class=3DMsoNormal>P.O.Box: 301079, Riyadh = 11372<o:p></o:p></p><p class=3DMsoNormal>Phone: (+966) 11 464 7114 =
Ext. 140<o:p></o:p></p><p class=3DMsoNormal>Mobile: (+966) = 562311787<o:p></o:p></p><p = class=3DMsoNormal>Fax: (+966) 11 465 = 4735<o:p></o:p></p><p class=3DMsoNormal>Website: =
http://www.cyberia.net.sa<o:p></o:p></p><p = class=3DMsoNormal><o:p> </o:p></p><p = class=3DMsoNormal><o:p> </o:p></p></div></body></html> ------=_NextPart_000_1174_01D658FA.34B7D720--
--- Synchronet 3.21d-Linux NewsLink 1.2