• scripts-to-block-domains

    From MEjaz@mejaz@cyberia.net.sa to bind-users on Mon Jul 13 09:44:28 2020
    From Newsgroup: comp.protocols.dns.bind

    This is a multipart message in MIME format.

    ------=_NextPart_000_1174_01D658FA.34B7D720
    Content-Type: text/plain;
    charset="us-ascii"
    Content-Transfer-Encoding: 7bit

    Hell all,





    I have an requirement from our national Cyber security to block several thousand forged domains from our recursive servers, Is there any way we can
    add clause in named.conf to scan such bogus domain list without impacting
    the performance of the servers.



    Thanks in advance.. for the usual contribution.





    Thanks,

    Mohammed Ejaz

    Asst. Operation Director of Systems.

    Cyberia SAUDI ARABIA

    P.O.Box: 301079, Riyadh 11372

    Phone: (+966) 11 464 7114 Ext. 140

    Mobile: (+966) 562311787

    Fax: (+966) 11 465 4735

    Website: http://www.cyberia.net.sa






    ------=_NextPart_000_1174_01D658FA.34B7D720
    Content-Type: text/html;
    charset="us-ascii"
    Content-Transfer-Encoding: quoted-printable

    <html xmlns:v=3D"urn:schemas-microsoft-com:vml" = xmlns:o=3D"urn:schemas-microsoft-com:office:office" = xmlns:w=3D"urn:schemas-microsoft-com:office:word" = xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" = xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta = http-equiv=3DContent-Type content=3D"text/html; =
    charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 = (filtered medium)"><style><!--
    /* Font Definitions */
    @font-face
    {font-family:"Cambria Math";
    panose-1:2 4 5 3 5 4 6 3 2 4;}
    @font-face
    {font-family:Calibri;
    panose-1:2 15 5 2 2 2 4 3 2 4;}
    /* Style Definitions */
    p.MsoNormal, li.MsoNormal, div.MsoNormal
    {margin:0in;
    margin-bottom:.0001pt;
    font-size:11.0pt;
    font-family:"Calibri",sans-serif;}
    a:link, span.MsoHyperlink
    {mso-style-priority:99;
    color:#0563C1;
    text-decoration:underline;}
    a:visited, span.MsoHyperlinkFollowed
    {mso-style-priority:99;
    color:#954F72;
    text-decoration:underline;}
    span.EmailStyle17
    {mso-style-type:personal-compose;
    font-family:"Calibri",sans-serif;
    color:windowtext;}
    .MsoChpDefault
    {mso-style-type:export-only;
    font-family:"Calibri",sans-serif;}
    @page WordSection1
    {size:8.5in 11.0in;
    margin:1.0in 1.0in 1.0in 1.0in;}
    div.WordSection1
    {page:WordSection1;}
    </style><!--[if gte mso 9]><xml>
    <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
    </xml><![endif]--><!--[if gte mso 9]><xml>
    <o:shapelayout v:ext=3D"edit">
    <o:idmap v:ext=3D"edit" data=3D"1" /> </o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
    link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p = class=3DMsoNormal>Hell &nbsp;all, <o:p></o:p></p><p = class=3DMsoNormal><o:p>&nbsp;</o:p></p><p = class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I have an = requirement from our &nbsp;national Cyber security to block several =
    thousand forged domains from our recursive servers, Is there any way we =
    can add clause in named.conf to scan such bogus domain list without =
    impacting the performance of the servers. <o:p></o:p></p><p = class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Thanks in = advance.. for the usual contribution.<o:p></o:p></p><p = class=3DMsoNormal><o:p>&nbsp;</o:p></p><p = class=3DMsoNormal><o:p>&nbsp;</o:p></p><p = class=3DMsoNormal>Thanks,<o:p></o:p></p><p class=3DMsoNormal>Mohammed = Ejaz<o:p></o:p></p><p class=3DMsoNormal>Asst. Operation Director of = Systems.<o:p></o:p></p><p class=3DMsoNormal>Cyberia SAUDI = ARABIA<o:p></o:p></p><p class=3DMsoNormal>P.O.Box: 301079, Riyadh = 11372<o:p></o:p></p><p class=3DMsoNormal>Phone:&nbsp; (+966) 11 464 7114 =
    Ext. 140<o:p></o:p></p><p class=3DMsoNormal>Mobile:&nbsp; (+966) = 562311787<o:p></o:p></p><p = class=3DMsoNormal>Fax:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (+966) 11 465 = 4735<o:p></o:p></p><p class=3DMsoNormal>Website: = http://www.cyberia.net.sa<o:p></o:p></p><p = class=3DMsoNormal><o:p>&nbsp;</o:p></p><p = class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html> ------=_NextPart_000_1174_01D658FA.34B7D720--

    --- Synchronet 3.21d-Linux NewsLink 1.2
  • From Daniel Stirnimann@daniel.stirnimann@switch.ch to MEjaz on Mon Jul 13 09:34:54 2020
    From Newsgroup: comp.protocols.dns.bind

    Hello Mohammed,

    You can use RPZ (Response Policy Zone). The following link should give
    you a good introduction on how to set this up:

    Building DNS Firewalls with Response Policy Zones (RPZ) https://kb.isc.org/docs/aa-00525

    Daniel


    On 13.07.20 08:44, MEjaz wrote:
    Hell aall,

    a

    a

    I have an requirement from our anational Cyber security to block several thousand forged domains from our recursive servers, Is there any way we
    can add clause in named.conf to scan such bogus domain list without
    impacting the performance of the servers.

    a

    Thanks in advance.. for the usual contribution.

    a

    a

    Thanks,

    Mohammed Ejaz

    Asst. Operation Director of Systems.

    Cyberia SAUDI ARABIA

    P.O.Box: 301079, Riyadh 11372

    Phone:a (+966) 11 464 7114 Ext. 140

    Mobile:a (+966) 562311787

    Fax:aaaaa (+966) 11 465 4735

    Website: http://www.cyberia.net.sa
    --- Synchronet 3.21d-Linux NewsLink 1.2
  • From @lbutlr@kremels@kreme.com to bind-users on Tue Jul 14 01:27:32 2020
    From Newsgroup: comp.protocols.dns.bind

    On 14 Jul 2020, at 00:31, MEjaz <mejaz@cyberia.net.sa> wrote:
    <image001.png>

    Please do not post images. Copy and paste the text.

    (Over 100 lines of quoted lines with no content deleted)
    --
    I WILL NOT BARF UNLESS I'M SICK Bart chalkboard Ep. 8F15

    --- Synchronet 3.21d-Linux NewsLink 1.2
  • From MEjaz@mejaz@cyberia.net.sa to '@lbutlr' on Tue Jul 14 11:14:34 2020
    From Newsgroup: comp.protocols.dns.bind

    Ok, I will take care next time will

    -----Original Message-----
    From: bind-users [mailto:bind-users-bounces@lists.isc.org] On Behalf Of
    @lbutlr
    Sent: Tuesday, July 14, 2020 10:28 AM
    To: bind-users <bind-users@lists.isc.org>
    Subject: Re: scripts-to-block-domains

    On 14 Jul 2020, at 00:31, MEjaz <mejaz@cyberia.net.sa> wrote:
    <image001.png>

    Please do not post images. Copy and paste the text.

    (Over 100 lines of quoted lines with no content deleted)
    --
    I WILL NOT BARF UNLESS I'M SICK Bart chalkboard Ep. 8F15

    _______________________________________________
    Please visit https://lists.isc.org/mailman/listinfo/bind-users to
    unsubscribe from this list

    ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information.


    bind-users mailing list
    bind-users@lists.isc.org
    https://lists.isc.org/mailman/listinfo/bind-users

    --- Synchronet 3.21d-Linux NewsLink 1.2