DNS Sinkhole in BIND

Ryan Novosielski novosirj at umdnj.edu
Mon Oct 17 19:51:48 UTC 2011

I do this. There may now be a smarter way, but I have a small number so this is manageable for me: configure zones for each of the evil zones. Your server will appear authoritative and you can direct clients wherever you like. I direct some of mine to a virtualhost handing out 503 errors.

-- Sent from my Palm Pre
On Oct 17, 2011 13:46, babu dheen <babudheen at yahoo.co.in> wrote: 

YOu are obsolutely correct Chris.. I want to block/redirect all malware domain request intiated by clients by setting up DNS SINKHOLE in Redhat BIND server.

--- On Mon, 17/10/11, Chris Thompson <cet1 at cam.ac.uk> wrote:

From: Chris Thompson <cet1 at cam.ac.uk>
Subject: Re: DNS Sinkhole in BIND
To: "Bind Users Mailing List" <bind-users at lists.isc.org>
Cc: "babu dheen" <babudheen at yahoo.co.in>
Date: Monday, 17 October, 2011, 8:19 PM

On Oct 16 2011, babu dheen wrote:

> Can anyone help me how to setup DNS Sinkhole in BIND on Linux 32 bit edition.

All the replies to this so far seem to assume that he wants to block evil
entities from using his nameservers. But Google seems to suggest that
"DNS Sinkhole" usually refers to redirecting names that are being used
for evil purposes to e.g. a local monitoring station - not the same thing
at all.

-- Chris Thompson
Email: cet1 at cam.ac.uk

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20111017/83906f93/attachment.html>

More information about the bind-users mailing list