|
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list
bind-users mailing list
bind-...@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
> 1. Do you have basic example/steps to configure RPZ in Bind? ( I need couple of examples like /etc/named.conf file and zone files for rpz
> 2. If I use RPZ, recursive DNS will contact remote RBL database for every DNS query?
> 3. Is it possible to download DNS RBLs locally on the DNS server automatically daily and then allow RPZ query locally to give malware domain lookup response?
Here’s a technical note with some configuration examples: http://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt. As I understand it, when you configure a response policy zone on your recursive resolver, your resolver uses the master-slave mechanism to get a copy of the response policy zone file from your RPZ provider. It keeps that copy updated based on notify messages and incremental transfers from the RPZ provider. For each query, your resolver consults your local copy of the RPZ or your cache as part of the recursive resolution process. ISC had a webinar on RPZ. See http://www.isc.org/files/imce/DNSRPZ-2011-03-01-Webinar.pdf. In it they mentioned http://www.surbl.org/ as an RPZ data provider. I worked with RPZ several months ago and had difficulty determining how well it was working. What was lacking at the time was a test domain name or set of such names guaranteed to be in the RPZ data that would generate an NXDOMAIN response. Would you please post information about your experiences as you proceed with your RPZ project. Thanks.
Jeffry A. Spain
Network Administrator
Cincinnati Country Day School
Wonderful update. Really thanks for the details provided. Can you give me additional details as below
I gone through link http://jpmens.net/2011/04/26/how-to-configure-your-bind-resolvers-to-lie-using-response-policy-zones-rpz/ and got to know that we need to configure one common zone to redirect all malware domain lookup to walled garden IP address and also we need to configure 'response-policy' in /etc/named.conf file.
1. How frequently DNS server will download the malware domain database
2. From where DNS server downloads the malware domains .. is it from SURBL webiste?
3. How to whitelist list of official/customer domains from RPZ query so that in case customer domain is listed in RPZ , business will not be affected?
Regards
Babu
|