Hi Felipe,
You do need to do that. You may configure redirect action on a zone level. Just
add "policy cname domain"
[ response-policy {
zone zone_name
[ policy ( given | disabled | passthru | drop |
tcp-only | nxdomain | nodata | cname domain ) ]
[ recursive-only yes_or_no ]
[ max-policy-ttl number ] ;
...
}
E.g.
response-policy {zone "badlist" cname www.wgarden.com;};
BR,
Vadim
> On 04 Aug 2018, at 06:52, Felipe Arturo Polanco <[email protected]>
> wrote:
>
> Hi,
>
> I have a question regarding BIND and its RPZ functionality.
>
> We are using a DNS provider that blocks malware by returning an NXDOMAIN
> response back whenever a match is found.
>
> The way they differentiate between real non-existent websites vs malware
> sites is by turning off the 'recursion available' bit in the NXDOMAIN
> response, non-existent sites do have this bit turned on.
>
> Is there a way to match this flag in an RPZ policy to redirect malware sites
> response to a wall garden website while not matching real non-existent
> websites?
>
> Thanks,
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> bind-users mailing list
> [email protected]
> https://lists.isc.org/mailman/listinfo/bind-users
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
from this list
bind-users mailing list
[email protected]
https://lists.isc.org/mailman/listinfo/bind-users