[rbldnsd] Using rbldnsd to blacklist websites

Michael Tokarev mjt at tls.msk.ru
Sun Jan 28 22:57:08 MSK 2007


Wayne Sherman wrote:
>>> (I could test if this works with binds "forward first" with only #3
>>> implemented)
>>
>> You can easily hack it in, for testing.  Use generic dataset, add, say,
>> MX record for some name, and query that name for any other RR type
>> (like A for example) - you'll get positive (NOERROR) reply with empty
>> answer section (this can be done with any other NS as well).
> 
> I just tried this.  Here is a direct query of rbldnsd:
[]
>   After receiving an empty answer from rbldnsd, bind passed that back to
> the requester.  To be complete though, I should try test what happens

That's how it SHOULD work.  Exactly.  I gave you the above example just
so you'll be able to see that yourself ;)

With other return codes it may work differently, but I again refer you
to notes in my previous email.  It's a big kludge.

> when bind gets a non-authoritative "empty" answer.  Is there an easy way
> to make rbldnsd return the empty answer with the AA flag off?

Yes - don't fill in NS information, and don't use -a switch.
This way (w/o -a), rbldnsd will try to add NS info, but since there's
no NS info available, it'll not turn AA bit on.  If memory serves me
right anyway.

But that doesn't matter - BIND will just forward that "NOERROR + 0 answers"
reply back to that client, exactly the same way it does that with AA
reply.

What you need is either a DNS proxy which does this 'blocklisting' stuff,
or that blocklisting implemented inside the resolving nameserver.

/mjt


More information about the rbldnsd mailing list