[rbldnsd] Using rbldnsd to blacklist websites

Wayne Sherman wsherman at gmail.com
Thu Feb 1 00:23:20 MSK 2007


> One more comment.  I guess you'd want to REFUSE the query to the base DN
> right away.  Here:
> 
>   if (qi.qi_dnlab == 0) {       /* query to base zone: SOA and NS */
>     refuse(DNS_R_REFUSED); <== this place
>     ...
>   }

Ok, I adjusted the above item, as well as the others you mentioned in 
your other email.  Please see attached file for the updated version.

To the original rbldnsd_packet.c file, I have added code to three 
places.  See code starting at lines 275, 378, and 405.

I have tested the code (using dig) in its various modes of operation 
(normal rbldnsd mode, webrbl_mode, and webrbl_mode using 
webrbl_reply_nxdomain).  It is working well both when rbldnsd is queried 
directly, and also when called as a forward from bind.

Thanks,

Wayne

-------------- next part --------------
A non-text attachment was scrubbed...
Name: rbldnsd_packet.c.gz
Type: application/gzip
Size: 10567 bytes
Desc: not available
Url : http://www.corpit.ru/pipermail/rbldnsd/attachments/20070131/58e474be/rbldnsd_packet.c.bin


More information about the rbldnsd mailing list