[rbldnsd] Using rbldnsd to blacklist websites
Wayne Sherman
wsherman at gmail.com
Thu Feb 1 00:23:20 MSK 2007
> One more comment. I guess you'd want to REFUSE the query to the base DN
> right away. Here:
>
> if (qi.qi_dnlab == 0) { /* query to base zone: SOA and NS */
> refuse(DNS_R_REFUSED); <== this place
> ...
> }
Ok, I adjusted the above item, as well as the others you mentioned in
your other email. Please see attached file for the updated version.
To the original rbldnsd_packet.c file, I have added code to three
places. See code starting at lines 275, 378, and 405.
I have tested the code (using dig) in its various modes of operation
(normal rbldnsd mode, webrbl_mode, and webrbl_mode using
webrbl_reply_nxdomain). It is working well both when rbldnsd is queried
directly, and also when called as a forward from bind.
Thanks,
Wayne
-------------- next part --------------
A non-text attachment was scrubbed...
Name: rbldnsd_packet.c.gz
Type: application/gzip
Size: 10567 bytes
Desc: not available
Url : http://www.corpit.ru/pipermail/rbldnsd/attachments/20070131/58e474be/rbldnsd_packet.c.bin
More information about the rbldnsd
mailing list