1
0
Fork 0
mirror of https://github.com/Luzifer/named-blacklist.git synced 2024-11-08 15:30:06 +00:00
DNS blacklist generator to be used in combination with DNS Response Policy Zones in BIND 9.8+
Find a file
dependabot[bot] 1b1e3a0147
Bump golang.org/x/net from 0.0.0-20190813141303-74dc4d7220e7 to 0.7.0
Bumps [golang.org/x/net](https://github.com/golang/net) from 0.0.0-20190813141303-74dc4d7220e7 to 0.7.0.
- [Release notes](https://github.com/golang/net/releases)
- [Commits](https://github.com/golang/net/commits/v0.7.0)

---
updated-dependencies:
- dependency-name: golang.org/x/net
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-02-24 22:56:00 +00:00
config.go Fix: On error response is nil 2021-04-10 22:25:18 +02:00
config.sample.yaml Make comments sortable for diffing generated files 2020-02-15 14:22:35 +01:00
go.mod Bump golang.org/x/net from 0.0.0-20190813141303-74dc4d7220e7 to 0.7.0 2023-02-24 22:56:00 +00:00
go.sum Bump golang.org/x/net from 0.0.0-20190813141303-74dc4d7220e7 to 0.7.0 2023-02-24 22:56:00 +00:00
helpers.go Initial version 2019-08-25 20:38:08 +02:00
LICENSE Add META files 2019-08-25 20:52:51 +02:00
main.go Make comments sortable for diffing generated files 2020-02-15 14:22:35 +01:00
provider.go Make comments sortable for diffing generated files 2020-02-15 14:22:35 +01:00
provider_domainList.go Make comments sortable for diffing generated files 2020-02-15 14:22:35 +01:00
provider_hostFile.go Make comments sortable for diffing generated files 2020-02-15 14:22:35 +01:00
README.md Add META files 2019-08-25 20:52:51 +02:00

Go Report Card

Luzifer / named-blacklist

This repo contains a DNS blacklist generator to be used in combination with DNS Response Policy Zones in BIND 9.8+.

Usage

For full usage inside BIND see BIND ARM.

Quoted from the ARM:

For example, you might use this option statement

response-policy { zone "badlist"; };

and this zone statement

zone "badlist" { 
  type master; 
  file "master/badlist"; 
  allow-query { none; }; 
};

Then you can generate the master/badlist file using named-blacklist:

# named-blacklist --config config.sample.yaml | tee master/badlist
$TTL 1H

@ SOA LOCALHOST. dns-master.localhost. (1 1h 15m 30d 2h)
  NS  LOCALHOST.

; Blacklist entries
0.nextyourcontent.com CNAME . ; From: "Dan Pollock - someonewhocares"
0.r.msn.com CNAME . ; From: "add.Risk"
000.0x1f4b0.com CNAME . ; From: "CoinBlocker"
000.gaysexe.free.fr CNAME . ; From: "Mitchell Krog's - Badd Boyz Hosts"
[...]