Page MenuHomeMy privacy DNS

Bind
Updated 280 Days AgoPublic

Read the guide here Bind 9 integration

python
# First we sets the default master DNS servers
masters mypdnsAUTH {
    195.201.225.97 port 5306; # auth2
    95.216.166.138 port 5306; # auth1
}:

# Here we define the zones that are to be used as RPZ zones
    response-policy {
        zone "whitelist.localdomain"; zone "blacklist.localdomain";
        zone "adware.mypdns.cloud";
        zone "coinblocker.mypdns.cloud";
        zone "gambling.mypdns.cloud";
        zone "malicious.mypdns.cloud";
        zone "phishing.mypdns.cloud";
        zone "pirated.mypdns.cloud";
        zone "redirector.mypdns.cloud";
        zone "rpz.mypdns.cloud";
        zone "spam.mypdns.cloud";
        zone "spyware.mypdns.cloud";
        zone "tracking.mypdns.cloud";
        zone "typosquatting.mypdns.cloud";
        zone "whitelist.mypdns.cloud";
        };

# Here we are setting the zones as slaves, to automatically update the records,
# just like an ordinary DNS record

zone "adware.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/adware.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "coinblocker.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/coinblocker.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "gambling.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/gambling.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "malicious.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/malicious.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "phishing.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/phishing.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "pirated.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/pirated.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "redirector.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/redirector.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "rpz.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/rpz.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "spam.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/spam.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "tracking.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/tracking.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "spyware.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/spyware.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "typosquatting.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/typosquatting.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

zone "whitelist.mypdns.cloud" {
    type slave;
    file "/usr/local/etc/namedb/slave/whitelist.mypdns.cloud.db";
    allow-transfer { any; };
    notify yes;
    masters { mypdnsAUTH;  };
};

If you find any missing zones, you just uses these examples to setup another zone 😄 Have fun and safe serfing

Last Author
Spirillen
Last Edited
Jan 18 2021, 7:47 PM