Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Aug 2021 13:25:31 -0700
From:      Michael Sierchio <kudzu@tenebras.com>
To:        FreeBSD Mailing List <freebsd-questions@freebsd.org>
Subject:   Re: Can ipfw Rules Be Based On DNS Name
Message-ID:  <CAHu1Y71VfnE%2BNvgGLPBQ21VuqduspNceM8RDxhJyP=Tv4HdShQ@mail.gmail.com>
In-Reply-To: <ac332bfe-314a-ac76-eeb4-f0111bac4d0d@tundraware.com>
References:  <ac332bfe-314a-ac76-eeb4-f0111bac4d0d@tundraware.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, Aug 11, 2021 at 1:05 PM Tim Daneliuk via freebsd-questions <
freebsd-questions@freebsd.org> wrote:

> I have used ipfw for years to configure access at the IP address level.
>
> I now need to block a particular domain and all its subdomains from
> accessing anything on the server.   Is this possible using the top level
> domain name rather than IPs (which appear to be fluid).
>

Generally, no.  Also, specifically, no.  There isn't a way of solving the
problem as you've articulated it.

You can block entire countries by IP block.  You can block a company's
entire CIDR block if it has one allocated.  Tables make this easy.

You can create a cron job to do a whois on incoming traffic (if you're
loggin it), and block if it's undesireable (add the block to your reject
table).

If you were concerned with outbound, rather than inbound traffic, I would
say sinkhole / blackhole DNS works.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAHu1Y71VfnE%2BNvgGLPBQ21VuqduspNceM8RDxhJyP=Tv4HdShQ>