try to block traffic from ad.doubleclick.net, but dns record hops.

Michael Kjorling michael at kjorling.com
Sat Jun 23 14:56:51 UTC 2001


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This really isn't anything strange - they're using a CNAME RR for
ad.doubleclick.net, and a low TTL on the corresponding A RRs. Looking
it up with dig gives data which seems to support that assumption
(cutting to save people here from too much junk, you can look it up
yourself if you like):

	$ dig ad.doubleclick.net a | grep -v ^\; | egrep -v '^ *$' | grep A
	ad.doubleclick.net.     840     IN      CNAME   gd3.doubleclick.net.
	gd3.doubleclick.net.    10      IN      A       204.253.104.80
	$

While this is not a BIND question, this might solve your problem. If
not, I see no other obvious solution than adding all the IPs manually.

	# ipchains -A input -s gd3.doubleclick.net -j DENY
	# ipchains -A output -d gd3.doubleclick.net -j DENY


Michael Kjörling


On Jun 23 2001 10:16 -0400, zz at rockstone.com wrote:

> I don't quite understand the mechanism which doubleclik have deployed
> to make their nslookup hopping or rotating, but are there anyway I
> can completely stop ad traffic from their ad servers to my LAN?

- -- 
Michael Kjörling - michael at kjorling.com - PGP: 8A70E33E
"We must be the change we wish to see" (Mahatma Gandhi)

^..^     Support the wolves in Norway -- go to     ^..^
 \/   http://home.no.net/ulvelist/protest_int.htm   \/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7NK48KqN7/Ypw4z4RApgGAKCycZjVOXnOynnFiyNm0Ylq5VPhMgCfRDBm
1IsiS2b7RsZudRoUXTyiDJ8=
=zkeJ
-----END PGP SIGNATURE-----




More information about the bind-users mailing list