try to block traffic from ad.doubleclick.net, but dns record hops.
Michael Kjorling
michael at kjorling.com
Sat Jun 23 14:56:51 UTC 2001
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This really isn't anything strange - they're using a CNAME RR for
ad.doubleclick.net, and a low TTL on the corresponding A RRs. Looking
it up with dig gives data which seems to support that assumption
(cutting to save people here from too much junk, you can look it up
yourself if you like):
$ dig ad.doubleclick.net a | grep -v ^\; | egrep -v '^ *$' | grep A
ad.doubleclick.net. 840 IN CNAME gd3.doubleclick.net.
gd3.doubleclick.net. 10 IN A 204.253.104.80
$
While this is not a BIND question, this might solve your problem. If
not, I see no other obvious solution than adding all the IPs manually.
# ipchains -A input -s gd3.doubleclick.net -j DENY
# ipchains -A output -d gd3.doubleclick.net -j DENY
Michael Kjörling
On Jun 23 2001 10:16 -0400, zz at rockstone.com wrote:
> I don't quite understand the mechanism which doubleclik have deployed
> to make their nslookup hopping or rotating, but are there anyway I
> can completely stop ad traffic from their ad servers to my LAN?
- --
Michael Kjörling - michael at kjorling.com - PGP: 8A70E33E
"We must be the change we wish to see" (Mahatma Gandhi)
^..^ Support the wolves in Norway -- go to ^..^
\/ http://home.no.net/ulvelist/protest_int.htm \/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE7NK48KqN7/Ypw4z4RApgGAKCycZjVOXnOynnFiyNm0Ylq5VPhMgCfRDBm
1IsiS2b7RsZudRoUXTyiDJ8=
=zkeJ
-----END PGP SIGNATURE-----
More information about the bind-users
mailing list