At work we use OpenDNS and it has wrongly blocked irc.freenode.net for malware. How can I make sure that any request for *.freenode.net goes to 126.96.36.199 and 188.8.131.52 (Google’s DNS).
I tried doing this by fiddling with resolv.conf on Ubuntu, but I wasn’t able to get too far. Also, is there an easy way to do this for Mac and Windows systems (I have a few colleagues using those OSes and they’d like to use IRC as well).
Linux does not support the use of domain-specific DNS servers via
resolv.conf. You could potentially work around this by running a caching nameserver (such as
dnsmasq) locally and then configuring explicit forwarders for each domain.
Under OS X, this sort of setting is relatively easy using the
scutil command. The common use case for this configuration is to forward DNS requests for a VPN connection to VPN-specific DNS servers, so you’ll find this discussed often in concert with, e.g., OpenVPN. This document talks about the
scutil command as does this, and a Google search for
scutil will yield more results.
I’m not sure about Windows. You could presumably use the local DNS server solution for all three platforms if you needed to.
- In BIND, forward DNS query for specific domain to specific nameserver
- AD domain member DNS record randomly disappearing from AD’s DNS server
- Overriding remote DNS with some local DNS for all users of a domain
- DNS Override for a specific subdomain only?
- How can I add a secondary DNS server for specific record types?
Leave a comment
- What is the easiest way to upgrade my existing Perl 5.14 to Perl 5.16 on FreeBSD 9 using the ports system?
- Know if mysql has done its job
- Redirect https .com to https .co.uk without a valid SSL cert on .com without DNS change
- Why is it a bad idea to use customer email as from address
- 100% packets dropped on first RX queue on 3/5 raid6 iSCSI NAS devices using intel igb (resolved)