------------------
Pos6 Poison Module
------------------

To use this module, you will need to have a Pos6 version (18-04-2003 CVS or
later) installed, including the header files (automagically installed if you
built from source, or otherwise, from the pos6-devel package).

To compile, run "./configure" at first to perform some basic checks. Then, run
"make" to compile the module.

Then, either copy the resulting library files (the ".la" file and the
various ".so" files in the hidden ".libs" subdirectory) to your Pos6 library
directory (usually /usr/lib/pos6), or add the build directory to your module
lookup path by using the "libdir" configuration option.

This module specifies the "poison" zone type. This zone type will try to poison
bad caches with information for other zones. Modern Unix caches do not have
this problem, but on Windows, at least I _thought_ protection against this is
not by default enabled on at least Simple DNS Plus (otherwise a very good
program).

Here's what it does:

; Answer ID: 0  QR: 0  OPCODE: QUERY  AA: 0  TC: 0  RD: 1
;        RA: 1  RCODE: NOERROR  qc 1  an 1  au 0  ad 1
; Questions:
;poison.acdam.net.    A
; Answers:
poison.acdam.net.    3600   CNAME acdam.net.
; Authority:
;(none)
; Additional:
acdam.net.           3600   A     192.168.1.1
; Query took:      1 msec
; Server queried:  127.0.0.1#3000[udp]

Obviously, the address for acdam.net should be discarded as the server is
authoritive for the "poison.acdam.net" zone, not for "acdam.net".

This module takes the following arguments:

 * victim - Domain name to attack (the root by default)
 * ip - Ip number to send back (127.0.0.1 by default)

Here's how I configured the module:

libdir "/home/meilof/pos6poison"
loadmodule poison

zone poison poison.acdam.net
  victim acdam.net
  ip 192.168.1.1
