On Wed, Oct 1, 2008 at 10:46 AM, Richard Thomas <[EMAIL PROTECTED]>wrote:
> > ware wrote: > > cat nameserver 4.2.2.2 >> /etc/resolv.conf > > > No. That doesn't help. This is a network based intercept. Any DNS > traffic heading off Bill's network gets intercepted. That's why I had to > configure stuff to work on port 52 (though any other port would likely > have worked just as well) > > Rich > Out of curiosity, do the returning packets have any indication on the actual server being contacted (i.e. is supplying the bogus DNS info)? Andy --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "NLUG" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/nlug-talk?hl=en -~----------~----~----~----~------~----~------~--~---
