On Wed, Jan 29, 2014 at 2:02 PM, Toke Høiland-Jørgensen wrote:
> Dave Taht writes:
>
>> works. yea! no more nat holes for ipv4 dns.
>
> Eh? Nat holes for DNS? What exactly are you doing, and what is your
> setup? :)
>
> -Toke
1 case:
Since most forwarders can't be trusted to return NXDOMAIN, an
How must I define a dnskey? Help shows:
--dnskey=,, Specify trust anchor DNSKEY
I retrieve the trust anchor DNSKEY for the de zone with dig +multiline de dnskey
; <<>> DiG 9.7.6-P4 <<>> +multiline de dnskey
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR
I have been (mostly) happily fiddling with my new comcast ipv6 connection,
trying to route all dns queries over ipv6 in particular, by disabling
requesting the ipv4 dns addrs and relying on the dhcpv6 request to
succeed.
config interface eth0
option 'ifname' 'eth0'
option 'proto'
We have a pretty tightly-controlled private network environment which we've
configured to have a 1-to-1-to-1 relationship between client MAC address,
hostnames and IP addresses. Apart from "guest" IP ranges, we have control
over when clients get added to the network. Thus, we can detect duplicate
M
Hello Simon Kelley
Referring to
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2013q1/006818.html
The thread mainly focuses on Operating System side of a IPv6 dhclient functions.
But here are other aspects of the issue, more difficult to figure out:
The World of UEFI IPv6 network boot
Hi,
dnsmasq resolves my systems via /etc/hosts which works fine, except for
names with an additional suffix.
-- dnsmasq.conf (extract) --
local=/dyn.example.com/
expand-hosts
domain=dyn.example.com
-- hosts --
10.0.0.1 system1
10.0.0.2 system2
...
10.1.0.1 server.test
--- test ---
system1.d