On 01/30/2014 11:40 AM, Dave Taht wrote:>>> ?
and then there's splitting dns... where I might want nuc.hm.armory.com
s available to the outside universe. somehow.
Have you looked at the dnsmasq auth stuff for this?
head, hurting.
hope a real-life example helps :)
$ cat /etc/dnsmasq.c
On Thu, Jan 30, 2014 at 1:57 AM, Simon Kelley wrote:
> On 29/01/14 19:22, Dave Taht wrote:
>>
>> I have been (mostly) happily fiddling with my new comcast ipv6 connection,
>> trying to route all dns queries over ipv6 in particular, by disabling
>> requesting the ipv4 dns addrs and relying on the d
On 29/01/14 18:04, Linux Luser wrote:
We have a pretty tightly-controlled private network environment which
we've configured to have a 1-to-1-to-1 relationship between client MAC
address, hostnames and IP addresses. Apart from "guest" IP ranges, we
have control over when clients get added to the
On 29/01/14 19:22, Dave Taht wrote:
I have been (mostly) happily fiddling with my new comcast ipv6 connection,
trying to route all dns queries over ipv6 in particular, by disabling
requesting the ipv4 dns addrs and relying on the dhcpv6 request to
succeed.
config interface eth0
option '
On 29/01/14 19:30, e9hack wrote:
How must I define a dnskey? Help shows:
--dnskey=,, Specify trust anchor DNSKEY
I retrieve the trust anchor DNSKEY for the de zone with dig +multiline de dnskey
; <<>> DiG 9.7.6-P4 <<>> +multiline de dnskey
;; global options: +cmd
;; Got answer:
;; ->>HEADE