2016-03-02 2:43 GMT+08:00 Simon Kelley :
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
>
> That should, I think work, and a quick test here, indicates that it
> does seem to.
>
>
> Please could you start dnsmasq as you describe, and then post the
> result of running the command
>
>
> netst
On Tue, Mar 01, 2016 at 06:50:14PM +, Simon Kelley wrote:
> On 24/02/16 23:38, Kurt H Maier wrote:
>
> This approach assumes that all the servers are dnsmasq, and running the
> loop-detection code, which is a reasonable assumption. Once a query
> escapes from the "cloud" of interconnected dnsm
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
That should, I think work, and a quick test here, indicates that it
does seem to.
Please could you start dnsmasq as you describe, and then post the
result of running the command
netstat -apn | grep dnsmasq
here? That will tell us which IP add
I just pushed a fix for this to git.
Cheers,
Simon.
On 24/02/16 01:05, Zheng Yi wrote:
> Hi, the list,
>
> I found that when multiple user-class data provided (as rfc3004),
> Dnsmasq can not setup DNSMASQ_USER_CLASS correctly.
>
> here is the client machine testing code, using u
On 24/02/16 23:38, Kurt H Maier wrote:
> On Wed, Feb 24, 2016 at 05:20:14PM +, Simon Kelley wrote:
>>
>> I wonder if a better solution to the loop-detection is to mark queries
>> with a UID of all the servers they've been forwarded by, in an EDNS0
>> option. That would avoid the false detection
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 28/02/16 10:47, ?? wrote:
> Greetings.
>
> I think it would be better to be "--tftp-blksize", as this is
> already defined in RFC 2347. If some buggy client said he want
> bigger, the server could reply --tftp-blksize is the maximum.
I think tha
Fixed now.
Cheers,
Simon.
On 01/03/16 01:07, Hongyi Zhao wrote:
> Hi all,
>
> I try to compile the latest git version, but meet the following error:
>
> --
> edns0.c: In function ‘add_pseudoheader’:
> edns0.c:148:8: error: ‘islast’ undeclared (first use in this function)
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 01/03/16 09:29, Nicolas Cavallari wrote:
> On 26/01/2016 14:46, Simon Kelley wrote:
>>
>>
>> On 26/01/16 13:42, Stefan Priebe - Profihost AG wrote:
>>
>>
>>
>>> what about writing and sending kill 1 / HUP?
>>
>>
>>
>> No. The only only way
On 26/01/2016 14:46, Simon Kelley wrote:
>
>
> On 26/01/16 13:42, Stefan Priebe - Profihost AG wrote:
>
>
>
>> what about writing and sending kill 1 / HUP?
>
>
>
> No. The only only way to make that work would be to
>
> 1) Stop dnsmasq with SIGTERM
> 2) modify the leases file
> 3) restart