Today "#" (get domain from resolv.conf) is not accepted when we use
--domain=domain,network,local syntax.
Thanks.
___
Dnsmasq-discuss mailing list
Dnsmasq-discuss@lists.thekelleys.org.uk
http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss
I am looking into murky waters, and have no knowledge of what is under
the surface.
So this may need to be categorized under 'ID10T'.
Can / should dnsmasq be used to block DNS TXT record retrieval?
reference: "DNSMessenger" @ threatpost.com
regards,
Jim A.
OK, so a network with no mail servers (residential/SMB relying on
WebMail) it may not be an issue.
Is blocking TXT queries possible?
I found this:
"Once the initial DNS response is received by the malware, it then
iterates to the next subdomain which is 'mail'. The malware uses this
domain in
On 01/03/17 15:27, Derek Higgins wrote:
> On 28 February 2017 at 18:24, Simon Kelley wrote:
>
>
> On 28/02/17 17:10, Derek Higgins wrote:
On 28 February 2017 at 16:43, Simon Kelley
wrote: Could you post (or send to me) you
Both patches applied.
Cheers,
Simon.
On 05/03/17 10:13, Olivier Gayot wrote:
> The rev-server directive only handles the following CIDR prefixes
> properly: /8, /16, /24, /32.
>
> Any other value was silently converted to /16 which could result in
> unexpected behaviour.
>
> This patch
Hi Chris,
I think you create some file, for exaqmple
/etc/NetworkManager/dnsmasq.d/hosts.conf, containing
addn-hosts=/etc/hosts.dnsmasq.
Then you would have to create hosts.dnsmasq with hosts(5) format. Place odin
there.
1.2.3.4 odin
You could use some hook to NetworkManager to use create