Hello,
I use dnsmasq to provide DHCP. IPv4 is working well, but I'm struggling to
configure IPv6. I use DHCPv6 and Router Advertisements and get a /64 when
requesting a DHCP lease, which is according to my configuration.
However: the RA contains a default route to the dnsmasq server, but the d
On Sunday 23 February 2020 11:41:47 William Edwards wrote:
> Question: how do I configure dnsmasq to supply a user-specified default
> gateway address in RAs?
Hello William! This is not possible as IPv6 gateway (router) address is
not present in RA packet structure. If client receives RA packet i
Hello Pali,
Thank you for your answer.
I am aware RAs are supposed to be sent by routers. I attempted using dnsmasq
for RAs, because it seemed easier than getting RAs to be sent from my VRRP
address as source address.
I have enough information to proceed with dnsmasq configuration.
Met vrie
Hi,
I have a 'dhcp-script'. It is being called with "add" and "old" upon requesting
DHCP lease, but when a lease expires, it is not called with "del".
To test, I changed lease time to 1 minute and kept an eye on
/var/lib/misc/dnsmasq.leases . After 1 minute, the lease disappeared from
/var/li
On Sun, Feb 23, 2020 at 08:41:28PM +0100, William Edwards wrote:
>
> Hi,
>
> I have a 'dhcp-script'. It is being called with "add" and "old" upon
> requesting DHCP lease, but when a lease expires,
> it is not called with "del".
>
> To test, I changed lease time to 1 minute and kept an eye on
> /
On Sun, Feb 23, 2020 at 09:57:20PM +0100, Geert Stappers wrote:
> On Sun, Feb 23, 2020 at 08:41:28PM +0100, William Edwards wrote:
> >
> > Hi,
> >
> > I have a 'dhcp-script'. It is being called with "add" and "old" upon
> > requesting DHCP lease, but when a lease expires,
> > it is not called wit
Unfortunately I’m dealing with an obnoxious firewall that rejects EDNS
packets. DNSMASQ eventually resends without EDNS, but is it possible to
disable EDNS entirely or for replies to a specific host? I tried setting
the max EDNS packet size to 512 and below but still no luck.
(Ideally the firewall
Google might mangle the patch. Feedback welcomed.
RFC 8624 Section 3.1 (https://www.rfc-editor.org/rfc/rfc8624.txt )says:
3 | DSA| MUST NOT| MUST NOT
6 | DSA-NSEC3-SHA1 | MUST NOT| MUST NOT
I've added them on this gh repo:
1) Remove DSA-NSEC3-SHA