Blason R skrev den 2024-11-16 04:24:
Where is that exactly to be added? I added in response-policy
statement then I tired adding in options stanza but rndc fails
everytime.
try this
response-policy {
zone "rpz.localhost";
} break-dnssec yes qname-wait-recurse no recursi
Where is that exactly to be added? I added in response-policy
statement then I tired adding in options stanza but rndc fails
everytime.
On Fri, Nov 15, 2024 at 6:35 PM Blason R wrote:
>
> Hmmm - Ok let me try doing that. Thanks for letting me know
>
> On Fri, Nov 15, 2024 at 3:43 PM Lee wrote:
On 16/11/2024 04:47, Charles Eckman via bind-users wrote:
I'm also down for other workarounds, if you have suggestions!
Hi Charles.
As a simple workaround, you can create the zone file in /var/lib, and
then create a hard-link (using "ln") to the same file in /etc/bind. That
way you can confi
Hi bind-users,
As I was configuring DNSSEC for a domain, I ran into a conflict
between the AppArmor profile in the bind9 Debian package, and what I
understand to be the default / recommended file layout (the same issue
as [1]). The proposed solution in [1] is to put admin-provided (i.e.
zone files
Hmmm - Ok let me try doing that. Thanks for letting me know
On Fri, Nov 15, 2024 at 3:43 PM Lee wrote:
>
> On Thu, Nov 14, 2024 at 1:48 AM Blason R wrote:
> >
> > Hello Team,
> >
> > I am encountering an unusual problem. I am using BIND version BIND
> > 9.18.19-1+ubuntu22.04.1+isc+1-Ubuntu and h
On Thu, Nov 14, 2024 at 1:48 AM Blason R wrote:
>
> Hello Team,
>
> I am encountering an unusual problem. I am using BIND version BIND
> 9.18.19-1+ubuntu22.04.1+isc+1-Ubuntu and have configured BIND RPZ. My
> objective is to block access to app.hubspot.com, for which I have
> established a zone.
>
6 matches
Mail list logo