Re: 9.18 horrendous

2024-08-23 Thread David Farje
Why not? It clearly shows that arguing this 'free' argument is a bit narrow. Because the scenarios are completely different. By using open source software you enter a legal contract. No that is not the point of open source software. The point of open source software is that the code is available

Re: 9.18 horrendous

2024-08-23 Thread David Farje
I get the point you're trying to make. I just don't think a volunteer crosswalk and a car accident is an appropriate analogy for open source software. The whole point of open source software is that you as a user get software for free and if something goes wrong you are free to collaborate to fix

Re: 9.18 horrendous

2024-08-23 Thread David Farje
My kid would know better than to take free candy. And if he did he would know there is a risk involved for which only he would be responsible. On Fri, Aug 23, 2024 at 3:12 PM Marc wrote: > > > > That being said. It's preposterous to complain about free software. > > > > > > So if some store own

Re: 9.18 horrendous

2024-08-23 Thread David Farje
Software problems make some people angry but they make me very happy. Some people are underpaid and work under tremendous pressure leading to anger. It's understandable. That being said. It's preposterous to complain about free software. On Fri, Aug 23, 2024 at 1:52 PM Tim Daneliuk wrote: > O

Re: rolling my own hints file

2024-06-26 Thread David Farje
to use my custom TLD server for the .net domain. Best Regards, David Farje On Wed, Jun 26, 2024 at 10:58 AM Cuttler, Brian R (HEALTH) via bind-users < bind-users@lists.isc.org> wrote: > Running Bind 9.18.18 on Ubuntu 22.04 > > > > We would like to use root servers within our o

Re: Counters for DNS transports?

2024-05-22 Thread David Farje
I frontend DoH and DoT traffic with nginx and use that for analytics/statistics. Cheers, David On Wed, May 22, 2024 at 11:08 AM Havard Eidnes via bind-users < bind-users@lists.isc.org> wrote: > Hi, > > I recently had reason to enable BIND 9.18.27 to do DoT and DoH > (done via unbound earlier), a

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread David Farje
forget about nslookup. deprecated in my mind. use dig like so: for DoT: $dig @1.1.1.1 -tA +dnssec +tls www.google.com for Doh: dig @1.1.1.1 -ta +https +dnssec www.google.com Make sure you have a more recent version of dig to supports this. If you need programmatic DNSSEC access use a library like