Hi Alex,
On Mon, 1 Oct 2018 12:51:46 -0400
Alex wrote:
> I believe I said as many as 500 qps, but I believe that's wrong. It's
> more like a sustained 200 q/s.
One other thing you might double check is whether or not any consumer
equipment (cable modem, router) has a firewall setting that could
ning a bug I want to make sure I didn't goof something on my end.
Thanks,
Shaun
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
from this list
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
On Fri, 28 Feb 2020 20:07:47 +
Tony Finch wrote:
> Shaun via bind-users wrote:
> >
> > The 9.16.0 version of delv seems to have trouble reading the root trust
> > anchor from the bind.keys file.
>
> I see this too. The bug is that dns_client_addtrustedkey()
Hi Sandeep,
I encountered this on RHEL 6 and got past it by tweaking an environment
variable:
export PKG_CONFIG_PATH=$PKG_CONFIG_PATH:/usr/local/lib/pkgconfig
libuv places a meta file into that directory, and the configure script
needed a little hint to find it.
Shaun
On Tue, 24 Mar 2020 19
commonly-used hostnames in your
zone, recording which ones return RRs. If you have an authoritative BIND
server configured with the rate-limit {} option, these attacks will show
up in the corresponding rate-limit logging channel.
Shaun
--
Visit https://lists.isc.org/mailman/listinfo/bind-users
5 matches
Mail list logo