As a heads-up, this fixed my recursive DNS to world
issue while ability to serve authoritative domains
was not impaired. Thank you, t...@t-3.net
Running your own DNS is a good idea for those who
got too used to all these 8.8.8.8 and 8.8.4.4 things.
On Tue, Sep 10, 2013 at 04:33:23AM -0400, t...@
Bright Star, thank you for your elaborate explanation!
On Sep 10, 2013, at 09:45 , Bry8 Star wrote:
> Set your Recursive/caching DNS-Server portion in BIND to listen on
> 127.0.0.1:53, And set your machine's Network adapter's DNS-Server
> settings to use only 127.0.0.1 as your DNS-Server, then all
Hey.
Am 10.09.2013 10:14, schrieb Eugen Leitl:
Speaking about recursive DNS for BIND, does anyone have
a working set of options which limit recursive DNS queries
to just the local subnet, and another couple IPs, maybe?
options {
allow-recursion { 192.168.0.0/24; };
};
http://www.bind9.net/
For linux bind named.conf:
Within "options {" put:
allow-query { any; };
allow-recursion { trusted; };
allow-query-cache { trusted; };
Then, add this new section somewhere after the options closing
bracket:
acl "trusted" {
localhost;
localnets;
//netblocks/IPs you want, examples below:
123
On Tue, Sep 10, 2013 at 12:45:03AM -0700, Bry8 Star wrote:
> If you run your own BIND/named as Authoritative DNS-Server, for some
> domain-name that you own, and if it is also configured to function
> as a Recursive DNS-Server for local software (in that computer), and
> if you have enabled DNSSEC
Hi,
If you run your own BIND/named as Authoritative DNS-Server, for some
domain-name that you own, and if it is also configured to function
as a Recursive DNS-Server for local software (in that computer), and
if you have enabled DNSSEC (for recursive side), then that would be
better, imho.
Such, R
On Sep 7, 2013, at 20:55 , Peter Palfrader wrote:
> Running a local bind or unbound is probably a smart thing to do, and if
> you put 127.0.0.1 into /etc/resolv.conf tor will use that.
I now have a local Bind9 running, but I still get a lot of these:
Sep 08 22:11:27.000 [warn] eventdns: All name
On 13-09-07 02:55 PM, Peter Palfrader wrote:
> On Sat, 07 Sep 2013, Yoriz wrote:
>
>> Does Tor use the system DNS configuration? In other words, if I would
>> run a local Bind daemon, would my tor exit use it? Is that bad for the
>> safety of the tor user, as the Bind daemon effectively becomes an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Take a look at the
www.opennicproject.org
Yoriz schrieb:
>My VPS hoster has configured DNS as follows:
>
> $ cat /etc/resolv.conf
> nameserver 8.8.8.8
> nameserver 8.8.4.4
>
>I believe these are Google's DNS servers. Unfortunately, they are
My VPS hoster has configured DNS as follows:
$ cat /etc/resolv.conf
nameserver 8.8.8.8
nameserver 8.8.4.4
I believe these are Google's DNS servers. Unfortunately, they are somehow
unreliable (possible rate-limited by Google). My tor logs are filled with:
Sep 07 16:37:24.000 [warn] e
On Sat, 07 Sep 2013, Yoriz wrote:
> Does Tor use the system DNS configuration? In other words, if I would
> run a local Bind daemon, would my tor exit use it? Is that bad for the
> safety of the tor user, as the Bind daemon effectively becomes an
> audit log of all domains visited by tor users?
R
11 matches
Mail list logo