aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/brcm63xx/patches-4.4/331-MIPS-BCM63XX-define-variant-id-field.patch
diff options
context:
space:
mode:
authorKevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>2017-02-20 10:15:55 +0000
committerHans Dedecker <dedeckeh@gmail.com>2017-03-09 10:42:27 +0100
commit3a06dd60eba362df90705315bbbddced39566a2e (patch)
treeb4041f803bea867c097902fa1239afcb203bec82 /target/linux/brcm63xx/patches-4.4/331-MIPS-BCM63XX-define-variant-id-field.patch
parent2261c9cc7715e6d590952989ebef96e08cc019fc (diff)
downloadupstream-3a06dd60eba362df90705315bbbddced39566a2e.tar.gz
upstream-3a06dd60eba362df90705315bbbddced39566a2e.tar.bz2
upstream-3a06dd60eba362df90705315bbbddced39566a2e.zip
dnsmasq: do not forward rfc6761 excluded domains
RFC 6761 defines a number of top level domains should not be forwarded to the Internet's domain servers since they are not responsible for those domains. This change adds a list of domains that will be blocked when 'boguspriv' is used and augments that which is already blocked by dnsmasq's notion of 'local service' using '--bogus-priv' i.e. RFC 1918 private addresses and IPv6 prefixes as defined in RFC 6303. To make this configurable rather than hard coded in dnsmasq's init script, a new file /usr/share/dnsmasq/rfc6761.conf is conditionally included. The default file matches the RFC 6761 recommendation along with a few other top level domains that should not be forwarded to the Internet. Compile & run tested Archer C7 v2 Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
Diffstat (limited to 'target/linux/brcm63xx/patches-4.4/331-MIPS-BCM63XX-define-variant-id-field.patch')
0 files changed, 0 insertions, 0 deletions