/dragonfly/crypto/openssh/ |
H A D | README.dns | 1 How to verify host keys using OpenSSH and DNS 4 OpenSSH contains support for verifying host keys using DNS as described 6 instructions on how to use this feature. Configuring DNS is out of the 10 (1) Server: Generate and publish the DNS RR 12 To create a DNS resource record (RR) containing a fingerprint of the 22 generic DNS RR format parsable by most modern name server 26 To publish the fingerprint using the DNS you must add the generated RR 27 to your DNS zone file and sign your zone. 30 (2) Client: Enable ssh to verify host keys using DNS 32 To enable the ssh client to verify host keys using DNS, you have to [all …]
|
/dragonfly/contrib/openresolv/ |
H A D | resolvconf.in | 87 Inform the system about any DNS updates. 90 -a \$INTERFACE Add DNS information to the specified interface 91 (DNS supplied via stdin in resolv.conf format) 92 -C \$PATTERN Deprecate DNS information for matched interfaces 93 -c \$PATTERN Configure DNS information for matched interfaces 94 -d \$INTERFACE Delete DNS information from the specified interface 96 -i [\$PATTERN] Show interfaces that have supplied DNS information 99 -l [\$PATTERN] Show DNS information, optionally from interfaces 102 -u Run updates from our current DNS information 107 -m metric Give the added DNS information a metric
|
/dragonfly/libexec/bootpd/ |
H A D | Problems | 23 timeouts on failed DNS lookup operations. If this is the 24 problem, find the client names for which DNS lookup fails 33 If your DNS lookups work but are just slow, consider either 34 running bootpd on the same machine as the DNS server or 35 running a caching DNS server on the host running bootpd.
|
/dragonfly/sbin/natd/samples/ |
H A D | natd.cf.sample | 58 # BEFORE running named, so if the DNS server and NAT are on the same 78 # DNS in this situation can get hairy. For example, an inside host 81 # 192.168.1.56 and 198.105.232.1 are set up as address records in the DNS 90 # It's probably not a good idea to use DNS names in redirect_address statements
|
/dragonfly/etc/ |
H A D | hosts.allow | 29 # Protect against simple DNS spoofing attacks by checking that the 32 # 20 seconds is logged. No protection is afforded against DNS poisoning, 33 # IP spoofing or more complicated attacks. Hosts with no reverse DNS
|
/dragonfly/share/examples/IPv6/ |
H A D | USAGE | 215 resolved by DNS. Specify the "-w" option to "ping6". 489 EDNS0 is defined in RFC2671. With EDNS0, the resolver library can tell DNS 490 server of its receiving buffer size, and permit DNS server to transmit large 497 KAME box -----------------------------> BIND9 DNS server 498 KAME box <----------------------------- BIND9 DNS server 499 can transmit jumbo reply, since DNS server 503 - prepare KAME box and BIND9 DNS server (can be a same node) 511 - BIND 4/8 DNS server will choke with EDNS0 packet, so you must not 512 turn the option on if you have BIND 4/8 DNS server. If you enable 513 "options edns0" against BIND 4/8 DNS server, you will never be able [all …]
|
/dragonfly/share/examples/pf/ |
H A D | faq-example2 | 23 # dns_out - DNS queries. 42 # dns_in - DNS replies.
|
/dragonfly/contrib/dhcpcd/hooks/ |
H A D | 29-lookup-hostname | 1 # Lookup the hostname in DNS if not set
|
/dragonfly/contrib/tcp_wrappers/ |
H A D | README.NIS | 12 confusion I have removed the old name wzv-gw.win.tue.nl from the DNS. I 26 The DNS was designed to handle multi-homed hosts. In the DNS my gateway
|
H A D | CHANGES | 16 - When syslogging DNS hostname problems, always stop after a limited 134 foulup with multi-homed hosts in DNS through NIS mode. 201 with other DNS-related problems. See the "tcpdchk.8" manual page. 206 conflicts and with other DNS-related problems. See the "tcpdmatch.8" 245 - Resurrected my year-old code to reduce DNS load by appending a dot to
|
H A D | README.IRIX | 43 your system tries DNS before NIS (hostresorder bind nis local).
|
H A D | README | 283 depend on some far-away DNS (domain name server) outside your own 287 the address->name DNS server, by asking for a second opinion. To this 289 the name->address DNS server, which may be an entirely different host. 291 If any name or address discrepancies are found, or if the second DNS 1010 Dik (fwi.uva.nl) provided additional insight into DNS spoofing
|
/dragonfly/etc/sendmail/ |
H A D | dragonfly.mc | 63 dnl DNS based black hole lists 65 dnl DNS based black hole lists come and go on a regular basis
|
/dragonfly/share/dict/ |
H A D | freebsd | 25 DNS
|
/dragonfly/share/examples/ppp/ |
H A D | ppp.linkdown.sample | 20 # We don't really need to do much here. If we have notified a DNS
|
H A D | ppp.linkup.sample | 37 # as arguments too - useful for informing a DNS of your assigned IP.
|
H A D | ppp.conf.sample | 224 # Inform the client if they ask for our DNS IP numbers: 233 # Some people like to prioritize DNS packets: 303 set filter in 4 permit udp src eq 53 # DNS 304 set filter out 4 permit udp dst eq 53 # DNS 751 accept dns # Allow DNS negotiation
|
/dragonfly/include/rpcsvc/ |
H A D | nis_object.x | 121 DNS = 4, /* Domain Name Service */ enumerator
|
/dragonfly/contrib/tnftp/ |
H A D | NEWS | 111 so that features such as DNS Service Discovery will work.
|
/dragonfly/contrib/dhcpcd/ |
H A D | README.md | 19 dhcpcd may not be the only daemon running that wants to configure DNS on the
|
/dragonfly/contrib/mdocml/ |
H A D | lib.in | 112 LINE("libresolv", "DNS Resolver Library (libresolv, \\-lresolv)")
|
/dragonfly/usr.sbin/ppp/ |
H A D | README.changes | 70 will auto enable it. The DNS side may be enabled/disabled, and if
|
H A D | ppp.8.m4 | 495 This can be done by configuring a local DNS 2232 do this if you are running a local DNS unless you also either use 2283 .It Li DNS 2284 Log DNS QUERY packets. 2698 This option allows DNS negotiation. 2712 will answer any DNS queries requested by the peer rather than rejecting 3999 successfully negotiates a DNS. 4421 This command specifies DNS overrides for the
|
/dragonfly/contrib/tcpdump/ |
H A D | CHANGES | 30 man: Update DNS sections 43 Make protocol-specific updates for: AH, DHCP, DNS, ESP, FRF.16, HNCP, 149 CVE-2017-12995 (DNS) 310 DNS: Represent the "DNSSEC OK" bit as "DO" instead of "OK". Add a test case 766 Updated list of DNS RR typecodes 939 DNS dissector handles TKEY, TSIG and IXFR.
|
/dragonfly/bin/cpdup/ |
H A D | BACKUPS | 294 *ONLY* (no spaces). Replace <BAKHOST> with the IP address or DNS name
|