Home
last modified time | relevance | path

Searched refs:DNS (Results 1 – 25 of 30) sorted by relevance

12

/dragonfly/crypto/openssh/
H A DREADME.dns1 How to verify host keys using OpenSSH and DNS
4 OpenSSH contains support for verifying host keys using DNS as described
6 instructions on how to use this feature. Configuring DNS is out of the
10 (1) Server: Generate and publish the DNS RR
12 To create a DNS resource record (RR) containing a fingerprint of the
22 generic DNS RR format parsable by most modern name server
26 To publish the fingerprint using the DNS you must add the generated RR
27 to your DNS zone file and sign your zone.
30 (2) Client: Enable ssh to verify host keys using DNS
32 To enable the ssh client to verify host keys using DNS, you have to
[all …]
/dragonfly/contrib/openresolv/
H A Dresolvconf.in87 Inform the system about any DNS updates.
90 -a \$INTERFACE Add DNS information to the specified interface
91 (DNS supplied via stdin in resolv.conf format)
92 -C \$PATTERN Deprecate DNS information for matched interfaces
93 -c \$PATTERN Configure DNS information for matched interfaces
94 -d \$INTERFACE Delete DNS information from the specified interface
96 -i [\$PATTERN] Show interfaces that have supplied DNS information
99 -l [\$PATTERN] Show DNS information, optionally from interfaces
102 -u Run updates from our current DNS information
107 -m metric Give the added DNS information a metric
/dragonfly/libexec/bootpd/
H A DProblems23 timeouts on failed DNS lookup operations. If this is the
24 problem, find the client names for which DNS lookup fails
33 If your DNS lookups work but are just slow, consider either
34 running bootpd on the same machine as the DNS server or
35 running a caching DNS server on the host running bootpd.
/dragonfly/sbin/natd/samples/
H A Dnatd.cf.sample58 # BEFORE running named, so if the DNS server and NAT are on the same
78 # DNS in this situation can get hairy. For example, an inside host
81 # 192.168.1.56 and 198.105.232.1 are set up as address records in the DNS
90 # It's probably not a good idea to use DNS names in redirect_address statements
/dragonfly/etc/
H A Dhosts.allow29 # Protect against simple DNS spoofing attacks by checking that the
32 # 20 seconds is logged. No protection is afforded against DNS poisoning,
33 # IP spoofing or more complicated attacks. Hosts with no reverse DNS
/dragonfly/share/examples/IPv6/
H A DUSAGE215 resolved by DNS. Specify the "-w" option to "ping6".
489 EDNS0 is defined in RFC2671. With EDNS0, the resolver library can tell DNS
490 server of its receiving buffer size, and permit DNS server to transmit large
497 KAME box -----------------------------> BIND9 DNS server
498 KAME box <----------------------------- BIND9 DNS server
499 can transmit jumbo reply, since DNS server
503 - prepare KAME box and BIND9 DNS server (can be a same node)
511 - BIND 4/8 DNS server will choke with EDNS0 packet, so you must not
512 turn the option on if you have BIND 4/8 DNS server. If you enable
513 "options edns0" against BIND 4/8 DNS server, you will never be able
[all …]
/dragonfly/share/examples/pf/
H A Dfaq-example223 # dns_out - DNS queries.
42 # dns_in - DNS replies.
/dragonfly/contrib/dhcpcd/hooks/
H A D29-lookup-hostname1 # Lookup the hostname in DNS if not set
/dragonfly/contrib/tcp_wrappers/
H A DREADME.NIS12 confusion I have removed the old name wzv-gw.win.tue.nl from the DNS. I
26 The DNS was designed to handle multi-homed hosts. In the DNS my gateway
H A DCHANGES16 - When syslogging DNS hostname problems, always stop after a limited
134 foulup with multi-homed hosts in DNS through NIS mode.
201 with other DNS-related problems. See the "tcpdchk.8" manual page.
206 conflicts and with other DNS-related problems. See the "tcpdmatch.8"
245 - Resurrected my year-old code to reduce DNS load by appending a dot to
H A DREADME.IRIX43 your system tries DNS before NIS (hostresorder bind nis local).
H A DREADME283 depend on some far-away DNS (domain name server) outside your own
287 the address->name DNS server, by asking for a second opinion. To this
289 the name->address DNS server, which may be an entirely different host.
291 If any name or address discrepancies are found, or if the second DNS
1010 Dik (fwi.uva.nl) provided additional insight into DNS spoofing
/dragonfly/etc/sendmail/
H A Ddragonfly.mc63 dnl DNS based black hole lists
65 dnl DNS based black hole lists come and go on a regular basis
/dragonfly/share/dict/
H A Dfreebsd25 DNS
/dragonfly/share/examples/ppp/
H A Dppp.linkdown.sample20 # We don't really need to do much here. If we have notified a DNS
H A Dppp.linkup.sample37 # as arguments too - useful for informing a DNS of your assigned IP.
H A Dppp.conf.sample224 # Inform the client if they ask for our DNS IP numbers:
233 # Some people like to prioritize DNS packets:
303 set filter in 4 permit udp src eq 53 # DNS
304 set filter out 4 permit udp dst eq 53 # DNS
751 accept dns # Allow DNS negotiation
/dragonfly/include/rpcsvc/
H A Dnis_object.x121 DNS = 4, /* Domain Name Service */ enumerator
/dragonfly/contrib/tnftp/
H A DNEWS111 so that features such as DNS Service Discovery will work.
/dragonfly/contrib/dhcpcd/
H A DREADME.md19 dhcpcd may not be the only daemon running that wants to configure DNS on the
/dragonfly/contrib/mdocml/
H A Dlib.in112 LINE("libresolv", "DNS Resolver Library (libresolv, \\-lresolv)")
/dragonfly/usr.sbin/ppp/
H A DREADME.changes70 will auto enable it. The DNS side may be enabled/disabled, and if
H A Dppp.8.m4495 This can be done by configuring a local DNS
2232 do this if you are running a local DNS unless you also either use
2283 .It Li DNS
2284 Log DNS QUERY packets.
2698 This option allows DNS negotiation.
2712 will answer any DNS queries requested by the peer rather than rejecting
3999 successfully negotiates a DNS.
4421 This command specifies DNS overrides for the
/dragonfly/contrib/tcpdump/
H A DCHANGES30 man: Update DNS sections
43 Make protocol-specific updates for: AH, DHCP, DNS, ESP, FRF.16, HNCP,
149 CVE-2017-12995 (DNS)
310 DNS: Represent the "DNSSEC OK" bit as "DO" instead of "OK". Add a test case
766 Updated list of DNS RR typecodes
939 DNS dissector handles TKEY, TSIG and IXFR.
/dragonfly/bin/cpdup/
H A DBACKUPS294 *ONLY* (no spaces). Replace <BAKHOST> with the IP address or DNS name

12