-
-
Notifications
You must be signed in to change notification settings - Fork 362
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FR] Ability to set the Redis password #833
Comments
Your commit is fully working: =========================== Configuration:
Tests:
====================================== I'm already using, thank you very much! |
jedisct1
added a commit
to jedisct1/unbound
that referenced
this issue
Feb 15, 2023
* nlnet/master: Regenerate configure for the fix acx_nlnetlabs.m4 for -Wstrict-prototypes. - Fix acx_nlnetlabs.m4 for -Wstrict-prototypes. Fix NLnetLabs#833: [FR] Ability to set the Redis password. - Fix NLnetLabs#835: [FR] Ability to use Redis unix sockets. - Add NLnetLabs#835: [FR] Ability to use Redis unix sockets. Changelog note for NLnetLabs#819, generate configparser.c and comment syntax change. - Merge NLnetLabs#819: Added new static zone type block_a to suppress all A queries for specific zones. - Fix test for new default. - Set default for harden-unknown-additional to no. So that it does not hamper future protocol developments. - Add harden-unknown-additional option. Default on and it removes unknown records from the authority section and additional section. Thanks to Xiang Li, from NISL Lab, Tsinghua University. - Set max-udp-size default to 1232. This is the same default value as the default value for edns-buffer-size. It restricts client edns buffer size choices, and makes unbound behave similar to other DNS resolvers. The new choice, down from 4096 means it is harder to get large responses from Unbound. Thanks to Xiang Li, from NISL Lab, Tsinghua University. - Fix not following cleared RD flags potentially enables amplification DDoS attacks, reported by Xiang Li and Wei Xu from NISL Lab, Tsinghua University. The fix stops query loops, by refusing to send RD=0 queries to a forwarder, they still get answered from cache. Added new static zone type block_a to suppress all A queries for specific zones
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Many prefer to keep the Redis database protected with a password.
There is no option in Unbound for setting it.
An option for setting the Redis password in Unbound would be very welcome
The text was updated successfully, but these errors were encountered: