-
-
Notifications
You must be signed in to change notification settings - Fork 362
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FR] Ability to use Redis unix sockets #835
Comments
The commits add the option |
Configuration:
/\ [::1]:10053 is the port of my local DNSCrypt.
=========================================== It's fully working, as you can see, the cache persists across invocations of Unbound. |
If it isn't asking too much, could you implement ability to specify the Redis password? ===> #833 |
Hi @alpominth, #833 is now addressed on the master branch. Could you try and report if it works for you on the issue? |
* nlnet/master: Regenerate configure for the fix acx_nlnetlabs.m4 for -Wstrict-prototypes. - Fix acx_nlnetlabs.m4 for -Wstrict-prototypes. Fix NLnetLabs#833: [FR] Ability to set the Redis password. - Fix NLnetLabs#835: [FR] Ability to use Redis unix sockets. - Add NLnetLabs#835: [FR] Ability to use Redis unix sockets. Changelog note for NLnetLabs#819, generate configparser.c and comment syntax change. - Merge NLnetLabs#819: Added new static zone type block_a to suppress all A queries for specific zones. - Fix test for new default. - Set default for harden-unknown-additional to no. So that it does not hamper future protocol developments. - Add harden-unknown-additional option. Default on and it removes unknown records from the authority section and additional section. Thanks to Xiang Li, from NISL Lab, Tsinghua University. - Set max-udp-size default to 1232. This is the same default value as the default value for edns-buffer-size. It restricts client edns buffer size choices, and makes unbound behave similar to other DNS resolvers. The new choice, down from 4096 means it is harder to get large responses from Unbound. Thanks to Xiang Li, from NISL Lab, Tsinghua University. - Fix not following cleared RD flags potentially enables amplification DDoS attacks, reported by Xiang Li and Wei Xu from NISL Lab, Tsinghua University. The fix stops query loops, by refusing to send RD=0 queries to a forwarder, they still get answered from cache. Added new static zone type block_a to suppress all A queries for specific zones
Redis has two options for setting communication over unix sockets:
Such a feature would be useful as unix sockets have a better throughput than AF_INET/AF_INET6 sockets.
The text was updated successfully, but these errors were encountered: