[dnsdist] Editing TTLs for spoofed responses
Holger Hoffstätte
holger at applied-asynchrony.com
Sun Nov 22 11:22:46 UTC 2020
On 2020-11-22 11:50, Holger Hoffstätte via dnsdist wrote:
> Sorry if this is a dumb question - I'm certain I'm doing something wrong,
> I just don't know what it is.. :)
..and of course 30 seconds after sending I find various issues in
the bug tracker, pointing me to the new feature in 1.5. Thanks. :}
There are two issues here:
- I cannot read: the docs for SpoofAction clearly describe the ttl option,
new as of 1.5. Hooray, since I'm using 1.5.1.
- It does not seem to work:
$dnsdist>o={ttl=3600}
$dnsdist>a=SpoofAction("192.168.100.223", o)
Error: Unable to convert parameter from table to N5boost8optionalINSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEEEE>
Any hints?
Holger
More information about the dnsdist
mailing list