[dnsdist] Editing TTLs for spoofed responses

Holger Hoffstätte holger at applied-asynchrony.com
Sun Nov 22 11:22:46 UTC 2020


On 2020-11-22 11:50, Holger Hoffstätte via dnsdist wrote:
> Sorry if this is a dumb question - I'm certain I'm doing something wrong,
> I just don't know what it is.. :)

..and of course 30 seconds after sending I find various issues in
the bug tracker, pointing me to the new feature in 1.5. Thanks. :}

There are two issues here:

- I cannot read: the docs for SpoofAction clearly describe the ttl option,
new as of 1.5. Hooray, since I'm using 1.5.1.

- It does not seem to work:

$dnsdist>o={ttl=3600}
$dnsdist>a=SpoofAction("192.168.100.223", o)
Error: Unable to convert parameter from table to N5boost8optionalINSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEEEE>

Any hints?

Holger


More information about the dnsdist mailing list