DNSSEC validation should not be enabled by default - it wasn't in v5, either. The reason for this is that it may be causing issues on devices with broken/missing RTCs where NTP time synchronization relies on DNS resolution
Signed-off-by: DL6ER <dl6er@dl6er.de>
This commit is contained in:
parent
94521b8124
commit
16cc1027fb
|
@ -497,7 +497,7 @@ void initConfig(struct config *conf)
|
|||
conf->dns.dnssec.h = "Validate DNS replies using DNSSEC?";
|
||||
conf->dns.dnssec.t = CONF_BOOL;
|
||||
conf->dns.dnssec.f = FLAG_RESTART_FTL;
|
||||
conf->dns.dnssec.d.b = true;
|
||||
conf->dns.dnssec.d.b = false;
|
||||
|
||||
conf->dns.interface.k = "dns.interface";
|
||||
conf->dns.interface.h = "Interface to use for DNS (see also dnsmasq.listening.mode) and DHCP (if enabled)";
|
||||
|
|
Loading…
Reference in New Issue