• Home
  • History
  • Annotate
  • only in this directory
NameDateSize

..16-Jun-201416

dnsmasq-SuSE.patchH A D25-Feb-20141.4 KiB

dnsmasq.rhH A D25-Feb-20141.9 KiB

rc.dnsmasq-suseH A D25-Feb-20141.7 KiB

README.susefirewallH A D25-Feb-20141.6 KiB

README.susefirewall

1This is a patch against SuSEfirewall2-3.1-206 (SuSE 9.x and older)
2It fixes the depancy from the dns daemon name 'named'
3After appending the patch, the SuSEfirewall is again able to autodetect 
4the dnsmasq named service.
5This is a very old bug in the SuSEfirewall script.
6The SuSE people think the name of the dns server will allways 'named'
7
8
9--- /sbin/SuSEfirewall2.orig	2004-01-23 13:30:09.000000000 +0100
10+++ /sbin/SuSEfirewall2	2004-01-23 13:31:56.000000000 +0100
11@@ -764,7 +764,7 @@
12     echo 'FW_ALLOW_INCOMING_HIGHPORTS_UDP should be set to yes, if you are running a DNS server!'
13 
14 test "$FW_SERVICE_AUTODETECT" = yes -o "$FW_SERVICE_AUTODETECT" = dmz -o "$FW_SERVICE_AUTODETECT" = ext && {
15-    test "$FW_SERVICE_DNS" = no -a '!' "$START_NAMED" = no && check_srv named && {
16+    test "$FW_SERVICE_DNS" = no -a '!' "$START_NAMED" = no && check_srv dnsmasq && {
17 	echo -e 'Warning: detected activated named, enabling FW_SERVICE_DNS!
18 You still have to allow tcp/udp port 53 on internal, dmz and/or external.'
19 	FW_SERVICE_DNS=$FW_SERVICE_AUTODETECT
20@@ -878,7 +878,7 @@
21 test -e /etc/resolv.conf || echo "Warning: /etc/resolv.conf not found"
22 # Get ports/IP bindings of NAMED/SQUID
23 test "$FW_SERVICE_DNS" = yes -o "$FW_SERVICE_DNS" = dmz -o "$FW_SERVICE_DNS" = ext -o "$START_NAMED" = yes && DNS_PORT=`$LSOF -i -n -P | \
24-    $AWK -F: '/^named .* UDP / {print $2}'| $GREP -vw 53 | $SORT -un`
25+    $AWK -F: '/^dnsmasq .* UDP / {print $2}'| $GREP -vw 53 | $SORT -un`
26 test "$FW_SERVICE_SQUID" = yes -o "$FW_SERVICE_SQUID" = dmz -o "$FW_SERVICE_SQUID" = ext -o "$START_SQUID" = yes && SQUID_PORT=`$LSOF -i -n -P | \
27     $AWK -F: '/^squid .* UDP/ {print $2}'| $SORT -un`
28