From patchwork Wed May 1 02:16:39 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 2226 Return-Path: Received: from mail01.ipfire.org (unknown [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id 278D585BD81 for ; Tue, 30 Apr 2019 17:17:24 +0100 (BST) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 44tmrg5GD2z5Dw80; Tue, 30 Apr 2019 17:17:23 +0100 (BST) Received: from ipfire.tremer.co.uk (unknown [88.215.19.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 44tmrT5PpQz55Jp1; Tue, 30 Apr 2019 17:17:13 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904rsa; t=1556641033; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=fyQEzqApEKXtTl7c82Zl+nsfOmSBVKJ7B8JFbhg0uxE=; b=vXSj68aP7CUOhJrq9oS0OWCv0VLcpC8ssdipZHa5thdYSDW0L8Jj8USNx3q5hnk7p3KjwA lvb3oUxVr74XtUzjXIDUtVbJSkA0nv5/BY3Lk5dWIzjnD86sVD73M6DTLleXPYgk3zJIu3 Gay7uy8xXNGFph+T5OFDAeKbWNxhj+8giTRt/ouLLBrHI+D6iHlC+XrOxjphg5tPwRJ1Ka R5T54UnmyADIft6FifkpX889hnFMV6T2mFZMnAryr9kGGmnr3KMIH0x4RNPS4JVDsNtyNT +4wqbgsaYzT7yrht6xDSZ37CUX9vhhaiQbdhIoXdGzRBCLNKrpbhAAUYAZ8uyg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904ed25519; t=1556641033; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=fyQEzqApEKXtTl7c82Zl+nsfOmSBVKJ7B8JFbhg0uxE=; b=0HS/RiCzSwsj5UZ9da4BtcTqgjSe+AvWgeS4kAu7wiu/LN8C8Y0V0nDAe3KtZADgzmplTi U1v31ZRRQY0dB1BA== From: Michael Tremer To: development@lists.ipfire.org Subject: [RFC PATCH 2/8] unbound: Enable Bing SafeSearch Date: Tue, 30 Apr 2019 17:16:39 +0100 Message-Id: <20190430161645.24261-3-michael.tremer@ipfire.org> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20190430161645.24261-1-michael.tremer@ipfire.org> References: <20190430161645.24261-1-michael.tremer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=ms smtp.mailfrom=michael.tremer@ipfire.org Cc: Michael Tremer X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Michael Tremer --- src/initscripts/system/unbound | 3 +++ 1 file changed, 3 insertions(+) diff --git a/src/initscripts/system/unbound b/src/initscripts/system/unbound index 4ac8331dc..3b4da1dff 100644 --- a/src/initscripts/system/unbound +++ b/src/initscripts/system/unbound @@ -687,6 +687,9 @@ setup_safe_search() { local domain + # Bing + unbound-control local_data "bind.com CNAME strict.bing.com." + # Google for domain in ${GOOGLE_TLDS[@]}; do unbound-control local_data "${domain} CNAME forcesafesearch.google.com."