From patchwork Wed May 1 02:16:40 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 2227 Return-Path: Received: from mail01.ipfire.org (unknown [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id 4EE9985BD81 for ; Tue, 30 Apr 2019 17:17:27 +0100 (BST) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 44tmrk6QRYz5H9PF; Tue, 30 Apr 2019 17:17:26 +0100 (BST) Received: from ipfire.tremer.co.uk (unknown [88.215.19.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 44tmrV1lt1z4yv6V; Tue, 30 Apr 2019 17:17:14 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904rsa; t=1556641034; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=WwkVqLbtfTIR+y/FTmKmQpkLZ+rv2tWEXBxZw3o0eno=; b=VOe4j60jdt8acC/h28zQfvDsqCM2QYrT1yTybLGsYD8qcnyqcI+WQc2xWMl9hIR9RYYFNQ 3ZhxIpGo4gnFDCcz+Hpgs9PpKO+wsqMlmdvEDTTyJst++NE60vYFID6643p96gYTIlYWK7 iZAmEBo8W08faCbyUBcpwqZ4pAxxO3rsmrJqgDJSsAG1M+wUDIYsndlnFW5A4sePsvoBrV uA/y5JvOMvivNS/4uTX0/KROdjJvBgvIOlr6xqSS/6vxngpD9cNyvDhJxnm/u80nfL3u9K FSDjzkwXQaEzMxob5ESXRSdBFkgeUoqxGCm5iE6vanuX5nh19BrJU8lPe1OEjg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904ed25519; t=1556641034; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=WwkVqLbtfTIR+y/FTmKmQpkLZ+rv2tWEXBxZw3o0eno=; b=nlVScBPrjThoDV4nOjSH4BU6HUZj/kL77bho76DXLle9mLckCrPD9eyQ+CI8ZzayQwJyGv mU2BpQIpq9TmcoBw== From: Michael Tremer To: development@lists.ipfire.org Subject: [RFC PATCH 3/8] unbound: Enbale DuckDuckGo safe search Date: Tue, 30 Apr 2019 17:16:40 +0100 Message-Id: <20190430161645.24261-4-michael.tremer@ipfire.org> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20190430161645.24261-1-michael.tremer@ipfire.org> References: <20190430161645.24261-1-michael.tremer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=ms smtp.mailfrom=michael.tremer@ipfire.org Cc: Michael Tremer X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Michael Tremer --- src/initscripts/system/unbound | 3 +++ 1 file changed, 3 insertions(+) diff --git a/src/initscripts/system/unbound b/src/initscripts/system/unbound index 3b4da1dff..41117904f 100644 --- a/src/initscripts/system/unbound +++ b/src/initscripts/system/unbound @@ -690,6 +690,9 @@ setup_safe_search() { # Bing unbound-control local_data "bind.com CNAME strict.bing.com." + # DuckDuckGo + unbound-control local_data "duckduckgo.com CNAME safe.duckduckgo.com." + # Google for domain in ${GOOGLE_TLDS[@]}; do unbound-control local_data "${domain} CNAME forcesafesearch.google.com."