From patchwork Wed May 1 02:16:42 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 2229 Return-Path: Received: from mail01.ipfire.org (unknown [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id E009185BD81 for ; Tue, 30 Apr 2019 17:17:33 +0100 (BST) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 44tmrs3TQxz5Btsl; Tue, 30 Apr 2019 17:17:33 +0100 (BST) Received: from ipfire.tremer.co.uk (unknown [88.215.19.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 44tmrW2Yk5z57JhQ; Tue, 30 Apr 2019 17:17:15 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904rsa; t=1556641035; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=hZ4iLfEG7kAED4/s19oAOPGRileN4xwRkv/OKEGnCEk=; b=RH0n7qUVlGPsl3wEWdUC4AtuzNhw/SHKm8quUzhKOV2dwerw5UDoUdveY82iNQ4rNe7xOP 0i0XCT4ZwWqlvjv+WCpYcBTycZaPBJeJ6jd5VoGnjRvgta4eJa5nG8L8bU7fkT2o1JZlGh 4IbQARKRKQZDagWv5IL/wUyre9tp/8DDLHESMAdBnMjHqer53Ca9my/cS0Mi1AJcOdeq3b hwfB6LxnFAwy3jDNSywmhHElSSkxm8zoq9N8kLFO3a+t6ByzJ7W1N33QhSNqwF6EWJvLdN /bzT2frPkHt4Zu+yrs6ThI4eo5KBQDVvDMzgQpRaWRw6gtqsqwO/Q+HZ+yytXw== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904ed25519; t=1556641035; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=hZ4iLfEG7kAED4/s19oAOPGRileN4xwRkv/OKEGnCEk=; b=wky6xVOZKR+hzuUyw5q4oXXnJbpxkm6CQTFxqqG59CELXtKxxl/Uid7/gc5gfF/qxzcDEy 8VmFzYOKjVsscUAw== From: Michael Tremer To: development@lists.ipfire.org Subject: [RFC PATCH 5/8] unbound: Add Yandex Safe Search Date: Tue, 30 Apr 2019 17:16:42 +0100 Message-Id: <20190430161645.24261-6-michael.tremer@ipfire.org> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20190430161645.24261-1-michael.tremer@ipfire.org> References: <20190430161645.24261-1-michael.tremer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=ms smtp.mailfrom=michael.tremer@ipfire.org Cc: Michael Tremer X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Michael Tremer --- src/initscripts/system/unbound | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/src/initscripts/system/unbound b/src/initscripts/system/unbound index 951fda7ab..388b65c03 100644 --- a/src/initscripts/system/unbound +++ b/src/initscripts/system/unbound @@ -703,6 +703,10 @@ write_safe_search_conf() { echo " local-zone: ${domain} transparent" echo " local-data: \"${domain} CNAME forcesafesearch.google.com.\"" done + + # Yandex + echo " local-zone: yandex.ru transparent" + echo " local-data: \"yandex.ru A 213.180.193.56\"" ) > /etc/unbound/safe-search.conf }