From patchwork Wed May 1 02:16:43 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 2230 Return-Path: Received: from mail01.ipfire.org (unknown [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id 0154685BD81 for ; Tue, 30 Apr 2019 17:17:37 +0100 (BST) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 44tmrw4Ff1z57JhQ; Tue, 30 Apr 2019 17:17:36 +0100 (BST) Received: from ipfire.tremer.co.uk (unknown [88.215.19.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 44tmrW6JByz57Jhg; Tue, 30 Apr 2019 17:17:15 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904rsa; t=1556641036; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=2uA7VraLhm7ewaRxpQbi0kg/CRpsy1jMexN+zNRtecs=; b=YtiXDCdWJXgEgUGA7OsfCNZ3h+tdEGgmc1Z2ZSG9mcLXvHF/20OkEEf5WHcezx2+oXmqkp C4x4EggTuDKbgKaAhB3q2nt/Qecrr++F/Vy/xzxg1+k91HCiN7AdEU9LTSKGBW7O+MuKae +Cp2IqXCPe1CKW6tj5PEUFklY7ENHtXKnNHBKFOifx3sUk9mYBhrhU4hXJ6JepvsCdml8R SXmY0j6rYXcvyE+20fM1GEpLDrc3FaIWPiF144hYtoxki/lHviFRBO7nZwgGPDRYB+nxtL DS95AxSN70Gw5fJ8EB26ao85XxcOLV1NfD2Yf3IScnmrgD9sGmvzMpCaLBR4Yg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904ed25519; t=1556641036; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:openpgp:autocrypt; bh=2uA7VraLhm7ewaRxpQbi0kg/CRpsy1jMexN+zNRtecs=; b=fzYjtf4Ov2HlgmIGibFkIN5fFbsXaJxrkJveejkOXRzqCQ2w/r8muesRK+T7iyrVgbo2Qp eaNQbY7aXetw1eAQ== From: Michael Tremer To: development@lists.ipfire.org Subject: [RFC PATCH 6/8] unbound: Fix Bing domain name for SafeSearch Date: Tue, 30 Apr 2019 17:16:43 +0100 Message-Id: <20190430161645.24261-7-michael.tremer@ipfire.org> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20190430161645.24261-1-michael.tremer@ipfire.org> References: <20190430161645.24261-1-michael.tremer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=ms smtp.mailfrom=michael.tremer@ipfire.org Cc: Michael Tremer X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Michael Tremer --- src/initscripts/system/unbound | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/initscripts/system/unbound b/src/initscripts/system/unbound index 388b65c03..318656b80 100644 --- a/src/initscripts/system/unbound +++ b/src/initscripts/system/unbound @@ -691,7 +691,7 @@ write_safe_search_conf() { # Bing echo " local-zone: bing.com transparent" - echo " local-data: \"bing.com CNAME strict.bing.com.\"" + echo " local-data: \"www.bing.com CNAME strict.bing.com.\"" # DuckDuckGo echo " local-zone: duckduckgo.com transparent"