mirror of
https://github.com/pi-hole/dnsmasq.git
synced 2025-12-19 18:28:25 +00:00
28 lines
1.6 KiB
Plaintext
28 lines
1.6 KiB
Plaintext
This is a patch against SuSEfirewall2-3.1-206 (SuSE 9.x and older)
|
|
It fixes the depancy from the dns daemon name 'named'
|
|
After appending the patch, the SuSEfirewall is again able to autodetect
|
|
the dnsmasq named service.
|
|
This is a very old bug in the SuSEfirewall script.
|
|
The SuSE people think the name of the dns server will allways 'named'
|
|
|
|
|
|
--- /sbin/SuSEfirewall2.orig 2004-01-23 13:30:09.000000000 +0100
|
|
+++ /sbin/SuSEfirewall2 2004-01-23 13:31:56.000000000 +0100
|
|
@@ -764,7 +764,7 @@
|
|
echo 'FW_ALLOW_INCOMING_HIGHPORTS_UDP should be set to yes, if you are running a DNS server!'
|
|
|
|
test "$FW_SERVICE_AUTODETECT" = yes -o "$FW_SERVICE_AUTODETECT" = dmz -o "$FW_SERVICE_AUTODETECT" = ext && {
|
|
- test "$FW_SERVICE_DNS" = no -a '!' "$START_NAMED" = no && check_srv named && {
|
|
+ test "$FW_SERVICE_DNS" = no -a '!' "$START_NAMED" = no && check_srv dnsmasq && {
|
|
echo -e 'Warning: detected activated named, enabling FW_SERVICE_DNS!
|
|
You still have to allow tcp/udp port 53 on internal, dmz and/or external.'
|
|
FW_SERVICE_DNS=$FW_SERVICE_AUTODETECT
|
|
@@ -878,7 +878,7 @@
|
|
test -e /etc/resolv.conf || echo "Warning: /etc/resolv.conf not found"
|
|
# Get ports/IP bindings of NAMED/SQUID
|
|
test "$FW_SERVICE_DNS" = yes -o "$FW_SERVICE_DNS" = dmz -o "$FW_SERVICE_DNS" = ext -o "$START_NAMED" = yes && DNS_PORT=`$LSOF -i -n -P | \
|
|
- $AWK -F: '/^named .* UDP / {print $2}'| $GREP -vw 53 | $SORT -un`
|
|
+ $AWK -F: '/^dnsmasq .* UDP / {print $2}'| $GREP -vw 53 | $SORT -un`
|
|
test "$FW_SERVICE_SQUID" = yes -o "$FW_SERVICE_SQUID" = dmz -o "$FW_SERVICE_SQUID" = ext -o "$START_SQUID" = yes && SQUID_PORT=`$LSOF -i -n -P | \
|
|
$AWK -F: '/^squid .* UDP/ {print $2}'| $SORT -un`
|