# enable new Quad9 (184.108.40.206) DNS and DNSSEC service # in Ubuntu 17.10 64-bit using a bash shell script sudo apt purge unbound LogTime=$(date '+%Y-%m-%d_%Hh%Mm%Ss') cp /etc/resolv.conf $HOME/resolv.conf_$LogTime cp /etc/nsswitch.conf $HOME/nsswitch.conf_$LogTime cp /etc/systemd/resolved.conf $HOME/resolved.conf_$LogTime sudo service resolvconf stop sudo update-rc.d resolvconf remove cp /etc/resolv.conf /tmp/resolv.conf grep -v nameserver /tmp/resolv.conf > /tmp/resolv.conf.1 echo 'nameserver 220.127.116.11' >> /tmp/resolv.conf.1 sudo cp /tmp/resolv.conf.1 /etc/resolv.conf sudo service resolvconf start # enable systemd caching DNS resolver rm /tmp/nsswitch.conf rm /tmp/nsswitch.conf.1 cp /etc/nsswitch.conf /tmp/nsswitch.conf grep -v hosts /tmp/nsswitch.conf > /tmp/nsswitch.conf.1 # dns must be mentioned in next line, or else wget does not work echo 'hosts: files mdns4_minimal resolv dns myhostname mymachines' >> /tmp/nsswitch.conf.1 sudo cp /tmp/nsswitch.conf.1 /etc/nsswitch.conf # set DNS server to 18.104.22.168 rm /tmp/resolved.conf rm /tmp/resolved.conf.1 cp /etc/systemd/resolved.conf /tmp/resolved.conf grep -v DNS /tmp/resolved.conf > /tmp/resolved.conf.1 # enable new Quad9 (22.214.171.124) DNS and DNSSEC service # https://arstechnica.com/information-technology/2017/11/new-quad9-dns-service-blocks-malicious-domains-for-everyone/ echo 'DNS=126.96.36.199' >> /tmp/resolved.conf.1 echo 'DNSSEC=yes' >> /tmp/resolved.conf.1 sudo cp /tmp/resolved.conf.1 /etc/systemd/resolved.conf sudo systemd-resolve --flush-caches sudo systemctl restart systemd-resolved sudo systemd-resolve --flush-caches sudo systemd-resolve --status # It is probably also necessary to manually set # the DNS server to 188.8.131.52 in the router's configuration # and in the NetworkManager GUI # test DNSSEC validation using dig command-line tool and using DNS server 184.108.40.206: # see: https://docs.menandmice.com/display/MM/How+to+test+DNSSEC+validation dig pir.org +dnssec +multi
Tags » Ubuntu.
How to enable new Quad9 (220.127.116.11) DNS and DNSSEC service in Ubuntu 17.10 64-bit using a bash shell script
After growing tired of sourcing Petalinux/Yocto-project settings, I decided to compile a script/code that resides under my
~/.bashrc , the only thing the code/script does it automagically source my settings upon entering the directory else it will just list the contents of that directory. 119 more words
MAAS 2.x relies on Ephemeral images during commissioning of nodes. Basically, an Ephemeral image consists of a kernel, a RAM disk and a squashfs file-system that is booted over the network (PXE) and relies on cloud-init to perform discovery of a node’s hardware (e.g. 418 more words
Welcome to the seventh Ubuntu OpenStack development summary!
This summary is intended to be a regular communication of activities and plans happening in and around Ubuntu OpenStack, covering but not limited to the distribution and deployment of OpenStack on Ubuntu. 674 more words
Last week, myself and a number of the OpenStack Charms team had the pleasure of attending the OpenStack Project Teams Gathering in Denver, Colorado.
The first two days of the PTG where dedicated to cross project discussions, with the last three days focused on project specific discussion and work in dedicated rooms. 1,550 more words