]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
Fix formatting of PowerDNS SA 2024-03 14164/head
authorDoug Freed <dwfreed@mtu.edu>
Mon, 13 May 2024 21:26:58 +0000 (16:26 -0500)
committerGitHub <noreply@github.com>
Mon, 13 May 2024 21:26:58 +0000 (16:26 -0500)
Add a newline so that the list of workarounds actually becomes a list.

pdns/dnsdistdist/docs/security-advisories/powerdns-advisory-for-dnsdist-2024-03.rst

index a4771213926581525da2aa79717e2dd62a68fdb3..fdd77ca07234f436392977dabeae92ecbe834013 100644 (file)
@@ -19,6 +19,7 @@ DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53
 `CVSS Score: 7.5 <https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1>`__, only for configurations where incoming DoH is enabled and a TCP-only/DoT backend is enabled.
 
 Two workarounds are available:
+
 - refuse incoming XFR requests via a DNSdist rule: ``addAction(OrRule({QTypeRule(DNSQType.AXFR), QTypeRule(DNSQType.IXFR)}), RCodeAction(DNSRCode.REFUSED))``
 - switch to the legacy h2o provider by setting ``library='h2o'`` in the ``addDOHLocal`` directive