From: Remi Gacogne Date: Wed, 29 Jun 2016 12:57:05 +0000 (+0200) Subject: dnsdist: Replace `TCP/IP` by `TCP` in the README X-Git-Tag: rec-4.0.2~48^2 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=d39e03df21a8abaab7456ae0585ce4709f4f6972;p=thirdparty%2Fpdns.git dnsdist: Replace `TCP/IP` by `TCP` in the README --- diff --git a/pdns/README-dnsdist.md b/pdns/README-dnsdist.md index 3370ff255d..08c9727930 100644 --- a/pdns/README-dnsdist.md +++ b/pdns/README-dnsdist.md @@ -431,7 +431,7 @@ If you invoke setQR(1) on that, `dnsdist` knows you turned the packet into a response, and will send the answer directly to the original client. If you also called setTC(1), this will tell the remote client to move to -TCP/IP, and in this way you can implement ANY-to-TCP even for downstream +TCP, and in this way you can implement ANY-to-TCP even for downstream servers that lack this feature. Note that calling `addAnyTCRule()` achieves the same thing, without @@ -469,7 +469,7 @@ addAction(MaxQPSIPRule(5), TCAction()) ``` This will respectively drop traffic exceeding that 5 QPS limit per IP or range, or return it with TC=1, forcing -clients to fall back to TCP/IP. +clients to fall back to TCP. To turn this per IP or range limit into a global limit, use NotRule(MaxQPSRule(5000)) instead of MaxQPSIPRule. @@ -1142,8 +1142,8 @@ Here are all functions: * member `attachFilter(BPFFilter)`: attach a BPF Filter to this bind * member `toString()`: print the address this bind listens to * Network related: - * `addLocal(netmask, [true], [false], [TCP Fast Open queue size])`: add to addresses we listen on. Second optional parameter sets TCP/IP or not. Third optional parameter sets SO_REUSEPORT when available. Last parameter sets the TCP Fast Open queue size, enabling TCP Fast Open when available and the value is larger than 0. - * `setLocal(netmask, [true], [false], [TCP Fast Open queue size])`: reset list of addresses we listen on to this address. Second optional parameter sets TCP/IP or not. Third optional parameter sets SO_REUSEPORT when available. Last parameter sets the TCP Fast Open queue size, enabling TCP Fast Open when available and the value is larger than 0. + * `addLocal(netmask, [true], [false], [TCP Fast Open queue size])`: add to addresses we listen on. Second optional parameter sets TCP or not. Third optional parameter sets SO_REUSEPORT when available. Last parameter sets the TCP Fast Open queue size, enabling TCP Fast Open when available and the value is larger than 0. + * `setLocal(netmask, [true], [false], [TCP Fast Open queue size])`: reset list of addresses we listen on to this address. Second optional parameter sets TCP or not. Third optional parameter sets SO_REUSEPORT when available. Last parameter sets the TCP Fast Open queue size, enabling TCP Fast Open when available and the value is larger than 0. * Blocking related: * `addDomainBlock(domain)`: block queries within this domain * Carbon/Graphite/Metronome statistics related: @@ -1239,7 +1239,7 @@ instantiate a server with additional parameters * `SkipCacheAction()`: don't lookup the cache for this query, don't store the answer * `SpoofAction(ip[, ip])` or `SpoofAction({ip, ip, ..}): forge a response with the specified IPv4 (for an A query) or IPv6 (for an AAAA). If you specify multiple addresses, all that match the query type (A, AAAA or ANY) will get spoofed in * `SpoofCNAMEAction(cname)`: forge a response with the specified CNAME value - * `TCAction()`: create answer to query with TC and RD bits set, to move to TCP/IP + * `TCAction()`: create answer to query with TC and RD bits set, to move to TCP * `TeeAction(remote[, addECS])`: send copy of query to remote, keep stats on responses. If `addECS` is set to `true`, EDNS Client Subnet information will be added to the query * Specialist rule generators * `addAnyTCRule()`: generate TC=1 answers to ANY queries received over UDP, moving them to TCP