up to 1.16.2 (fixes CVE-2022-30698 CVE-2022-30699)
[packages/unbound.git] / unbound-default_trust_anchor.patch
1 diff -dur unbound-1.4.22.orig/doc/example.conf.in unbound-1.4.22/doc/example.conf.in
2 --- unbound-1.4.22.orig/doc/example.conf.in     2014-03-12 13:31:42.000000000 +0100
3 +++ unbound-1.4.22/doc/example.conf.in  2014-04-25 11:14:14.000000000 +0200
4 @@ -342,7 +342,7 @@
5         # And then enable the auto-trust-anchor-file config item.
6         # Please note usage of unbound-anchor root anchor is at your own risk
7         # and under the terms of our LICENSE (see that file in the source).
8 -       # auto-trust-anchor-file: "@UNBOUND_ROOTKEY_FILE@"
9 +       auto-trust-anchor-file: "@UNBOUND_ROOTKEY_FILE@"
10  
11         # trust anchor signaling sends a RFC8145 key tag query after priming.
12         # trust-anchor-signaling: yes
This page took 0.208957 seconds and 3 git commands to generate.