diff --git a/content/u/blog/love-letter-to-isc-bind/contents.lr b/content/u/blog/love-letter-to-isc-bind/contents.lr index 83a32cc..bef01b7 100644 --- a/content/u/blog/love-letter-to-isc-bind/contents.lr +++ b/content/u/blog/love-letter-to-isc-bind/contents.lr @@ -33,10 +33,11 @@ incorrect entries? I had so much trust in you and then that! Years passed and after my shock, I had a fling with [djbdns](https://cr.yp.to/djbdns.html) (together with qmail and -daemontools). Which right away took security more serious. So -serious that even managing djbdns with its own suite was almost like a -crypto analysis adventure. Many years this was my software solution of -choice, compiled by source, patched by hand. Oh, the old 2000's! +daemontools). Which right away took security more serious. So serious +that even managing djbdns with its own suite was almost like a crypto +analysis adventure (no offense, Dan!). Many years this was my software +solution of choice, compiled by source, patched by hand. Oh, the old +2000's! Over time the effort for managing software by source code and /usr/local installations did not turn out to be very efficient. So I @@ -44,7 +45,8 @@ looked around and found [powerdns](https://www.powerdns.com/), [nsd](https://www.nlnetlabs.nl/projects/nsd/about/) and [unbound](https://www.nlnetlabs.nl/projects/unbound/about/). -I settled for the nsd/unbound combination for many years. Then I +I settled for the nsd/unbound combination for many years. Solid, easy +to use and nice separation of concerns. Thanks nlnetlabs! Then I stumbled upon [dnsmasq](http://www.thekelleys.org.uk/dnsmasq/doc.html). Dnsmasq feels a bit like a younger sibling of bind: it does everything and