On Mon, Jul 8, 2013 at 9:35 AM, Jens Thiele <ka...@karme.de> wrote: > from the test: > > "to easily reproduce, fake packet loss/overloaded dns server > on linux do something like: > # iptables -I OUTPUT -p udp -m udp --dport 53 -j DROP > # iptables -I OUTPUT -p udp -m udp --dport 53 -j LOG --log-prefix "DROP > DNS REQUEST " > # iptables -I OUTPUT -p udp -m udp --dport 53 -m limit --limit 10/sec -j > ACCEPT > first > " > > all 3 lines are needed! >
OK, tried again after running all three commands. Output: y.c:44: error: r=-2 Name or service not known -- Thomas