On Mon, Jul 8, 2013 at 9:35 AM, Jens Thiele <ka...@karme.de> wrote:

> from the test:
>
> "to easily reproduce, fake packet loss/overloaded dns server
> on linux do something like:
> # iptables -I OUTPUT -p udp -m udp --dport 53 -j DROP
> # iptables -I OUTPUT -p udp -m udp --dport 53 -j LOG --log-prefix "DROP
> DNS REQUEST "
> # iptables -I OUTPUT -p udp -m udp --dport 53 -m limit --limit 10/sec -j
> ACCEPT
> first
> "
>
> all 3 lines are needed!
>


OK, tried again after running all three commands.

Output:  y.c:44: error: r=-2 Name or service not known

-- 
Thomas

Reply via email to