diff --git a/management/daemon.py b/management/daemon.py index ae7fb351..3ab391aa 100755 --- a/management/daemon.py +++ b/management/daemon.py @@ -776,7 +776,7 @@ if __name__ == '__main__': #app.logger.info('API key: ' + auth_service.key) - logging.basicConfig(level=logging_level, format='%(levelname)s:%(module)s.%(funcName)s %(message)s') + logging.basicConfig(level=logging_level, format='MiaB %(levelname)s:%(module)s.%(funcName)s %(message)s') logging.info('Logging level set to %s', logging.getLevelName(logging_level)) # Start the application server. Listens on 127.0.0.1 (IPv4 only). diff --git a/tools/create_dns_blocklist.sh b/tools/create_dns_blocklist.sh index 5b8bab86..6b06e5a3 100755 --- a/tools/create_dns_blocklist.sh +++ b/tools/create_dns_blocklist.sh @@ -4,6 +4,20 @@ set -euo pipefail # Download select set of malware blocklists from The Firebog's "The Big Blocklist # Collection" [0] and block access to them with Unbound by returning NXDOMAIN. # +# Usage: +# # create the blocklist +# create_dns_blocklist.sh > ~/blocklist.conf +# sudo mv ~/blocklist.conf /etc/unbound/lists.d +# +# # check list contains valid syntax. If not valid, remove blocklist.conf, +# # otherwise unbound will not work +# sudo unbound-checkconf +# > unbound-checkconf: no errors in /etc/unbound/unbound.con +# +# # reload unbound configuration +# sudo unbound-control reload +# +# # [0]: https://firebog.net ( # Malicious Lists