source: hybrid/branches/releng-11/nanobsd/files/usr/local/etc/unbound/unbound.conf

Last change on this file was 14089, checked in by rick, 7 years ago

Fix DNS reply from unexpected source

dig for example will give warning:

;; reply from unexpected source: x.x.x.x#53, expected y.y.y.y#53

as it looks like an attack of some kind.

File size: 31.4 KB
Line 
1#
2# Example configuration file.
3#
4# See unbound.conf(5) man page, version 1.6.0.
5#
6# this is a comment.
7
8# Bind to specific IP addresses & initial forward zones
9include: "/usr/local/etc/unbound.wleiden.conf"
10
11# The server clause sets the main parameters.
12server:
13 # whitespace is not necessary, but looks cleaner.
14
15 # verbosity number, 0 is least verbose. 1 is default.
16 verbosity: 1
17
18 # print statistics to the log (for every thread) every N seconds.
19 # Set to "" or 0 to disable. Default is disabled.
20 # statistics-interval: 0
21
22 # enable cumulative statistics, without clearing them after printing.
23 # statistics-cumulative: no
24
25 # enable extended statistics (query types, answer codes, status)
26 # printed from unbound-control. default off, because of speed.
27 extended-statistics: yes
28
29 # number of threads to create. 1 disables threading.
30 # num-threads: 1
31
32 # specify the interfaces to answer queries from by ip-address.
33 # The default is to listen to localhost (127.0.0.1 and ::1).
34 # specify 0.0.0.0 and ::0 to bind to all available interfaces.
35 # specify every interface[@port] on a new 'interface:' labelled line.
36 # The listen interfaces are not changed on reload, only on restart.
37 # interface: 192.0.2.153
38 # interface: 192.0.2.154
39 # interface: 192.0.2.154@5003
40 # interface: 2001:DB8::5
41 interface: 127.0.0.1
42
43 # enable this feature to copy the source address of queries to reply.
44 # Socket options are not supported on all platforms. experimental.
45 interface-automatic: yes
46
47 # port to answer queries from
48 # port: 53
49
50 # specify the interfaces to send outgoing queries to authoritative
51 # server from by ip-address. If none, the default (all) interface
52 # is used. Specify every interface on a 'outgoing-interface:' line.
53 # outgoing-interface: 192.0.2.153
54 # outgoing-interface: 2001:DB8::5
55 # outgoing-interface: 2001:DB8::6
56
57 # Specify a netblock to use remainder 64 bits as random bits for
58 # upstream queries. Uses freebind option (Linux).
59 # outgoing-interface: 2001:DB8::/64
60 # Also (Linux:) ip -6 addr add 2001:db8::/64 dev lo
61 # And: ip -6 route add local 2001:db8::/64 dev lo
62 # And set prefer-ip6: yes to use the ip6 randomness from a netblock.
63 # Set this to yes to prefer ipv6 upstream servers over ipv4.
64 # prefer-ip6: no
65
66 # number of ports to allocate per thread, determines the size of the
67 # port range that can be open simultaneously. About double the
68 # num-queries-per-thread, or, use as many as the OS will allow you.
69 # outgoing-range: 4096
70
71 # permit unbound to use this port number or port range for
72 # making outgoing queries, using an outgoing interface.
73 # outgoing-port-permit: 32768
74
75 # deny unbound the use this of port number or port range for
76 # making outgoing queries, using an outgoing interface.
77 # Use this to make sure unbound does not grab a UDP port that some
78 # other server on this computer needs. The default is to avoid
79 # IANA-assigned port numbers.
80 # If multiple outgoing-port-permit and outgoing-port-avoid options
81 # are present, they are processed in order.
82 # outgoing-port-avoid: "3200-3208"
83
84 # number of outgoing simultaneous tcp buffers to hold per thread.
85 # outgoing-num-tcp: 10
86
87 # number of incoming simultaneous tcp buffers to hold per thread.
88 # incoming-num-tcp: 10
89
90 # buffer size for UDP port 53 incoming (SO_RCVBUF socket option).
91 # 0 is system default. Use 4m to catch query spikes for busy servers.
92 # so-rcvbuf: 0
93
94 # buffer size for UDP port 53 outgoing (SO_SNDBUF socket option).
95 # 0 is system default. Use 4m to handle spikes on very busy servers.
96 # so-sndbuf: 0
97
98 # use SO_REUSEPORT to distribute queries over threads.
99 # so-reuseport: no
100
101 # use IP_TRANSPARENT so the interface: addresses can be non-local
102 # and you can config non-existing IPs that are going to work later on
103 # (uses IP_BINDANY on FreeBSD).
104 ip-transparent: yes
105
106 # use IP_FREEBIND so the interface: addresses can be non-local
107 # and you can bind to nonexisting IPs and interfaces that are down.
108 # Linux only. On Linux you also have ip-transparent that is similar.
109 # ip-freebind: no
110
111 # EDNS reassembly buffer to advertise to UDP peers (the actual buffer
112 # is set with msg-buffer-size). 1480 can solve fragmentation (timeouts).
113 # edns-buffer-size: 4096
114
115 # Maximum UDP response size (not applied to TCP response).
116 # Suggested values are 512 to 4096. Default is 4096. 65536 disables it.
117 # max-udp-size: 4096
118
119 # buffer size for handling DNS data. No messages larger than this
120 # size can be sent or received, by UDP or TCP. In bytes.
121 # msg-buffer-size: 65552
122
123 # the amount of memory to use for the message cache.
124 # plain value in bytes or you can append k, m or G. default is "4Mb".
125 # msg-cache-size: 4m
126
127 # the number of slabs to use for the message cache.
128 # the number of slabs must be a power of 2.
129 # more slabs reduce lock contention, but fragment memory usage.
130 # msg-cache-slabs: 4
131
132 # the number of queries that a thread gets to service.
133 # num-queries-per-thread: 1024
134
135 # if very busy, 50% queries run to completion, 50% get timeout in msec
136 # jostle-timeout: 200
137
138 # msec to wait before close of port on timeout UDP. 0 disables.
139 # delay-close: 0
140
141 # the amount of memory to use for the RRset cache.
142 # plain value in bytes or you can append k, m or G. default is "4Mb".
143 # rrset-cache-size: 4m
144
145 # the number of slabs to use for the RRset cache.
146 # the number of slabs must be a power of 2.
147 # more slabs reduce lock contention, but fragment memory usage.
148 # rrset-cache-slabs: 4
149
150 # the time to live (TTL) value lower bound, in seconds. Default 0.
151 # If more than an hour could easily give trouble due to stale data.
152 # cache-min-ttl: 0
153
154 # the time to live (TTL) value cap for RRsets and messages in the
155 # cache. Items are not cached for longer. In seconds.
156 # cache-max-ttl: 86400
157
158 # the time to live (TTL) value cap for negative responses in the cache
159 # cache-max-negative-ttl: 3600
160
161 # the time to live (TTL) value for cached roundtrip times, lameness and
162 # EDNS version information for hosts. In seconds.
163 # infra-host-ttl: 900
164
165 # minimum wait time for responses, increase if uplink is long. In msec.
166 # infra-cache-min-rtt: 50
167
168 # the number of slabs to use for the Infrastructure cache.
169 # the number of slabs must be a power of 2.
170 # more slabs reduce lock contention, but fragment memory usage.
171 # infra-cache-slabs: 4
172
173 # the maximum number of hosts that are cached (roundtrip, EDNS, lame).
174 # infra-cache-numhosts: 10000
175
176 # define a number of tags here, use with local-zone, access-control.
177 # repeat the define-tag statement to add additional tags.
178 # define-tag: "tag1 tag2 tag3"
179
180 # Enable IPv4, "yes" or "no".
181 # do-ip4: yes
182
183 # Enable IPv6, "yes" or "no".
184 # do-ip6: yes
185
186 # Enable UDP, "yes" or "no".
187 # do-udp: yes
188
189 # Enable TCP, "yes" or "no".
190 # do-tcp: yes
191
192 # upstream connections use TCP only (and no UDP), "yes" or "no"
193 # useful for tunneling scenarios, default no.
194 # tcp-upstream: no
195
196 # Maximum segment size (MSS) of TCP socket on which the server
197 # responds to queries. Default is 0, system default MSS.
198 # tcp-mss: 0
199
200 # Maximum segment size (MSS) of TCP socket for outgoing queries.
201 # Default is 0, system default MSS.
202 # outgoing-tcp-mss: 0
203
204 # Detach from the terminal, run in background, "yes" or "no".
205 # do-daemonize: yes
206
207 # control which clients are allowed to make (recursive) queries
208 # to this server. Specify classless netblocks with /size and action.
209 # By default everything is refused, except for localhost.
210 # Choose deny (drop message), refuse (polite error reply),
211 # allow (recursive ok), allow_snoop (recursive and nonrecursive ok)
212 # deny_non_local (drop queries unless can be answered from local-data)
213 # refuse_non_local (like deny_non_local but polite error reply).
214 # access-control: 0.0.0.0/0 refuse
215 # access-control: 127.0.0.0/8 allow
216 # access-control: ::0/0 refuse
217 # access-control: ::1 allow
218 # access-control: ::ffff:127.0.0.1 allow
219 access-control: 0.0.0.0/0 deny
220 access-control: 127.0.0.0/8 allow
221 access-control: 172.16.0.0/12 allow
222
223 # tag access-control with list of tags (in "" with spaces between)
224 # Clients using this access control element use localzones that
225 # are tagged with one of these tags.
226 # access-control-tag: 192.0.2.0/24 "tag2 tag3"
227
228 # set action for particular tag for given access control element
229 # if you have multiple tag values, the tag used to lookup the action
230 # is the first tag match between access-control-tag and local-zone-tag
231 # where "first" comes from the order of the define-tag values.
232 # access-control-tag-action: 192.0.2.0/24 tag3 refuse
233
234 # set redirect data for particular tag for access control element
235 # access-control-tag-data: 192.0.2.0/24 tag2 "A 127.0.0.1"
236
237 # Set view for access control element
238 # access-control-view: 192.0.2.0/24 viewname
239
240 # if given, a chroot(2) is done to the given directory.
241 # i.e. you can chroot to the working directory, for example,
242 # for extra security, but make sure all files are in that directory.
243 #
244 # If chroot is enabled, you should pass the configfile (from the
245 # commandline) as a full path from the original root. After the
246 # chroot has been performed the now defunct portion of the config
247 # file path is removed to be able to reread the config after a reload.
248 #
249 # All other file paths (working dir, logfile, roothints, and
250 # key files) can be specified in several ways:
251 # o as an absolute path relative to the new root.
252 # o as a relative path to the working directory.
253 # o as an absolute path relative to the original root.
254 # In the last case the path is adjusted to remove the unused portion.
255 #
256 # The pid file can be absolute and outside of the chroot, it is
257 # written just prior to performing the chroot and dropping permissions.
258 #
259 # Additionally, unbound may need to access /dev/random (for entropy).
260 # How to do this is specific to your OS.
261 #
262 # If you give "" no chroot is performed. The path must not end in a /.
263 # chroot: "/usr/local/etc/unbound"
264
265 # if given, user privileges are dropped (after binding port),
266 # and the given username is assumed. Default is user "unbound".
267 # If you give "" no privileges are dropped.
268 # username: "unbound"
269
270 # the working directory. The relative files in this config are
271 # relative to this directory. If you give "" the working directory
272 # is not changed.
273 # If you give a server: directory: dir before include: file statements
274 # then those includes can be relative to the working directory.
275 # directory: "/usr/local/etc/unbound"
276
277 # the log file, "" means log to stderr.
278 # Use of this option sets use-syslog to "no".
279 # logfile: ""
280
281 # Log to syslog(3) if yes. The log facility LOG_DAEMON is used to
282 # log to. If yes, it overrides the logfile.
283 # use-syslog: yes
284
285 # Log identity to report. if empty, defaults to the name of argv[0]
286 # (usually "unbound").
287 # log-identity: ""
288
289 # print UTC timestamp in ascii to logfile, default is epoch in seconds.
290 # log-time-ascii: no
291
292 # print one line with time, IP, name, type, class for every query.
293 # log-queries: no
294
295 # the pid file. Can be an absolute path outside of chroot/work dir.
296 # pidfile: "/usr/local/etc/unbound/unbound.pid"
297
298 # file to read root hints from.
299 # get one from https://www.internic.net/domain/named.cache
300 # root-hints: ""
301
302 # enable to not answer id.server and hostname.bind queries.
303 # hide-identity: no
304
305 # enable to not answer version.server and version.bind queries.
306 # hide-version: no
307
308 # the identity to report. Leave "" or default to return hostname.
309 # identity: ""
310
311 # the version to report. Leave "" or default to return package version.
312 # version: ""
313
314 # the target fetch policy.
315 # series of integers describing the policy per dependency depth.
316 # The number of values in the list determines the maximum dependency
317 # depth the recursor will pursue before giving up. Each integer means:
318 # -1 : fetch all targets opportunistically,
319 # 0: fetch on demand,
320 # positive value: fetch that many targets opportunistically.
321 # Enclose the list of numbers between quotes ("").
322 # target-fetch-policy: "3 2 1 0 0"
323
324 # Harden against very small EDNS buffer sizes.
325 # harden-short-bufsize: no
326
327 # Harden against unseemly large queries.
328 # harden-large-queries: no
329
330 # Harden against out of zone rrsets, to avoid spoofing attempts.
331 # harden-glue: yes
332
333 # Harden against receiving dnssec-stripped data. If you turn it
334 # off, failing to validate dnskey data for a trustanchor will
335 # trigger insecure mode for that zone (like without a trustanchor).
336 # Default on, which insists on dnssec data for trust-anchored zones.
337 # harden-dnssec-stripped: yes
338
339 # Harden against queries that fall under dnssec-signed nxdomain names.
340 # harden-below-nxdomain: no
341
342 # Harden the referral path by performing additional queries for
343 # infrastructure data. Validates the replies (if possible).
344 # Default off, because the lookups burden the server. Experimental
345 # implementation of draft-wijngaards-dnsext-resolver-side-mitigation.
346 # harden-referral-path: no
347
348 # Harden against algorithm downgrade when multiple algorithms are
349 # advertised in the DS record. If no, allows the weakest algorithm
350 # to validate the zone.
351 # harden-algo-downgrade: no
352
353 # Sent minimum amount of information to upstream servers to enhance
354 # privacy. Only sent minimum required labels of the QNAME and set QTYPE
355 # to NS when possible.
356 # qname-minimisation: no
357
358 # QNAME minimisation in strict mode. Do not fall-back to sending full
359 # QNAME to potentially broken nameservers. A lot of domains will not be
360 # resolvable when this option in enabled.
361 # This option only has effect when qname-minimisation is enabled.
362 # qname-minimisation-strict: no
363
364 # Use 0x20-encoded random bits in the query to foil spoof attempts.
365 # This feature is an experimental implementation of draft dns-0x20.
366 # use-caps-for-id: no
367
368 # Domains (and domains in them) without support for dns-0x20 and
369 # the fallback fails because they keep sending different answers.
370 # caps-whitelist: "licdn.com"
371 # caps-whitelist: "senderbase.org"
372
373 # Enforce privacy of these addresses. Strips them away from answers.
374 # It may cause DNSSEC validation to additionally mark it as bogus.
375 # Protects against 'DNS Rebinding' (uses browser as network proxy).
376 # Only 'private-domain' and 'local-data' names are allowed to have
377 # these private addresses. No default.
378 # private-address: 10.0.0.0/8
379 # private-address: 172.16.0.0/12
380 # private-address: 192.168.0.0/16
381 # private-address: 169.254.0.0/16
382 # private-address: fd00::/8
383 # private-address: fe80::/10
384 # private-address: ::ffff:0:0/96
385
386 # Allow the domain (and its subdomains) to contain private addresses.
387 # local-data statements are allowed to contain private addresses too.
388 # private-domain: "example.com"
389 private-domain: "wleiden.net"
390
391 # If nonzero, unwanted replies are not only reported in statistics,
392 # but also a running total is kept per thread. If it reaches the
393 # threshold, a warning is printed and a defensive action is taken,
394 # the cache is cleared to flush potential poison out of it.
395 # A suggested value is 10000000, the default is 0 (turned off).
396 # unwanted-reply-threshold: 0
397
398 # Do not query the following addresses. No DNS queries are sent there.
399 # List one address per entry. List classless netblocks with /size,
400 # do-not-query-address: 127.0.0.1/8
401 # do-not-query-address: ::1
402
403 # if yes, the above default do-not-query-address entries are present.
404 # if no, localhost can be queried (for testing and debugging).
405 do-not-query-localhost: no
406
407 # if yes, perform prefetching of almost expired message cache entries.
408 # prefetch: no
409
410 # if yes, perform key lookups adjacent to normal lookups.
411 # prefetch-key: no
412
413 # if yes, Unbound rotates RRSet order in response.
414 # rrset-roundrobin: no
415
416 # if yes, Unbound doesn't insert authority/additional sections
417 # into response messages when those sections are not required.
418 # minimal-responses: no
419
420 # true to disable DNSSEC lameness check in iterator.
421 # disable-dnssec-lame-check: no
422
423 # module configuration of the server. A string with identifiers
424 # separated by spaces. Syntax: "[dns64] [validator] iterator"
425 # module-config: "validator iterator"
426
427 # File with trusted keys, kept uptodate using RFC5011 probes,
428 # initial file like trust-anchor-file, then it stores metadata.
429 # Use several entries, one per domain name, to track multiple zones.
430 #
431 # If you want to perform DNSSEC validation, run unbound-anchor before
432 # you start unbound (i.e. in the system boot scripts). And enable:
433 # Please note usage of unbound-anchor root anchor is at your own risk
434 # and under the terms of our LICENSE (see that file in the source).
435 # auto-trust-anchor-file: "/usr/local/etc/unbound/root.key"
436
437 # File with DLV trusted keys. Same format as trust-anchor-file.
438 # There can be only one DLV configured, it is trusted from root down.
439 # DLV is going to be decommissioned. Please do not use it any more.
440 # dlv-anchor-file: "dlv.isc.org.key"
441
442 # File with trusted keys for validation. Specify more than one file
443 # with several entries, one file per entry.
444 # Zone file format, with DS and DNSKEY entries.
445 # Note this gets out of date, use auto-trust-anchor-file please.
446 # trust-anchor-file: ""
447
448 # Trusted key for validation. DS or DNSKEY. specify the RR on a
449 # single line, surrounded by "". TTL is ignored. class is IN default.
450 # Note this gets out of date, use auto-trust-anchor-file please.
451 # (These examples are from August 2007 and may not be valid anymore).
452 # trust-anchor: "nlnetlabs.nl. DNSKEY 257 3 5 AQPzzTWMz8qSWIQlfRnPckx2BiVmkVN6LPupO3mbz7FhLSnm26n6iG9N Lby97Ji453aWZY3M5/xJBSOS2vWtco2t8C0+xeO1bc/d6ZTy32DHchpW 6rDH1vp86Ll+ha0tmwyy9QP7y2bVw5zSbFCrefk8qCUBgfHm9bHzMG1U BYtEIQ=="
453 # trust-anchor: "jelte.nlnetlabs.nl. DS 42860 5 1 14D739EB566D2B1A5E216A0BA4D17FA9B038BE4A"
454
455 # File with trusted keys for validation. Specify more than one file
456 # with several entries, one file per entry. Like trust-anchor-file
457 # but has a different file format. Format is BIND-9 style format,
458 # the trusted-keys { name flag proto algo "key"; }; clauses are read.
459 # you need external update procedures to track changes in keys.
460 # trusted-keys-file: ""
461
462 # Ignore chain of trust. Domain is treated as insecure.
463 # domain-insecure: "example.com"
464
465 # Override the date for validation with a specific fixed date.
466 # Do not set this unless you are debugging signature inception
467 # and expiration. "" or "0" turns the feature off. -1 ignores date.
468 # val-override-date: ""
469
470 # The time to live for bogus data, rrsets and messages. This avoids
471 # some of the revalidation, until the time interval expires. in secs.
472 # val-bogus-ttl: 60
473
474 # The signature inception and expiration dates are allowed to be off
475 # by 10% of the signature lifetime (expir-incep) from our local clock.
476 # This leeway is capped with a minimum and a maximum. In seconds.
477 # val-sig-skew-min: 3600
478 # val-sig-skew-max: 86400
479
480 # Should additional section of secure message also be kept clean of
481 # unsecure data. Useful to shield the users of this validator from
482 # potential bogus data in the additional section. All unsigned data
483 # in the additional section is removed from secure messages.
484 # val-clean-additional: yes
485
486 # Turn permissive mode on to permit bogus messages. Thus, messages
487 # for which security checks failed will be returned to clients,
488 # instead of SERVFAIL. It still performs the security checks, which
489 # result in interesting log files and possibly the AD bit in
490 # replies if the message is found secure. The default is off.
491 # val-permissive-mode: no
492
493 # Ignore the CD flag in incoming queries and refuse them bogus data.
494 # Enable it if the only clients of unbound are legacy servers (w2008)
495 # that set CD but cannot validate themselves.
496 # ignore-cd-flag: no
497
498 # Serve expired reponses from cache, with TTL 0 in the response,
499 # and then attempt to fetch the data afresh.
500 # serve-expired: no
501
502 # Have the validator log failed validations for your diagnosis.
503 # 0: off. 1: A line per failed user query. 2: With reason and bad IP.
504 # val-log-level: 0
505
506 # It is possible to configure NSEC3 maximum iteration counts per
507 # keysize. Keep this table very short, as linear search is done.
508 # A message with an NSEC3 with larger count is marked insecure.
509 # List in ascending order the keysize and count values.
510 # val-nsec3-keysize-iterations: "1024 150 2048 500 4096 2500"
511
512 # instruct the auto-trust-anchor-file probing to add anchors after ttl.
513 # add-holddown: 2592000 # 30 days
514
515 # instruct the auto-trust-anchor-file probing to del anchors after ttl.
516 # del-holddown: 2592000 # 30 days
517
518 # auto-trust-anchor-file probing removes missing anchors after ttl.
519 # If the value 0 is given, missing anchors are not removed.
520 # keep-missing: 31622400 # 366 days
521
522 # debug option that allows very small holddown times for key rollover,
523 # otherwise the RFC mandates probe intervals must be at least 1 hour.
524 # permit-small-holddown: no
525
526 # the amount of memory to use for the key cache.
527 # plain value in bytes or you can append k, m or G. default is "4Mb".
528 # key-cache-size: 4m
529
530 # the number of slabs to use for the key cache.
531 # the number of slabs must be a power of 2.
532 # more slabs reduce lock contention, but fragment memory usage.
533 # key-cache-slabs: 4
534
535 # the amount of memory to use for the negative cache (used for DLV).
536 # plain value in bytes or you can append k, m or G. default is "1Mb".
537 # neg-cache-size: 1m
538
539 # By default, for a number of zones a small default 'nothing here'
540 # reply is built-in. Query traffic is thus blocked. If you
541 # wish to serve such zone you can unblock them by uncommenting one
542 # of the nodefault statements below.
543 # You may also have to use domain-insecure: zone to make DNSSEC work,
544 # unless you have your own trust anchors for this zone.
545 # local-zone: "localhost." nodefault
546 # local-zone: "127.in-addr.arpa." nodefault
547 # local-zone: "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa." nodefault
548 # local-zone: "onion." nodefault
549 # local-zone: "10.in-addr.arpa." nodefault
550 local-zone: "16.172.in-addr.arpa." nodefault
551 local-zone: "17.172.in-addr.arpa." nodefault
552 local-zone: "18.172.in-addr.arpa." nodefault
553 local-zone: "19.172.in-addr.arpa." nodefault
554 local-zone: "20.172.in-addr.arpa." nodefault
555 local-zone: "21.172.in-addr.arpa." nodefault
556 local-zone: "22.172.in-addr.arpa." nodefault
557 local-zone: "23.172.in-addr.arpa." nodefault
558 local-zone: "24.172.in-addr.arpa." nodefault
559 local-zone: "25.172.in-addr.arpa." nodefault
560 local-zone: "26.172.in-addr.arpa." nodefault
561 local-zone: "27.172.in-addr.arpa." nodefault
562 local-zone: "28.172.in-addr.arpa." nodefault
563 local-zone: "29.172.in-addr.arpa." nodefault
564 local-zone: "30.172.in-addr.arpa." nodefault
565 local-zone: "31.172.in-addr.arpa." nodefault
566 # local-zone: "168.192.in-addr.arpa." nodefault
567 # local-zone: "0.in-addr.arpa." nodefault
568 # local-zone: "254.169.in-addr.arpa." nodefault
569 # local-zone: "2.0.192.in-addr.arpa." nodefault
570 # local-zone: "100.51.198.in-addr.arpa." nodefault
571 # local-zone: "113.0.203.in-addr.arpa." nodefault
572 # local-zone: "255.255.255.255.in-addr.arpa." nodefault
573 # local-zone: "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa." nodefault
574 # local-zone: "d.f.ip6.arpa." nodefault
575 # local-zone: "8.e.f.ip6.arpa." nodefault
576 # local-zone: "9.e.f.ip6.arpa." nodefault
577 # local-zone: "a.e.f.ip6.arpa." nodefault
578 # local-zone: "b.e.f.ip6.arpa." nodefault
579 # local-zone: "8.b.d.0.1.0.0.2.ip6.arpa." nodefault
580 # And for 64.100.in-addr.arpa. to 127.100.in-addr.arpa.
581
582 # If unbound is running service for the local host then it is useful
583 # to perform lan-wide lookups to the upstream, and unblock the
584 # long list of local-zones above. If this unbound is a dns server
585 # for a network of computers, disabled is better and stops information
586 # leakage of local lan information.
587 # unblock-lan-zones: no
588
589 # The insecure-lan-zones option disables validation for
590 # these zones, as if they were all listed as domain-insecure.
591 insecure-lan-zones: yes
592
593 # a number of locally served zones can be configured.
594 # local-zone: <zone> <type>
595 # local-data: "<resource record string>"
596 # o deny serves local data (if any), else, drops queries.
597 # o refuse serves local data (if any), else, replies with error.
598 # o static serves local data, else, nxdomain or nodata answer.
599 # o transparent gives local data, but resolves normally for other names
600 # o redirect serves the zone data for any subdomain in the zone.
601 # o nodefault can be used to normally resolve AS112 zones.
602 # o typetransparent resolves normally for other types and other names
603 # o inform acts like transparent, but logs client IP address
604 # o inform_deny drops queries and logs client IP address
605 # o always_transparent, always_refuse, always_nxdomain, resolve in
606 # that way but ignore local data for that name.
607 #
608 # defaults are localhost address, reverse for 127.0.0.1 and ::1
609 # and nxdomain for AS112 zones. If you configure one of these zones
610 # the default content is omitted, or you can omit it with 'nodefault'.
611 #
612 # If you configure local-data without specifying local-zone, by
613 # default a transparent local-zone is created for the data.
614 #
615 # You can add locally served data with
616 # local-zone: "local." static
617 # local-data: "mycomputer.local. IN A 192.0.2.51"
618 # local-data: 'mytext.local TXT "content of text record"'
619 #
620 # You can override certain queries with
621 # local-data: "adserver.example.com A 127.0.0.1"
622 #
623 # You can redirect a domain to a fixed address with
624 # (this makes example.com, www.example.com, etc, all go to 192.0.2.3)
625 # local-zone: "example.com" redirect
626 # local-data: "example.com A 192.0.2.3"
627 #
628 # Shorthand to make PTR records, "IPv4 name" or "IPv6 name".
629 # You can also add PTR records using local-data directly, but then
630 # you need to do the reverse notation yourself.
631 # local-data-ptr: "192.0.2.3 www.example.com"
632 local-data: "welcome.wleiden.net A 172.31.255.1"
633
634 # Hack supporting UniFi Device time management
635 local-data: "0.ubnt.pool.ntp.org A 172.31.255.1"
636
637 # tag a localzone with a list of tag names (in "" with spaces between)
638 # local-zone-tag: "example.com" "tag2 tag3"
639
640 # add a netblock specific override to a localzone, with zone type
641 # local-zone-override: "example.com" 192.0.2.0/24 refuse
642
643 # service clients over SSL (on the TCP sockets), with plain DNS inside
644 # the SSL stream. Give the certificate to use and private key.
645 # default is "" (disabled). requires restart to take effect.
646 # ssl-service-key: "path/to/privatekeyfile.key"
647 # ssl-service-pem: "path/to/publiccertfile.pem"
648 # ssl-port: 853
649
650 # request upstream over SSL (with plain DNS inside the SSL stream).
651 # Default is no. Can be turned on and off with unbound-control.
652 # ssl-upstream: no
653
654 # DNS64 prefix. Must be specified when DNS64 is use.
655 # Enable dns64 in module-config. Used to synthesize IPv6 from IPv4.
656 # dns64-prefix: 64:ff9b::0/96
657
658 # ratelimit for uncached, new queries, this limits recursion effort.
659 # ratelimiting is experimental, and may help against randomqueryflood.
660 # if 0(default) it is disabled, otherwise state qps allowed per zone.
661 # ratelimit: 0
662
663 # ratelimits are tracked in a cache, size in bytes of cache (or k,m).
664 # ratelimit-size: 4m
665 # ratelimit cache slabs, reduces lock contention if equal to cpucount.
666 # ratelimit-slabs: 4
667
668 # 0 blocks when ratelimited, otherwise let 1/xth traffic through
669 # ratelimit-factor: 10
670
671 # override the ratelimit for a specific domain name.
672 # give this setting multiple times to have multiple overrides.
673 # ratelimit-for-domain: example.com 1000
674 # override the ratelimits for all domains below a domain name
675 # can give this multiple times, the name closest to the zone is used.
676 # ratelimit-below-domain: com 1000
677
678# Python config section. To enable:
679# o use --with-pythonmodule to configure before compiling.
680# o list python in the module-config string (above) to enable.
681# o and give a python-script to run.
682python:
683 # Script file to load
684 # python-script: "/usr/local/etc/unbound/ubmodule-tst.py"
685
686# Remote control config section.
687remote-control:
688 # Enable remote control with unbound-control(8) here.
689 # set up the keys and certificates with unbound-control-setup.
690 control-enable: yes
691
692 # Set to no and use an absolute path as control-interface to use
693 # a unix local named pipe for unbound-control.
694 # control-use-cert: yes
695
696 # what interfaces are listened to for remote control.
697 # give 0.0.0.0 and ::0 to listen to all interfaces.
698 # control-interface: 127.0.0.1
699 # control-interface: ::1
700
701 # port number for remote control operations.
702 # control-port: 8953
703
704 # unbound server key file.
705 # server-key-file: "/usr/local/etc/unbound/unbound_server.key"
706
707 # unbound server certificate file.
708 # server-cert-file: "/usr/local/etc/unbound/unbound_server.pem"
709
710 # unbound-control key file.
711 # control-key-file: "/usr/local/etc/unbound/unbound_control.key"
712
713 # unbound-control certificate file.
714 # control-cert-file: "/usr/local/etc/unbound/unbound_control.pem"
715
716# Stub zones.
717# Create entries like below, to make all queries for 'example.com' and
718# 'example.org' go to the given list of nameservers. list zero or more
719# nameservers by hostname or by ipaddress. If you set stub-prime to yes,
720# the list is treated as priming hints (default is no).
721# With stub-first yes, it attempts without the stub if it fails.
722# Consider adding domain-insecure: name and local-zone: name nodefault
723# to the server: section if the stub is a locally served zone.
724# stub-zone:
725# name: "example.com"
726# stub-addr: 192.0.2.68
727# stub-prime: no
728# stub-first: no
729# stub-ssl-upstream: no
730# stub-zone:
731# name: "example.org"
732# stub-host: ns.example.com.
733stub-zone:
734 name: "wleiden.net"
735 stub-addr: 127.0.0.1@5353
736
737#$ for I in `seq 16 31`; do echo -e "stub-zone:\n\tname: \"$I.172.in-addr.arpa\"\n\tstub-addr: 127.0.0.1@5353\n"; done
738stub-zone:
739 name: "16.172.in-addr.arpa"
740 stub-addr: 127.0.0.1@5353
741
742stub-zone:
743 name: "17.172.in-addr.arpa"
744 stub-addr: 127.0.0.1@5353
745
746stub-zone:
747 name: "18.172.in-addr.arpa"
748 stub-addr: 127.0.0.1@5353
749
750stub-zone:
751 name: "19.172.in-addr.arpa"
752 stub-addr: 127.0.0.1@5353
753
754stub-zone:
755 name: "20.172.in-addr.arpa"
756 stub-addr: 127.0.0.1@5353
757
758stub-zone:
759 name: "21.172.in-addr.arpa"
760 stub-addr: 127.0.0.1@5353
761
762stub-zone:
763 name: "22.172.in-addr.arpa"
764 stub-addr: 127.0.0.1@5353
765
766stub-zone:
767 name: "23.172.in-addr.arpa"
768 stub-addr: 127.0.0.1@5353
769
770stub-zone:
771 name: "24.172.in-addr.arpa"
772 stub-addr: 127.0.0.1@5353
773
774stub-zone:
775 name: "25.172.in-addr.arpa"
776 stub-addr: 127.0.0.1@5353
777
778stub-zone:
779 name: "26.172.in-addr.arpa"
780 stub-addr: 127.0.0.1@5353
781
782stub-zone:
783 name: "27.172.in-addr.arpa"
784 stub-addr: 127.0.0.1@5353
785
786stub-zone:
787 name: "28.172.in-addr.arpa"
788 stub-addr: 127.0.0.1@5353
789
790stub-zone:
791 name: "29.172.in-addr.arpa"
792 stub-addr: 127.0.0.1@5353
793
794stub-zone:
795 name: "30.172.in-addr.arpa"
796 stub-addr: 127.0.0.1@5353
797
798stub-zone:
799 name: "31.172.in-addr.arpa"
800 stub-addr: 127.0.0.1@5353
801# Forward zones
802# Create entries like below, to make all queries for 'example.com' and
803# 'example.org' go to the given list of servers. These servers have to handle
804# recursion to other nameservers. List zero or more nameservers by hostname
805# or by ipaddress. Use an entry with name "." to forward all queries.
806# If you enable forward-first, it attempts without the forward if it fails.
807# forward-zone:
808# name: "example.com"
809# forward-addr: 192.0.2.68
810# forward-addr: 192.0.2.73@5355 # forward to port 5355.
811# forward-first: no
812# forward-ssl-upstream: no
813# forward-zone:
814# name: "example.org"
815# forward-host: fwd.example.com
816
817# Views
818# Create named views. Name must be unique. Map views to requests using
819# the access-control-view option. Views can contain zero or more local-zone
820# and local-data options. Options from matching views will override global
821# options. Global options will be used if no matching view is found.
822# With view-first yes, it will try to answer using the global local-zone and
823# local-data elements if there is no view specific match.
824# view:
825# name: "viewname"
826# local-zone: "example.com" redirect
827# local-data: "example.com A 192.0.2.3"
828# view-first: no
829# view:
830# name: "anotherview"
831# local-zone: "example.com" refuse
Note: See TracBrowser for help on using the repository browser.