source: hybrid/branches/releng-11/nanobsd/files/usr/local/etc/unbound/unbound.conf@ 13911

Last change on this file since 13911 was 13911, checked in by rick, 9 years ago

Stripping the number of resolvers unbound can use.

Unbound does not handle multiple resolvers well it internal 'logic' keeps
pounding and checking all resolvers making it a very slow process. By limiting
the count of resolvers it sould be more happy.

Count limititing is done using two-phase approch, firstly the initial resolvers
are limited to a fixed set of resolvers, secondly the list is updated based on
the results of the zone inquiries.

While here, ensure the listen is set on dynamic ranges ensuring failing
interfaces will not bring down the DNS server.

Making the list more limited and based on active resolvers.

File size: 31.4 KB
Line 
1#
2# Example configuration file.
3#
4# See unbound.conf(5) man page, version 1.6.0.
5#
6# this is a comment.
7
8# Bind to specific IP addresses & initial forward zones
9include: "/usr/local/etc/unbound.wleiden.conf"
10
11# The server clause sets the main parameters.
12server:
13 # whitespace is not necessary, but looks cleaner.
14
15 # verbosity number, 0 is least verbose. 1 is default.
16 verbosity: 1
17
18 # print statistics to the log (for every thread) every N seconds.
19 # Set to "" or 0 to disable. Default is disabled.
20 # statistics-interval: 0
21
22 # enable cumulative statistics, without clearing them after printing.
23 # statistics-cumulative: no
24
25 # enable extended statistics (query types, answer codes, status)
26 # printed from unbound-control. default off, because of speed.
27 extended-statistics: yes
28
29 # number of threads to create. 1 disables threading.
30 # num-threads: 1
31
32 # specify the interfaces to answer queries from by ip-address.
33 # The default is to listen to localhost (127.0.0.1 and ::1).
34 # specify 0.0.0.0 and ::0 to bind to all available interfaces.
35 # specify every interface[@port] on a new 'interface:' labelled line.
36 # The listen interfaces are not changed on reload, only on restart.
37 # interface: 192.0.2.153
38 # interface: 192.0.2.154
39 # interface: 192.0.2.154@5003
40 # interface: 2001:DB8::5
41 interface: 127.0.0.1
42
43 # enable this feature to copy the source address of queries to reply.
44 # Socket options are not supported on all platforms. experimental.
45 # interface-automatic: no
46
47 # port to answer queries from
48 # port: 53
49
50 # specify the interfaces to send outgoing queries to authoritative
51 # server from by ip-address. If none, the default (all) interface
52 # is used. Specify every interface on a 'outgoing-interface:' line.
53 # outgoing-interface: 192.0.2.153
54 # outgoing-interface: 2001:DB8::5
55 # outgoing-interface: 2001:DB8::6
56
57 # Specify a netblock to use remainder 64 bits as random bits for
58 # upstream queries. Uses freebind option (Linux).
59 # outgoing-interface: 2001:DB8::/64
60 # Also (Linux:) ip -6 addr add 2001:db8::/64 dev lo
61 # And: ip -6 route add local 2001:db8::/64 dev lo
62 # And set prefer-ip6: yes to use the ip6 randomness from a netblock.
63 # Set this to yes to prefer ipv6 upstream servers over ipv4.
64 # prefer-ip6: no
65
66 # number of ports to allocate per thread, determines the size of the
67 # port range that can be open simultaneously. About double the
68 # num-queries-per-thread, or, use as many as the OS will allow you.
69 # outgoing-range: 4096
70
71 # permit unbound to use this port number or port range for
72 # making outgoing queries, using an outgoing interface.
73 # outgoing-port-permit: 32768
74
75 # deny unbound the use this of port number or port range for
76 # making outgoing queries, using an outgoing interface.
77 # Use this to make sure unbound does not grab a UDP port that some
78 # other server on this computer needs. The default is to avoid
79 # IANA-assigned port numbers.
80 # If multiple outgoing-port-permit and outgoing-port-avoid options
81 # are present, they are processed in order.
82 # outgoing-port-avoid: "3200-3208"
83
84 # number of outgoing simultaneous tcp buffers to hold per thread.
85 # outgoing-num-tcp: 10
86
87 # number of incoming simultaneous tcp buffers to hold per thread.
88 # incoming-num-tcp: 10
89
90 # buffer size for UDP port 53 incoming (SO_RCVBUF socket option).
91 # 0 is system default. Use 4m to catch query spikes for busy servers.
92 # so-rcvbuf: 0
93
94 # buffer size for UDP port 53 outgoing (SO_SNDBUF socket option).
95 # 0 is system default. Use 4m to handle spikes on very busy servers.
96 # so-sndbuf: 0
97
98 # use SO_REUSEPORT to distribute queries over threads.
99 # so-reuseport: no
100
101 # use IP_TRANSPARENT so the interface: addresses can be non-local
102 # and you can config non-existing IPs that are going to work later on
103 # (uses IP_BINDANY on FreeBSD).
104 ip-transparent: yes
105
106 # use IP_FREEBIND so the interface: addresses can be non-local
107 # and you can bind to nonexisting IPs and interfaces that are down.
108 # Linux only. On Linux you also have ip-transparent that is similar.
109 # ip-freebind: no
110
111 # EDNS reassembly buffer to advertise to UDP peers (the actual buffer
112 # is set with msg-buffer-size). 1480 can solve fragmentation (timeouts).
113 # edns-buffer-size: 4096
114
115 # Maximum UDP response size (not applied to TCP response).
116 # Suggested values are 512 to 4096. Default is 4096. 65536 disables it.
117 # max-udp-size: 4096
118
119 # buffer size for handling DNS data. No messages larger than this
120 # size can be sent or received, by UDP or TCP. In bytes.
121 # msg-buffer-size: 65552
122
123 # the amount of memory to use for the message cache.
124 # plain value in bytes or you can append k, m or G. default is "4Mb".
125 # msg-cache-size: 4m
126
127 # the number of slabs to use for the message cache.
128 # the number of slabs must be a power of 2.
129 # more slabs reduce lock contention, but fragment memory usage.
130 # msg-cache-slabs: 4
131
132 # the number of queries that a thread gets to service.
133 # num-queries-per-thread: 1024
134
135 # if very busy, 50% queries run to completion, 50% get timeout in msec
136 # jostle-timeout: 200
137
138 # msec to wait before close of port on timeout UDP. 0 disables.
139 # delay-close: 0
140
141 # the amount of memory to use for the RRset cache.
142 # plain value in bytes or you can append k, m or G. default is "4Mb".
143 # rrset-cache-size: 4m
144
145 # the number of slabs to use for the RRset cache.
146 # the number of slabs must be a power of 2.
147 # more slabs reduce lock contention, but fragment memory usage.
148 # rrset-cache-slabs: 4
149
150 # the time to live (TTL) value lower bound, in seconds. Default 0.
151 # If more than an hour could easily give trouble due to stale data.
152 # cache-min-ttl: 0
153
154 # the time to live (TTL) value cap for RRsets and messages in the
155 # cache. Items are not cached for longer. In seconds.
156 # cache-max-ttl: 86400
157
158 # the time to live (TTL) value cap for negative responses in the cache
159 # cache-max-negative-ttl: 3600
160
161 # the time to live (TTL) value for cached roundtrip times, lameness and
162 # EDNS version information for hosts. In seconds.
163 # infra-host-ttl: 900
164
165 # minimum wait time for responses, increase if uplink is long. In msec.
166 # infra-cache-min-rtt: 50
167
168 # the number of slabs to use for the Infrastructure cache.
169 # the number of slabs must be a power of 2.
170 # more slabs reduce lock contention, but fragment memory usage.
171 # infra-cache-slabs: 4
172
173 # the maximum number of hosts that are cached (roundtrip, EDNS, lame).
174 # infra-cache-numhosts: 10000
175
176 # define a number of tags here, use with local-zone, access-control.
177 # repeat the define-tag statement to add additional tags.
178 # define-tag: "tag1 tag2 tag3"
179
180 # Enable IPv4, "yes" or "no".
181 # do-ip4: yes
182
183 # Enable IPv6, "yes" or "no".
184 # do-ip6: yes
185
186 # Enable UDP, "yes" or "no".
187 # do-udp: yes
188
189 # Enable TCP, "yes" or "no".
190 # do-tcp: yes
191
192 # upstream connections use TCP only (and no UDP), "yes" or "no"
193 # useful for tunneling scenarios, default no.
194 # tcp-upstream: no
195
196 # Maximum segment size (MSS) of TCP socket on which the server
197 # responds to queries. Default is 0, system default MSS.
198 # tcp-mss: 0
199
200 # Maximum segment size (MSS) of TCP socket for outgoing queries.
201 # Default is 0, system default MSS.
202 # outgoing-tcp-mss: 0
203
204 # Detach from the terminal, run in background, "yes" or "no".
205 # do-daemonize: yes
206
207 # control which clients are allowed to make (recursive) queries
208 # to this server. Specify classless netblocks with /size and action.
209 # By default everything is refused, except for localhost.
210 # Choose deny (drop message), refuse (polite error reply),
211 # allow (recursive ok), allow_snoop (recursive and nonrecursive ok)
212 # deny_non_local (drop queries unless can be answered from local-data)
213 # refuse_non_local (like deny_non_local but polite error reply).
214 # access-control: 0.0.0.0/0 refuse
215 # access-control: 127.0.0.0/8 allow
216 # access-control: ::0/0 refuse
217 # access-control: ::1 allow
218 # access-control: ::ffff:127.0.0.1 allow
219 access-control: 0.0.0.0/0 deny
220 access-control: 127.0.0.0/8 allow
221 access-control: 172.16.0.0/12 allow
222
223 # tag access-control with list of tags (in "" with spaces between)
224 # Clients using this access control element use localzones that
225 # are tagged with one of these tags.
226 # access-control-tag: 192.0.2.0/24 "tag2 tag3"
227
228 # set action for particular tag for given access control element
229 # if you have multiple tag values, the tag used to lookup the action
230 # is the first tag match between access-control-tag and local-zone-tag
231 # where "first" comes from the order of the define-tag values.
232 # access-control-tag-action: 192.0.2.0/24 tag3 refuse
233
234 # set redirect data for particular tag for access control element
235 # access-control-tag-data: 192.0.2.0/24 tag2 "A 127.0.0.1"
236
237 # Set view for access control element
238 # access-control-view: 192.0.2.0/24 viewname
239
240 # if given, a chroot(2) is done to the given directory.
241 # i.e. you can chroot to the working directory, for example,
242 # for extra security, but make sure all files are in that directory.
243 #
244 # If chroot is enabled, you should pass the configfile (from the
245 # commandline) as a full path from the original root. After the
246 # chroot has been performed the now defunct portion of the config
247 # file path is removed to be able to reread the config after a reload.
248 #
249 # All other file paths (working dir, logfile, roothints, and
250 # key files) can be specified in several ways:
251 # o as an absolute path relative to the new root.
252 # o as a relative path to the working directory.
253 # o as an absolute path relative to the original root.
254 # In the last case the path is adjusted to remove the unused portion.
255 #
256 # The pid file can be absolute and outside of the chroot, it is
257 # written just prior to performing the chroot and dropping permissions.
258 #
259 # Additionally, unbound may need to access /dev/random (for entropy).
260 # How to do this is specific to your OS.
261 #
262 # If you give "" no chroot is performed. The path must not end in a /.
263 # chroot: "/usr/local/etc/unbound"
264
265 # if given, user privileges are dropped (after binding port),
266 # and the given username is assumed. Default is user "unbound".
267 # If you give "" no privileges are dropped.
268 # username: "unbound"
269
270 # the working directory. The relative files in this config are
271 # relative to this directory. If you give "" the working directory
272 # is not changed.
273 # If you give a server: directory: dir before include: file statements
274 # then those includes can be relative to the working directory.
275 # directory: "/usr/local/etc/unbound"
276
277 # the log file, "" means log to stderr.
278 # Use of this option sets use-syslog to "no".
279 # logfile: ""
280
281 # Log to syslog(3) if yes. The log facility LOG_DAEMON is used to
282 # log to. If yes, it overrides the logfile.
283 # use-syslog: yes
284
285 # Log identity to report. if empty, defaults to the name of argv[0]
286 # (usually "unbound").
287 # log-identity: ""
288
289 # print UTC timestamp in ascii to logfile, default is epoch in seconds.
290 # log-time-ascii: no
291
292 # print one line with time, IP, name, type, class for every query.
293 # log-queries: no
294
295 # the pid file. Can be an absolute path outside of chroot/work dir.
296 # pidfile: "/usr/local/etc/unbound/unbound.pid"
297
298 # file to read root hints from.
299 # get one from https://www.internic.net/domain/named.cache
300 # root-hints: ""
301
302 # enable to not answer id.server and hostname.bind queries.
303 # hide-identity: no
304
305 # enable to not answer version.server and version.bind queries.
306 # hide-version: no
307
308 # the identity to report. Leave "" or default to return hostname.
309 # identity: ""
310
311 # the version to report. Leave "" or default to return package version.
312 # version: ""
313
314 # the target fetch policy.
315 # series of integers describing the policy per dependency depth.
316 # The number of values in the list determines the maximum dependency
317 # depth the recursor will pursue before giving up. Each integer means:
318 # -1 : fetch all targets opportunistically,
319 # 0: fetch on demand,
320 # positive value: fetch that many targets opportunistically.
321 # Enclose the list of numbers between quotes ("").
322 # target-fetch-policy: "3 2 1 0 0"
323
324 # Harden against very small EDNS buffer sizes.
325 # harden-short-bufsize: no
326
327 # Harden against unseemly large queries.
328 # harden-large-queries: no
329
330 # Harden against out of zone rrsets, to avoid spoofing attempts.
331 # harden-glue: yes
332
333 # Harden against receiving dnssec-stripped data. If you turn it
334 # off, failing to validate dnskey data for a trustanchor will
335 # trigger insecure mode for that zone (like without a trustanchor).
336 # Default on, which insists on dnssec data for trust-anchored zones.
337 # harden-dnssec-stripped: yes
338
339 # Harden against queries that fall under dnssec-signed nxdomain names.
340 # harden-below-nxdomain: no
341
342 # Harden the referral path by performing additional queries for
343 # infrastructure data. Validates the replies (if possible).
344 # Default off, because the lookups burden the server. Experimental
345 # implementation of draft-wijngaards-dnsext-resolver-side-mitigation.
346 # harden-referral-path: no
347
348 # Harden against algorithm downgrade when multiple algorithms are
349 # advertised in the DS record. If no, allows the weakest algorithm
350 # to validate the zone.
351 # harden-algo-downgrade: no
352
353 # Sent minimum amount of information to upstream servers to enhance
354 # privacy. Only sent minimum required labels of the QNAME and set QTYPE
355 # to NS when possible.
356 # qname-minimisation: no
357
358 # QNAME minimisation in strict mode. Do not fall-back to sending full
359 # QNAME to potentially broken nameservers. A lot of domains will not be
360 # resolvable when this option in enabled.
361 # This option only has effect when qname-minimisation is enabled.
362 # qname-minimisation-strict: no
363
364 # Use 0x20-encoded random bits in the query to foil spoof attempts.
365 # This feature is an experimental implementation of draft dns-0x20.
366 # use-caps-for-id: no
367
368 # Domains (and domains in them) without support for dns-0x20 and
369 # the fallback fails because they keep sending different answers.
370 # caps-whitelist: "licdn.com"
371 # caps-whitelist: "senderbase.org"
372
373 # Enforce privacy of these addresses. Strips them away from answers.
374 # It may cause DNSSEC validation to additionally mark it as bogus.
375 # Protects against 'DNS Rebinding' (uses browser as network proxy).
376 # Only 'private-domain' and 'local-data' names are allowed to have
377 # these private addresses. No default.
378 # private-address: 10.0.0.0/8
379 # private-address: 172.16.0.0/12
380 # private-address: 192.168.0.0/16
381 # private-address: 169.254.0.0/16
382 # private-address: fd00::/8
383 # private-address: fe80::/10
384 # private-address: ::ffff:0:0/96
385
386 # Allow the domain (and its subdomains) to contain private addresses.
387 # local-data statements are allowed to contain private addresses too.
388 # private-domain: "example.com"
389 private-domain: "wleiden.net"
390
391 # If nonzero, unwanted replies are not only reported in statistics,
392 # but also a running total is kept per thread. If it reaches the
393 # threshold, a warning is printed and a defensive action is taken,
394 # the cache is cleared to flush potential poison out of it.
395 # A suggested value is 10000000, the default is 0 (turned off).
396 # unwanted-reply-threshold: 0
397
398 # Do not query the following addresses. No DNS queries are sent there.
399 # List one address per entry. List classless netblocks with /size,
400 # do-not-query-address: 127.0.0.1/8
401 # do-not-query-address: ::1
402
403 # if yes, the above default do-not-query-address entries are present.
404 # if no, localhost can be queried (for testing and debugging).
405 do-not-query-localhost: no
406
407 # if yes, perform prefetching of almost expired message cache entries.
408 # prefetch: no
409
410 # if yes, perform key lookups adjacent to normal lookups.
411 # prefetch-key: no
412
413 # if yes, Unbound rotates RRSet order in response.
414 # rrset-roundrobin: no
415
416 # if yes, Unbound doesn't insert authority/additional sections
417 # into response messages when those sections are not required.
418 # minimal-responses: no
419
420 # true to disable DNSSEC lameness check in iterator.
421 # disable-dnssec-lame-check: no
422
423 # module configuration of the server. A string with identifiers
424 # separated by spaces. Syntax: "[dns64] [validator] iterator"
425 # module-config: "validator iterator"
426
427 # File with trusted keys, kept uptodate using RFC5011 probes,
428 # initial file like trust-anchor-file, then it stores metadata.
429 # Use several entries, one per domain name, to track multiple zones.
430 #
431 # If you want to perform DNSSEC validation, run unbound-anchor before
432 # you start unbound (i.e. in the system boot scripts). And enable:
433 # Please note usage of unbound-anchor root anchor is at your own risk
434 # and under the terms of our LICENSE (see that file in the source).
435 # auto-trust-anchor-file: "/usr/local/etc/unbound/root.key"
436
437 # File with DLV trusted keys. Same format as trust-anchor-file.
438 # There can be only one DLV configured, it is trusted from root down.
439 # DLV is going to be decommissioned. Please do not use it any more.
440 # dlv-anchor-file: "dlv.isc.org.key"
441
442 # File with trusted keys for validation. Specify more than one file
443 # with several entries, one file per entry.
444 # Zone file format, with DS and DNSKEY entries.
445 # Note this gets out of date, use auto-trust-anchor-file please.
446 # trust-anchor-file: ""
447
448 # Trusted key for validation. DS or DNSKEY. specify the RR on a
449 # single line, surrounded by "". TTL is ignored. class is IN default.
450 # Note this gets out of date, use auto-trust-anchor-file please.
451 # (These examples are from August 2007 and may not be valid anymore).
452 # trust-anchor: "nlnetlabs.nl. DNSKEY 257 3 5 AQPzzTWMz8qSWIQlfRnPckx2BiVmkVN6LPupO3mbz7FhLSnm26n6iG9N Lby97Ji453aWZY3M5/xJBSOS2vWtco2t8C0+xeO1bc/d6ZTy32DHchpW 6rDH1vp86Ll+ha0tmwyy9QP7y2bVw5zSbFCrefk8qCUBgfHm9bHzMG1U BYtEIQ=="
453 # trust-anchor: "jelte.nlnetlabs.nl. DS 42860 5 1 14D739EB566D2B1A5E216A0BA4D17FA9B038BE4A"
454
455 # File with trusted keys for validation. Specify more than one file
456 # with several entries, one file per entry. Like trust-anchor-file
457 # but has a different file format. Format is BIND-9 style format,
458 # the trusted-keys { name flag proto algo "key"; }; clauses are read.
459 # you need external update procedures to track changes in keys.
460 # trusted-keys-file: ""
461
462 # Ignore chain of trust. Domain is treated as insecure.
463 # domain-insecure: "example.com"
464
465 # Override the date for validation with a specific fixed date.
466 # Do not set this unless you are debugging signature inception
467 # and expiration. "" or "0" turns the feature off. -1 ignores date.
468 # val-override-date: ""
469
470 # The time to live for bogus data, rrsets and messages. This avoids
471 # some of the revalidation, until the time interval expires. in secs.
472 # val-bogus-ttl: 60
473
474 # The signature inception and expiration dates are allowed to be off
475 # by 10% of the signature lifetime (expir-incep) from our local clock.
476 # This leeway is capped with a minimum and a maximum. In seconds.
477 # val-sig-skew-min: 3600
478 # val-sig-skew-max: 86400
479
480 # Should additional section of secure message also be kept clean of
481 # unsecure data. Useful to shield the users of this validator from
482 # potential bogus data in the additional section. All unsigned data
483 # in the additional section is removed from secure messages.
484 # val-clean-additional: yes
485
486 # Turn permissive mode on to permit bogus messages. Thus, messages
487 # for which security checks failed will be returned to clients,
488 # instead of SERVFAIL. It still performs the security checks, which
489 # result in interesting log files and possibly the AD bit in
490 # replies if the message is found secure. The default is off.
491 # val-permissive-mode: no
492
493 # Ignore the CD flag in incoming queries and refuse them bogus data.
494 # Enable it if the only clients of unbound are legacy servers (w2008)
495 # that set CD but cannot validate themselves.
496 # ignore-cd-flag: no
497
498 # Serve expired reponses from cache, with TTL 0 in the response,
499 # and then attempt to fetch the data afresh.
500 # serve-expired: no
501
502 # Have the validator log failed validations for your diagnosis.
503 # 0: off. 1: A line per failed user query. 2: With reason and bad IP.
504 # val-log-level: 0
505
506 # It is possible to configure NSEC3 maximum iteration counts per
507 # keysize. Keep this table very short, as linear search is done.
508 # A message with an NSEC3 with larger count is marked insecure.
509 # List in ascending order the keysize and count values.
510 # val-nsec3-keysize-iterations: "1024 150 2048 500 4096 2500"
511
512 # instruct the auto-trust-anchor-file probing to add anchors after ttl.
513 # add-holddown: 2592000 # 30 days
514
515 # instruct the auto-trust-anchor-file probing to del anchors after ttl.
516 # del-holddown: 2592000 # 30 days
517
518 # auto-trust-anchor-file probing removes missing anchors after ttl.
519 # If the value 0 is given, missing anchors are not removed.
520 # keep-missing: 31622400 # 366 days
521
522 # debug option that allows very small holddown times for key rollover,
523 # otherwise the RFC mandates probe intervals must be at least 1 hour.
524 # permit-small-holddown: no
525
526 # the amount of memory to use for the key cache.
527 # plain value in bytes or you can append k, m or G. default is "4Mb".
528 # key-cache-size: 4m
529
530 # the number of slabs to use for the key cache.
531 # the number of slabs must be a power of 2.
532 # more slabs reduce lock contention, but fragment memory usage.
533 # key-cache-slabs: 4
534
535 # the amount of memory to use for the negative cache (used for DLV).
536 # plain value in bytes or you can append k, m or G. default is "1Mb".
537 # neg-cache-size: 1m
538
539 # By default, for a number of zones a small default 'nothing here'
540 # reply is built-in. Query traffic is thus blocked. If you
541 # wish to serve such zone you can unblock them by uncommenting one
542 # of the nodefault statements below.
543 # You may also have to use domain-insecure: zone to make DNSSEC work,
544 # unless you have your own trust anchors for this zone.
545 # local-zone: "localhost." nodefault
546 # local-zone: "127.in-addr.arpa." nodefault
547 # local-zone: "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa." nodefault
548 # local-zone: "onion." nodefault
549 # local-zone: "10.in-addr.arpa." nodefault
550 local-zone: "16.172.in-addr.arpa." nodefault
551 local-zone: "17.172.in-addr.arpa." nodefault
552 local-zone: "18.172.in-addr.arpa." nodefault
553 local-zone: "19.172.in-addr.arpa." nodefault
554 local-zone: "20.172.in-addr.arpa." nodefault
555 local-zone: "21.172.in-addr.arpa." nodefault
556 local-zone: "22.172.in-addr.arpa." nodefault
557 local-zone: "23.172.in-addr.arpa." nodefault
558 local-zone: "24.172.in-addr.arpa." nodefault
559 local-zone: "25.172.in-addr.arpa." nodefault
560 local-zone: "26.172.in-addr.arpa." nodefault
561 local-zone: "27.172.in-addr.arpa." nodefault
562 local-zone: "28.172.in-addr.arpa." nodefault
563 local-zone: "29.172.in-addr.arpa." nodefault
564 local-zone: "30.172.in-addr.arpa." nodefault
565 local-zone: "31.172.in-addr.arpa." nodefault
566 # local-zone: "168.192.in-addr.arpa." nodefault
567 # local-zone: "0.in-addr.arpa." nodefault
568 # local-zone: "254.169.in-addr.arpa." nodefault
569 # local-zone: "2.0.192.in-addr.arpa." nodefault
570 # local-zone: "100.51.198.in-addr.arpa." nodefault
571 # local-zone: "113.0.203.in-addr.arpa." nodefault
572 # local-zone: "255.255.255.255.in-addr.arpa." nodefault
573 # local-zone: "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa." nodefault
574 # local-zone: "d.f.ip6.arpa." nodefault
575 # local-zone: "8.e.f.ip6.arpa." nodefault
576 # local-zone: "9.e.f.ip6.arpa." nodefault
577 # local-zone: "a.e.f.ip6.arpa." nodefault
578 # local-zone: "b.e.f.ip6.arpa." nodefault
579 # local-zone: "8.b.d.0.1.0.0.2.ip6.arpa." nodefault
580 # And for 64.100.in-addr.arpa. to 127.100.in-addr.arpa.
581
582 # If unbound is running service for the local host then it is useful
583 # to perform lan-wide lookups to the upstream, and unblock the
584 # long list of local-zones above. If this unbound is a dns server
585 # for a network of computers, disabled is better and stops information
586 # leakage of local lan information.
587 # unblock-lan-zones: no
588
589 # The insecure-lan-zones option disables validation for
590 # these zones, as if they were all listed as domain-insecure.
591 insecure-lan-zones: yes
592
593 # a number of locally served zones can be configured.
594 # local-zone: <zone> <type>
595 # local-data: "<resource record string>"
596 # o deny serves local data (if any), else, drops queries.
597 # o refuse serves local data (if any), else, replies with error.
598 # o static serves local data, else, nxdomain or nodata answer.
599 # o transparent gives local data, but resolves normally for other names
600 # o redirect serves the zone data for any subdomain in the zone.
601 # o nodefault can be used to normally resolve AS112 zones.
602 # o typetransparent resolves normally for other types and other names
603 # o inform acts like transparent, but logs client IP address
604 # o inform_deny drops queries and logs client IP address
605 # o always_transparent, always_refuse, always_nxdomain, resolve in
606 # that way but ignore local data for that name.
607 #
608 # defaults are localhost address, reverse for 127.0.0.1 and ::1
609 # and nxdomain for AS112 zones. If you configure one of these zones
610 # the default content is omitted, or you can omit it with 'nodefault'.
611 #
612 # If you configure local-data without specifying local-zone, by
613 # default a transparent local-zone is created for the data.
614 #
615 # You can add locally served data with
616 # local-zone: "local." static
617 # local-data: "mycomputer.local. IN A 192.0.2.51"
618 # local-data: 'mytext.local TXT "content of text record"'
619 #
620 # You can override certain queries with
621 # local-data: "adserver.example.com A 127.0.0.1"
622 #
623 # You can redirect a domain to a fixed address with
624 # (this makes example.com, www.example.com, etc, all go to 192.0.2.3)
625 # local-zone: "example.com" redirect
626 # local-data: "example.com A 192.0.2.3"
627 #
628 # Shorthand to make PTR records, "IPv4 name" or "IPv6 name".
629 # You can also add PTR records using local-data directly, but then
630 # you need to do the reverse notation yourself.
631 # local-data-ptr: "192.0.2.3 www.example.com"
632 local-data: "welcome.wleiden.net A 172.31.255.1"
633
634 # Hack supporting UniFi Device time management
635 local-data: "0.ubnt.pool.ntp.org A 172.31.255.1"
636
637 # tag a localzone with a list of tag names (in "" with spaces between)
638 # local-zone-tag: "example.com" "tag2 tag3"
639
640 # add a netblock specific override to a localzone, with zone type
641 # local-zone-override: "example.com" 192.0.2.0/24 refuse
642
643 # service clients over SSL (on the TCP sockets), with plain DNS inside
644 # the SSL stream. Give the certificate to use and private key.
645 # default is "" (disabled). requires restart to take effect.
646 # ssl-service-key: "path/to/privatekeyfile.key"
647 # ssl-service-pem: "path/to/publiccertfile.pem"
648 # ssl-port: 853
649
650 # request upstream over SSL (with plain DNS inside the SSL stream).
651 # Default is no. Can be turned on and off with unbound-control.
652 # ssl-upstream: no
653
654 # DNS64 prefix. Must be specified when DNS64 is use.
655 # Enable dns64 in module-config. Used to synthesize IPv6 from IPv4.
656 # dns64-prefix: 64:ff9b::0/96
657
658 # ratelimit for uncached, new queries, this limits recursion effort.
659 # ratelimiting is experimental, and may help against randomqueryflood.
660 # if 0(default) it is disabled, otherwise state qps allowed per zone.
661 # ratelimit: 0
662
663 # ratelimits are tracked in a cache, size in bytes of cache (or k,m).
664 # ratelimit-size: 4m
665 # ratelimit cache slabs, reduces lock contention if equal to cpucount.
666 # ratelimit-slabs: 4
667
668 # 0 blocks when ratelimited, otherwise let 1/xth traffic through
669 # ratelimit-factor: 10
670
671 # override the ratelimit for a specific domain name.
672 # give this setting multiple times to have multiple overrides.
673 # ratelimit-for-domain: example.com 1000
674 # override the ratelimits for all domains below a domain name
675 # can give this multiple times, the name closest to the zone is used.
676 # ratelimit-below-domain: com 1000
677
678# Python config section. To enable:
679# o use --with-pythonmodule to configure before compiling.
680# o list python in the module-config string (above) to enable.
681# o and give a python-script to run.
682python:
683 # Script file to load
684 # python-script: "/usr/local/etc/unbound/ubmodule-tst.py"
685
686# Remote control config section.
687remote-control:
688 # Enable remote control with unbound-control(8) here.
689 # set up the keys and certificates with unbound-control-setup.
690 control-enable: yes
691
692 # Set to no and use an absolute path as control-interface to use
693 # a unix local named pipe for unbound-control.
694 # control-use-cert: yes
695
696 # what interfaces are listened to for remote control.
697 # give 0.0.0.0 and ::0 to listen to all interfaces.
698 # control-interface: 127.0.0.1
699 # control-interface: ::1
700
701 # port number for remote control operations.
702 # control-port: 8953
703
704 # unbound server key file.
705 # server-key-file: "/usr/local/etc/unbound/unbound_server.key"
706
707 # unbound server certificate file.
708 # server-cert-file: "/usr/local/etc/unbound/unbound_server.pem"
709
710 # unbound-control key file.
711 # control-key-file: "/usr/local/etc/unbound/unbound_control.key"
712
713 # unbound-control certificate file.
714 # control-cert-file: "/usr/local/etc/unbound/unbound_control.pem"
715
716# Stub zones.
717# Create entries like below, to make all queries for 'example.com' and
718# 'example.org' go to the given list of nameservers. list zero or more
719# nameservers by hostname or by ipaddress. If you set stub-prime to yes,
720# the list is treated as priming hints (default is no).
721# With stub-first yes, it attempts without the stub if it fails.
722# Consider adding domain-insecure: name and local-zone: name nodefault
723# to the server: section if the stub is a locally served zone.
724# stub-zone:
725# name: "example.com"
726# stub-addr: 192.0.2.68
727# stub-prime: no
728# stub-first: no
729# stub-ssl-upstream: no
730# stub-zone:
731# name: "example.org"
732# stub-host: ns.example.com.
733stub-zone:
734 name: "wleiden.net"
735 stub-addr: 127.0.0.1@5353
736
737#$ for I in `seq 16 31`; do echo -e "stub-zone:\n\tname: \"$I.172.in-addr.arpa\"\n\tstub-addr: 127.0.0.1@5353\n"; done
738stub-zone:
739 name: "16.172.in-addr.arpa"
740 stub-addr: 127.0.0.1@5353
741
742stub-zone:
743 name: "17.172.in-addr.arpa"
744 stub-addr: 127.0.0.1@5353
745
746stub-zone:
747 name: "18.172.in-addr.arpa"
748 stub-addr: 127.0.0.1@5353
749
750stub-zone:
751 name: "19.172.in-addr.arpa"
752 stub-addr: 127.0.0.1@5353
753
754stub-zone:
755 name: "20.172.in-addr.arpa"
756 stub-addr: 127.0.0.1@5353
757
758stub-zone:
759 name: "21.172.in-addr.arpa"
760 stub-addr: 127.0.0.1@5353
761
762stub-zone:
763 name: "22.172.in-addr.arpa"
764 stub-addr: 127.0.0.1@5353
765
766stub-zone:
767 name: "23.172.in-addr.arpa"
768 stub-addr: 127.0.0.1@5353
769
770stub-zone:
771 name: "24.172.in-addr.arpa"
772 stub-addr: 127.0.0.1@5353
773
774stub-zone:
775 name: "25.172.in-addr.arpa"
776 stub-addr: 127.0.0.1@5353
777
778stub-zone:
779 name: "26.172.in-addr.arpa"
780 stub-addr: 127.0.0.1@5353
781
782stub-zone:
783 name: "27.172.in-addr.arpa"
784 stub-addr: 127.0.0.1@5353
785
786stub-zone:
787 name: "28.172.in-addr.arpa"
788 stub-addr: 127.0.0.1@5353
789
790stub-zone:
791 name: "29.172.in-addr.arpa"
792 stub-addr: 127.0.0.1@5353
793
794stub-zone:
795 name: "30.172.in-addr.arpa"
796 stub-addr: 127.0.0.1@5353
797
798stub-zone:
799 name: "31.172.in-addr.arpa"
800 stub-addr: 127.0.0.1@5353
801# Forward zones
802# Create entries like below, to make all queries for 'example.com' and
803# 'example.org' go to the given list of servers. These servers have to handle
804# recursion to other nameservers. List zero or more nameservers by hostname
805# or by ipaddress. Use an entry with name "." to forward all queries.
806# If you enable forward-first, it attempts without the forward if it fails.
807# forward-zone:
808# name: "example.com"
809# forward-addr: 192.0.2.68
810# forward-addr: 192.0.2.73@5355 # forward to port 5355.
811# forward-first: no
812# forward-ssl-upstream: no
813# forward-zone:
814# name: "example.org"
815# forward-host: fwd.example.com
816
817# Views
818# Create named views. Name must be unique. Map views to requests using
819# the access-control-view option. Views can contain zero or more local-zone
820# and local-data options. Options from matching views will override global
821# options. Global options will be used if no matching view is found.
822# With view-first yes, it will try to answer using the global local-zone and
823# local-data elements if there is no view specific match.
824# view:
825# name: "viewname"
826# local-zone: "example.com" redirect
827# local-data: "example.com A 192.0.2.3"
828# view-first: no
829# view:
830# name: "anotherview"
831# local-zone: "example.com" refuse
Note: See TracBrowser for help on using the repository browser.