summaryrefslogtreecommitdiff
path: root/doc/example.conf.in
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2020-10-27 15:09:16 +0000
committerCy Schubert <cy@FreeBSD.org>2020-10-27 15:09:16 +0000
commit4cb89f2eee3bb358f0491932ab0498b5319f4229 (patch)
treefc2691469564e7d7e552247f2b2c6e04dd7efb8a /doc/example.conf.in
parent7973006f41cdaf144441d1a39f9f075053435e2f (diff)
Notes
Diffstat (limited to 'doc/example.conf.in')
-rw-r--r--doc/example.conf.in85
1 files changed, 49 insertions, 36 deletions
diff --git a/doc/example.conf.in b/doc/example.conf.in
index 4f6411033e696..2fe9a2c7e7a79 100644
--- a/doc/example.conf.in
+++ b/doc/example.conf.in
@@ -1,7 +1,7 @@
#
# Example configuration file.
#
-# See unbound.conf(5) man page, version 1.11.0.
+# See unbound.conf(5) man page, version 1.12.0.
#
# this is a comment.
@@ -129,8 +129,8 @@ server:
# ip-dscp: 0
# EDNS reassembly buffer to advertise to UDP peers (the actual buffer
- # is set with msg-buffer-size). 1472 can solve fragmentation (timeouts)
- # edns-buffer-size: 4096
+ # is set with msg-buffer-size).
+ # edns-buffer-size: 1232
# Maximum UDP response size (not applied to TCP response).
# Suggested values are 512 to 4096. Default is 4096. 65536 disables it.
@@ -431,8 +431,8 @@ server:
# Domains (and domains in them) without support for dns-0x20 and
# the fallback fails because they keep sending different answers.
- # caps-whitelist: "licdn.com"
- # caps-whitelist: "senderbase.org"
+ # caps-exempt: "licdn.com"
+ # caps-exempt: "senderbase.org"
# Enforce privacy of these addresses. Strips them away from answers.
# It may cause DNSSEC validation to additionally mark it as bogus.
@@ -509,11 +509,6 @@ server:
# Root key trust anchor sentinel (draft-ietf-dnsop-kskroll-sentinel)
# root-key-sentinel: yes
- # File with DLV trusted keys. Same format as trust-anchor-file.
- # There can be only one DLV configured, it is trusted from root down.
- # DLV is going to be decommissioned. Please do not use it any more.
- # dlv-anchor-file: "dlv.isc.org.key"
-
# File with trusted keys for validation. Specify more than one file
# with several entries, one file per entry.
# Zone file format, with DS and DNSKEY entries.
@@ -589,7 +584,7 @@ server:
#
# Time in milliseconds before replying to the client with expired data.
# This essentially enables the serve-stale behavior as specified in
- # draft-ietf-dnsop-serve-stale-10 that first tries to resolve before
+ # RFC 8767 that first tries to resolve before
# immediately responding with expired data. 0 disables this behavior.
# A recommended value is 1800.
# serve-expired-client-timeout: 0
@@ -627,7 +622,7 @@ server:
# more slabs reduce lock contention, but fragment memory usage.
# key-cache-slabs: 4
- # the amount of memory to use for the negative cache (used for DLV).
+ # the amount of memory to use for the negative cache.
# plain value in bytes or you can append k, m or G. default is "1Mb".
# neg-cache-size: 1m
@@ -738,12 +733,14 @@ server:
# add a netblock specific override to a localzone, with zone type
# local-zone-override: "example.com" 192.0.2.0/24 refuse
- # service clients over TLS (on the TCP sockets), with plain DNS inside
- # the TLS stream. Give the certificate to use and private key.
+ # service clients over TLS (on the TCP sockets) with plain DNS inside
+ # the TLS stream, and over HTTPS using HTTP/2 as specified in RFC8484.
+ # Give the certificate to use and private key.
# default is "" (disabled). requires restart to take effect.
# tls-service-key: "path/to/privatekeyfile.key"
# tls-service-pem: "path/to/publiccertfile.pem"
# tls-port: 853
+ # https-port: 443
# cipher setting for TLSv1.2
# tls-ciphers: "DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256"
@@ -775,6 +772,22 @@ server:
# Also serve tls on these port numbers (eg. 443, ...), by listing
# tls-additional-port: portno for each of the port numbers.
+ # HTTP endpoint to provide DNS-over-HTTPS service on.
+ # http-endpoint: "/dns-query"
+
+ # HTTP/2 SETTINGS_MAX_CONCURRENT_STREAMS value to use.
+ # http-max-streams: 100
+
+ # Maximum number of bytes used for all HTTP/2 query buffers.
+ # http-query-buffer-size: 4m
+
+ # Maximum number of bytes used for all HTTP/2 response buffers.
+ # http-response-buffer-size: 4m
+
+ # Set TCP_NODELAY socket option on sockets used for DNS-over-HTTPS
+ # service.
+ # http-nodelay: yes
+
# DNS64 prefix. Must be specified when DNS64 is use.
# Enable dns64 in module-config. Used to synthesize IPv6 from IPv4.
# dns64-prefix: 64:ff9b::0/96
@@ -848,9 +861,9 @@ server:
# ipsecmod-ignore-bogus: no
#
# Domains for which ipsecmod will be triggered. If not defined (default)
- # all domains are treated as being whitelisted.
- # ipsecmod-whitelist: "example.com"
- # ipsecmod-whitelist: "nlnetlabs.nl"
+ # all domains are treated as being allowed.
+ # ipsecmod-allow: "example.com"
+ # ipsecmod-allow: "nlnetlabs.nl"
# Python config section. To enable:
@@ -948,27 +961,27 @@ remote-control:
# upstream (which saves a lookup to the upstream). The first example
# has a copy of the root for local usage. The second serves example.org
# authoritatively. zonefile: reads from file (and writes to it if you also
-# download it), master: fetches with AXFR and IXFR, or url to zonefile.
-# With allow-notify: you can give additional (apart from masters) sources of
+# download it), primary: fetches with AXFR and IXFR, or url to zonefile.
+# With allow-notify: you can give additional (apart from primaries) sources of
# notifies.
# auth-zone:
# name: "."
-# master: 199.9.14.201 # b.root-servers.net
-# master: 192.33.4.12 # c.root-servers.net
-# master: 199.7.91.13 # d.root-servers.net
-# master: 192.5.5.241 # f.root-servers.net
-# master: 192.112.36.4 # g.root-servers.net
-# master: 193.0.14.129 # k.root-servers.net
-# master: 192.0.47.132 # xfr.cjr.dns.icann.org
-# master: 192.0.32.132 # xfr.lax.dns.icann.org
-# master: 2001:500:200::b # b.root-servers.net
-# master: 2001:500:2::c # c.root-servers.net
-# master: 2001:500:2d::d # d.root-servers.net
-# master: 2001:500:2f::f # f.root-servers.net
-# master: 2001:500:12::d0d # g.root-servers.net
-# master: 2001:7fd::1 # k.root-servers.net
-# master: 2620:0:2830:202::132 # xfr.cjr.dns.icann.org
-# master: 2620:0:2d0:202::132 # xfr.lax.dns.icann.org
+# primary: 199.9.14.201 # b.root-servers.net
+# primary: 192.33.4.12 # c.root-servers.net
+# primary: 199.7.91.13 # d.root-servers.net
+# primary: 192.5.5.241 # f.root-servers.net
+# primary: 192.112.36.4 # g.root-servers.net
+# primary: 193.0.14.129 # k.root-servers.net
+# primary: 192.0.47.132 # xfr.cjr.dns.icann.org
+# primary: 192.0.32.132 # xfr.lax.dns.icann.org
+# primary: 2001:500:200::b # b.root-servers.net
+# primary: 2001:500:2::c # c.root-servers.net
+# primary: 2001:500:2d::d # d.root-servers.net
+# primary: 2001:500:2f::f # f.root-servers.net
+# primary: 2001:500:12::d0d # g.root-servers.net
+# primary: 2001:7fd::1 # k.root-servers.net
+# primary: 2620:0:2830:202::132 # xfr.cjr.dns.icann.org
+# primary: 2620:0:2d0:202::132 # xfr.lax.dns.icann.org
# fallback-enabled: yes
# for-downstream: no
# for-upstream: yes
@@ -1088,7 +1101,7 @@ remote-control:
# rpz:
# name: "rpz.example.com"
# zonefile: "rpz.example.com"
-# master: 192.0.2.0
+# primary: 192.0.2.0
# allow-notify: 192.0.2.0/32
# url: http://www.example.com/rpz.example.org.zone
# rpz-action-override: cname