aboutsummaryrefslogtreecommitdiff
path: root/doc/example.conf.in
diff options
context:
space:
mode:
Diffstat (limited to 'doc/example.conf.in')
-rw-r--r--doc/example.conf.in33
1 files changed, 32 insertions, 1 deletions
diff --git a/doc/example.conf.in b/doc/example.conf.in
index 3411d7edbdd6..539602953beb 100644
--- a/doc/example.conf.in
+++ b/doc/example.conf.in
@@ -1,7 +1,7 @@
#
# Example configuration file.
#
-# See unbound.conf(5) man page, version 1.6.3.
+# See unbound.conf(5) man page, version 1.6.4.
#
# this is a comment.
@@ -448,6 +448,9 @@ server:
# and under the terms of our LICENSE (see that file in the source).
# auto-trust-anchor-file: "@UNBOUND_ROOTKEY_FILE@"
+ # trust anchor signaling sends a RFC8145 key tag query after priming.
+ # trust-anchor-signaling: no
+
# File with DLV trusted keys. Same format as trust-anchor-file.
# There can be only one DLV configured, it is trusted from root down.
# DLV is going to be decommissioned. Please do not use it any more.
@@ -698,6 +701,34 @@ server:
# 0 blocks when ip is ratelimited, otherwise let 1/xth traffic through
# ip-ratelimit-factor: 10
+ # Specific options for ipsecmod. unbound needs to be configured with
+ # --enable-ipsecmod for these to take effect.
+ #
+ # Enable or disable ipsecmod (it still needs to be defined in
+ # module-config above). Can be used when ipsecmod needs to be
+ # enabled/disabled via remote-control(below).
+ # ipsecmod-enabled: yes
+ #
+ # Path to executable external hook. It must be defined when ipsecmod is
+ # listed in module-config (above).
+ # ipsecmod-hook: "./my_executable"
+ #
+ # When enabled unbound will reply with SERVFAIL if the return value of
+ # the ipsecmod-hook is not 0.
+ # ipsecmod-strict: no
+ #
+ # Maximum time to live (TTL) for cached A/AAAA records with IPSECKEY.
+ # ipsecmod-max-ttl: 3600
+ #
+ # Reply with A/AAAA even if the relevant IPSECKEY is bogus. Mainly used for
+ # testing.
+ # ipsecmod-ignore-bogus: no
+ #
+ # Domains for which ipsecmod will be triggered. If not defined (default)
+ # all domains are treated as being whitelisted.
+ # ipsecmod-whitelist: "example.com"
+ # ipsecmod-whitelist: "nlnetlabs.nl"
+
# Python config section. To enable:
# o use --with-pythonmodule to configure before compiling.