Serveur DNS recursif
- utilise les variables
our_domains
etprivate_domains
pour les zones 'locales' (stub-zones) - autorise
our_nets
etprivate_nets
- ecoute sur
unbound_interfaces
(ou toutes les adresses par défaut) - redirige les requetes vers
unbound_forwarders
s'ils existent
unbound_interfaces ([])
IP's to listen tounbound_port (53)
our_nets ([])
allowed public networksprivate_nets ([])
allowed AND protected private networksour_domains ([])
direct access to our public domains eg: - { name: "univ.fr.", masters: [ "192.168.1.1", "192.168.1.2@5353" ] }private_domains ([])
domains allowed to containprivate_nets
IP's (and config stub-zone) same syntax asour_domains
unbound_force_masters ([])
if defined,our_domains
andprivate_domains
's "masters" will be overriden byunbound_force_masters
(for example to use a local nsd)unbound_nodefault ([])
RFC1918/RFC3330/RFC4291/RFC4193/RFC4291/RFC7686 local zones eg: - 168.192.in-addr.arpa.unbound_forwarders ([])
eventual forwardersunbound_forward_domains ([])
forward-zones same syntax asour_domains
, but 'master' MUST be a resolver itselfunbound_stub_domains ([])
forward-zones same syntax asour_domains
, avoidsunbound_force_masters
mechanismunbound_dns64_prefix ("")
unbound_dns64 (False)
Enable DNS64unbound_tls_key ("")
tls key file for DOT and DOHunbound_tls_cert ("")
tls cert file for DOT and DOHunbound_tls_bundle ('')
set to "" to disable. Allows use of DOT on upstream zonesunbound_dot (False)
needsunbound_tls_key
andunbound_tls_cert
Enable DNS over TLS supportunbound_doh (False)
needsunbound_tls_key
andunbound_tls_cert
Enable DNS over HTTPS support