2015-11-25 04:12:51 +08:00
|
|
|
<?xml version='1.0'?> <!--*- Mode: nxml; nxml-child-indent: 2; indent-tabs-mode: nil -*-->
|
2014-05-19 04:10:48 +08:00
|
|
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
2015-06-19 01:47:44 +08:00
|
|
|
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
|
2014-05-19 04:10:48 +08:00
|
|
|
|
|
|
|
<!--
|
|
|
|
This file is part of systemd.
|
|
|
|
|
|
|
|
Copyright 2014 Tom Gundersen
|
|
|
|
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
Lesser General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
-->
|
|
|
|
|
2014-11-29 17:07:11 +08:00
|
|
|
<refentry id="resolved.conf" conditional='ENABLE_RESOLVED'
|
2015-02-04 10:14:13 +08:00
|
|
|
xmlns:xi="http://www.w3.org/2001/XInclude">
|
|
|
|
<refentryinfo>
|
|
|
|
<title>resolved.conf</title>
|
|
|
|
<productname>systemd</productname>
|
|
|
|
|
|
|
|
<authorgroup>
|
|
|
|
<author>
|
|
|
|
<contrib>Developer</contrib>
|
|
|
|
<firstname>Tom</firstname>
|
|
|
|
<surname>Gundersen</surname>
|
|
|
|
<email>teg@jklm.no</email>
|
|
|
|
</author>
|
|
|
|
</authorgroup>
|
|
|
|
</refentryinfo>
|
|
|
|
|
|
|
|
<refmeta>
|
|
|
|
<refentrytitle>resolved.conf</refentrytitle>
|
|
|
|
<manvolnum>5</manvolnum>
|
|
|
|
</refmeta>
|
|
|
|
|
|
|
|
<refnamediv>
|
|
|
|
<refname>resolved.conf</refname>
|
|
|
|
<refname>resolved.conf.d</refname>
|
|
|
|
<refpurpose>Network Name Resolution configuration files</refpurpose>
|
|
|
|
</refnamediv>
|
|
|
|
|
|
|
|
<refsynopsisdiv>
|
2015-06-19 01:47:44 +08:00
|
|
|
<para><filename>/etc/systemd/resolved.conf</filename></para>
|
|
|
|
<para><filename>/etc/systemd/resolved.conf.d/*.conf</filename></para>
|
2015-02-04 10:14:13 +08:00
|
|
|
<para><filename>/run/systemd/resolved.conf.d/*.conf</filename></para>
|
2015-06-19 01:47:44 +08:00
|
|
|
<para><filename>/usr/lib/systemd/resolved.conf.d/*.conf</filename></para>
|
2015-02-04 10:14:13 +08:00
|
|
|
</refsynopsisdiv>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Description</title>
|
|
|
|
|
|
|
|
<para>These configuration files control local DNS and LLMNR
|
2014-08-03 13:11:37 +08:00
|
|
|
name resolution.</para>
|
2015-02-04 10:14:13 +08:00
|
|
|
|
|
|
|
</refsect1>
|
|
|
|
|
2015-03-04 08:10:21 +08:00
|
|
|
<xi:include href="standard-conf.xml" xpointer="main-conf" />
|
2015-02-04 10:14:13 +08:00
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Options</title>
|
|
|
|
|
|
|
|
<variablelist class='network-directives'>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><varname>DNS=</varname></term>
|
2014-08-03 13:11:12 +08:00
|
|
|
<listitem><para>A space-separated list of IPv4 and IPv6
|
2015-02-04 10:14:13 +08:00
|
|
|
addresses to be used as system DNS servers. DNS requests are
|
|
|
|
sent to one of the listed DNS servers in parallel to any
|
|
|
|
per-interface DNS servers acquired from
|
|
|
|
<citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
|
2015-11-25 04:12:51 +08:00
|
|
|
For compatibility reasons, if this setting is not specified,
|
2015-11-24 23:44:02 +08:00
|
|
|
the DNS servers listed in
|
|
|
|
<filename>/etc/resolv.conf</filename> are used instead, if
|
|
|
|
that file exists and any servers are configured in it. This
|
|
|
|
setting defaults to the empty list.</para></listitem>
|
2015-02-04 10:14:13 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><varname>FallbackDNS=</varname></term>
|
2014-08-03 13:11:12 +08:00
|
|
|
<listitem><para>A space-separated list of IPv4 and IPv6
|
2015-02-04 10:14:13 +08:00
|
|
|
addresses to be used as the fallback DNS servers. Any
|
|
|
|
per-interface DNS servers obtained from
|
|
|
|
<citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>
|
|
|
|
take precedence over this setting, as do any servers set via
|
|
|
|
<varname>DNS=</varname> above or
|
|
|
|
<filename>/etc/resolv.conf</filename>. This setting is hence
|
|
|
|
only used if no other DNS server information is known. If this
|
|
|
|
option is not given, a compiled-in list of DNS servers is used
|
|
|
|
instead.</para></listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2015-11-25 04:12:51 +08:00
|
|
|
<varlistentry>
|
|
|
|
<term><varname>Domains=</varname></term>
|
|
|
|
<listitem><para>A space-separated list of search domains. For
|
|
|
|
compatibility reasons, if this setting is not specified, the
|
|
|
|
search domains listed in <filename>/etc/resolv.conf</filename>
|
|
|
|
are used instead, if that file exists and any domains are
|
|
|
|
configured in it. This setting defaults to the empty
|
|
|
|
list.</para></listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
<varlistentry>
|
|
|
|
<term><varname>LLMNR=</varname></term>
|
|
|
|
<listitem><para>Takes a boolean argument or
|
|
|
|
<literal>resolve</literal>. Controls Link-Local Multicast Name
|
|
|
|
Resolution support (<ulink
|
|
|
|
url="https://tools.ietf.org/html/rfc4795">RFC 4794</ulink>) on
|
2014-08-03 13:11:12 +08:00
|
|
|
the local host. If true, enables full LLMNR responder and
|
2014-08-03 13:11:37 +08:00
|
|
|
resolver support. If false, disables both. If set to
|
|
|
|
<literal>resolve</literal>, only resolution support is enabled,
|
2015-02-04 10:14:13 +08:00
|
|
|
but responding is disabled. Note that
|
|
|
|
<citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>
|
|
|
|
also maintains per-interface LLMNR settings. LLMNR will be
|
|
|
|
enabled on an interface only if the per-interface and the
|
|
|
|
global setting is on.</para></listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2016-01-05 07:31:32 +08:00
|
|
|
<varlistentry>
|
|
|
|
<term><varname>DNSSEC=</varname></term>
|
|
|
|
<listitem><para>Takes a boolean argument or
|
|
|
|
<literal>downgrade-ok</literal>. If true all DNS lookups are
|
|
|
|
DNSSEC-validated locally. If a response for a lookup request
|
|
|
|
is detected invalid this is returned as lookup failure to
|
|
|
|
applications. Note that this mode requires a DNS server that
|
|
|
|
supports DNSSEC. If the DNS server does not properly support
|
|
|
|
DNSSEC all validations will fail. If set to
|
|
|
|
<literal>downgrade-ok</literal> DNSSEC validation is
|
|
|
|
attempted, but if the server does not support DNSSEC properly,
|
|
|
|
DNSSEC mode is automatically disabled. Note that this mode
|
|
|
|
makes DNSSEC validation vulnerable to "downgrade" attacks,
|
|
|
|
where an attacker might be able to trigger a downgrade to
|
|
|
|
non-DNSSEC mode by synthesizing a DNS response that suggests
|
|
|
|
DNSSEC was not supported. If set to false, DNS lookups are not
|
|
|
|
DNSSEC validated.</para>
|
|
|
|
|
|
|
|
<para>Note that DNSSEC validation requires retrieval of
|
|
|
|
additional DNS data, and thus results in a small DNS look-up
|
|
|
|
time penalty.</para>
|
|
|
|
|
|
|
|
<para>DNSSEC requires knowledge of "trust anchors" to prove
|
|
|
|
data integrity. The trust anchor for the Internet root domain
|
2016-01-05 21:20:27 +08:00
|
|
|
is built into the resolver, additional trust anchors may be
|
|
|
|
defined with
|
|
|
|
<citerefentry><refentrytitle>dnssec-trust-anchors.d</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
|
|
|
|
Trust anchors may change in regular intervals, and old trust
|
|
|
|
anchors may be revoked. In such a case DNSSEC validation is
|
|
|
|
not possible until new trust anchors are configured locally or
|
|
|
|
the resolver software package is updated with the new root
|
|
|
|
trust anchor. In effect, when the built-in trust anchor is
|
|
|
|
revoked and <varname>DNSSEC=</varname> is true, all further
|
|
|
|
lookups will fail, as it cannot be proved anymore whether
|
|
|
|
lookups are correctly signed, or validly unsigned. If
|
2016-01-05 07:31:32 +08:00
|
|
|
<varname>DNSSEC=</varname> is set to
|
|
|
|
<literal>downgrade-ok</literal> the resolver will
|
2016-01-05 23:42:40 +08:00
|
|
|
automatically turn off DNSSEC validation in such a case.</para>
|
2016-01-05 07:31:32 +08:00
|
|
|
|
|
|
|
<para>Client programs looking up DNS data will be informed
|
|
|
|
whether lookups could be verified using DNSSEC, or whether the
|
|
|
|
returned data could not be verified (either because the data
|
|
|
|
was found unsigned in the DNS, or the DNS server did not
|
|
|
|
support DNSSEC or no appropriate trust anchors were known). In
|
|
|
|
the latter case it is assumed that client programs employ a
|
|
|
|
secondary scheme to validate the returned DNS data, should
|
|
|
|
this be required.</para>
|
|
|
|
|
|
|
|
<para>It is recommended to set <varname>DNSSEC=</varname> to
|
2016-01-05 23:42:40 +08:00
|
|
|
true on systems where it is known that the DNS server supports
|
2016-01-05 07:31:32 +08:00
|
|
|
DNSSEC correctly, and where software or trust anchor updates
|
|
|
|
happen regularly. On other systems it is recommended to set
|
|
|
|
<varname>DNSSEC=</varname> to
|
2016-01-05 23:42:40 +08:00
|
|
|
<literal>downgrade-ok</literal>.</para>
|
2016-01-05 07:31:32 +08:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2015-02-04 10:14:13 +08:00
|
|
|
</variablelist>
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>See Also</title>
|
|
|
|
<para>
|
|
|
|
<citerefentry><refentrytitle>systemd</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
|
|
|
|
<citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
|
|
|
|
<citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
|
2016-01-05 21:20:27 +08:00
|
|
|
<citerefentry><refentrytitle>dnssec-trust-anchors.d</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
|
2015-02-04 10:14:13 +08:00
|
|
|
<citerefentry><refentrytitle>resolv.conf</refentrytitle><manvolnum>4</manvolnum></citerefentry>
|
|
|
|
</para>
|
|
|
|
</refsect1>
|
2014-05-19 04:10:48 +08:00
|
|
|
|
|
|
|
</refentry>
|