Blob Blame History Raw
# The options configured in this file are supported by dnssec-trigger-script
# which is called due to various events in related services including
# dnssec-trigger and NetworkManager. As a result, dnssec-trigger-script,
# together with the dnssec-trigger daemon, reconfigures a running instance
# of Unbound, your local validating resolver.
#
# Changes in this file are typically applied on the next network change. To
# make them work immediately, restart the dnssec-trigger service. On many
# systems this is achieved by the following command:
#
#     systemctl restart dnssec-triggerd
#
# To achieve a clean state of Unbound, you can just restart the unbound
# service and dnssec-trigger gets restarted automatically. Note that some
# other services like VPN clients may have reconfigured unbound at runtime
# and thus may need to be restarted as well.
#
#     systemctl restart unbound
#
# In future some of the options may be interpretted by other services as well,
# so be careful to restart all of them. One such service may be a future
# version of NetworkManager.
#
#     systemctl restart NetworkManager
#

# validate_connection_provided_zones:
# -----------------------------------
# Ensures that foward zones provided by NetworkManager connections will be
# validated by Unbound.
#
# Security notes:
#
#  - If this option is turned off, the network you're connecting to
#    can provide you a list of spoofed domains e.g. via DHCP. Those domains
#    are then configured as insecure forward zones in your local validating
#    resolver, constituting a downgrade attack on DNSSEC validation.
#
#  - See also security notes on the `add_wifi_provided_zones` option.
#
# validate_connection_provided_zones=no
#
#  - Connection provided zones will be configured in Unbound as secure forward
#    zones, validated using DNSSEC.
#
#    If the DNS servers for such a connection are not capable of forwarding
#    DNSSEC queries and responses or the local zone is required to be signed
#    according to the global DNSSEC database, local resources will not be
#    resolved correctly and will appear inaccessible.
#
#    Many networks use fake top level domains which fail DNSSEC validation
#    as there is no way to validate them at all. Do not use this strict
#    option if you want to access resources on such networks.
#
# validate_connection_provided_zones=no
#
#  - Connection provided zones will be configured in Unbound as insecure
#    forward zones, not validated using DNSSEC. This allows you to access
#    local resources on networks with non-compliant DNS servers as well
#    as networks that hijack domains that are either not in the global DNS
#    tree at all or are required to be signed.
#
#    Turning this option off has security implications, See the security
#    notice above.
#
validate_connection_provided_zones=no

# add_wifi_provided_zones:
# ------------------------
# Ensures that wifi provided zones are accepted by dnssec-trigger-script just
# as any other connection provided zones. Wireless ethernet is special in
# that you often connect to network with no authentication or authentication
# based on a shared secret.
#
# Security notes:
#
#  - Anyone knowing such a shared secret can set up an access point for the
#    network and provide you a spoofed domain list via DHCP. When this option
#    is turned on, the spoofed domains are configured as forward zones in your
#    local validating resolver.
#
#  - See also security notes on the `validate_connection_provided_zones` option.
#
# add_wifi_provided_zones=yes
#
#  - Domains provided by WiFi connections will be configured as forward zones
#    in your local validating resolver. See the security notice above.
#
# add_wifi_provided_zones=no
#
#  - Domains provided by WiFi connection will be ignored.
#
add_wifi_provided_zones=no

# set_search_domains:
# -------------------
# Enable or disable writing of search domains to `/etc/resolv.conf`.
#
# set_search_domains=yes - Search domains are written to `/etc/resolv.conf`.
#
# set_search_domains=no - Search domains are not written to `/etc/resolv.conf`.
#
set_search_domains=no

# use_private_address_ranges:
# ---------------------------
# Enable or disable adding reverse name resolution zones derived from
# private IP addresses as defined in RFC 1918 and RFC 4193.
#
# use_private_address_ranges=yes - Use standard private IP address ranges to build
#                                  reverse name resolution zones using the global
#                                  forwarders.
#
# use_private_address_ranges=no - Ignore standard IP address ranges.
use_private_address_ranges=yes