From a3a457fa305d1805b227476ab8e523feda611470 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Ale=C5=A1=20Mr=C3=A1zek?= Date: Thu, 13 Jul 2023 15:32:37 +0200 Subject: [PATCH] docs: config: new declarative policy --- doc/config-forward.rst | 72 +++++++++++++ doc/config-local-data.rst | 148 ++++++++++++++++++++++++++ doc/config-policy-new.rst | 200 +++++------------------------------- doc/config-rebinding.rst | 32 ++++++ doc/config-refuse-no-rd.rst | 16 +++ doc/config-renumber.rst | 36 +++++++ doc/config-reordering.rst | 16 +++ 7 files changed, 348 insertions(+), 172 deletions(-) create mode 100644 doc/config-forward.rst create mode 100644 doc/config-local-data.rst create mode 100644 doc/config-rebinding.rst create mode 100644 doc/config-refuse-no-rd.rst create mode 100644 doc/config-renumber.rst create mode 100644 doc/config-reordering.rst diff --git a/doc/config-forward.rst b/doc/config-forward.rst new file mode 100644 index 000000000..2fe656162 --- /dev/null +++ b/doc/config-forward.rst @@ -0,0 +1,72 @@ +.. SPDX-License-Identifier: GPL-3.0-or-later + +.. _config-forward: + +Forwarding +========== + +The :option:`forward >` list of rules overrides which servers get asked to obtain DNS data. + +.. option:: forward: + + .. option:: subtree: + + Subtree to forward. + + .. option:: servers: | + + Optionaly you can set port after address by ``@`` separator (``193.17.47.1@5353``). + + .. option:: address:
| + + IP address(es) of a forward server. + + .. option:: transport: tls + + Optional, transport protocol for a forward server. + + .. option:: hostname: + + Hostname of the Forward server. + + .. option:: ca-file: + + Optional, path to CA certificate file. + + .. option:: options: + + .. option:: authoritative: true|false + + :default: false + + The forwarding target is an authoritative server. + + .. option:: dnssec: true|false + + :default: true + + Enable/disable DNSSEC for a subtree. + +.. code-block:: yaml + + forward: + # ask everything through some public resolver + - subtree: . + servers: [ 2001:148f:fffe::1, 193.17.47.1 ] + +.. code-block:: yaml + + forward: + # encrypted public resolver, again for all names + - subtree: . + servers: + - address: [ 2001:148f:fffe::1, 193.17.47.1 ] + transport: tls + hostname: odvr.nic.cz + + # use a local authoritative server for an internal-only zone + - subtree: internal.example.com + servers: [ 10.0.0.53 ] + options: + authoritative: true + dnssec: false diff --git a/doc/config-local-data.rst b/doc/config-local-data.rst new file mode 100644 index 000000000..507935858 --- /dev/null +++ b/doc/config-local-data.rst @@ -0,0 +1,148 @@ +.. SPDX-License-Identifier: GPL-3.0-or-later + +.. _config-local-data: + +Local Data and RPZ +================== + +Local overrides for DNS data may be defined in the :option:`local-data ` configuration tree. +It provides various input formats described in following subsections. + +.. option:: local-data: + + .. option:: ttl: