Blame SOURCES/dnssec-trigger.conf

0d3b23
# Red Hat Enterprise Linux 7 version of dnssec-trigger.conf
0d3b23
0d3b23
# logging detail, 0=only errors, 1=operations, 2=detail, 3,4 debug detail.
0d3b23
# verbosity: 1
0d3b23
0d3b23
# pidfile location
0d3b23
pidfile: "/var/run/dnssec-triggerd.pid"
0d3b23
0d3b23
# log to a file instead of syslog, default is to syslog
0d3b23
# logfile: "/var/log/dnssec-trigger.log"
0d3b23
0d3b23
# log to syslog, or (log to to stderr or a logfile if specified). yes or no.
0d3b23
# use-syslog: yes
0d3b23
0d3b23
# chroot to this directory
0d3b23
# chroot: ""
0d3b23
0d3b23
# the unbound-control binary if not found in PATH.
0d3b23
# commandline options can be appended "unbound-control -c my.conf" if you wish.
0d3b23
# unbound-control: "/usr/sbin/unbound-control"
0d3b23
0d3b23
# where is resolv.conf to edit.
0d3b23
# resolvconf: "/etc/resolv.conf"
0d3b23
0d3b23
# the domain example.com line (if any) to add to resolv.conf(5). default none.
0d3b23
# domain: ""
0d3b23
0d3b23
# domain name search path to add to resolv.conf(5). default none.
0d3b23
# the search path from DHCP is not picked up, it could be used to misdirect.
0d3b23
# search: ""
0d3b23
0d3b23
# the command to run to open login pages on hot spots, a web browser.
0d3b23
# empty string runs no command.
0d3b23
# login-command: "xdg-open"
0d3b23
0d3b23
# the url to open to get hot spot login, it gets overridden by the hotspot.
0d3b23
login-location: "http://www.nlnetlabs.nl/projects/dnssec-trigger"
0d3b23
# should to be a ttl=0 entry
0d3b23
0d3b23
# do not perform actions (unbound-control or resolv.conf), for a dry-run.
0d3b23
# noaction: no
0d3b23
0d3b23
# port number to use for probe daemon.
0d3b23
# port: 8955
0d3b23
0d3b23
# keys and certificates generated by the dnssec-trigger-keygen systemd service
0d3b23
# (which called dnssec-trigger-control-setup)
0d3b23
server-key-file: "/etc/dnssec-trigger/dnssec_trigger_server.key"
0d3b23
server-cert-file: "/etc/dnssec-trigger/dnssec_trigger_server.pem"
0d3b23
control-key-file: "/etc/dnssec-trigger/dnssec_trigger_control.key"
0d3b23
control-cert-file: "/etc/dnssec-trigger/dnssec_trigger_control.pem"
0d3b23
0d3b23
# check for updates, download and ask to install them (for Windows, OSX).
0d3b23
# check-updates: no
0d3b23
0d3b23
# webservers that are probed to see if internet access is possible.
0d3b23
# They serve a simple static page over HTTP port 80.  It probes a random url:
0d3b23
# after a space is the content expected on the page, (the page can contain
0d3b23
# whitespace before and after this code).  Without urls it skips http probes.
0d3b23
0d3b23
# provided by NLnetLabs
0d3b23
# It is provided on a best effort basis, with no service guarantee.
0d3b23
url: "http://ster.nlnetlabs.nl/hotspot.txt OK"
0d3b23
0d3b23
# fallback open DNSSEC resolvers that run on TCP port 80 and TCP port 443.
0d3b23
# the ssl443 adds an ssl server IP, if you specify a hash it is checked, put
0d3b23
# the following on one line: ssl443:<space><IP><space><HASHoutput>
0d3b23
# hash is output of openssl x509 -sha256 -fingerprint -in server.pem
0d3b23
# You can add more with extra config lines.
0d3b23
0d3b23
# provided by Paul Wouters (pwouters@redhat.com)
0d3b23
# It is provided on a best effort basis, with no service guarantee.
0d3b23
# tcp80:  193.110.157.123
0d3b23
# tcp80:  2001:888:2003:1004::123
0d3b23
# ssl443: 193.110.157.123 16:41:49:E0:9D:62:CD:DB:79:A7:2B:71:58:C4:D5:E8:70:FA:BF:4D:6D:36:CC:07:35:33:C0:16:17:1B:61:E7
0d3b23
# ssl443: 2001:888:2003:1004::123 16:41:49:E0:9D:62:CD:DB:79:A7:2B:71:58:C4:D5:E8:70:FA:BF:4D:6D:36:CC:07:35:33:C0:16:17:1B:61:E7
0d3b23
0d3b23
# provided by NLnetLabs (www.nlnetlabs.nl)
0d3b23
# It is provided on a best effort basis, with no service guarantee.
0d3b23
tcp80: 213.154.224.3
0d3b23
tcp80: 2001:7b8:206:1:bb::
0d3b23
ssl443: 213.154.224.3 DC:22:7B:1C:00:1A:CE:C5:48:49:B1:E3:30:DE:61:93:61:12:4E:CB:5C:B4:33:C4:BC:75:8C:D6:16:9D:F0:9F
0d3b23
ssl443: 2001:7b8:206:1:bb:: DC:22:7B:1C:00:1A:CE:C5:48:49:B1:E3:30:DE:61:93:61:12:4E:CB:5C:B4:33:C4:BC:75:8C:D6:16:9D:F0:9F
0d3b23