Documentation du Dr FRAPPE

Ce wiki regroupe les résultats de mes expériences en informatique accumulés au cours de mes recherches sur le net.

Dans la mesure du possible, j'ai cité mes sources ; il en manque certainement… :-)

Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentesRévision précédente
Prochaine révision
Révision précédente
Prochaine révisionLes deux révisions suivantes
logiciel:internet:dnsmasq:dnsmasq.conf [2020/11/06 10:35] – [Options] adminfr:logiciel:internet:dnsmasq:dnsmasq.conf [2021/02/15 12:07] – ↷ Page déplacée de logiciel:internet:dnsmasq:dnsmasq.conf à fr:logiciel:internet:dnsmasq:dnsmasq.conf admin
Ligne 5: Ligne 5:
 ====== Format ====== ====== Format ======
  
-Une option par ligne+Une option par ligne :<code txt ><option>=<valeur></code>
  
 les options valides sont les mêmes que celles sur la ligne de commande. les options valides sont les mêmes que celles sur la ligne de commande.
Ligne 345: Ligne 345:
   ? local-ttl=   ? local-ttl=
    Normally responses which come from /etc/hosts and the DHCP lease file have Time-To-Live set as zero, which conventionally means do not cache further. If you are happy to trade lower load on the server for potentially stale date, you can set a time-to-live (in seconds) here.    Normally responses which come from /etc/hosts and the DHCP lease file have Time-To-Live set as zero, which conventionally means do not cache further. If you are happy to trade lower load on the server for potentially stale date, you can set a time-to-live (in seconds) here.
-   ? bogus-nxdomain=64.94.110.11 +  ? bogus-nxdomain=64.94.110.11 
-   : If you want dnsmasq to detect attempts by Verisign to send queries to unregistered .com and .net hosts to its sitefinder service and have dnsmasq instead return the correct NXDOMAIN response, uncomment this line. You can add similar lines to do the same for other registries which have implemented wildcard A records. +  : If you want dnsmasq to detect attempts by Verisign to send queries to unregistered .com and .net hosts to its sitefinder service and have dnsmasq instead return the correct NXDOMAIN response, uncomment this line. You can add similar lines to do the same for other registries which have implemented wildcard A records. 
-   ? alias +  ? alias 
-   : If you want to fix up DNS results from upstream servers, use the alias option. This only works for IPv4. +  : If you want to fix up DNS results from upstream servers, use the alias option. This only works for IPv4. 
-     ? alias=1.2.3.4,5.6.7.8 +    ? alias=1.2.3.4,5.6.7.8 
-     : This alias makes a result of 1.2.3.4 appear as 5.6.7.8 +    : This alias makes a result of 1.2.3.4 appear as 5.6.7.8 
-     ? alias=1.2.3.0,5.6.7.0,255.255.255.0 +    ? alias=1.2.3.0,5.6.7.0,255.255.255.0 
-     : and this maps 1.2.3.x to 5.6.7.x +    : and this maps 1.2.3.x to 5.6.7.x 
-     ? alias=192.168.0.10-192.168.0.40,10.0.0.0,255.255.255.0 +    ? alias=192.168.0.10-192.168.0.40,10.0.0.0,255.255.255.0 
-     : and this maps 192.168.0.10->192.168.0.40 to 10.0.0.10->10.0.0.40 +    : and this maps 192.168.0.10->192.168.0.40 to 10.0.0.10->10.0.0.40 
-   ? MX records +  ? MX records 
-   : Change these lines if you want dnsmasq to serve MX records. +  : Change these lines if you want dnsmasq to serve MX records. 
-     ? mx-host=maildomain.com,servermachine.com,50 +    ? mx-host=maildomain.com,servermachine.com,50 
-     : Return an MX record named "maildomain.com" with target servermachine.com and preference 50 +    : Return an MX record named "maildomain.com" with target servermachine.com and preference 50 
-     ? mx-target=servermachine.com +    ? mx-target=servermachine.com 
-     : Set the default target for MX records created using the localmx option. +    : Set the default target for MX records created using the localmx option. 
-     ? localmx +    ? localmx 
-     : Return an MX record pointing to the mx-target for all local machines. +    : Return an MX record pointing to the mx-target for all local machines. 
-     ? selfmx +    ? selfmx 
-     : Return an MX record pointing to itself for all local machines. +    : Return an MX record pointing to itself for all local machines. 
-   ? srv-host +  ? srv-host 
-   : Change the following lines if you want dnsmasq to serve SRV records. These are useful if you want to serve ldap requests for Active Directory and other windows-originated DNS requests. +  : Change the following lines if you want dnsmasq to serve SRV records. These are useful if you want to serve ldap requests for Active Directory and other windows-originated DNS requests. 
-   : See RFC 2782. +  : See RFC 2782. 
-   : You may add multiple srv-host lines. +  : You may add multiple srv-host lines. 
-   : The fields are <name>,<target>,<port>,<priority>,<weight> +  : The fields are <name>,<target>,<port>,<priority>,<weight> 
-   : If the domain part if missing from the name (so that is just has the service and protocol sections) then the domain given by the domain= config option is used. (Note that expand-hosts does not need to be set for this to work.) +  : If the domain part if missing from the name (so that is just has the service and protocol sections) then the domain given by the domain= config option is used. (Note that expand-hosts does not need to be set for this to work.) 
-     ? srv-host=_ldap._tcp.example.com,ldapserver.example.com,389 +    ? srv-host=_ldap._tcp.example.com,ldapserver.example.com,389 
-     : A SRV record sending LDAP for the example.com domain to ldapserver.example.com port 389 +    : A SRV record sending LDAP for the example.com domain to ldapserver.example.com port 389 
-     ? domain=example.com\\ srv-host=_ldap._tcp,ldapserver.example.com,389 +    ? domain=example.com\\ srv-host=_ldap._tcp,ldapserver.example.com,389 
-     : A SRV record sending LDAP for the example.com domain to ldapserver.example.com port 389 (using domain=) +    : A SRV record sending LDAP for the example.com domain to ldapserver.example.com port 389 (using domain=) 
-     ? srv-host=_ldap._tcp.example.com,ldapserver.example.com,389,1\\ srv-host=_ldap._tcp.example.com,ldapserver.example.com,389,+    ? srv-host=_ldap._tcp.example.com,ldapserver.example.com,389,1\\ srv-host=_ldap._tcp.example.com,ldapserver.example.com,389,
-     : Two SRV records for LDAP, each with different priorities +    : Two SRV records for LDAP, each with different priorities 
-     ? srv-host=_ldap._tcp.example.com +    ? srv-host=_ldap._tcp.example.com 
-     : A SRV record indicating that there is no LDAP server for the domain example.com +    : A SRV record indicating that there is no LDAP server for the domain example.com 
- +  ? ptr-record=_http._tcp.dns-sd-services,"New Employee Page._http._tcp.dns-sd-services" 
-The following line shows how to make dnsmasq serve an arbitrary PTR +  : The following line shows how to make dnsmasq serve an arbitrary PTR record. This is useful for DNS-SD. (Note that the domain-name expansion done for SRV records _does_not occur for PTR records.) 
-record. This is useful for DNS-SD. (Note that the +  ? txt-record 
-domain-name expansion done for SRV records _does_not +  : Change the following lines to enable dnsmasq to serve TXT records. 
-occur for PTR records.) +  : These are used for things like SPF and zeroconf. (Note that the domain-name expansion done for SRV records _does_not occur for TXT records.) 
-#ptr-record=_http._tcp.dns-sd-services,"New Employee Page._http._tcp.dns-sd-services" +    ? txt-record=example.com,"v=spf1 a -all" 
- +    : Example SPF. 
-Change the following lines to enable dnsmasq to serve TXT records. +    ? txt-record=_http._tcp.example.com,name=value,paper=A4 
-These are used for things like SPF and zeroconf. (Note that the +    : Example zeroconf 
-domain-name expansion done for SRV records _does_not +  ? cname=bertand,bert 
-occur for TXT records.) +  : Provide an alias for a "local" DNS name. Note that this _only_ works for targets which are names from DHCP or /etc/hosts. Give host "bert" another name, bertrand 
- +  ? log-queries 
-#Example SPF. +  : For debugging purposes, log each DNS query as it passes through dnsmasq. 
-#txt-record=example.com,"v=spf1 a -all" +  ? log-dhcp 
- +  : Log lots of extra information about DHCP transactions. 
-#Example zeroconf +  ? conf-file=/etc/dnsmasq.more.conf 
-#txt-record=_http._tcp.example.com,name=value,paper=A4 +  ? conf-dir=/etc/dnsmasq.d 
- +  : Include another lot of configuration options. 
-Provide an alias for a "local" DNS name. Note that this _only_ works +  ? conf-dir=/etc/dnsmasq.d,.bak 
-for targets which are names from DHCP or /etc/hosts. Give host +  : Include all the files in a directory except those ending in .bak 
-"bert" another name, bertrand +  ? conf-dir=/etc/dnsmasq.d/,*.conf 
-#cname=bertand,bert +  : Include all files in a directory which end in .conf 
- +  ? dhcp-name-match=set:wpad-ignore,wpad 
-For debugging purposes, log each DNS query as it passes through +  ? dhcp-ignore-names=tag:wpad-ignore 
-dnsmasq. +  : If a DHCP client claims that its name is "wpad", ignore that. 
-#log-queries +  : This fixes a security hole. see CERT Vulnerability VU#598349
- +
-Log lots of extra information about DHCP transactions. +
-#log-dhcp +
- +
-# Include another lot of configuration options. +
-#conf-file=/etc/dnsmasq.more.conf +
-#conf-dir=/etc/dnsmasq.d +
- +
-Include all the files in a directory except those ending in .bak +
-#conf-dir=/etc/dnsmasq.d,.bak +
- +
-Include all files in a directory which end in .conf +
-#conf-dir=/etc/dnsmasq.d/,*.conf +
- +
-If a DHCP client claims that its name is "wpad", ignore that. +
-This fixes a security hole. see CERT Vulnerability VU#598349 +
-#dhcp-name-match=set:wpad-ignore,wpad +
-#dhcp-ignore-names=tag:wpad-ignore+
  
 ====== Voir aussi ====== ====== Voir aussi ======