Documentation du Dr FRAPPE

Ce wiki regroupe les résultats de mes expériences en informatique accumulés au cours de mes recherches sur le net.

Dans la mesure du possible, j'ai cité mes sources ; il en manque certainement… :-)

Dnsmasq.conf : options

Format

Une option par ligne :

<option>=<valeur>

les options valides sont les mêmes que celles sur la ligne de commande.

Pour plus de détails, voir

...@...:~$ /usr/sbin/dnsmasq --help

ou

...@...:~$ man 8 dnsmasq

Options

port
port=5353
Écouter sur ce port au lieu du port DNS standard (53).
Un réglage à zéro désactive complètement la fonction DNS, ne laissant que DHCP et/ou TFTP.
domain-needed et bogus-priv
filtrer les requêtes auxquelles le DNS public ne peut pas répondre et qui chargent inutilement les serveurs.
domain-needed
Pas de nom simple (sans point ni partie de domaine)
bogus-priv
Pas d'adresse dans les espaces d'adressage non routés.
conf-file et dnssec
Activer la validation DNSSEC et la mise en cache
conf-file=%%PREFIX%%/share/dnsmasq/trust-anchors.conf
dnssec
dnssec-check-unsigned
vérifier qu'une réponse non signée est valide.
filterwin2k
Filtrer les requêtes DNS inutiles provenant de Windows qui peuvent être déclenchées.
resolv-file=
Modifiez cette ligne si vous voulez que DNS récupère ses serveurs d'un autre endroit que /etc/resolv.conf
strict-order
Essayer chaque requête avec chaque serveur dans l'ordre strict d'apparition dans /etc/resolv.conf
no-resolv
Pour que dnsmasq récupère ses serveurs à partir de ce fichier (voir ci-dessous) au lieu de /etc/resolv.conf ou tout autre fichier
no-poll
Ne pas interroger /etc/resolv.conf ou d'autres fichiers resolv pour chercher les changements et les relire
server
server=/localnet/192.168.0.1
Ajoutez ici d'autres serveurs de noms, avec des spécifications de domaine pour des domaines non publics.
server=/3.168.192.in-addr.arpa/10.1.2.3
Exemple de routage des requêtes PTR vers les serveurs de noms qui enverra toutes les requêtes adresse→nom pour 192.168.3/24 au serveur de noms 10.1.2.3
server=10.1.2.3@eth1
Vous pouvez contrôler comment dnsmasq parle à un serveur : ceci force les requêtes vers 10.1.2.3 à être acheminées via eth1
server=10.1.2.3@192.168.1.1#55
adresse source (c'est-à-dire locale) utilisée pour parler au port 55 de 10.1.2.3 à 192.168.1.1 (il doit y avoir une interface avec cette adresse IP sur la machine, évidemment).
local
local=/localnet/
Ajoutez ici des domaines locaux, les requêtes pour ces domaines ne sont traitées qu'à partir de /etc/hosts ou de DHCP
address
address=/double-click.net/127.0.0.1
Domaine dont vous voulez forcer l'adresse IP.
Cet exemple envoie n'importe quel hôte de double-click.net à un serveur Web local.
address=/www.thekelleys.org.uk/fe80::20d:60ff:fe36:f83
–address (et –server) fonctionnent également avec les adresses IPv6.
ipset
ipset=/yahoo.com/google.com/vpn,search
Ajoutez les adresses IP de toutes les requêtes à yahoo.com, google.com et leurs sous-domaines au VPN et aux ipsets de recherche
server
user et group
Si vous voulez que dnsmasq change uid et gid en autre chose que la valeur par défaut, modifiez les lignes suivantes :
user=
group=
interface, except-interface, listen-address, no-dhcp-interface
interface=
N'écouter les requêtes DHCP et DNS que sur les interfaces spécifiées (par exemple eth0)
Répétez la ligne pour plusieurs interfaces.
except-interface=
interface sur laquelle ne pas écouter
listen-address=
interface sur laquelle écouter par adresse (n'oubliez pas d'inclure 127.0.0.1 si vous l'utilisez.)
no-dhcp-interface=
If you want dnsmasq to provide only DNS service on an interface, configure it as shown above, and then use the following line to disable DHCP and TFTP on it.
bind-interfaces
On systems which support it, dnsmasq binds the wildcard address, even when it is listening on only some interfaces. It then discards requests that it shouldn't reply to. This has the advantage of working even when interfaces come and go and change address. If you want dnsmasq to really bind only the interfaces it is listening on, uncomment this option. About the only time you may need this is when running another nameserver on the same machine.
no-hosts
If you don't want dnsmasq to read /etc/hosts, uncomment the following line.
addn-hosts=/etc/banner_add_hosts
if you want it to read another file, as well as /etc/hosts, use this.
expand-hosts
Set this (and domain: see below) if you want to have a domain automatically added to simple names in a hosts-file.
domain
domain=thekelleys.org.uk
Set the domain for dnsmasq. this is optional, but if it is set, it does the following things.
1) Allows DHCP hosts to have fully qualified domain names, as long as the domain part matches this setting.
2) Sets the “domain” DHCP option thereby potentially setting the domain of all systems configured by DHCP
3) Provides the domain part for “expand-hosts”
domain=wireless.thekelleys.org.uk,192.168.2.0/24
Set a different domain for a particular subnet
domain=reserved.thekelleys.org.uk,192.68.3.100,192.168.3.200
Same idea, but range rather then subnet
dhcp-range
dhcp-range=192.168.0.50,192.168.0.150,12h
Uncomment this to enable the integrated DHCP server, you need to supply the range of addresses available for lease and optionally a lease time. If you have more than one network, you will need to repeat this for each network on which you want to supply DHCP service.
dhcp-range=192.168.0.50,192.168.0.150,255.255.255.0,12h
This is an example of a DHCP range where the netmask is given. This is needed for networks we reach the dnsmasq DHCP server via a relay agent. If you don't know what a DHCP relay agent is, you probably don't need to worry about this.
dhcp-range=set:red,192.168.0.50,192.168.0.150
This is an example of a DHCP range which sets a tag, so that some DHCP options may be set only for this network.
dhcp-range=tag:green,192.168.0.50,192.168.0.150,12h
Use this DHCP range only when the tag “green” is set.
dhcp-range=192.168.0.0,static
Specify a subnet which can't be used for dynamic address allocation, is available for hosts with matching –dhcp-host lines. Note that dhcp-host declarations will be ignored unless there is a dhcp-range of some type for the subnet in question. In this case the netmask is implied (it comes from the network configuration on the machine running dnsmasq) it is possible to give an explicit netmask instead.
dhcp-range=1234::2, 1234::500, 64, 12h
Enable DHCPv6. Note that the prefix-length does not need to be specified and defaults to 64 if missing/
dhcp-range=1234::, ra-only
Do Router Advertisements, BUT NOT DHCP for this subnet.
dhcp-range=1234::, ra-names
Do Router Advertisements, BUT NOT DHCP for this subnet, also try and add names to the DNS for the IPv6 address of SLAAC-configured dual-stack hosts. Use the DHCPv4 lease to derive the name, network segment and MAC address and assume that the host will also have an IPv6 address calculated using the SLAAC algorithm.
dhcp-range=1234::, ra-only, 48h
Do Router Advertisements, BUT NOT DHCP for this subnet.
Set the lifetime to 46 hours. (Note: minimum lifetime is 2 hours.)
dhcp-range=1234::2, 1234::500, slaac
Do DHCP and Router Advertisements for this subnet. Set the A bit in the RA so that clients can use SLAAC addresses as well as DHCP ones.
dhcp-range=1234::, ra-stateless
Do Router Advertisements and stateless DHCP for this subnet. Clients will not get addresses from DHCP, but they will get other configuration information.
They will use SLAAC for addresses.
dhcp-range=1234::, ra-stateless, ra-names
Do stateless DHCP, SLAAC, and generate DNS names for SLAAC addresses from DHCPv4 leases.
enable-ra
Do router advertisements for all subnets where we're doing DHCPv6 Unless overridden by ra-stateless, ra-names, et al, the router advertisements will have the M and O bits set, so that the clients get addresses and configuration from DHCPv6, and the A bit reset, so the clients don't use SLAAC addresses.
dhcp-host
Supply parameters for specified hosts using DHCP. There are lots of valid alternatives, so we will give examples of each. Note that IP addresses DO NOT have to be in the range given above, they just need to be on the same network. The order of the parameters in these do not matter, it's permissible to give name, address and MAC in any order.
dhcp-host=11:22:33:44:55:66,192.168.0.60
Always allocate the host with Ethernet address 11:22:33:44:55:66 The IP address 192.168.0.60
dhcp-host=11:22:33:44:55:66,fred
Always set the name of the host with hardware address 11:22:33:44:55:66 to be “fred”
dhcp-host=11:22:33:44:55:66,fred,192.168.0.60,45m
Always give the host with Ethernet address 11:22:33:44:55:66 the name fred and IP address 192.168.0.60 and lease time 45 minutes
dhcp-host=11:22:33:44:55:66,12:34:56:78:90:12,192.168.0.60
Give a host with Ethernet address 11:22:33:44:55:66 or 12:34:56:78:90:12 the IP address 192.168.0.60. Dnsmasq will assume that these two Ethernet interfaces will never be in use at the same time, and give the IP address to the second, even if it is already in use by the first. Useful for laptops with wired and wireless addresses.
dhcp-host=bert,192.168.0.70,infinite
Give the machine which says its name is “bert” IP address 192.168.0.70 and an infinite lease
dhcp-host=id:01:02:02:04,192.168.0.60
Always give the host with client identifier 01:02:02:04 the IP address 192.168.0.60
dhcp-host=id:ff:00:00:00:00:00:02:00:00:02:c9:00:f4:52:14:03:00:28:05:81,192.168.0.61
Always give the InfiniBand interface with hardware address 80:00:00:48:fe:80:00:00:00:00:00:00:f4:52:14:03:00:28:05:81 the ip address 192.168.0.61. The client id is derived from the prefix ff:00:00:00:00:00:02:00:00:02:c9:00 and the last 8 pairs of hex digits of the hardware address.
dhcp-host=id:marjorie,192.168.0.60
Always give the host with client identifier “marjorie” the IP address 192.168.0.60
dhcp-host=judge
Enable the address given for “judge” in /etc/hosts to be given to a machine presenting the name “judge” when it asks for a DHCP lease.
dhcp-host=11:22:33:44:55:66,ignore
Never offer DHCP service to a machine whose Ethernet address is 11:22:33:44:55:66
dhcp-host=11:22:33:44:55:66,id:*
Ignore any client-id presented by the machine with Ethernet address 11:22:33:44:55:66. This is useful to prevent a machine being treated differently when running under different OS's or between PXE boot and OS boot.
dhcp-host=11:22:33:44:55:66,set:red
Send extra options which are tagged as “red” to the machine with Ethernet address 11:22:33:44:55:66
dhcp-host=11:22:33:*:*:*,set:red
Send extra options which are tagged as “red” to any machine with Ethernet address starting 11:22:33:
dhcp-host=id:00:01:00:01:16:d2:83:fc:92:d4:19:e2:d8:b2, fred, [1234::5]
Give a fixed IPv6 address and name to client with DUID 00:01:00:01:16:d2:83:fc:92:d4:19:e2:d8:b2
Note the MAC addresses CANNOT be used to identify DHCPv6 clients.
Note also that the [] around the IPv6 address are obligatory.
dhcp-ignore=tag:!known
Ignore any clients which are not specified in dhcp-host lines or /etc/ethers. Equivalent to ISC “deny unknown-clients”.
This relies on the special “known” tag which is set when a host is matched.
dhcp-vendorclass=set:red,Linux
Send extra options which are tagged as “red” to any machine whose DHCP vendorclass string includes the substring “Linux”
dhcp-userclass=set:red,accounts
Send extra options which are tagged as “red” to any machine one of whose DHCP userclass strings includes the substring “accounts”
dhcp-mac=set:red,00:60:8C:*:*:*
Send extra options which are tagged as “red” to any machine whose MAC address matches the pattern.
read-ethers
If this line is uncommented, dnsmasq will read /etc/ethers and act on the ethernet-address/IP pairs found there just as if they had been given as –dhcp-host options. Useful if you keep MAC-address/host mappings there for other purposes.
dhcp-option
Send options to hosts which ask for a DHCP lease.
See RFC 2132 for details of available options.
Common options can be given to dnsmasq by name:
run “dnsmasq –help dhcp” to get a list.
Note that all the common settings, such as netmask and broadcast address, DNS server and default route, are given sane defaults by dnsmasq. You very likely will not need any dhcp-options. If you use Windows clients and Samba, there are some options which are recommended, they are detailed at the end of this section.
dhcp-option=3,1.2.3.4
Override the default route supplied by dnsmasq, which assumes the router is the same machine as the one running dnsmasq.
dhcp-option=option:router,1.2.3.4
Do the same thing, but using the option name
dhcp-option=3
Override the default route supplied by dnsmasq and send no default route at all. Note that this only works for the options sent by default (1, 3, 6, 12, 28) the same line will send a zero-length option for all other option numbers.
dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
Set the NTP time server addresses to 192.168.0.4 and 10.10.0.5
dhcp-option=option6:dns-server,[1234::77],[1234::88]
Send DHCPv6 option. Note [] around IPv6 addresses.
dhcp-option=option6:dns-server,[::],[1234::88]
Send DHCPv6 option for namservers as the machine running dnsmasq and another.
dhcp-option=option6:information-refresh-time,6h
Ask client to poll for option changes every six hours. (RFC4242)
dhcp-option=option:T1,1m
Set option 58 client renewal time (T1). Defaults to half of the lease time if not specified. (RFC2132)
dhcp-option=option:T2,2m
Set option 59 rebinding time (T2). Defaults to 7/8 of the lease time if not specified. (RFC2132)
dhcp-option=42,0.0.0.0
Set the NTP time server address to be the same machine as is running dnsmasq
dhcp-option=40,welly
Set the NIS domain name to “welly”
dhcp-option=23,50
Set the default time-to-live to 50
dhcp-option=27,1
Set the “all subnets are local” flag
dhcp-option=128,e4:45:74:68:00:00
dhcp-option=129,NIC=eepro100
Send the etherboot magic flag and then etherboot options (a string).
dhcp-option = tag:red, option:ntp-server, 192.168.1.1
Specify an option which will only be sent to the “red” network (see dhcp-range for the declaration of the “red” network)
Note that the tag: part must precede the option: part.
The following DHCP options
set up dnsmasq in the same way as is specified for the ISC dhcpcd in http://www.samba.org/samba/ftp/docs/textdocs/DHCP-Server-Configuration.txt adapted for a typical dnsmasq installation where the host running dnsmasq is also the host running samba. you may want to uncomment some or all of them if you use Windows clients and Samba.
dhcp-option=19,0
option ip-forwarding off
dhcp-option=44,0.0.0.0
set netbios-over-TCP/IP nameserver(s) aka WINS server(s)
dhcp-option=45,0.0.0.0
netbios datagram distribution server
dhcp-option=46,8
netbios node type
dhcp-option=252,“\n”
Send an empty WPAD option. This may be REQUIRED to get windows 7 to behave.
dhcp-option=option:domain-search,eng.apple.com,marketing.apple.com
Send RFC-3397 DNS domain search DHCP option. WARNING: Your DHCP client probably doesn't support this……
dhcp-option=121,192.168.1.0/24,1.2.3.4,10.0.0.0/8,5.6.7.8
Send RFC-3442 classless static routes (note the netmask encoding)
dhcp-option=vendor:PXEClient,1,0.0.0.0
Send vendor-class specific options encapsulated in DHCP option 43.
The meaning of the options is defined by the vendor-class so options are sent only when the client supplied vendor class matches the class given here. (A substring match is OK, so “MSFT” matches “MSFT” and “MSFT 5.0”). This example sets the mtftp address to 0.0.0.0 for PXEClients.
dhcp-option=vendor:MSFT,2,1i
Send microsoft-specific option to tell windows to release the DHCP lease when it shuts down. Note the “i” flag, to tell dnsmasq to send the value as a four-byte integer - that's what microsoft wants. See http://technet2.microsoft.com/WindowsServer/en/library/a70f1bb7-d2d4-49f0-96d6-4b7414ecfaae1033.mspx?mfr=true
dhcp-option=vendor:Etherboot,60,“Etherboot”
Send the Encapsulated-vendor-class ID needed by some configurations of Etherboot to allow is to recognise the DHCP server.
dhcp-option-force
dhcp-option-force=208,f1:00:74:7e
Send options to PXELinux. Note that we need to send the options even though they don't appear in the parameter request list, so we need to use dhcp-option-force here. See http://syslinux.zytor.com/pxe.php#special for details. Magic number - needed before anything else is recognised
dhcp-option-force=209,configs/common
Configuration file name
dhcp-option-force=210,/tftpboot/pxelinux/files/
Path prefix
dhcp-option-force=211,30i
Reboot time. (Note 'i' to send 32-bit value)
dhcp-boot
dhcp-boot=pxelinux.0
Set the boot filename for netboot/PXE. You will only need this if you want to boot machines over the network and you will need a TFTP server; either dnsmasq's built-in TFTP server or an external one. (See below for how to enable the TFTP server.)
dhcp-boot=pxelinux,server.name,192.168.1.100
The same as above, but use custom tftp-server instead machine running dnsmasq
Boot for iPXE
The idea is to send two different filenames, the first loads iPXE, and the second tells iPXE what to load. The dhcp-match sets the ipxe tag for requests from iPXE.
dhcp-boot=undionly.kpxe
dhcp-match=set:ipxe,175 # iPXE sends a 175 option.
dhcp-boot=tag:ipxe,http://boot.ipxe.org/demo/boot.php
Encapsulated options for iPXE.
All the options are encapsulated within option 175
dhcp-option=encap:175, 1, 5b
priority code
dhcp-option=encap:175, 176, 1b
no-proxydhcp
dhcp-option=encap:175, 177, string
bus-id
dhcp-option=encap:175, 189, 1b
BIOS drive code
dhcp-option=encap:175, 190, user
iSCSI username
dhcp-option=encap:175, 191, pass
iSCSI password
dhcp-match
Test for the architecture of a netboot client.
PXE clients are supposed to send their architecture as option 93. (See RFC 4578)
dhcp-match=peecees, option:client-arch, 0 #x86-32
dhcp-match=itanics, option:client-arch, 2 #IA64
dhcp-match=hammers, option:client-arch, 6 #x86-64
dhcp-match=mactels, option:client-arch, 7 #EFI x86-64
pxe-prompt
pxe-prompt=“What system shall I netboot?”
Do real PXE, rather than just booting a single file, this is an alternative to dhcp-boot.
pxe-prompt=“Press F8 for menu.”, 60
or with timeout before first available action is taken:
pxe-service
pxe-service=x86PC, “Boot from local disk”
Available boot services. for PXE.
pxe-service=x86PC, “Install Linux”, pxelinux
Loads <tftp-root>/pxelinux.0 from dnsmasq TFTP server.
pxe-service=x86PC, “Install Linux”, pxelinux, 1.2.3.4
Loads <tftp-root>/pxelinux.0 from TFTP server at 1.2.3.4.
Beware this fails on old PXE ROMS.
pxe-service=x86PC, “Install windows from RIS server”, 1
Use bootserver on network, found my multicast or broadcast.
pxe-service=x86PC, “Install windows from RIS server”, 1, 1.2.3.4
Use bootserver at a known IP address.
multicast-FTP
If you have multicast-FTP available, information for that can be passed in a similar way using options 1 to 5. See page 19 of http://download.intel.com/design/archives/wfm/downloads/pxespec.pdf
enable-tftp
Enable dnsmasq's built-in TFTP server
tftp-root=/var/ftpd
Set the root directory for files available via FTP.
tftp-no-fail
Do not abort if the tftp-root is unavailable
tftp-secure
Make the TFTP server more secure: with this set, only files owned by the user dnsmasq is running as will be send over the net.
tftp-no-blocksize
This option stops dnsmasq from negotiating a larger blocksize for TFTP transfers. It will slow things down, but may rescue some broken TFTP clients.
dhcp-boot
dhcp-boot=tag:red,pxelinux.red-net
Set the boot file name only when the “red” tag is set.
dhcp-boot=/var/ftpd/pxelinux.0,boothost,192.168.0.3
An example of dhcp-boot with an external TFTP server: the name and IP address of the server are given after the filename.
Can fail with old PXE ROMS. Overridden by –pxe-service.
dhcp-boot=/var/ftpd/pxelinux.0,boothost,tftp_server_name
If there are multiple external tftp servers having a same name (using /etc/hosts) then that name can be specified as the tftp_servername (the third option to dhcp-boot) and in that case dnsmasq resolves this name and returns the resultant IP addresses in round robin fashion. This facility can be used to load balance the tftp load among a set of servers.
dhcp-lease
dhcp-lease-max=150
Set the limit on DHCP leases, the default is 150
dhcp-leasefile=/var/lib/misc/dnsmasq.leases
The DHCP server needs somewhere on disk to keep its lease database.
This defaults to a sane location, but if you want to change it, use the line below.
dhcp-authoritative
Set the DHCP server to authoritative mode. In this mode it will barge in and take over the lease for any client which broadcasts on the network, whether it has a record of the lease or not. This avoids long timeouts when a machine wakes up on a new network. DO NOT enable this if there's the slightest chance that you might end up accidentally configuring a DHCP server for your campus/company accidentally. The ISC server uses the same option, and this URL provides more information: http://www.isc.org/files/auth.html
dhcp-rapid-commit
Set the DHCP server to enable DHCPv4 Rapid Commit Option per RFC 4039.
In this mode it will respond to a DHCPDISCOVER message including a Rapid Commit option with a DHCPACK including a Rapid Commit option and fully committed address and configuration information. This must only be enabled if either the server is the only server for the subnet, or multiple servers are present and they each commit a binding for all clients.
dhcp-script=/bin/echo
Run an executable when a DHCP lease is created or destroyed.
The arguments sent to the script are “add” or “del”, then the MAC address, the IP address and finally the hostname if there is one.
cache-size=150
Set the cachesize here.
no-negcache
If you want to disable negative caching, uncomment this.
local-ttl= Normally responses which come from /etc/hosts and the DHCP lease file have Time-To-Live set as zero, which conventionally means do not cache further. If you are happy to trade lower load on the server for potentially stale date, you can set a time-to-live (in seconds) here.
bogus-nxdomain=64.94.110.11
If you want dnsmasq to detect attempts by Verisign to send queries to unregistered .com and .net hosts to its sitefinder service and have dnsmasq instead return the correct NXDOMAIN response, uncomment this line. You can add similar lines to do the same for other registries which have implemented wildcard A records.
alias
If you want to fix up DNS results from upstream servers, use the alias option. This only works for IPv4.
alias=1.2.3.4,5.6.7.8
This alias makes a result of 1.2.3.4 appear as 5.6.7.8
alias=1.2.3.0,5.6.7.0,255.255.255.0
and this maps 1.2.3.x to 5.6.7.x
alias=192.168.0.10-192.168.0.40,10.0.0.0,255.255.255.0
and this maps 192.168.0.10→192.168.0.40 to 10.0.0.10→10.0.0.40
MX records
Change these lines if you want dnsmasq to serve MX records.
mx-host=maildomain.com,servermachine.com,50
Return an MX record named “maildomain.com” with target servermachine.com and preference 50
mx-target=servermachine.com
Set the default target for MX records created using the localmx option.
localmx
Return an MX record pointing to the mx-target for all local machines.
selfmx
Return an MX record pointing to itself for all local machines.
srv-host
Change the following lines if you want dnsmasq to serve SRV records. These are useful if you want to serve ldap requests for Active Directory and other windows-originated DNS requests.
See RFC 2782.
You may add multiple srv-host lines.
The fields are <name>,<target>,<port>,<priority>,<weight>
If the domain part if missing from the name (so that is just has the service and protocol sections) then the domain given by the domain= config option is used. (Note that expand-hosts does not need to be set for this to work.)
srv-host=_ldap._tcp.example.com,ldapserver.example.com,389
A SRV record sending LDAP for the example.com domain to ldapserver.example.com port 389
domain=example.com
srv-host=_ldap._tcp,ldapserver.example.com,389
A SRV record sending LDAP for the example.com domain to ldapserver.example.com port 389 (using domain=)
srv-host=_ldap._tcp.example.com,ldapserver.example.com,389,1
srv-host=_ldap._tcp.example.com,ldapserver.example.com,389,2
Two SRV records for LDAP, each with different priorities
srv-host=_ldap._tcp.example.com
A SRV record indicating that there is no LDAP server for the domain example.com
ptr-record=_http._tcp.dns-sd-services,“New Employee Page._http._tcp.dns-sd-services”
The following line shows how to make dnsmasq serve an arbitrary PTR record. This is useful for DNS-SD. (Note that the domain-name expansion done for SRV records _does_not occur for PTR records.)
txt-record
Change the following lines to enable dnsmasq to serve TXT records.
These are used for things like SPF and zeroconf. (Note that the domain-name expansion done for SRV records _does_not occur for TXT records.)
txt-record=example.com,“v=spf1 a -all”
Example SPF.
txt-record=_http._tcp.example.com,name=value,paper=A4
Example zeroconf
cname=bertand,bert
Provide an alias for a “local” DNS name. Note that this _only_ works for targets which are names from DHCP or /etc/hosts. Give host “bert” another name, bertrand
log-queries
For debugging purposes, log each DNS query as it passes through dnsmasq.
log-dhcp
Log lots of extra information about DHCP transactions.
conf-file=/etc/dnsmasq.more.conf
conf-dir=/etc/dnsmasq.d
Include another lot of configuration options.
conf-dir=/etc/dnsmasq.d,.bak
Include all the files in a directory except those ending in .bak
conf-dir=/etc/dnsmasq.d/,*.conf
Include all files in a directory which end in .conf
dhcp-name-match=set:wpad-ignore,wpad
dhcp-ignore-names=tag:wpad-ignore
If a DHCP client claims that its name is “wpad”, ignore that.
This fixes a security hole. see CERT Vulnerability VU#598349

Voir aussi


Basé sur « Article » par Auteur.