summaryrefslogtreecommitdiff
path: root/man/resolved.conf.xml
diff options
context:
space:
mode:
authorIwan Timmer <irtimmer@gmail.com>2018-06-11 21:33:57 +0200
committerIwan Timmer <irtimmer@gmail.com>2018-06-12 18:50:30 +0200
commit30e59c84d77ba3a1fc348408b3fca9e3eb40877a (patch)
treec62b3f7d27ab09cd97bd2e60408ef8dfaf9009fa /man/resolved.conf.xml
parentd050561ac3b3087ffcc0352db988518c120c1979 (diff)
downloadsystemd-30e59c84d77ba3a1fc348408b3fca9e3eb40877a.tar.gz
man: document DNS-over-TLS options
Diffstat (limited to 'man/resolved.conf.xml')
-rw-r--r--man/resolved.conf.xml32
1 files changed, 32 insertions, 0 deletions
diff --git a/man/resolved.conf.xml b/man/resolved.conf.xml
index e87aa59bae..67cc409440 100644
--- a/man/resolved.conf.xml
+++ b/man/resolved.conf.xml
@@ -207,6 +207,38 @@
</varlistentry>
<varlistentry>
+ <term><varname>PrivateDNS=</varname></term>
+ <listitem>
+ <para>Takes false or
+ <literal>opportunistic</literal>. When set to <literal>opportunistic</literal>
+ DNS request are attempted to send encrypted with DNS-over-TLS.
+ If the DNS server does not support TLS, DNS-over-TLS is disabled.
+ Note that this mode makes DNS-over-TLS vulnerable to "downgrade"
+ attacks, where an attacker might be able to trigger a downgrade
+ to non-encrypted mode by synthesizing a response that suggests
+ DNS-over-TLS was not supported. If set to false, DNS lookups
+ are send over UDP.</para>
+
+ <para>Note that DNS-over-TLS requires additional data to be
+ send for setting up an encrypted connection, and thus results
+ in a small DNS look-up time penalty.</para>
+
+ <para>Note as the resolver is not capable of authenticating
+ the server, it is vulnerable for "man-in-the-middle" attacks.</para>
+
+ <para>In addition to this global PrivateDNS setting
+ <citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>
+ also maintains per-link PrivateDNS settings. For system DNS
+ servers (see above), only the global PrivateDNS setting is in
+ effect. For per-link DNS servers the per-link
+ setting is in effect, unless it is unset in which case the
+ global setting is used instead.</para>
+
+ <para>Defaults to off.</para>
+ </listitem>
+ </varlistentry>
+
+ <varlistentry>
<term><varname>Cache=</varname></term>
<listitem><para>Takes a boolean argument. If "yes" (the default), resolving a domain name which already got
queried earlier will return the previous result as long as it is still valid, and thus does not result in a new