"Fossies" - the Fresh Open Source Software Archive  

Source code changes of the file "nsd.conf.sample.in" between
nsd-4.3.5.tar.gz and nsd-4.3.6.tar.gz

About: NSD is an authoritative only, high performance, simple name server daemon.

nsd.conf.sample.in  (nsd-4.3.5):nsd.conf.sample.in  (nsd-4.3.6)
skipping to change at line 258 skipping to change at line 258
# Default is "" (disabled). Requires restart to take effect. # Default is "" (disabled). Requires restart to take effect.
# tls-service-key: "path/to/privatekeyfile.key" # tls-service-key: "path/to/privatekeyfile.key"
# tls-service-pem: "path/to/publiccertfile.pem" # tls-service-pem: "path/to/publiccertfile.pem"
# tls-service-ocsp: "path/to/ocsp.pem" # tls-service-ocsp: "path/to/ocsp.pem"
# tls-port: 853 # tls-port: 853
# DNSTAP config section, if compiled with that # DNSTAP config section, if compiled with that
# dnstap: # dnstap:
# set this to yes and set one or more of dnstap-log-..-messages to yes. # set this to yes and set one or more of dnstap-log-..-messages to yes.
# dnstap-enable: no # dnstap-enable: no
# dnstap-socket-path: "/var/run/dnstap.sock" # dnstap-socket-path: "@dnstap_socket_path@"
# dnstap-send-identity: no # dnstap-send-identity: no
# dnstap-send-version: no # dnstap-send-version: no
# dnstap-identity: "" # dnstap-identity: ""
# dnstap-version: "" # dnstap-version: ""
# dnstap-log-auth-query-messages: no # dnstap-log-auth-query-messages: no
# dnstap-log-auth-response-messages: no # dnstap-log-auth-response-messages: no
# Remote control config section. # Remote control config section.
remote-control: remote-control:
# Enable remote control with nsd-control(8) here. # Enable remote control with nsd-control(8) here.
# set up the keys and certificates with nsd-control-setup. # set up the keys and certificates with nsd-control-setup.
# control-enable: no # control-enable: no
# what interfaces are listened to for control, default is on localhost. # what interfaces are listened to for control, default is on localhost.
# interfaces can be specified by IP address or interface name.
# with an interface name, all IP addresses associated with that
# interface are used.
# with an absolute path, a unix local named pipe is used for control # with an absolute path, a unix local named pipe is used for control
# (and key and cert files are not needed, use directory permissions). # (and key and cert files are not needed, use directory permissions).
# control-interface: 127.0.0.1 # control-interface: 127.0.0.1
# control-interface: ::1 # control-interface: ::1
# control-interface: lo
# port number for remote control operations (uses TLS over TCP). # port number for remote control operations (uses TLS over TCP).
# control-port: 8952 # control-port: 8952
# nsd server key file for remote control. # nsd server key file for remote control.
# server-key-file: "@configdir@/nsd_server.key" # server-key-file: "@configdir@/nsd_server.key"
# nsd server certificate file for remote control. # nsd server certificate file for remote control.
# server-cert-file: "@configdir@/nsd_server.pem" # server-cert-file: "@configdir@/nsd_server.pem"
skipping to change at line 321 skipping to change at line 325
#name: "myzones" #name: "myzones"
# the zonefile for the zones that use this pattern. # the zonefile for the zones that use this pattern.
# if relative then from the zonesdir (inside the chroot). # if relative then from the zonesdir (inside the chroot).
# the name is processed: %s - zone name (as appears in zone:name). # the name is processed: %s - zone name (as appears in zone:name).
# %1 - first character of zone name, %2 second, %3 third. # %1 - first character of zone name, %2 second, %3 third.
# %z - topleveldomain label of zone, %y, %x next labels in name. # %z - topleveldomain label of zone, %y, %x next labels in name.
# if label or character does not exist you get a dot '.'. # if label or character does not exist you get a dot '.'.
# for example "%s.zone" or "zones/%1/%2/%3/%s" or "secondary/%z/%s" # for example "%s.zone" or "zones/%1/%2/%3/%s" or "secondary/%z/%s"
#zonefile: "%s.zone" #zonefile: "%s.zone"
# The allow-query allows an access control list to be specified
# for a zone to be queried. Without an allow-query option, any
# IP address is allowed to send queries for the zone.
# This could be useful for example to not leak content from a zone
# which is only offered for transfer to secondaries over TLS.
#allow-query: 192.0.2.0/24 NOKEY
# If no master and slave access control elements are provided, # If no master and slave access control elements are provided,
# this zone will not be served to/from other servers. # this zone will not be served to/from other servers.
# A master zone needs notify: and provide-xfr: lists. A slave # A master zone needs notify: and provide-xfr: lists. A slave
# may also allow zone transfer (for debug or other secondaries). # may also allow zone transfer (for debug or other secondaries).
# notify these slaves when the master zone changes, address TSIG|NOKEY # notify these slaves when the master zone changes, address TSIG|NOKEY
# IP can be ipv4 and ipv6, with @port for a nondefault port number. # IP can be ipv4 and ipv6, with @port for a nondefault port number.
#notify: 192.0.2.1 NOKEY #notify: 192.0.2.1 NOKEY
# allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED # allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED
# address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40 # address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40
 End of changes. 4 change blocks. 
1 lines changed or deleted 12 lines changed or added

Home  |  About  |  Features  |  All  |  Newest  |  Dox  |  Diffs  |  RSS Feeds  |  Screenshots  |  Comments  |  Imprint  |  Privacy  |  HTTP(S)