Commit graph

36 commits

Author SHA1 Message Date
ohdearaugustin
5da2ce698f Fix idempotency create file 2022-04-05 23:01:09 +02:00
Pig Monkey
03261a8744 unbound does not depend on openresolv
But make sure the config file exists so Unbound doesn't choke when
starting.
2021-10-21 18:29:52 -07:00
Pig Monkey
04b62197a1 increase randomized delay of persistent timers
This reduces the chance of a timer executing a time consuming service
close to boot, potentially speeding up boot (or at least making
`systemd-analyze blame` look better).
2021-02-17 18:16:36 -08:00
Pig Monkey
06e04a8ad3 unbound depends on nmtrust for root hit udpate timer 2020-12-31 18:43:53 -08:00
Pig Monkey
e716310608 unbound and networkmanager depend on openresolv 2020-01-22 19:27:46 -08:00
Pig Monkey
79e940c631 support forwarding LAN zones to local LAN DNS
With this option enabled, if you connect to a local network which claims
to serve DNS for `mycorp.com`, unbound will forward DNS requests for
that domain to the local network DNS resolver.

If you connect to a local network which claims to serve DNS for a domain
like `mynetwork.lan` or `local.mesh`, and you have those domains
whitelisted in the `unbound.private_domains` var, you will be able to
successfully resolve those hostnames.

The `private_interfaces` option prevents forwarding the root zone to the
local network resolver. If the network claims to provide DNS for
`mycorp.com` and everything else, requests for `mycorp.com` will go to
the network's resolver, but requests for every other domain will still go
through unbound to the nameservers specified in the
`unbound.nameservers` var.
2020-01-22 19:13:27 -08:00
Pig Monkey
987a7d388e move openresolv to its own role 2020-01-22 19:08:01 -08:00
Pig Monkey
cffd55bdb6 support optional private domains in unbound dns
This will have no effect, unless you use my default list of
private domains in `group_vars/all`.
2020-01-22 19:00:39 -08:00
Pig Monkey
4ad216326b only force tls in the default unbound forward zone
This change has no effect on the default setup, but will allow the user
to add other forward-zones entry that do not support TLS.
2020-01-22 18:47:56 -08:00
Pig Monkey
6acdd37ced reformat yml 2019-09-19 16:18:14 -07:00
Pig Monkey
1a3d384708 reenable unbound chroot
Upstream has patched to make disabling this unnecessary.

https://bugs.archlinux.org/task/61163#comment181887
2019-09-19 14:13:24 -07:00
Pig Monkey
7466a2f4c6 merge in default unbound.conf updates
Disabling the chroot is apparently needed to allow Unbound to
communicate with the systemd notification service in the new service
file: https://bugs.archlinux.org/task/61163
2019-09-18 13:01:19 -07:00
Pig Monkey
41cbcb6f1c do not firejail unbound
Arch now uses Unbound's default systemd service file, which includes
hardening that conflicts with Firejail. But theoretically this should
all be good enough so we can just drop Firejail from this role?

Existing users should delete the override.

    # rm -r /etc/systemd/system/unbound.service.d

https://bugs.archlinux.org/task/61163
2019-09-18 12:59:04 -07:00
Pig Monkey
f8893fe292 update roothints monthly 2019-09-11 18:54:08 -07:00
Pig Monkey
fc80e7ce2e enable dnssec 2019-09-11 18:53:58 -07:00
Pig Monkey
cddf4131db specify auth name and cert location for dns over tls 2019-09-11 18:50:22 -07:00
Pig Monkey
81b14e8868 always download latest root hints from internic 2018-04-03 19:08:38 -07:00
Pig Monkey
231c760415 default to dns over tls 2018-04-03 19:03:39 -07:00
Pig Monkey
c657841718 namespace unbound vars 2018-04-03 19:02:58 -07:00
Pig Monkey
17eece1ad0 remove unbound host blocking 2017-03-19 17:09:12 -07:00
Pig Monkey
a6ffb394d1 update local blocking hosts 2016-12-26 16:00:47 -08:00
Pig Monkey
5622e90993 make nameservers configurable
I chose the defaults based on namebench results. Users in other
geographical areas likely want to choose other servers.
2016-09-10 14:09:51 -07:00
Pig Monkey
eadf72bad7 make unbound.conf a template 2016-09-10 14:07:01 -07:00
Pig Monkey
440c5a5688 update ad block hosts 2016-08-31 20:46:23 -07:00
Pig Monkey
96bf3c69c5 update ad hosts 2016-04-02 13:35:18 -07:00
Pig Monkey
cf8e7269fd include root hints 2016-04-02 13:32:08 -07:00
Pig Monkey
48912b59db add handlers
This should mostly eliminate the need to manually reload/restart
services (or reboot the machine) after updates.
2016-01-30 16:01:47 -08:00
Pig Monkey
7a6d602dcb add localhost to resolvconf 2016-01-20 18:03:11 -08:00
Pig Monkey
841ba28471 properly set firejail dependent roles 2016-01-18 22:21:07 -08:00
Pig Monkey
0b62437c1b properly kill jailed unbound
/run/unbound.pid will hold the PID of unbound inside of the jail
(usually something like 2), which is not useful for systemd. It will try
to kill that PID and fail (eventually timing out).

Editing /usr/lib/systemd/system/unbound.service is super lame and should
never be done, but I can't figure out how to clear the PIDFile line just
by editing our unit override.
2016-01-14 17:23:52 -08:00
Pig Monkey
652b1c1d54 firejail unbound 2016-01-13 15:51:09 -08:00
Pig Monkey
d496d7a1d3 update unbound blocked hosts 2016-01-11 18:56:26 -08:00
Pig Monkey
8b1bc82e7b set unbound private networks 2016-01-11 18:56:11 -08:00
Pig Monkey
fba3d339c6 set unbound username and directory 2016-01-11 18:55:54 -08:00
Pig Monkey
05be250360 update unbound block hosts
https://github.com/jodrell/unbound-block-hosts
2015-11-11 08:39:52 -08:00
Pig Monkey
b6c6dd140e initial commit 2015-09-06 15:51:37 -07:00