-
Jan Kadlec authored163c01e0
Knot DNS Configuration Reference
This reference describes every configuration option in Knot DNS server.
system
Statement
The system
statement contains general options related to the
operating system and other general options which do not fit anywhere
else.
system
Syntax
system {
[ identity ( on | "string" ); ]
[ version ( on | "string" ); ]
[ nsid ( on | "string" | hex_string ); ]
[ rundir "string"; ]
[ pidfile "string"; ]
[ workers integer; ]
[ background-workers integer; ]
[ asynchronous-start ( on | off ); ]
[ user string[.string]; ]
[ max-conn-idle ( integer | integer(s | m | h | d); ) ]
[ max-conn-handshake ( integer | integer(s | m | h | d); ) ]
[ max-conn-reply ( integer | integer(s | m | h | d); ) ]
[ transfers integer; ]
[ rate-limit integer; ]
[ rate-limit-size integer; ]
[ rate-limit-slip integer; ]
[ max-udp-payload integer; ]
}
system
Statement Definition and Usage
identity
Identity of the server returned in a response for the query for TXT
record id.server.
or hostname.bind.
in the CHAOS class (see
RFC4892).
If not specified or empty, the server returns REFUSED status code. If
a boolean value of on
is used, FQDN hostname is used as a default.
system {
identity "ns01.example.com";
identity on;
}
version
Version of the server software returned in a response for the query
for TXT record version.server.
or version.bind.
in the CHAOS
class (see RFC4892).
Option allows a boolean value on|off
, if on
, automatic version
string is set as a default. If not specified or empty, the server
returns REFUSED status code.
system {
version "Knot DNS 1.3.0";
version on; # Reports current version
}
nsid
DNS Name Server Identifier (see RFC5001).
Use a string format "text" or a hexstring (e.g. 0x01ab00) If a
boolean value of on
is used, FQDN hostname is used as a default.
system {
nsid 0x00cafe;
nsid "cafe";
nsid on;
}
rundir
Path for storing run-time data, for example PID file and unix sockets.
Default value: ${localstatedir}/run/knot
, configured with
--with-rundir=path
system {
rundir "/var/run/knot";
}
pidfile
Specifies a custom PID file location.
Default value: knot.pid
in rundir
directory.
system {
pidfile "/var/run/knot/knot_dmz.pid";
}
workers
Number of workers (threads) per server interface. This option is used to force number of threads used per interface.
Default value: unset (auto-estimates optimal value from the number of online CPUs)
system {
workers 16;
}
background-workers
This option is used to set number of threads used to execute background operations (e.g., zone loading, zone signing, XFR zone updates, ...).
Default value: unset (auto-estimates optimal value for the number of online CPUs)
system {
background-workers 4;
}
asynchronous-start
When asynchronous startup is enabled, server doesn't wait for the zones to be loaded, and starts responding immediately with SERVFAIL answers until the zone loads. This may be useful in some scenarios, but it is disabled by default.
Default value: off
(wait for zones to be loaded before answering)
system {
asynchronous-start off;
}
user
System user
or user
.``group`` under which the Knot DNS is run
after starting and binding to interfaces. Linux capabilities
(:ref:`Required libraries`) are employed if supported and this
configuration option is set.
Default value: root.root
system {
user knot.knot;
}
max-conn-idle
Maximum idle time between requests on a TCP connection. This also limits receiving of a single query, each query must be received in this time limit.
max-conn-handshake
Maximum time between newly accepted TCP connection and first query. This is useful to disconnect inactive connections faster, than connection that already made at least 1 meaningful query.
max-conn-reply
Maximum time to wait for a reply to an issued SOA query.
transfers
Maximum parallel transfers, including pending SOA queries. Lowest possible number is the number of CPUs. Default is 10.
rate-limit
Rate limiting is based on a token bucket scheme, rate basically represents number of tokens available each second. Each response is processed and classified (based on a several discriminators, f.e. source netblock, qtype, name, rcode, etc.). Classified responses are then hashed and assigned to a bucket containing number of available tokens, timestamp and metadata. When available tokens are exhausted, response is rejected or enters SLIP (server responds with a truncated response). Number of available tokens is recalculated each second.
Default value: 0 (disabled)
rate-limit-size
Option controls the size of a hashtable of buckets. The larger the
hashtable, the lesser probability of a hash collision, but at the
expense of additional memory costs. Each bucket is estimated roughly
to 32B. Size should be selected as a reasonably large prime due to
the better hash function distribution properties. Hash table is
internally chained and works well up to a fill rate of 90%, general
rule of thumb is to select a prime near 1.2 * maximum_qps
.
Default value: 393241
rate-limit-slip
As attacks using DNS/UDP are usually based on a forged source address, an attacker could deny services to the victim netblock if all responses would be completely blocked. The idea behind SLIP mechanism is to send each Nth response as truncated, thus allowing client to reconnect via TCP for at least some degree of service. It is worth noting, that some responses can't be truncated (f.e. SERVFAIL).
Default value: 1
max-udp-payload
Maximum EDNS0 UDP payload size.
Default value: 4096
system Example
system {
identity "Knot DNS |version|";
version "|version|";
nsid "amaterasu";
rundir "/var/run/knot";
workers 16;
user knot.knot;
max-udp-payload 4096;
}
keys
Statement
The keys
statement sets up the TSIG keys used to authenticate
zone transfers.
keys Syntax
keys {
key_id algorithm "string";
[ key_id algorithm "string"; ... ]
}
Statement Definition and Usage
key_id
Statement
The key_id
statement defines a secret shared key for use with
TSIG. It consists of its name
, algorithm
and key
contents.
Supported algoritms:
- hmac-md5
- hmac-sha1
- hmac-sha224
- hmac-sha256
- hmac-sha384
- hmac-sha512
You need to use bind or ldns utils to generate TSIG keys. Unfortunately, Knot DNS does not have any own generation utilities yet.
$ dnssec-keygen -a HMAC-SHA256 -b 256 -n HOST foobar.example.com
Kfoobar.example.com.+163+21239
$ cat Kfoobar.example.com.+163+21239.key
foobar.example.com. ( IN KEY 512 3 163
rqv2WRyDgIUaHcJi03Zssor9jtG1kOpb3dPywxZfTeo= )
Key generated in previous paragraph would be written as:
keys {
foobar.example.com. hmac-sha256
"rqv2WRyDgIUaHcJi03Zssor9jtG1kOpb3dPywxZfTeo=";
}
keys Example
keys {
key0.server0 hmac-md5 "Wg==";
foobar.example.com. hmac-sha256 "RQ==";
}
interfaces
Statement
The interfaces
statement contains IP interfaces where Knot DNS
listens for incoming queries.
interfaces
Syntax
interfaces {
interface_id
( ip_address[@port_number] |
{ address ip_address; [ port port_number; ] @} )
[ interface_id ...; ...; ]
}
interfaces
Statement Definition and Usage
interface_id
The interface_id
is a textual identifier of an IP interface, which
consists of an IP address and a port.
The definition of an interface can be written in long or a short form and it always contains IP (IPv4 or IPv6) address.
interfaces
Example
Long form:
interfaces {
my_ip {
address 192.0.2.1;
port 53;
}
}
Short form:
interfaces {
my_second_ip { address 198.51.100.1@53; }
}
Short form without port (defaults to 53):
interfaces {
my_third_ip { address 203.0.113.1; }
}
remotes
Statement
The remotes
statement sets up all remote servers for zone
transfers. Knot DNS does not distinguish between client or server in
this section. Role of the server is determined at the time of its
usage in the zones
section. One server may act as a client for
one zone (e.g. downloading the updates) and as a master server for a
different zone.
remotes
Syntax
remotes {
remote_id
( ip_address[@port_number] |
{ address ip_address;
[ port port_number; ]
[ key key_id; ]
[ via [ interface_id | ip_address ]; ]
}
)
[ remote_id ...; ...; ]
}
remotes
Statement Definition and Grammar
remote_id
remote_id
contains a symbolic name for a remote server.
address
address
sets an IPv4 or an IPv6 address for this particular
remote
.
port
port
section contains a port number for the current remote
.
This section is optional with default port set to 53.
key
key
section contains a key associated with this remote
. This
section is optional.
via
via
section specifies which interface will be used to communicate
with this remote
. This section is optional.
remotes
Example
remotes {
# Long form:
server0 {
address 127.0.0.1;
port 53531;
key key0.server0;
via ipv4; # reference to interface named ipv4
# via 82.35.64.59; # direct IPv4
# via [::cafe]; # direct IPv6
}
# Short form:
server1 {
address 127.0.0.1@53001;
}
}
groups
Statement
The groups
statement is used to create groups of remote machines
defined in :ref:`remotes` statement. The group can substitute multiple
machines specification anywhere in the configuration where the list of
remotes is allowed to be used (namely allow
in :ref:`control`
section and ACLs in :ref:`zones` section).
The remotes definitions must exist prior to using them in group definitions. One remote can be a member of multiple groups.
groups
Syntax
groups {
group_id { remote_id [ , ... ] }
[ ... ]
}
groups
Statement Definition and Grammar
group_id
group_id
contains a symbolic name for a group of remotes.
remote_id
remote_id
contains a symbolic name for a remote server as
specified in :ref:`remotes` section.
groups
Example
remotes {
ctl {
# ...
}
alice {
# ...
}
bob {
# ...
}
}
groups {
admins { alice, bob }
}
# example usage:
control {
# ...
allow ctl, admins;
}
control
Statement
The control
statement specifies on which interface to listen for
remote control commands. Caution: The control protocol is not
encrypted, and susceptible to replay attack in a short timeframe until
message digest expires, for that reason, it is recommended to use
default UNIX sockets.
control
Syntax
control {
[ listen-on {
( address ip_address[@port_number] |
{ address ip_address; [ port port_number; ] } )
} ]
[ allow remote_id [, remote_id, ... ]; ]
}
control
Statement Definition and Grammar
Control interface listen-on
either defines a UNIX socket or an
IPv4/IPv6 interface
definition as in :ref:`interfaces`. Default
port for IPv4/v6 control interface is 5533
, however UNIX socket is
preferred. UNIX socket address is relative to rundir
if not
specified as an absolute path. Without any configuration, the socket
will be created in rundir/knot.sock
.
control
Examples
UNIX socket example:
control {
listen-on "/var/run/knot/knot.sock";
}
IPv4 socket example:
keys {
knotc-key hmac-md5 "Wg==";
}
remotes {
ctl { address 127.0.0.1; key knotc-key; }
}
control {
listen-on { address 127.0.0.1; }
allow ctl;
}
zones
Statement
The zones
statement contains definition of zones served by Knot DNS.
zones
Syntax
zones {
[ zone_options ]
zone_id {
file "string";
[ xfr-in remote_id [, remote_id, ... ]; ]
[ xfr-out remote_id [, remote_id, ... ]; ]
[ notify-in remote_id [, remote_id, ... ]; ]
[ notify-out remote_id [, remote_id, ... ]; ]
[ update-in remote_id [, remote_id, ... ]; ]
[ zone_options ]
}
}
zone_options :=
[ storage "string"; ]
[ semantic-checks boolean; ]
[ ixfr-from-differences boolean; ]
[ disable-any boolean; ]
[ notify-timeout integer; ]
[ notify-retries integer; ]
[ zonefile-sync ( integer | integer(s | m | h | d); ) ]
[ ixfr-fslimit ( integer | integer(k | M | G) ); ]
[ ixfr-from-differences boolean; ]
[ dnssec-keydir "string"; ]
[ dnssec-enable ( on | off ); ]
[ signature-lifetime ( integer | integer(s | m | h | d); ) ]
[ serial-policy ( increment | unixtime ); ]
[ query_module { module_name "string"; [ module_name "string"; ... ] } ]
zones
Statement Definition and Grammar
zone_id
zone_id
is a zone origin, and as such is a domain name that may or
may not end with a ".". If no $ORIGIN directive is found inside
actual zone file, this domain name will be used in place of "@". SOA
record in the zone must have this name as its owner.
file
The file
statement defines a path to the zone file. You can
either use an absolute path or a relative path. In that case, the
zone file path will be relative to the storage
directory
(:ref:`storage`).
xfr-in
In xfr-in
statement user specifies which remotes will be permitted
to perform a zone transfer to update the zone. Remotes are defined in
remotes
section of configuration file (:ref:`remotes`).
xfr-out
In xfr-out
statement user specifies which remotes will be
permitted to obtain zone's contents via zone transfer. Remotes are
defined in remotes
section of configuration file
(:ref:`remotes`).
notify-in
notify-in
defines which remotes will be permitted to send NOTIFY
for this particular zone. Remotes are defined in remotes
section
of configuration file (:ref:`remotes`).
notify-out
notify-out
defines to which remotes will your server send NOTIFYs
about this particular zone. Remotes are defined in remotes
section of configuration file (:ref:`remotes`).
update-in
In update-in
statement user specifies which remotes will be
permitted to perform a DNS UPDATE. Remotes are defined in remotes
section of configuration file (:ref:`remotes`).
query_module
Statement query_module
takes a list of module_name
"config_string"
query modules separated by semicolon.
storage
Data directory for zones. It is used to store zone files and journal files. If compiled with LMDB support, a database storing persistent zone
event timers will also be created in the timers
subdirectory.
Value of storage
set in zone
section is relative to
storage
in zones
section.
Default value (in zones
section): ${localstatedir}/lib/knot
,
configured with --with-storage=path
Default value (in zone
config): inherited from zones
section
zones {
storage "/var/lib/knot";
example.com {
storage "com";
file "example.com"; # /var/lib/knot/com/example.com
}
}
semantic-checks
semantic-checks
statement turns on optional semantic checks for
this particular zone. See :ref:`zones List of zone semantic checks` for
more information.
Possible values are on
and off
. Most checks are disabled by
default.
ixfr-from-differences
Option ixfr-from-differences
is only relevant if you are running
Knot DNS as a master for this zone. By turning the feature on you
tell Knot to create differences from changes you made to a zone file
upon server reload. See :ref:`Controlling running daemon` for more
information.
Possible values are on
and off
. Disabled by default.
disable-any
If you enable disable-any
, all authoritative ANY queries sent over
UDP will be answered with an empty response and with the TC bit set.
Use to minimize the risk of DNS reflection attack. Disabled by default.
notify-timeout
notify-timeout
in seconds specifies how long will server wait for
NOTIFY response. Possible values are 1 to INT_MAX. By default, this
value is set to 60 seconds.
notify-retries
notify-retries
tells the server how many times it can retry to
send a NOTIFY. Possible values are 1 to INT_MAX and default value
is 5.
zonefile-sync
zonefile-sync
specifies a time in seconds after which current zone
in memory will be synced to zone file on the disk (as set in
:ref:`file`). Knot DNS will serve the latest zone even after restart,
but zone file on a disk will only be synced after zonefile-sync
time has expired (or synced manually via knotc flush
- see
:ref:`Running Knot DNS`). This is applicable when the zone is updated
via IXFR, DDNS or automatic DNSSEC signing. Possible values are 0 to
INT_MAX, optionally suffixed by unit size (s/m/h/d) - 1s is one
second, 1m one minute, 1h one hour and 1d one day
with default value set to 0s.
Important note: If you are serving large zones with frequent updates where the immediate sync to zone file is not desirable, set this value in the configuration file to other value.
ixfr-fslimit
ixfr-fslimit
sets a maximum file size for zone's journal in bytes.
Possible values are 1 to INT_MAX, with optional suffixes k, m and G.
I.e. 1k, 1m and 1G with default value not being set, meaning
that journal file can grow without limitations.
dnssec-keydir
Location of DNSSEC signing keys, relative to storage
.
Default value: not set
dnssec-enable
PREVIEW: Enable automatic DNSSEC signing for the zone.
Default value (in zones
section): off
Default value (in zone
config): inherited from zones
section
signature-lifetime
Specifies how long should the automatically generated DNSSEC signatures be valid.
Expiration will thus be set as current time (in the moment of signing)
+ signature-lifetime
. Possible values are from 10801 to INT_MAX.
The signatures are refreshed one tenth of the signature lifetime
before the signature expiration (i.e., 3 days before the expiration
with the default value). For information about zone expiration date,
invoke the knotc zonestatus
command.
Default value: 30d
(2592000
)
serial-policy
Specifies how the zone serial is updated after DDNS (dynamic update) and automatic DNSSEC signing. If the serial is changed by the dynamic update, no change is made.
-
increment
- After update or signing, the serial is automatically incremented (according to serial number arithmetic). -
unixtime
- After update or signing, serial is set to the current unix time.
Warning: If your serial was in other than unix time format, be careful with transition to unix time. It may happen that the new serial will be 'lower' than the old one. If this is the case, the transition should be done by hand (see RFC1982).
Default value: increment
zones
Example
zones {
# Shared options for all listed zones
storage "/var/lib/knot";
ixfr-from-differences off;
semantic-checks off;
disable-any off;
notify-timeout 60;
notify-retries 5;
zonefile-sync 0;
ixfr-fslimit 1G;
dnssec-enable on;
dnssec-keydir "keys";
signature-lifetime 60d;
serial-policy increment;
example.com {
storage "samples";
file "example.com.zone";
ixfr-from-differences off;
disable-any off;
semantic-checks on;
notify-timeout 60;
notify-retries 5;
zonefile-sync 0;
dnssec-keydir "keys";
dnssec-enable off;
signature-lifetime 30d;
serial-policy increment;
xfr-in server0;
xfr-out server0, server1;
notify-in server0;
notify-out server0, server1;
}
}
zones
List of zone semantic checks
The semantic-checks
statement turns on extra zone file semantic
checks. Several checks are enabled by default and cannot be turned
off. If an error is found using these mandatory checks, the zone file
will not be loaded. Upon loading a zone file, occurred errors and
counts of their occurrence will be logged to stderr. These
checks are the following:
- An extra record together with CNAME record (except for RRSIG and DS)
- CNAME link chain length greater than 10 (including infinite cycles)
- DNAME and CNAME records under the same owner (RFC 2672)
- CNAME and DNAME wildcards pointing to themselves
- SOA record missing in the zone (RFC 1034)
- DNAME records having records under it (DNAME children) (RFC 2672)
Following checks have to be turned on using semantic-checks
and a
zone containing following errors will be loaded even upon discovering
an error:
- Missing NS record at the zone apex
- Missing glue A or AAAA records
- Broken or non-cyclic NSEC(3) chain
- Wrong NSEC(3) type bitmap
- Multiple NSEC records at the same node
- Missing NSEC records at authoritative nodes
- Extra record types under same name as NSEC3 record (this is RFC-valid, but Knot will not serve such a zone correctly)
- NSEC3-unsecured delegation that is not part of Opt-out span
- Wrong original TTL value in NSEC3 records
- Wrong RDATA TTL value in RRSIG record
- Signer name in RRSIG RR not the same as in DNSKEY
- Signed RRSIG
- Not all RRs in node are signed
- Wrong key flags or wrong key in RRSIG record (not the same as ZSK)
log
Statement
log
Syntax
log {
[ log_name {
[ category severity; ]
} ]
[ log_file filename {
[ category severity; ]
} ]
}
log
Statement Definition and Grammar
The log
statement configures logging output of Knot DNS. You can
configure Knot DNS to log into file or system log. There are several
logging categories to choose from. Each log message has its severity
and user can configure severities for each log destination.
In case of missing log section, severities from warning
and more
serious will be logged to both stderr
and syslog
. The
info
and notice
severities will be logged to the stdout
.
log_name
log_name
should be replaced with one of 3 symbolic log names:
-
stdout
- logging to standard output -
stderr
- logging to standard error output -
syslog
- logging to syslog
category
Knot DNS allows user to choose from these logging categories:
-
server
- Messages related to general operation of the server. -
zone
- Messages related to zones, zone parsing and loading. -
any
- All categories.
severity
Knot DNS has the following logging severities:
-
debug
- Debug messages, must be turned on at compile time (:ref:`Enabling debug messages in server`). -
info
- Informational message. -
notice
- Server notices and hints. -
warning
- Warnings that might require user action. -
error
- Recoverable error. Action should be taken. -
critical
- Non-recoverable error resulting in server shutdown.
Each severity level includes all more serious levels, i.e. warning
severity
also includes error
and critical
severities.
log_file
log_file
is either absolute or relative path to file user wants to
log to. See following example for clarification.