File tree Expand file tree Collapse file tree 3 files changed +53
-0
lines changed Expand file tree Collapse file tree 3 files changed +53
-0
lines changed Original file line number Diff line number Diff line change 1+ # IETF configs
2+
3+ ## Description
4+ These are example DNS-over-TLS configs for IETF meetings.
5+
6+ ```
7+ stunnel.conf # The stunnel config we use on the servers.
8+ unbound.conf # Unbound config for IETF.
9+ ```
Original file line number Diff line number Diff line change 1+ ; stunnel configuration for dprive (DNS privacy) --sra 2017-07-14
2+ ; See the stunnel man page for details on what all of this does.
3+
4+ ; Drop privs after starting
5+ setuid = stunnel
6+ setgid = stunnel
7+
8+ ; Where to find our TLS certificate and key. The certificate is our
9+ ; usual Let's Encrypt certificate, obtained using acme-tiny.
10+
11+ cert = /path/to/certificate-chain.cer
12+ key = /path/to/private.key
13+
14+ ; Apparently stunnel drops privs before writing the PID file, so
15+ ; put the PID file in a directory where we have write permission.
16+
17+ pid = /var/run/stunnel/stunnel.pid
18+
19+ ; Now run the proxy itself. Depending on the platform on which you're
20+ ; running this, you may need one or both of these (netstat is your friend).
21+ ; On FreeBSD, TCPv4 and TCPv6 are totally separate, so we need two sockets.
22+ ; On Linux, the TCPv6 case may cover both. On any platform, the exact
23+ ; behavior may depend on sysctl settings or the like, so test your work.
24+
25+ [dprive4]
26+ accept = 853
27+ connect = 53
28+
29+ [dprive6]
30+ accept = :::853
31+ connect = 53onnect = 53
Original file line number Diff line number Diff line change 1+ # Experiment at IETF 99
2+ server:
3+ tcp-upstream: yes
4+ ssl-upstream: yes
5+
6+ forward-zone:
7+ name: "."
8+ forward-addr: 2001:67c:370:229::6@853
9+ forward-addr: 2001:67c:370:229::7@853
10+ forward-first: no
11+
12+ # Unbound does not authenticate the upstream so we don't add the keys!
13+
You can’t perform that action at this time.
0 commit comments