The configuration file config/server.conf
in the NameSurfer directory tree contains
a number of configurable settings in a simple, human-readable text
format. It is read by the NameSurfer primary DNS server process on startup. Changes made to this file will not take effect
until the process is killed and restarted.
Each setting is entered on a line of its own as a "name: value" pair.
Empty lines and comments beginning with a # character are allowed.
The following settings are supported:
The IP address of this host (the host on which NameSurfer primary name
server runs). This address is used by the secondary name servers to
perform zone transfers.
When set, NameSurfer daemon sends DNS NOTIFY messages only to
the servers specified in this list, and does not notify servers
listed in NS and ALSO_NOTIFY records.
A soft limit on the maximum number of simultaneous
child processes that may be spawned by NameSurfer daemon.
Additional child processes may be created in above of this limit, but
their creation will be delayed in order to limit server load.
A limit on the size of network messages accepted by the server process.
This size limit should be large enough to contain all the data for your
largest zone, but small enough for a malicious user not to exhaust memory
by sending a giant message.
The IP address of a name server providing recursive name service, for
example, a BIND server. This is needed to resolve addresses for RFC1996
notify messages. If you run NameSurfer primary DNS server
and BIND on the same machine, this can simply be the machine's own
IP address.
The IP address of a name server providing recursive name service, for
example, a BIND server. If this option is defined, ordinary queries
for the zones NameSurfer is not authoritative for will be redirected
to this name server.
When true, RFC2136 DynDNS update messages will be accepted
allowing anyone on the Internet to make changes to the DNS
data. We strongly recommend against turning it on in customer
installations. When false, update messages are only accepted
from hosts whose IP addresses are defined in the option
"allow_insecure_updates_from".
Secure dynamic updates (that is, updates signed with a Transaction
Signature (TSIG)) are always accepted.
A comma-separated list of the IP addresses of hosts that are allowed to
make insecure RFC2136 DynDNS updates. Note that the server cannot detect
IP address spoofing, so this option cannot be considered secure if the
server is reachable from the Internet. If empty, only secure dynamic
updates are accepted.
The syntax of list elements can be one of the following:
1. a single IP address like 10.10.10.10
2. IP address ranges, such as 10.10.10.10-11.11.11.11 or 10.10.10.10-17
3. IP subnetworks such as 10.10.10.0/24 or 10.10.10.0:255.255.255.240
This configuration option affects the operation of MX
selector boxes in the web user interface.
When true, MX record pointing back at the host
itself is treated as a special "MX pointing to self" token
rather than as an ordinary MX record pointing to the specific
host in question. This will reduce the number of alternatives
offered to the user in the MX selector box.
When true, the automatic serial number incrementation of NameSurfer is
based on the date. The serial number is incremented in
"yyyymmddnn" format. This format allows for a number of 100 changes per day.
When false, the serial number is incremented automatically by 1.
Strict DNS implementation does not allow multiple CNAMEs with the same name,
although some existing implementations (including BIND) do allow it. This option
is provided for compatibility with these implementations.
By default global ChangeLog contains only information about addition
and deletion of zones. All the changes made to existing zones are logged
in zone ChangeLog files. If this option is set to "true" changes made in
the zone are also duplicated to global ChangeLog.
This option controls secondary server update style. If set to "true"
it updates the secondary server in the "old" NameSurfer 3 style.
Which mens new zone is added to the secondary server immediatelly.
When true, FusionLayer NameSurfer daemon tries to look up IP addresses of the DNS servers to notify
from local database first, before attempting to resolve them through the recursive name server.
This setting is most useful when the recursive server relies on data provided by the FusionLayer NameSurfer
primary and thus doesn't necessarily have the information requested by the primary prior to fetching it from there.
When true, FusionLayer NameSurfer server components will use the system's syslog facility for most
logging instead of writing to the FusionLayer NameSurfer's own log files.
Specifies the syslog facility identifier to use for logging when configured to use syslog.
If the configured facility name is unrecognized, the 'user' facility will be used instead.