Add Technitum DNS
This commit is contained in:
9
docker/env/technitum-dns-stack.env
vendored
Normal file
9
docker/env/technitum-dns-stack.env
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
TECHNITUM_DNS_NETWORk_ID=proxy
|
||||
TECHNITUM_DNS_HOSTNAME=komodo
|
||||
|
||||
TECHNITUM_DNS_RESTART_POLICY=unless-stopped
|
||||
|
||||
##### Komodo Core Container
|
||||
TECHNITUM_DNS_CONTAINER_NAME=dns-server
|
||||
TECHNITUM_DNS_IMAGE=technitium/dns-server
|
||||
TECHNITUM_DNS_TAG=latest
|
||||
66
docker/env/technitum-dns.env
vendored
Normal file
66
docker/env/technitum-dns.env
vendored
Normal file
@@ -0,0 +1,66 @@
|
||||
# The primary domain name used by this DNS Server to identify itself.
|
||||
DNS_SERVER_DOMAIN=lab.gurulandia.eu
|
||||
|
||||
# DNS web console admin user password.
|
||||
# DNS_SERVER_ADMIN_PASSWORD=password
|
||||
|
||||
# The path to a file that contains a plain text password for the DNS web console admin user.
|
||||
DNS_SERVER_ADMIN_PASSWORD_FILE = /run/secrets/technitium_admin_password
|
||||
|
||||
# DNS Server will use IPv6 for querying whenever possible with this option enabled.
|
||||
# DNS_SERVER_PREFER_IPV6=false
|
||||
|
||||
# Comma separated list of network interface IP addresses that you want the web service to listen on for requests.
|
||||
# The "172.17.0.1" address is the built-in Docker bridge. The "[::]" is the default value if not specified.
|
||||
# Note! This must be used only with "host" network mode.
|
||||
# DNS_SERVER_WEB_SERVICE_LOCAL_ADDRESSES=172.17.0.1,127.0.0.1
|
||||
|
||||
# The TCP port number for the DNS web console over HTTP protocol.
|
||||
# DNS_SERVER_WEB_SERVICE_HTTP_PORT=5380
|
||||
|
||||
# The TCP port number for the DNS web console over HTTPS protocol.
|
||||
# DNS_SERVER_WEB_SERVICE_HTTPS_PORT=53443 #The TCP port number for the DNS web console over HTTPS protocol.
|
||||
|
||||
# Enables HTTPS for the DNS web console.
|
||||
# DNS_SERVER_WEB_SERVICE_ENABLE_HTTPS=false
|
||||
|
||||
# Enables self signed TLS certificate for the DNS web console.
|
||||
# DNS_SERVER_WEB_SERVICE_USE_SELF_SIGNED_CERT=false
|
||||
|
||||
# Enables DNS server optional protocol DNS-over-HTTP on TCP port 8053 to be used with a TLS terminating reverse proxy like nginx.
|
||||
# DNS_SERVER_OPTIONAL_PROTOCOL_DNS_OVER_HTTP=false
|
||||
|
||||
# Recursion options: Allow, Deny, AllowOnlyForPrivateNetworks, UseSpecifiedNetworkACL.
|
||||
# DNS_SERVER_RECURSION=AllowOnlyForPrivateNetworks
|
||||
|
||||
# Comma separated list of IP addresses or network addresses to allow access.
|
||||
# Add ! character at the start to deny access, e.g. !192.168.10.0/24 will deny entire subnet.
|
||||
# The ACL is processed in the same order its listed. If no networks match, the default policy is to deny all except loopback.
|
||||
# Valid only for `UseSpecifiedNetworkACL` recursion option.
|
||||
# DNS_SERVER_RECURSION_NETWORK_ACL=192.168.10.0/24, !192.168.10.2
|
||||
|
||||
# Comma separated list of IP addresses or network addresses to deny recursion. Valid only for `UseSpecifiedNetworkACL` recursion option.
|
||||
# This option is obsolete and DNS_SERVER_RECURSION_NETWORK_ACL should be used instead.
|
||||
# DNS_SERVER_RECURSION_DENIED_NETWORKS=1.1.1.0/24
|
||||
|
||||
# Comma separated list of IP addresses or network addresses to allow recursion. Valid only for `UseSpecifiedNetworkACL` recursion option.
|
||||
# This option is obsolete and DNS_SERVER_RECURSION_NETWORK_ACL should be used instead.
|
||||
# DNS_SERVER_RECURSION_ALLOWED_NETWORKS=127.0.0.1, 192.168.1.0/24
|
||||
|
||||
# Sets the DNS server to block domain names using Blocked Zone and Block List Zone.
|
||||
# DNS_SERVER_ENABLE_BLOCKING=false
|
||||
|
||||
# Specifies if the DNS Server should respond with TXT records containing a blocked domain report for TXT type requests.
|
||||
# DNS_SERVER_ALLOW_TXT_BLOCKING_REPORT=false
|
||||
|
||||
# A comma separated list of block list URLs.
|
||||
# DNS_SERVER_BLOCK_LIST_URLS=
|
||||
|
||||
# Comma separated list of forwarder addresses.
|
||||
# DNS_SERVER_FORWARDERS=1.1.1.1, 8.8.8.8
|
||||
|
||||
# Forwarder protocol options: Udp, Tcp, Tls, Https, HttpsJson.
|
||||
# DNS_SERVER_FORWARDER_PROTOCOL=Tcp
|
||||
|
||||
# Enable this option to use local time instead of UTC for logging.
|
||||
DNS_SERVER_LOG_USING_LOCAL_TIME=true
|
||||
60
docker/technitum-dns/compose.yaml
Normal file
60
docker/technitum-dns/compose.yaml
Normal file
@@ -0,0 +1,60 @@
|
||||
secrets:
|
||||
technitium_admin_password:
|
||||
file: ${SECRETSDIR}/technitum-dns/admin_password
|
||||
services:
|
||||
dns-server:
|
||||
container_name: ${TECHNITUM_DNS_CONTAINER_NAME}
|
||||
image: ${TECHNITUM_DNS_IMAGE}:${TECHNITUM_DNS_TAG}
|
||||
restart: ${TECHNITUM_DNS_RESTART_POLICY}
|
||||
security_opt:
|
||||
- no-new-privileges:true
|
||||
networks:
|
||||
- dns
|
||||
# For DHCP deployments, use "host" network mode and remove all the port mappings, including the ports array by commenting them
|
||||
# network_mode: "host"
|
||||
ports:
|
||||
- "5380:5380/tcp" #DNS web console (HTTP)
|
||||
# - "53443:53443/tcp" #DNS web console (HTTPS)
|
||||
- "53:53/udp" #DNS service
|
||||
- "53:53/tcp" #DNS service
|
||||
# - "853:853/udp" #DNS-over-QUIC service
|
||||
# - "853:853/tcp" #DNS-over-TLS service
|
||||
# - "443:443/udp" #DNS-over-HTTPS service (HTTP/3)
|
||||
# - "443:443/tcp" #DNS-over-HTTPS service (HTTP/1.1, HTTP/2)
|
||||
# - "80:80/tcp" #DNS-over-HTTP service (use with reverse proxy or certbot certificate renewal)
|
||||
# - "8053:8053/tcp" #DNS-over-HTTP service (use with reverse proxy)
|
||||
# - "67:67/udp" #DHCP service
|
||||
environment:
|
||||
- DNS_SERVER_DOMAIN
|
||||
# - DNS_SERVER_ADMIN_PASSWORD=password #DNS web console admin user password.
|
||||
# - DNS_SERVER_ADMIN_PASSWORD_FILE=password.txt #The path to a file that contains a plain text password for the DNS web console admin user.
|
||||
- DNS_SERVER_ADMIN_PASSWORD_FILE
|
||||
# - DNS_SERVER_PREFER_IPV6=false #DNS Server will use IPv6 for querying whenever possible with this option enabled.
|
||||
# - DNS_SERVER_WEB_SERVICE_LOCAL_ADDRESSES=172.17.0.1,127.0.0.1 #Comma separated list of network interface IP addresses that you want the web service to listen on for requests. The "172.17.0.1" address is the built-in Docker bridge. The "[::]" is the default value if not specified. Note! This must be used only with "host" network mode.
|
||||
# - DNS_SERVER_WEB_SERVICE_HTTP_PORT=5380 #The TCP port number for the DNS web console over HTTP protocol.
|
||||
# - DNS_SERVER_WEB_SERVICE_HTTPS_PORT=53443 #The TCP port number for the DNS web console over HTTPS protocol.
|
||||
# - DNS_SERVER_WEB_SERVICE_ENABLE_HTTPS=false #Enables HTTPS for the DNS web console.
|
||||
# - DNS_SERVER_WEB_SERVICE_USE_SELF_SIGNED_CERT=false #Enables self signed TLS certificate for the DNS web console.
|
||||
# - DNS_SERVER_OPTIONAL_PROTOCOL_DNS_OVER_HTTP=false #Enables DNS server optional protocol DNS-over-HTTP on TCP port 8053 to be used with a TLS terminating reverse proxy like nginx.
|
||||
# - DNS_SERVER_RECURSION=AllowOnlyForPrivateNetworks #Recursion options: Allow, Deny, AllowOnlyForPrivateNetworks, UseSpecifiedNetworkACL.
|
||||
# - DNS_SERVER_RECURSION_NETWORK_ACL=192.168.10.0/24, !192.168.10.2 #Comma separated list of IP addresses or network addresses to allow access. Add ! character at the start to deny access, e.g. !192.168.10.0/24 will deny entire subnet. The ACL is processed in the same order its listed. If no networks match, the default policy is to deny all except loopback. Valid only for `UseSpecifiedNetworkACL` recursion option.
|
||||
# - DNS_SERVER_RECURSION_DENIED_NETWORKS=1.1.1.0/24 #Comma separated list of IP addresses or network addresses to deny recursion. Valid only for `UseSpecifiedNetworkACL` recursion option. This option is obsolete and DNS_SERVER_RECURSION_NETWORK_ACL should be used instead.
|
||||
# - DNS_SERVER_RECURSION_ALLOWED_NETWORKS=127.0.0.1, 192.168.1.0/24 #Comma separated list of IP addresses or network addresses to allow recursion. Valid only for `UseSpecifiedNetworkACL` recursion option. This option is obsolete and DNS_SERVER_RECURSION_NETWORK_ACL should be used instead.
|
||||
# - DNS_SERVER_ENABLE_BLOCKING=false #Sets the DNS server to block domain names using Blocked Zone and Block List Zone.
|
||||
# - DNS_SERVER_ALLOW_TXT_BLOCKING_REPORT=false #Specifies if the DNS Server should respond with TXT records containing a blocked domain report for TXT type requests.
|
||||
# - DNS_SERVER_BLOCK_LIST_URLS= #A comma separated list of block list URLs.
|
||||
# - DNS_SERVER_FORWARDERS=1.1.1.1, 8.8.8.8 #Comma separated list of forwarder addresses.
|
||||
# - DNS_SERVER_FORWARDER_PROTOCOL=Tcp #Forwarder protocol options: Udp, Tcp, Tls, Https, HttpsJson.
|
||||
- DNS_SERVER_LOG_USING_LOCAL_TIME
|
||||
volumes:
|
||||
- config:/etc/dns
|
||||
sysctls:
|
||||
- net.ipv4.ip_local_port_range=1024 65000
|
||||
secrets:
|
||||
- technitium_admin_password
|
||||
|
||||
volumes:
|
||||
config:
|
||||
networks:
|
||||
dns:
|
||||
name: dns
|
||||
Reference in New Issue
Block a user