Difference between revisions of "Systemd-resolved"

From ArchWiki
Jump to: navigation, search
(mDNS: use "resolver" not "listener")
m (style)
 
(52 intermediate revisions by 5 users not shown)
Line 1: Line 1:
 
{{Lowercase title}}
 
{{Lowercase title}}
[[:Category:Domain Name System]]
+
[[Category:Domain Name System]]
[[:Category:Multicast DNS]]
+
[[Category:Multicast DNS]]
 
{{Related articles start}}
 
{{Related articles start}}
{{Related|systemd}}
+
{{Related|systemd-networkd}}
 
{{Related|resolv.conf}}
 
{{Related|resolv.conf}}
 
{{Related|Avahi}}
 
{{Related|Avahi}}
 
{{Related|Stubby}}
 
{{Related|Stubby}}
 +
{{Related|openresolv}}
 
{{Related articles end}}
 
{{Related articles end}}
{{Move|systemd-resolved|''systemd-resolved'' could use its own article.|Talk:Domain name resolution#Rewrite}}
+
[https://www.freedesktop.org/wiki/Software/systemd/resolved/ systemd-resolved] is a [[systemd]] service that provides network name resolution to local applications via a [[D-Bus]] interface, the {{ic|resolve}} [[Name Service Switch|NSS]] service ({{man|8|nss-resolve}}), and a local DNS stub listener on {{ic|127.0.0.53}}. See {{man|8|systemd-resolved}} for the usage.
[https://www.freedesktop.org/wiki/Software/systemd/resolved/ systemd-resolved] is a [[systemd]] service that provides network name resolution to local applications via a [[D-Bus]] interface, the {{ic|resolve}} [[NSS]] service ({{man|8|nss-resolve}}), and a local DNS stub listener on {{ic|127.0.0.53}}. See {{man|8|systemd-resolved}} for the usage.
 
  
 
== Installation ==
 
== Installation ==
  
''systemd-resolved'' is a part of the {{Pkg|systemd}} package that is installed by default.
+
''systemd-resolved'' is a part of the {{Pkg|systemd}} package that is [[install]]ed by default.
  
 
== Configuration ==
 
== Configuration ==
Line 27: Line 27:
 
=== DNS ===
 
=== DNS ===
  
''systemd-resolved'' has four different modes for handling the [[resolv.conf]] (described in {{man|8|systemd-resolved|/ETC/RESOLV.CONF}}). We will focus here on the two most relevant modes.
+
''systemd-resolved'' has four different modes for handling the [[Domain name resolution]] (the four modes are described in {{man|8|systemd-resolved|/ETC/RESOLV.CONF}}). We will focus here on the two most relevant modes.
  
# The ''systemd-resolved'''s '''recommended''' mode of operation: the DNS stub file {{ic|/run/systemd/resolve/stub-resolv.conf}} contains both the local stub {{ic|127.0.0.53}} as the only DNS servers and a list of search domains.
+
# Using the systemd DNS stub file - the systemd DNS stub file {{ic|/run/systemd/resolve/stub-resolv.conf}} contains the local stub {{ic|127.0.0.53}} as the only DNS server and a list of search domains. This is the '''recommended''' mode of operation. The service users are advised to redirect the {{ic|/etc/resolv.conf}} file to the local stub DNS resolver file {{ic|/run/systemd/resolve/stub-resolv.conf}} managed by ''systemd-resolved''. This propagates the systemd managed configuration to all the clients. This can be done by replacing {{ic|/etc/resolv.conf}} with a symbolic link to the systemd stub: {{bc|# ln -sf /run/systemd/resolve/stub-resolv.conf /etc/resolv.conf}}
# The mode in which ''systemd-resolved'' is a client of the {{ic|/etc/resolv.conf}}. This mode preserves {{ic|/etc/resolv.conf}} and is '''compatible''' with the procedures described in this page.
+
# Preserving ''resolv.conf'' - this mode preserves {{ic|/etc/resolv.conf}} and ''systemd-resolved'' is simply a client of this file. This mode is less disruptive as {{ic|/etc/resolv.conf}} can continue to be managed by other packages.
 
 
The service users are advised to redirect the {{ic|/etc/resolv.conf}} file to the local stub DNS resolver file {{ic|/run/systemd/resolve/stub-resolv.conf}} managed by ''systemd-resolved''. This propagates the systemd managed configuration to all the clients. This can be done by replacing {{ic|/etc/resolv.conf}} with a symbolic link to the systemd stub:
 
 
 
# ln -sf /run/systemd/resolve/stub-resolv.conf /etc/resolv.conf
 
  
 
{{Tip|The mode of operation of ''systemd-resolved'' is detected automatically, depending on whether {{ic|/etc/resolv.conf}} is a symlink to the local stub DNS resolver file or contains server names.}}
 
{{Tip|The mode of operation of ''systemd-resolved'' is detected automatically, depending on whether {{ic|/etc/resolv.conf}} is a symlink to the local stub DNS resolver file or contains server names.}}
Line 40: Line 36:
 
==== Setting DNS servers ====
 
==== Setting DNS servers ====
  
In order to check the DNS actually used by ''systemd-resolved'', the command to use is:
+
{{Tip|In order to check the DNS actually used by ''systemd-resolved'', the command to use is:
  
 
  $ resolvectl status
 
  $ resolvectl status
  
{{Expansion|Add information about {{ic|1=FallbackDNS=}} and Google's DNS servers.}}
+
}}
  
 
===== Automatically =====
 
===== Automatically =====
  
{{Accuracy|This is not limited to network managers, it should be "[[network manager]]s/DHCP clients/[[VPN]] software/others".}}
+
''systemd-resolved'' will work out of the box with a [[network manager]] using {{ic|/etc/resolv.conf}}. No particular configuration is required since ''systemd-resolved'' will be detected by following the {{ic|/etc/resolv.conf}} symlink. This is going to be the case with [[systemd-networkd]] or [[NetworkManager]].
  
''systemd-resolved'' can get the upstream DNS servers in two ways:
+
However, if the [[DHCP]] and [[VPN]] clients use the [[Wikipedia:resolvconf|resolvconf]] program to set name servers and search domains (see [[openresolv#Users]] for a list of software that use ''resolvconf''), the additional package {{Pkg|systemd-resolvconf}} is needed to provide the {{ic|/usr/bin/resolvconf}} symlink.
  
# If the used [[network manager]] supports ''systemd-resolved'', currently those are [[systemd-networkd]] and [[NetworkManager]].
+
{{Note|
# If the used [[network manager]] uses ''resolvconf'' to set DNS information. See [[openresolv#Users]] for a list of software that use ''resolvconf''.
+
* ''systemd-resolved'' has a limited ''resolvconf'' interface and may not work with all the clients, see {{man|1|resolvectl}} for more information.
 
+
* The ''resolvconf'' interface in systemd 239 does not set nameservers. See {{Bug|59459}} and [https://github.com/systemd/systemd/issues/9423 systemd issue 9423].
For the first case no configuration is required since ''systemd-resolved'' will be detected by folowing the {{ic|/etc/resolv.conf}} symlink.
+
}}
 
 
For the second case you need to [[install]] {{Pkg|systemd-resolvconf}}. I will provide {{ic|/usr/bin/resolvconf}} for tools that set DNS using ''resolvconf'' interface.
 
 
 
{{Note|''systemd-resolved'''s ''resolvconf'' interface is limited and may not work with all software that use it. See {{man|1|resolvectl}} for more information.}}
 
  
 
===== Manually =====
 
===== Manually =====
Line 71: Line 63:
  
 
{{Note|[[Network manager]]s have their own DNS settings that override ''systemd-resolved'''s default.}}
 
{{Note|[[Network manager]]s have their own DNS settings that override ''systemd-resolved'''s default.}}
 +
 +
===== Fallback =====
 +
 +
If ''systemd-resolved'' does not receive DNS server addresses from the [[network manager]] and no DNS servers are configured [[#Manually|manually]] then ''systemd-resolved'' falls back to the fallback DNS addresses to ensure that DNS resolution always works.
 +
 +
{{Note|1=The fallback DNS are in this order: [[Alternative DNS services#Cloudflare|Cloudflare]], [[Alternative DNS services#Quad9|Quad9]] (without filtering and without DNSSEC) and [[Alternative DNS services#Google|Google]]; see the [https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/systemd#n103 systemd PKGBUILD] where the servers are defined.}}
 +
 +
The addresses can be changed by setting {{ic|1=FallbackDNS=}} in {{man|5|resolved.conf}}. E.g.:
 +
 +
{{hc|/etc/systemd/resolved.conf.d/fallback_dns.conf|2=
 +
[Resolve]
 +
FallbackDNS=127.0.0.1 ::1
 +
}}
 +
 +
To disable the fallback DNS funtionality set the {{ic|1=FallbackDNS}} option without specifying any addresses:
 +
 +
{{hc|/etc/systemd/resolved.conf.d/fallback_dns.conf|2=
 +
[Resolve]
 +
FallbackDNS=
 +
}}
  
 
==== DNSSEC ====
 
==== DNSSEC ====
  
[[DNSSEC]] support can be enabled by setting {{ic|1=DNSSEC=true}}:
+
By default [[DNSSEC]] validation will only be enabled if the upstream DNS server supports it. If you want to always validate DNSSEC, thus breaking DNS resolution with name servers that do not support it, set {{ic|1=DNSSEC=true}}:
  
 
{{hc|/etc/systemd/resolved.conf.d/dnssec.conf|2=
 
{{hc|/etc/systemd/resolved.conf.d/dnssec.conf|2=
Line 118: Line 130:
 
''systemd-resolved'' is capable of working as a [[Wikipedia:Multicast DNS|multicast DNS]] resolver and responder.
 
''systemd-resolved'' is capable of working as a [[Wikipedia:Multicast DNS|multicast DNS]] resolver and responder.
  
mDNS will only be activated for the connection if both the systemd-resolved's global setting ({{ic|1=MulticastDNS=}} in {{man|5|resolved.conf}}) and the [[Network manager|network manager's]] per-connection setting is enabled. By default ''systemd-resolved'' enables mDNS responder, but both [[systemd-networkd]] and [[NetworkManager]] do not enable it for connections.
+
The resolver provides [[hostname]] resolution using a "''hostname''.local" naming scheme.
 +
 
 +
mDNS will only be activated for the connection if both the systemd-resolved's global setting ({{ic|1=MulticastDNS=}} in {{man|5|resolved.conf}}) and the [[Network manager|network manager's]] per-connection setting is enabled. By default ''systemd-resolved'' enables mDNS responder, but both [[systemd-networkd]] and [[NetworkManager]] do not enable it for connections:
  
 
* For [[systemd-networkd]] the setting is {{ic|1=MulticastDNS=}} in the {{ic|[Network]}} section. See {{man|5|systemd.network}}.
 
* For [[systemd-networkd]] the setting is {{ic|1=MulticastDNS=}} in the {{ic|[Network]}} section. See {{man|5|systemd.network}}.
* For [[NetworkManager]] the setting is {{ic|1=mdns=}} in the {{ic|[connection]}} section, see {{man|5|nm-setting}}. The values are {{ic|0}} - disabled, {{ic|1}} - resolver only, {{ic|2}} - resolver and responder. [https://cgit.freedesktop.org/NetworkManager/NetworkManager/tree/libnm-core/nm-setting-connection.h#n102]
+
* For [[NetworkManager]] the setting is {{ic|1=mdns=}} in the {{ic|[connection]}} section, see {{man|5|nm-settings}}. The values are {{ic|0}} - disabled, {{ic|1}} - resolver only, {{ic|2}} - resolver and responder. [https://cgit.freedesktop.org/NetworkManager/NetworkManager/tree/libnm-core/nm-setting-connection.h#n102]
 +
 
 +
{{Note|If [[Avahi]] has been installed, consider [[disabling]] {{ic|avahi.service}} and {{ic|avahi.socket}} to prevent conflicts with ''systemd-resolved''.}}
  
 
{{Tip|The default for all [[NetworkManager]] connections can be set by creating a configuration file in {{ic|/etc/NetworkManager/conf.d/}} and setting {{ic|1=connection.mdns=}} in the {{ic|[connection]}} section. For example the following will enable mDNS resolver for all connections:
 
{{Tip|The default for all [[NetworkManager]] connections can be set by creating a configuration file in {{ic|/etc/NetworkManager/conf.d/}} and setting {{ic|1=connection.mdns=}} in the {{ic|[connection]}} section. For example the following will enable mDNS resolver for all connections:
Line 137: Line 153:
 
=== LLMNR ===
 
=== LLMNR ===
  
[[Wikipedia:Link-Local Multicast Name Resolution|Link-Local Multicast Name Resolution]] is a hostname resolution protocol created by Microsoft.
+
[[Wikipedia:Link-Local Multicast Name Resolution|Link-Local Multicast Name Resolution]] is a [[hostname]] resolution protocol created by Microsoft.
  
LLMNR will only be activated for the connection if both the systemd-resolved's global setting ({{ic|1=LLMNR=}} in {{man|5|resolved.conf}}) and the [[Network manager|network manager's]] per-connection setting is enabled. By default ''systemd-resolved'' enables LLMNR responder, [[systemd-networkd]] enables it by default and [[NetworkManager]] does not have a setting to control it.
+
LLMNR will only be activated for the connection if both the systemd-resolved's global setting ({{ic|1=LLMNR=}} in {{man|5|resolved.conf}}) and the [[Network manager|network manager's]] per-connection setting is enabled. By default ''systemd-resolved'' enables LLMNR responder; [[systemd-networkd]] and [[NetworkManager]] enable it for connections.
  
For [[systemd-networkd]] the setting is {{ic|1=LLMNR=}} in the {{ic|[Network]}} section. See {{man|5|systemd.network}}.
+
* For [[systemd-networkd]] the setting is {{ic|1=LLMNR=}} in the {{ic|[Network]}} section. See {{man|5|systemd.network}}.
 +
* For [[NetworkManager]] the setting is {{ic|1=llmnr=}} in the {{ic|[connection]}} section, see {{man|5|nm-settings}}. The values are {{ic|0}} - disabled, {{ic|1}} - resolver only, {{ic|2}} - resolver and responder.
  
{{Warning|Since [[NetworkManager]] lacks control over per-connection LLMNR setting, if do not plan to use LLMNR the only option is to disable it globally in {{man|5|resolved.conf}}. E.g.:
+
{{Tip|The default for all [[NetworkManager]] connections can be set by creating a configuration file in {{ic|/etc/NetworkManager/conf.d/}} and setting {{ic|1=connection.llmnr=}} in the {{ic|[connection]}} section. For example the following will disable LLMNR for all connections:
  
{{hc|/etc/systemd/resolved.conf.d/disable_llmnr.conf|2=
+
{{hc|/etc/NetworkManager/conf.d/llmnr.conf|2=
[Resolve]
+
[connection]
LLMNR=false
+
connection.llmnr=0
 
}}
 
}}
  
 +
See {{man|5|NetworkManager.conf}}.
 
}}
 
}}
  
Line 167: Line 185:
 
-- Data is authenticated: no
 
-- Data is authenticated: no
 
}}
 
}}
 +
 +
See {{man|1|resolvectl|EXAMPLES}} for more examples.

Latest revision as of 07:08, 16 October 2018

systemd-resolved is a systemd service that provides network name resolution to local applications via a D-Bus interface, the resolve NSS service (nss-resolve(8)), and a local DNS stub listener on 127.0.0.53. See systemd-resolved(8) for the usage.

Installation

systemd-resolved is a part of the systemd package that is installed by default.

Configuration

systemd-resolved provides resolver services for Domain Name System (DNS) (including DNSSEC and DNS over TLS), Multicast DNS (mDNS) and Link-Local Multicast Name Resolution (LLMNR).

The resolver can be configured by editing /etc/systemd/resolved.conf and/or drop-in .conf files in /etc/systemd/resolved.conf.d/. See resolved.conf(5).

To use systemd-resolved start and enable systemd-resolved.service.

Tip: To understand the context around the choices and switches, one can turn on detailed debug information for systemd-resolved as described in systemd#Diagnosing a service.

DNS

systemd-resolved has four different modes for handling the Domain name resolution (the four modes are described in systemd-resolved(8)). We will focus here on the two most relevant modes.

  1. Using the systemd DNS stub file - the systemd DNS stub file /run/systemd/resolve/stub-resolv.conf contains the local stub 127.0.0.53 as the only DNS server and a list of search domains. This is the recommended mode of operation. The service users are advised to redirect the /etc/resolv.conf file to the local stub DNS resolver file /run/systemd/resolve/stub-resolv.conf managed by systemd-resolved. This propagates the systemd managed configuration to all the clients. This can be done by replacing /etc/resolv.conf with a symbolic link to the systemd stub:
    # ln -sf /run/systemd/resolve/stub-resolv.conf /etc/resolv.conf
  2. Preserving resolv.conf - this mode preserves /etc/resolv.conf and systemd-resolved is simply a client of this file. This mode is less disruptive as /etc/resolv.conf can continue to be managed by other packages.
Tip: The mode of operation of systemd-resolved is detected automatically, depending on whether /etc/resolv.conf is a symlink to the local stub DNS resolver file or contains server names.

Setting DNS servers

Tip: In order to check the DNS actually used by systemd-resolved, the command to use is:
$ resolvectl status
Automatically

systemd-resolved will work out of the box with a network manager using /etc/resolv.conf. No particular configuration is required since systemd-resolved will be detected by following the /etc/resolv.conf symlink. This is going to be the case with systemd-networkd or NetworkManager.

However, if the DHCP and VPN clients use the resolvconf program to set name servers and search domains (see openresolv#Users for a list of software that use resolvconf), the additional package systemd-resolvconf is needed to provide the /usr/bin/resolvconf symlink.

Note:
  • systemd-resolved has a limited resolvconf interface and may not work with all the clients, see resolvectl(1) for more information.
  • The resolvconf interface in systemd 239 does not set nameservers. See FS#59459 and systemd issue 9423.
Manually

In local DNS stub mode, alternative DNS servers are provided in the resolved.conf(5) file:

/etc/systemd/resolved.conf.d/dns_servers.conf
[Resolve]
DNS=91.239.100.100 89.233.43.71
Note: Network managers have their own DNS settings that override systemd-resolved's default.
Fallback

If systemd-resolved does not receive DNS server addresses from the network manager and no DNS servers are configured manually then systemd-resolved falls back to the fallback DNS addresses to ensure that DNS resolution always works.

Note: The fallback DNS are in this order: Cloudflare, Quad9 (without filtering and without DNSSEC) and Google; see the systemd PKGBUILD where the servers are defined.

The addresses can be changed by setting FallbackDNS= in resolved.conf(5). E.g.:

/etc/systemd/resolved.conf.d/fallback_dns.conf
[Resolve]
FallbackDNS=127.0.0.1 ::1

To disable the fallback DNS funtionality set the FallbackDNS option without specifying any addresses:

/etc/systemd/resolved.conf.d/fallback_dns.conf
[Resolve]
FallbackDNS=

DNSSEC

By default DNSSEC validation will only be enabled if the upstream DNS server supports it. If you want to always validate DNSSEC, thus breaking DNS resolution with name servers that do not support it, set DNSSEC=true:

/etc/systemd/resolved.conf.d/dnssec.conf
[Resolve]
DNSSEC=true

Test DNSSEC validation by querying a domain with a invalid signature:

$ resolvectl query sigfail.verteiltesysteme.net
sigfail.verteiltesysteme.net: resolve call failed: DNSSEC validation failed: invalid

Now test a domain with valid signature:

$ resolvectl query sigok.verteiltesysteme.net
sigok.verteiltesysteme.net: 134.91.78.139

-- Information acquired via protocol DNS in 266.3ms.
-- Data is authenticated: yes

DNS over TLS

Tango-view-fullscreen.pngThis article or section needs expansion.Tango-view-fullscreen.png

Reason: How to test if DNS over TLS is used? (Discuss in Talk:Systemd-resolved#)
Warning: As of version 239:
  • Only opportunistic mode is supported making systemd-resolved vulnerable to downgrade attacks.
  • DNS server certificates are not checked making systemd-resolved vulnerable to man-in-the-middle attacks. See systemd issue 9397.

DNS over TLS is disabled by default. To enable it change the DNSOverTLS= setting in the [Resolve] section in resolved.conf(5).

/etc/systemd/resolved.conf.d/dns_over_tls.conf
[Resolve]
DNSOverTLS=opportunistic
Note: The used DNS server must support DNS over TLS otherwise systemd-resolved will disable DNS over TLS for the connection.

mDNS

systemd-resolved is capable of working as a multicast DNS resolver and responder.

The resolver provides hostname resolution using a "hostname.local" naming scheme.

mDNS will only be activated for the connection if both the systemd-resolved's global setting (MulticastDNS= in resolved.conf(5)) and the network manager's per-connection setting is enabled. By default systemd-resolved enables mDNS responder, but both systemd-networkd and NetworkManager do not enable it for connections:

Note: If Avahi has been installed, consider disabling avahi.service and avahi.socket to prevent conflicts with systemd-resolved.
Tip: The default for all NetworkManager connections can be set by creating a configuration file in /etc/NetworkManager/conf.d/ and setting connection.mdns= in the [connection] section. For example the following will enable mDNS resolver for all connections:
/etc/NetworkManager/conf.d/mdns.conf
[connection]
connection.mdns=1

See NetworkManager.conf(5).

If you plan to use mDNS and use a firewall, make sure to open UDP port 5353.

LLMNR

Link-Local Multicast Name Resolution is a hostname resolution protocol created by Microsoft.

LLMNR will only be activated for the connection if both the systemd-resolved's global setting (LLMNR= in resolved.conf(5)) and the network manager's per-connection setting is enabled. By default systemd-resolved enables LLMNR responder; systemd-networkd and NetworkManager enable it for connections.

Tip: The default for all NetworkManager connections can be set by creating a configuration file in /etc/NetworkManager/conf.d/ and setting connection.llmnr= in the [connection] section. For example the following will disable LLMNR for all connections:
/etc/NetworkManager/conf.d/llmnr.conf
[connection]
connection.llmnr=0

See NetworkManager.conf(5).

If you plan to use LLMNR and use a firewall, make sure to open UDP and TCP ports 5355.

Lookup

To query DNS records, mDNS or LLMNR hosts you can use the resolvectl utility.

For example, to query a DNS record:

$ resolvectl query archlinux.org
archlinux.org: 2a01:4f8:172:1d86::1
               138.201.81.199

-- Information acquired via protocol DNS in 48.4ms.
-- Data is authenticated: no

See resolvectl(1) for more examples.