diff options
Diffstat (limited to 'templates/man5/resolved.conf.5.pot')
-rw-r--r-- | templates/man5/resolved.conf.5.pot | 935 |
1 files changed, 935 insertions, 0 deletions
diff --git a/templates/man5/resolved.conf.5.pot b/templates/man5/resolved.conf.5.pot new file mode 100644 index 00000000..17649b50 --- /dev/null +++ b/templates/man5/resolved.conf.5.pot @@ -0,0 +1,935 @@ +# SOME DESCRIPTIVE TITLE +# Copyright (C) YEAR Free Software Foundation, Inc. +# This file is distributed under the same license as the PACKAGE package. +# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR. +# +#, fuzzy +msgid "" +msgstr "" +"Project-Id-Version: PACKAGE VERSION\n" +"POT-Creation-Date: 2024-03-01 17:05+0100\n" +"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" + +#. type: TH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "RESOLVED\\&.CONF" +msgstr "" + +#. type: TH +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "systemd 255" +msgstr "" + +#. type: TH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "resolved.conf" +msgstr "" + +#. ----------------------------------------------------------------- +#. * MAIN CONTENT STARTS HERE * +#. ----------------------------------------------------------------- +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "NAME" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"resolved.conf, resolved.conf.d - Network Name Resolution configuration files" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "SYNOPSIS" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "/etc/systemd/resolved\\&.conf" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "/etc/systemd/resolved\\&.conf\\&.d/*\\&.conf" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "/run/systemd/resolved\\&.conf\\&.d/*\\&.conf" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "/usr/lib/systemd/resolved\\&.conf\\&.d/*\\&.conf" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "DESCRIPTION" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"These configuration files control local DNS and LLMNR name resolution\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "CONFIGURATION DIRECTORIES AND PRECEDENCE" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +#: opensuse-tumbleweed +msgid "" +"The default configuration is set during compilation, so configuration is " +"only needed when it is necessary to deviate from those defaults\\&. The main " +"configuration file is either in /usr/lib/systemd/ or /etc/systemd/ and " +"contains commented out entries showing the defaults as a guide to the " +"administrator\\&. Local overrides can be created by creating drop-ins, as " +"described below\\&. The main configuration file can also be edited for this " +"purpose (or a copy in /etc/ if it\\*(Aqs shipped in /usr/) however using " +"drop-ins for local configuration is recommended over modifications to the " +"main configuration file\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"In addition to the \"main\" configuration file, drop-in configuration " +"snippets are read from /usr/lib/systemd/*\\&.conf\\&.d/, /usr/local/lib/" +"systemd/*\\&.conf\\&.d/, and /etc/systemd/*\\&.conf\\&.d/\\&. Those drop-ins " +"have higher precedence and override the main configuration file\\&. Files in " +"the *\\&.conf\\&.d/ configuration subdirectories are sorted by their " +"filename in lexicographic order, regardless of in which of the " +"subdirectories they reside\\&. When multiple files specify the same option, " +"for options which accept just a single value, the entry in the file sorted " +"last takes precedence, and for options which accept a list of values, " +"entries are collected as they occur in the sorted files\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"When packages need to customize the configuration, they can install drop-ins " +"under /usr/\\&. Files in /etc/ are reserved for the local administrator, who " +"may use this logic to override the configuration files installed by vendor " +"packages\\&. Drop-ins have to be used to override package drop-ins, since " +"the main configuration file has lower precedence\\&. It is recommended to " +"prefix all filenames in those subdirectories with a two-digit number and a " +"dash, to simplify the ordering of the files\\&. This also defined a concept " +"of drop-in priority to allow distributions to ship drop-ins within a " +"specific range lower than the range used by users\\&. This should lower the " +"risk of package drop-ins overriding accidentally drop-ins defined by " +"users\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"To disable a configuration file supplied by the vendor, the recommended way " +"is to place a symlink to /dev/null in the configuration directory in /etc/, " +"with the same filename as the vendor configuration file\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "OPTIONS" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "The following options are available in the [Resolve] section:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<DNS=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"A space-separated list of IPv4 and IPv6 addresses to use as system DNS " +"servers\\&. Each address can optionally take a port number separated with \":" +"\", a network interface name or index separated with \"%\", and a Server " +"Name Indication (SNI) separated with \"#\"\\&. When IPv6 address is " +"specified with a port number, then the address must be in the square " +"brackets\\&. That is, the acceptable full formats are " +"\"111\\&.222\\&.333\\&.444:9953%ifname#example\\&.com\" for IPv4 and " +"\"[1111:2222::3333]:9953%ifname#example\\&.com\" for IPv6\\&. DNS requests " +"are sent to one of the listed DNS servers in parallel to suitable per-link " +"DNS servers acquired from B<systemd-networkd.service>(8) or set at runtime " +"by external applications\\&. For compatibility reasons, if this setting is " +"not specified, the DNS servers listed in /etc/resolv\\&.conf are used " +"instead, if that file exists and any servers are configured in it\\&. This " +"setting defaults to the empty list\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 213\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<FallbackDNS=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"A space-separated list of IPv4 and IPv6 addresses to use as the fallback DNS " +"servers\\&. Please see I<DNS=> for acceptable format of addresses\\&. Any " +"per-link DNS servers obtained from B<systemd-networkd.service>(8) take " +"precedence over this setting, as do any servers set via I<DNS=> above or /" +"etc/resolv\\&.conf\\&. This setting is hence only used if no other DNS " +"server information is known\\&. If this option is not given, a compiled-in " +"list of DNS servers is used instead\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 216\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<Domains=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"A space-separated list of domains, optionally prefixed with \"~\", used for " +"two distinct purposes described below\\&. Defaults to the empty list\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Any domains I<not> prefixed with \"~\" are used as search suffixes when " +"resolving single-label hostnames (domain names which contain no dot), in " +"order to qualify them into fully-qualified domain names (FQDNs)\\&. These " +"\"search domains\" are strictly processed in the order they are specified " +"in, until the name with the suffix appended is found\\&. For compatibility " +"reasons, if this setting is not specified, the search domains listed in /etc/" +"resolv\\&.conf with the I<search> keyword are used instead, if that file " +"exists and any domains are configured in it\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"The domains prefixed with \"~\" are called \"route-only domains\"\\&. All " +"domains listed here (I<both search domains and route-only domains> after " +"removing the \"~\" prefix) define a search path that preferably directs DNS " +"queries to this interface\\&. This search path has an effect only when " +"suitable per-link DNS servers are known\\&. Such servers may be defined " +"through the I<DNS=> setting (see above) and dynamically at run time, for " +"example from DHCP leases\\&. If no per-link DNS servers are known, route-" +"only domains have no effect\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Use the construct \"~\\&.\" (which is composed from \"~\" to indicate a " +"route-only domain and \"\\&.\" to indicate the DNS root domain that is the " +"implied suffix of all DNS domains) to use the DNS servers defined for this " +"link preferably for all domains\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"See \"Protocols and Routing\" in B<systemd-resolved.service>(8) for details " +"of how search and route-only domains are used\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Note that configuring the MulticastDNS domain \"local\" as search or routing " +"domain has the effect of routing lookups for this domain to classic unicast " +"DNS\\&. This may be used to provide compatibility with legacy installations " +"that use this domain in a unicast DNS context, against the IANA assignment " +"of this domain to pure MulticastDNS purposes\\&. Search and routing domains " +"are a unicast DNS concept, they I<cannot> be used to resolve single-label " +"lookups via MulticastDNS\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 229\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<LLMNR=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean argument or \"resolve\"\\&. Controls Link-Local Multicast " +"Name Resolution support (\\m[blue]B<RFC 4795>\\m[]\\&\\s-2\\u[1]\\d\\s+2) on " +"the local host\\&. If true, enables full LLMNR responder and resolver " +"support\\&. If false, disables both\\&. If set to \"resolve\", only " +"resolution support is enabled, but responding is disabled\\&. Note that " +"B<systemd-networkd.service>(8) also maintains per-link LLMNR settings\\&. " +"LLMNR will be enabled on a link only if the per-link and the global setting " +"is on\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<MulticastDNS=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean argument or \"resolve\"\\&. Controls Multicast DNS support " +"(\\m[blue]B<RFC 6762>\\m[]\\&\\s-2\\u[2]\\d\\s+2) on the local host\\&. If " +"true, enables full Multicast DNS responder and resolver support\\&. If " +"false, disables both\\&. If set to \"resolve\", only resolution support is " +"enabled, but responding is disabled\\&. Note that B<systemd-networkd." +"service>(8) also maintains per-link Multicast DNS settings\\&. Multicast " +"DNS will be enabled on a link only if the per-link and the global setting is " +"on\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 234\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<DNSSEC=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "Takes a boolean argument or \"allow-downgrade\"\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"If set to true, all DNS lookups are DNSSEC-validated locally (excluding " +"LLMNR and Multicast DNS)\\&. If the response to a lookup request is detected " +"to be invalid a lookup failure is returned to applications\\&. Note that " +"this mode requires a DNS server that supports DNSSEC\\&. If the DNS server " +"does not properly support DNSSEC all validations will fail\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"If set to \"allow-downgrade\", DNSSEC validation is attempted, but if the " +"server does not support DNSSEC properly, DNSSEC mode is automatically " +"disabled\\&. Note that this mode makes DNSSEC validation vulnerable to " +"\"downgrade\" attacks, where an attacker might be able to trigger a " +"downgrade to non-DNSSEC mode by synthesizing a DNS response that suggests " +"DNSSEC was not supported\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"If set to false, DNS lookups are not DNSSEC validated\\&. In this mode, or " +"when set to \"allow-downgrade\" and the downgrade has happened, the resolver " +"becomes security-unaware and all forwarded queries have DNSSEC OK (DO) bit " +"unset\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Note that DNSSEC validation requires retrieval of additional DNS data, and " +"thus results in a small DNS lookup time penalty\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"DNSSEC requires knowledge of \"trust anchors\" to prove data integrity\\&. " +"The trust anchor for the Internet root domain is built into the resolver, " +"additional trust anchors may be defined with B<dnssec-trust-anchors." +"d>(5)\\&. Trust anchors may change at regular intervals, and old trust " +"anchors may be revoked\\&. In such a case DNSSEC validation is not possible " +"until new trust anchors are configured locally or the resolver software " +"package is updated with the new root trust anchor\\&. In effect, when the " +"built-in trust anchor is revoked and I<DNSSEC=> is true, all further lookups " +"will fail, as it cannot be proved anymore whether lookups are correctly " +"signed, or validly unsigned\\&. If I<DNSSEC=> is set to \"allow-downgrade\" " +"the resolver will automatically turn off DNSSEC validation in such a case\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Client programs looking up DNS data will be informed whether lookups could " +"be verified using DNSSEC, or whether the returned data could not be verified " +"(either because the data was found unsigned in the DNS, or the DNS server " +"did not support DNSSEC or no appropriate trust anchors were known)\\&. In " +"the latter case it is assumed that client programs employ a secondary scheme " +"to validate the returned DNS data, should this be required\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"It is recommended to set I<DNSSEC=> to true on systems where it is known " +"that the DNS server supports DNSSEC correctly, and where software or trust " +"anchor updates happen regularly\\&. On other systems it is recommended to " +"set I<DNSSEC=> to \"allow-downgrade\"\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"In addition to this global DNSSEC setting B<systemd-networkd.service>(8) " +"also maintains per-link DNSSEC settings\\&. For system DNS servers (see " +"above), only the global DNSSEC setting is in effect\\&. For per-link DNS " +"servers the per-link setting is in effect, unless it is unset in which case " +"the global setting is used instead\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Site-private DNS zones generally conflict with DNSSEC operation, unless a " +"negative (if the private zone is not signed) or positive (if the private " +"zone is signed) trust anchor is configured for them\\&. If \"allow-" +"downgrade\" mode is selected, it is attempted to detect site-private DNS " +"zones using top-level domains (TLDs) that are not known by the DNS root " +"server\\&. This logic does not work in all private zone setups\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "Defaults to \"no\"\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<DNSOverTLS=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean argument or \"opportunistic\"\\&. If true all connections to " +"the server will be encrypted\\&. Note that this mode requires a DNS server " +"that supports DNS-over-TLS and has a valid certificate\\&. If the hostname " +"was specified in I<DNS=> by using the format \"address#server_name\" it is " +"used to validate its certificate and also to enable Server Name Indication " +"(SNI) when opening a TLS connection\\&. Otherwise the certificate is checked " +"against the server\\*(Aqs IP\\&. If the DNS server does not support DNS-over-" +"TLS all DNS requests will fail\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"When set to \"opportunistic\" DNS request are attempted to send encrypted " +"with DNS-over-TLS\\&. If the DNS server does not support TLS, DNS-over-TLS " +"is disabled\\&. Note that this mode makes DNS-over-TLS vulnerable to " +"\"downgrade\" attacks, where an attacker might be able to trigger a " +"downgrade to non-encrypted mode by synthesizing a response that suggests DNS-" +"over-TLS was not supported\\&. If set to false, DNS lookups are send over " +"UDP\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Note that DNS-over-TLS requires additional data to be send for setting up an " +"encrypted connection, and thus results in a small DNS look-up time " +"penalty\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Note that in \"opportunistic\" mode the resolver is not capable of " +"authenticating the server, so it is vulnerable to \"man-in-the-middle\" " +"attacks\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"In addition to this global I<DNSOverTLS=> setting B<systemd-networkd." +"service>(8) also maintains per-link I<DNSOverTLS=> settings\\&. For system " +"DNS servers (see above), only the global I<DNSOverTLS=> setting is in " +"effect\\&. For per-link DNS servers the per-link setting is in effect, " +"unless it is unset in which case the global setting is used instead\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 239\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<Cache=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean or \"no-negative\" as argument\\&. If \"yes\" (the default), " +"resolving a domain name which already got queried earlier will return the " +"previous result as long as it is still valid, and thus does not result in a " +"new network request\\&. Be aware that turning off caching comes at a " +"performance penalty, which is particularly high when DNSSEC is used\\&. If " +"\"no-negative\", only positive answers are cached\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Note that caching is turned off by default for host-local DNS servers\\&. " +"See I<CacheFromLocalhost=> for details\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 231\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<CacheFromLocalhost=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean as argument\\&. If \"no\" (the default), and response cames " +"from host-local IP address (such as 127\\&.0\\&.0\\&.1 or ::1), the result " +"wouldn\\*(Aqt be cached in order to avoid potential duplicate local " +"caching\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 248\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<DNSStubListener=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean argument or one of \"udp\" and \"tcp\"\\&. If \"udp\", a DNS " +"stub resolver will listen for UDP requests on addresses 127\\&.0\\&.0\\&.53 " +"and 127\\&.0\\&.0\\&.54, port 53\\&. If \"tcp\", the stub will listen for " +"TCP requests on the same addresses and port\\&. If \"yes\" (the default), " +"the stub listens for both UDP and TCP requests\\&. If \"no\", the stub " +"listener is disabled\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"The DNS stub resolver on 127\\&.0\\&.0\\&.53 provides the full feature set " +"of the local resolver, which includes offering LLMNR/MulticastDNS " +"resolution\\&. The DNS stub resolver on 127\\&.0\\&.0\\&.54 provides a more " +"limited resolver, that operates in \"proxy\" mode only, i\\&.e\\&. it will " +"pass most DNS messages relatively unmodified to the current upstream DNS " +"servers and back, but not try to process the messages locally, and hence " +"does not validate DNSSEC, or offer up LLMNR/MulticastDNS\\&. (It will " +"translate to DNS-over-TLS communication if needed however\\&.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Note that the DNS stub listener is turned off implicitly when its listening " +"address and port are already in use\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 232\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<DNSStubListenerExtra=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes an IPv4 or IPv6 address to listen on\\&. The address may be optionally " +"prefixed with a protocol name (\"udp\" or \"tcp\") separated with \":\"\\&. " +"If the protocol is not specified, the service will listen on both UDP and " +"TCP\\&. It may be also optionally suffixed by a numeric port number with " +"separator \":\"\\&. When an IPv6 address is specified with a port number, " +"then the address must be in the square brackets\\&. If the port is not " +"specified, then the service uses port 53\\&. Note that this is independent " +"of the primary DNS stub configured with I<DNSStubListener=>, and only " +"configures I<additional> sockets to listen on\\&. This option can be " +"specified multiple times\\&. If an empty string is assigned, then the all " +"previous assignments are cleared\\&. Defaults to unset\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "Examples:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "" +"DNSStubListenerExtra=192\\&.168\\&.10\\&.10\n" +"DNSStubListenerExtra=2001:db8:0:f102::10\n" +"DNSStubListenerExtra=192\\&.168\\&.10\\&.11:9953\n" +"DNSStubListenerExtra=[2001:db8:0:f102::11]:9953\n" +"DNSStubListenerExtra=tcp:192\\&.168\\&.10\\&.12\n" +"DNSStubListenerExtra=udp:2001:db8:0:f102::12\n" +"DNSStubListenerExtra=tcp:192\\&.168\\&.10\\&.13:9953\n" +"DNSStubListenerExtra=udp:[2001:db8:0:f102::13]:9953\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 247\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<ReadEtcHosts=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean argument\\&. If \"yes\" (the default), B<systemd-resolved> " +"will read /etc/hosts, and try to resolve hosts or address by using the " +"entries in the file before sending query to DNS servers\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 240\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "I<ResolveUnicastSingleLabel=>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a boolean argument\\&. When false (the default), B<systemd-resolved> " +"will not resolve A and AAAA queries for single-label names over classic " +"DNS\\&. Note that such names may still be resolved if search domains are " +"specified (see I<Domains=> above), or using other mechanisms, in particular " +"via LLMNR or from /etc/hosts\\&. When true, queries for single-label names " +"will be forwarded to global DNS servers even if no search domains are " +"defined\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"This option is provided for compatibility with configurations where I<public " +"DNS servers are not used>\\&. Forwarding single-label names to servers not " +"under your control is not standard-conformant, see \\m[blue]B<IAB " +"Statement>\\m[]\\&\\s-2\\u[3]\\d\\s+2, and may create a privacy and security " +"risk\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 246\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "StaleRetentionSec=I<SECONDS>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"Takes a duration value, which determines the length of time DNS resource " +"records can be retained in the cache beyond their Time To Live (TTL)\\&. " +"This allows these records to be returned as stale records\\&. By default, " +"this value is set to zero, meaning that DNS resource records are not stored " +"in the cache after their TTL expires\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"This is useful when a DNS server failure occurs or becomes unreachable\\&. " +"In such cases, B<systemd-resolved>(8) continues to use the stale records to " +"answer DNS queries, particularly when no valid response can be obtained from " +"the upstream DNS servers\\&. However, this doesn\\*(Aqt apply to NXDOMAIN " +"responses, as those are still perfectly valid responses\\&. This feature " +"enhances resilience against DNS infrastructure failures and outages\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"B<systemd-resolved> always attempts to reach the upstream DNS servers first, " +"before providing the client application with any stale data\\&. If this " +"feature is enabled, cache will not be flushed when changing servers\\&." +msgstr "" + +#. type: Plain text +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 254\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "SEE ALSO" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"B<systemd>(1), B<systemd-resolved.service>(8), B<systemd-networkd." +"service>(8), B<dnssec-trust-anchors.d>(5), B<resolv.conf>(5)" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid "NOTES" +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid " 1." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "RFC 4795" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "\\%https://tools.ietf.org/html/rfc4795" +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid " 2." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "RFC 6762" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "\\%https://tools.ietf.org/html/rfc6762" +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +#, no-wrap +msgid " 3." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "IAB Statement" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-tumbleweed +msgid "" +"\\%https://www.iab.org/documents/correspondence-reports-documents/2013-2/iab-" +"statement-dotless-domains-considered-harmful/" +msgstr "" + +#. type: TH +#: debian-bookworm opensuse-tumbleweed +#, no-wrap +msgid "systemd 254" +msgstr "" + +#. type: Plain text +#: debian-bookworm +msgid "" +"The default configuration is set during compilation, so configuration is " +"only needed when it is necessary to deviate from those defaults\\&. " +"Initially, the main configuration file in /etc/systemd/ contains commented " +"out entries showing the defaults as a guide to the administrator\\&. Local " +"overrides can be created by editing this file or by creating drop-ins, as " +"described below\\&. Using drop-ins for local configuration is recommended " +"over modifications to the main configuration file\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm +msgid "" +"When packages need to customize the configuration, they can install drop-ins " +"under /usr/\\&. Files in /etc/ are reserved for the local administrator, who " +"may use this logic to override the configuration files installed by vendor " +"packages\\&. Drop-ins have to be used to override package drop-ins, since " +"the main configuration file has lower precedence\\&. It is recommended to " +"prefix all filenames in those subdirectories with a two-digit number and a " +"dash, to simplify the ordering of the files\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm opensuse-tumbleweed +msgid "" +"This is useful when a DNS server failure occurs or becomes unreachable\\&. " +"In such cases, systemd-resolved continues to use the stale records to answer " +"DNS queries, particularly when no valid response can be obtained from the " +"upstream DNS servers\\&. However, this doesn\\*(Aqt apply to NXDOMAIN " +"responses, as those are still perfectly valid responses\\&. This feature " +"enhances resilience against DNS infrastructure failures and outages\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm opensuse-tumbleweed +msgid "" +"systemd-resolved always attempts to reach the upstream DNS servers first, " +"before providing the client application with any stale data\\&. If this " +"feature is enabled, cache will not be flushed when changing servers\\&." +msgstr "" + +#. type: Plain text +#: mageia-cauldron +msgid "Defaults to \"allow-downgrade\"\\&." +msgstr "" + +#. type: Plain text +#: opensuse-tumbleweed +msgid "" +"When packages need to customize the configuration, they can install drop-ins " +"under /usr/\\&. Files in /etc/ are reserved for the local administrator, who " +"may use this logic to override the configuration files installed by vendor " +"packages\\&. Drop-ins have to be used to override package drop-ins, since " +"the main configuration file has lower precedence\\&. It is recommended to " +"prefix all filenames in those subdirectories with a two-digit number and a " +"dash, to simplify the ordering of the files\\&. This also defines a concept " +"of drop-in priorities to allow OS vendors to ship drop-ins within a specific " +"range lower than the range used by users\\&. This should lower the risk of " +"package drop-ins overriding accidentally drop-ins defined by users\\&. It is " +"recommended to use the range 10-40 for drop-ins in /usr/ and the range 60-90 " +"for drop-ins in /etc/ and /run/, to make sure that local and transient drop-" +"ins take priority over drop-ins shipped by the OS vendor\\&." +msgstr "" |