diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index 2096ec31b7..4a58f62588 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -471,17 +471,29 @@ docs: <<: *release_branch_triggering_rules <<: *base_image stage: docs + before_script: + - test -w "${CCACHE_DIR}" && export PATH="/usr/lib/ccache:${PATH}" + - test -n "${OOT_BUILD_WORKSPACE}" && mkdir "${OOT_BUILD_WORKSPACE}" && cd "${OOT_BUILD_WORKSPACE}" + - pip3 install pytest requests || pip install pytest requests || true + - pip3 install sphinx sphinx_rtd_theme || pip install sphinx sphinx_rtd_theme + - apt -yqqq update + - apt -yqqq dist-upgrade + - apt -yqqq install texlive-full texlive-xetex latexmk xindy script: - - ./configure || cat config.log - - make -C doc/misc docbook - - make -C doc/arm Bv9ARM.html + - *configure + - make -j${BUILD_PARALLEL_JOBS:-1} -k maintainer-clean V=1 + - *configure + - make -j${BUILD_PARALLEL_JOBS:-1} -k all V=1 + - make -j${BUILD_PARALLEL_JOBS:-1} -k doc V=1 needs: - job: autoreconf artifacts: true - allow_failure: true + allow_failure: false artifacts: paths: - doc/arm/ + - doc/man/ + - doc/misc/ expire_in: "1 month" push:docs: diff --git a/Makefile.am b/Makefile.am index 77a8ad20fc..5cd00bd25f 100644 --- a/Makefile.am +++ b/Makefile.am @@ -1,6 +1,6 @@ include $(top_srcdir)/Makefile.top -SUBDIRS = . libltdl lib bin # doc +SUBDIRS = . libltdl lib doc bin BUILT_SOURCES = bind.keys.h CLEANFILES = bind.keys.h @@ -9,3 +9,5 @@ bind.keys.h: bind.keys Makefile ${PERL} ${top_srcdir}/util/bindkeys.pl < ${top_srcdir}/bind.keys > $@ dist_sysconf_DATA = bind.keys + +.PHONY: doc diff --git a/Makefile.docs b/Makefile.docs new file mode 100644 index 0000000000..8fe3114dbc --- /dev/null +++ b/Makefile.docs @@ -0,0 +1,51 @@ +SPHINX_V = $(SPHINX_V_@AM_V@) +SPHINX_V_ = $(SPHINX_V_@AM_DEFAULT_V@) +SPHINX_V_0 = -q +SPHINX_V_1 = -n + +AM_V_SPHINX = $(AM_V_SPHINX_@AM_V@) +AM_V_SPHINX_ = $(AM_V_SPHINX_@AM_DEFAULT_V@) +AM_V_SPHINX_0 = @echo " SPHINX $@"; + +SPHINXBUILDDIR = $(builddir)/_build + +common_SPHINXOPTS = \ + -c $(srcdir) \ + -a \ + $(SPHINX_V) + +ALLSPHINXOPTS = \ + $(common_SPHINXOPTS) \ + -D version="$(PACKAGE_VERSION)" \ + -D today="$(RELEASE_DATE)" \ + -D release="$(PACKAGE_VERSION)" \ + $(SPHINXOPTS) \ + $(srcdir) + +man_SPHINXOPTS = \ + $(common_SPHINXOPTS) \ + -D version="@""PACKAGE_VERSION@"\ + -D today="@""RELEASE_DATE@" \ + -D release="@""PACKAGE_VERSION@"\ + $(SPHINXOPTS) \ + $(srcdir) + +AM_V_SED = $(AM_V_SED_@AM_V@) +AM_V_SED_ = $(AM_V_SED_@AM_DEFAULT_V@) +AM_V_SED_0 = @echo " SED $@"; + +AM_V_CFG_TEST = $(AM_V_CFG_TEST_@AM_V@) +AM_V_CFG_TEST_ = $(AM_V_CFG_TEST_@AM_DEFAULT_V@) +AM_V_CFG_TEST_0 = @echo " CFG_GEN $@"; + +AM_V_RST_OPTIONS = $(AM_V_CFG_TEST_@AM_V@) +AM_V_RST_OPTIONS_ = $(AM_V_RST_OPTIONS_@AM_DEFAULT_V@) +AM_V_RST_OPTIONS_0 = @echo " RST_OPTIONS $@"; + +AM_V_RST_ZONEOPT = $(AM_V_CFG_TEST_@AM_V@) +AM_V_RST_ZONEOPT_ = $(AM_V_RST_ZONEOPT_@AM_DEFAULT_V@) +AM_V_RST_ZONEOPT_0 = @echo " RST_ZONEOPT $@"; + +AM_V_RST_GRAMMARS = $(AM_V_CFG_TEST_@AM_V@) +AM_V_RST_GRAMMARS_ = $(AM_V_RST_GRAMMARS_@AM_DEFAULT_V@) +AM_V_RST_GRAMMARS_0 = @echo " RST_GRAMMARS $@"; diff --git a/bin/check/named-checkconf.8 b/bin/check/named-checkconf.8 deleted file mode 100644 index 1376953b61..0000000000 --- a/bin/check/named-checkconf.8 +++ /dev/null @@ -1,152 +0,0 @@ -.\" Copyright (C) 2000-2002, 2004, 2005, 2007, 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: named-checkconf -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-01-10 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NAMED\-CHECKCONF" "8" "2014\-01\-10" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -named-checkconf \- named configuration file syntax checking tool -.SH "SYNOPSIS" -.HP \w'\fBnamed\-checkconf\fR\ 'u -\fBnamed\-checkconf\fR [\fB\-chjlvz\fR] [\fB\-p\fR\ [\fB\-x\fR\ ]] [\fB\-t\ \fR\fB\fIdirectory\fR\fR] {filename} -.SH "DESCRIPTION" -.PP -\fBnamed\-checkconf\fR -checks the syntax, but not the semantics, of a -\fBnamed\fR -configuration file\&. The file is parsed and checked for syntax errors, along with all files included by it\&. If no file is specified, -/etc/named\&.conf -is read by default\&. -.PP -Note: files that -\fBnamed\fR -reads in separate parser contexts, such as -rndc\&.key -and -bind\&.keys, are not automatically read by -\fBnamed\-checkconf\fR\&. Configuration errors in these files may cause -\fBnamed\fR -to fail to run, even if -\fBnamed\-checkconf\fR -was successful\&. -\fBnamed\-checkconf\fR -can be run on these files explicitly, however\&. -.SH "OPTIONS" -.PP -\-h -.RS 4 -Print the usage summary and exit\&. -.RE -.PP -\-j -.RS 4 -When loading a zonefile read the journal if it exists\&. -.RE -.PP -\-l -.RS 4 -List all the configured zones\&. Each line of output contains the zone name, class (e\&.g\&. IN), view, and type (e\&.g\&. master or slave)\&. -.RE -.PP -\-c -.RS 4 -Check "core" configuration only\&. This suppresses the loading of plugin modules, and causes all parameters to -\fBplugin\fR -statements to be ignored\&. -.RE -.PP -\-i -.RS 4 -Ignore warnings on deprecated options\&. -.RE -.PP -\-p -.RS 4 -Print out the -named\&.conf -and included files in canonical form if no errors were detected\&. See also the -\fB\-x\fR -option\&. -.RE -.PP -\-t \fIdirectory\fR -.RS 4 -Chroot to -directory -so that include directives in the configuration file are processed as if run by a similarly chrooted -\fBnamed\fR\&. -.RE -.PP -\-v -.RS 4 -Print the version of the -\fBnamed\-checkconf\fR -program and exit\&. -.RE -.PP -\-x -.RS 4 -When printing the configuration files in canonical form, obscure shared secrets by replacing them with strings of question marks (\*(Aq?\*(Aq)\&. This allows the contents of -named\&.conf -and related files to be shared \(em for example, when submitting bug reports \(em without compromising private data\&. This option cannot be used without -\fB\-p\fR\&. -.RE -.PP -\-z -.RS 4 -Perform a test load of all master zones found in -named\&.conf\&. -.RE -.PP -filename -.RS 4 -The name of the configuration file to be checked\&. If not specified, it defaults to -/etc/named\&.conf\&. -.RE -.SH "RETURN VALUES" -.PP -\fBnamed\-checkconf\fR -returns an exit status of 1 if errors were detected and 0 otherwise\&. -.SH "SEE ALSO" -.PP -\fBnamed\fR(8), -\fBnamed-checkzone\fR(8), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000-2002, 2004, 2005, 2007, 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/check/named-checkconf.docbook b/bin/check/named-checkconf.docbook deleted file mode 100644 index f38127e4c1..0000000000 --- a/bin/check/named-checkconf.docbook +++ /dev/null @@ -1,229 +0,0 @@ -]> - - - - - - 2014-01-10 - - - ISC - Internet Systems Consortium, Inc. - - - - named-checkconf - 8 - BIND9 - - - - - 2000 - 2001 - 2002 - 2004 - 2005 - 2007 - 2009 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - named-checkconf - named configuration file syntax checking tool - - - - - named-checkconf - - - - - - filename - - - - DESCRIPTION - - named-checkconf - checks the syntax, but not the semantics, of a - named configuration file. The file is parsed - and checked for syntax errors, along with all files included by it. - If no file is specified, /etc/named.conf is read - by default. - - - Note: files that named reads in separate - parser contexts, such as rndc.key and - bind.keys, are not automatically read - by named-checkconf. Configuration - errors in these files may cause named to - fail to run, even if named-checkconf was - successful. named-checkconf can be run - on these files explicitly, however. - - - - OPTIONS - - - - -h - - - Print the usage summary and exit. - - - - - - -j - - - When loading a zonefile read the journal if it exists. - - - - - - -l - - - List all the configured zones. Each line of output - contains the zone name, class (e.g. IN), view, and type - (e.g. master or slave). - - - - - - -c - - - Check "core" configuration only. This suppresses the loading - of plugin modules, and causes all parameters to - plugin statements to be ignored. - - - - - - -i - - - Ignore warnings on deprecated options. - - - - - - -p - - - Print out the named.conf and included files - in canonical form if no errors were detected. - See also the option. - - - - - - -t directory - - - Chroot to directory so that include - directives in the configuration file are processed as if - run by a similarly chrooted named. - - - - - - -v - - - Print the version of the named-checkconf - program and exit. - - - - - - -x - - - When printing the configuration files in canonical - form, obscure shared secrets by replacing them with - strings of question marks ('?'). This allows the - contents of named.conf and related - files to be shared — for example, when submitting - bug reports — without compromising private data. - This option cannot be used without . - - - - - - -z - - - Perform a test load of all master zones found in - named.conf. - - - - - - filename - - - The name of the configuration file to be checked. If not - specified, it defaults to /etc/named.conf. - - - - - - - - - RETURN VALUES - - named-checkconf - returns an exit status of 1 if - errors were detected and 0 otherwise. - - - - SEE ALSO - - - named8 - , - - named-checkzone8 - , - BIND 9 Administrator Reference Manual. - - - diff --git a/bin/check/named-checkconf.html b/bin/check/named-checkconf.html deleted file mode 100644 index 115dc6d16f..0000000000 --- a/bin/check/named-checkconf.html +++ /dev/null @@ -1,180 +0,0 @@ - - - - - -named-checkconf - - -
-
- - - - - - - -
-

Name

-

- named-checkconf - — named configuration file syntax checking tool -

-
- -
-

Synopsis

-

- named-checkconf - [-chjlvz] - [-p - [-x - ]] - [-t directory] - {filename} -

-
- -
-

DESCRIPTION

- -

named-checkconf - checks the syntax, but not the semantics, of a - named configuration file. The file is parsed - and checked for syntax errors, along with all files included by it. - If no file is specified, /etc/named.conf is read - by default. -

-

- Note: files that named reads in separate - parser contexts, such as rndc.key and - bind.keys, are not automatically read - by named-checkconf. Configuration - errors in these files may cause named to - fail to run, even if named-checkconf was - successful. named-checkconf can be run - on these files explicitly, however. -

-
- -
-

OPTIONS

- -
-
-h
-
-

- Print the usage summary and exit. -

-
-
-j
-
-

- When loading a zonefile read the journal if it exists. -

-
-
-l
-
-

- List all the configured zones. Each line of output - contains the zone name, class (e.g. IN), view, and type - (e.g. master or slave). -

-
-
-c
-
-

- Check "core" configuration only. This suppresses the loading - of plugin modules, and causes all parameters to - plugin statements to be ignored. -

-
-
-i
-
-

- Ignore warnings on deprecated options. -

-
-
-p
-
-

- Print out the named.conf and included files - in canonical form if no errors were detected. - See also the -x option. -

-
-
-t directory
-
-

- Chroot to directory so that include - directives in the configuration file are processed as if - run by a similarly chrooted named. -

-
-
-v
-
-

- Print the version of the named-checkconf - program and exit. -

-
-
-x
-
-

- When printing the configuration files in canonical - form, obscure shared secrets by replacing them with - strings of question marks ('?'). This allows the - contents of named.conf and related - files to be shared — for example, when submitting - bug reports — without compromising private data. - This option cannot be used without -p. -

-
-
-z
-
-

- Perform a test load of all master zones found in - named.conf. -

-
-
filename
-
-

- The name of the configuration file to be checked. If not - specified, it defaults to /etc/named.conf. -

-
-
- -
- -
-

RETURN VALUES

- -

named-checkconf - returns an exit status of 1 if - errors were detected and 0 otherwise. -

-
- -
-

SEE ALSO

- -

- named(8) - , - - named-checkzone(8) - , - BIND 9 Administrator Reference Manual. -

-
-
- diff --git a/bin/check/named-checkconf.rst b/bin/check/named-checkconf.rst new file mode 100644 index 0000000000..d499935a25 --- /dev/null +++ b/bin/check/named-checkconf.rst @@ -0,0 +1,105 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_named-checkconf: + +named-checkconf - named configuration file syntax checking tool +--------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named-checkconf` [**-chjlvz**] [**-p** [**-x** ]] [**-t** directory] {filename} + +Description +~~~~~~~~~~~ + +``named-checkconf`` checks the syntax, but not the semantics, of a +``named`` configuration file. The file is parsed and checked for syntax +errors, along with all files included by it. If no file is specified, +``/etc/named.conf`` is read by default. + +Note: files that ``named`` reads in separate parser contexts, such as +``rndc.key`` and ``bind.keys``, are not automatically read by +``named-checkconf``. Configuration errors in these files may cause +``named`` to fail to run, even if ``named-checkconf`` was successful. +``named-checkconf`` can be run on these files explicitly, however. + +Options +~~~~~~~ + +**-h** + Print the usage summary and exit. + +**-j** + When loading a zonefile read the journal if it exists. + +**-l** + List all the configured zones. Each line of output contains the zone + name, class (e.g. IN), view, and type (e.g. master or slave). + +**-c** + Check "core" configuration only. This suppresses the loading of + plugin modules, and causes all parameters to ``plugin`` statements to + be ignored. + +**-i** + Ignore warnings on deprecated options. + +**-p** + Print out the ``named.conf`` and included files in canonical form if + no errors were detected. See also the ``-x`` option. + +**-t** directory + Chroot to ``directory`` so that include directives in the + configuration file are processed as if run by a similarly chrooted + ``named``. + +**-v** + Print the version of the ``named-checkconf`` program and exit. + +**-x** + When printing the configuration files in canonical form, obscure + shared secrets by replacing them with strings of question marks + ('?'). This allows the contents of ``named.conf`` and related files + to be shared MDASH for example, when submitting bug reports MDASH + without compromising private data. This option cannot be used without + ``-p``. + +**-z** + Perform a test load of all master zones found in ``named.conf``. + +filename + The name of the configuration file to be checked. If not specified, + it defaults to ``/etc/named.conf``. + +Return Values +~~~~~~~~~~~~~ + +``named-checkconf`` returns an exit status of 1 if errors were detected +and 0 otherwise. + +See Also +~~~~~~~~ + +:manpage:`named(8)`, :manpage:`named-checkzone(8)`, BIND 9 Administrator Reference Manual. diff --git a/bin/check/named-checkzone.8 b/bin/check/named-checkzone.8 deleted file mode 100644 index 21c15a1892..0000000000 --- a/bin/check/named-checkzone.8 +++ /dev/null @@ -1,329 +0,0 @@ -.\" Copyright (C) 2000-2002, 2004-2007, 2009-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: named-checkzone -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-02-19 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NAMED\-CHECKZONE" "8" "2014\-02\-19" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -named-checkzone, named-compilezone \- zone file validity checking or converting tool -.SH "SYNOPSIS" -.HP \w'\fBnamed\-checkzone\fR\ 'u -\fBnamed\-checkzone\fR [\fB\-d\fR] [\fB\-h\fR] [\fB\-j\fR] [\fB\-q\fR] [\fB\-v\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-f\ \fR\fB\fIformat\fR\fR] [\fB\-F\ \fR\fB\fIformat\fR\fR] [\fB\-J\ \fR\fB\fIfilename\fR\fR] [\fB\-i\ \fR\fB\fImode\fR\fR] [\fB\-k\ \fR\fB\fImode\fR\fR] [\fB\-m\ \fR\fB\fImode\fR\fR] [\fB\-M\ \fR\fB\fImode\fR\fR] [\fB\-n\ \fR\fB\fImode\fR\fR] [\fB\-l\ \fR\fB\fIttl\fR\fR] [\fB\-L\ \fR\fB\fIserial\fR\fR] [\fB\-o\ \fR\fB\fIfilename\fR\fR] [\fB\-r\ \fR\fB\fImode\fR\fR] [\fB\-s\ \fR\fB\fIstyle\fR\fR] [\fB\-S\ \fR\fB\fImode\fR\fR] [\fB\-t\ \fR\fB\fIdirectory\fR\fR] [\fB\-T\ \fR\fB\fImode\fR\fR] [\fB\-w\ \fR\fB\fIdirectory\fR\fR] [\fB\-D\fR] [\fB\-W\ \fR\fB\fImode\fR\fR] {zonename} {filename} -.HP \w'\fBnamed\-compilezone\fR\ 'u -\fBnamed\-compilezone\fR [\fB\-d\fR] [\fB\-j\fR] [\fB\-q\fR] [\fB\-v\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-C\ \fR\fB\fImode\fR\fR] [\fB\-f\ \fR\fB\fIformat\fR\fR] [\fB\-F\ \fR\fB\fIformat\fR\fR] [\fB\-J\ \fR\fB\fIfilename\fR\fR] [\fB\-i\ \fR\fB\fImode\fR\fR] [\fB\-k\ \fR\fB\fImode\fR\fR] [\fB\-m\ \fR\fB\fImode\fR\fR] [\fB\-n\ \fR\fB\fImode\fR\fR] [\fB\-l\ \fR\fB\fIttl\fR\fR] [\fB\-L\ \fR\fB\fIserial\fR\fR] [\fB\-r\ \fR\fB\fImode\fR\fR] [\fB\-s\ \fR\fB\fIstyle\fR\fR] [\fB\-t\ \fR\fB\fIdirectory\fR\fR] [\fB\-T\ \fR\fB\fImode\fR\fR] [\fB\-w\ \fR\fB\fIdirectory\fR\fR] [\fB\-D\fR] [\fB\-W\ \fR\fB\fImode\fR\fR] {\fB\-o\ \fR\fB\fIfilename\fR\fR} {zonename} {filename} -.SH "DESCRIPTION" -.PP -\fBnamed\-checkzone\fR -checks the syntax and integrity of a zone file\&. It performs the same checks as -\fBnamed\fR -does when loading a zone\&. This makes -\fBnamed\-checkzone\fR -useful for checking zone files before configuring them into a name server\&. -.PP -\fBnamed\-compilezone\fR -is similar to -\fBnamed\-checkzone\fR, but it always dumps the zone contents to a specified file in a specified format\&. Additionally, it applies stricter check levels by default, since the dump output will be used as an actual zone file loaded by -\fBnamed\fR\&. When manually specified otherwise, the check levels must at least be as strict as those specified in the -\fBnamed\fR -configuration file\&. -.SH "OPTIONS" -.PP -\-d -.RS 4 -Enable debugging\&. -.RE -.PP -\-h -.RS 4 -Print the usage summary and exit\&. -.RE -.PP -\-q -.RS 4 -Quiet mode \- exit code only\&. -.RE -.PP -\-v -.RS 4 -Print the version of the -\fBnamed\-checkzone\fR -program and exit\&. -.RE -.PP -\-j -.RS 4 -When loading a zone file, read the journal if it exists\&. The journal file name is assumed to be the zone file name appended with the string -\&.jnl\&. -.RE -.PP -\-J \fIfilename\fR -.RS 4 -When loading the zone file read the journal from the given file, if it exists\&. (Implies \-j\&.) -.RE -.PP -\-c \fIclass\fR -.RS 4 -Specify the class of the zone\&. If not specified, "IN" is assumed\&. -.RE -.PP -\-i \fImode\fR -.RS 4 -Perform post\-load zone integrity checks\&. Possible modes are -\fB"full"\fR -(default), -\fB"full\-sibling"\fR, -\fB"local"\fR, -\fB"local\-sibling"\fR -and -\fB"none"\fR\&. -.sp -Mode -\fB"full"\fR -checks that MX records refer to A or AAAA record (both in\-zone and out\-of\-zone hostnames)\&. Mode -\fB"local"\fR -only checks MX records which refer to in\-zone hostnames\&. -.sp -Mode -\fB"full"\fR -checks that SRV records refer to A or AAAA record (both in\-zone and out\-of\-zone hostnames)\&. Mode -\fB"local"\fR -only checks SRV records which refer to in\-zone hostnames\&. -.sp -Mode -\fB"full"\fR -checks that delegation NS records refer to A or AAAA record (both in\-zone and out\-of\-zone hostnames)\&. It also checks that glue address records in the zone match those advertised by the child\&. Mode -\fB"local"\fR -only checks NS records which refer to in\-zone hostnames or that some required glue exists, that is when the nameserver is in a child zone\&. -.sp -Mode -\fB"full\-sibling"\fR -and -\fB"local\-sibling"\fR -disable sibling glue checks but are otherwise the same as -\fB"full"\fR -and -\fB"local"\fR -respectively\&. -.sp -Mode -\fB"none"\fR -disables the checks\&. -.RE -.PP -\-f \fIformat\fR -.RS 4 -Specify the format of the zone file\&. Possible formats are -\fB"text"\fR -(default), -\fB"raw"\fR, and -\fB"map"\fR\&. -.RE -.PP -\-F \fIformat\fR -.RS 4 -Specify the format of the output file specified\&. For -\fBnamed\-checkzone\fR, this does not cause any effects unless it dumps the zone contents\&. -.sp -Possible formats are -\fB"text"\fR -(default), which is the standard textual representation of the zone, and -\fB"map"\fR, -\fB"raw"\fR, and -\fB"raw=N"\fR, which store the zone in a binary format for rapid loading by -\fBnamed\fR\&. -\fB"raw=N"\fR -specifies the format version of the raw zone file: if N is 0, the raw file can be read by any version of -\fBnamed\fR; if N is 1, the file can be read by release 9\&.9\&.0 or higher; the default is 1\&. -.RE -.PP -\-k \fImode\fR -.RS 4 -Perform -\fB"check\-names"\fR -checks with the specified failure mode\&. Possible modes are -\fB"fail"\fR -(default for -\fBnamed\-compilezone\fR), -\fB"warn"\fR -(default for -\fBnamed\-checkzone\fR) and -\fB"ignore"\fR\&. -.RE -.PP -\-l \fIttl\fR -.RS 4 -Sets a maximum permissible TTL for the input file\&. Any record with a TTL higher than this value will cause the zone to be rejected\&. This is similar to using the -\fBmax\-zone\-ttl\fR -option in -named\&.conf\&. -.RE -.PP -\-L \fIserial\fR -.RS 4 -When compiling a zone to "raw" or "map" format, set the "source serial" value in the header to the specified serial number\&. (This is expected to be used primarily for testing purposes\&.) -.RE -.PP -\-m \fImode\fR -.RS 4 -Specify whether MX records should be checked to see if they are addresses\&. Possible modes are -\fB"fail"\fR, -\fB"warn"\fR -(default) and -\fB"ignore"\fR\&. -.RE -.PP -\-M \fImode\fR -.RS 4 -Check if a MX record refers to a CNAME\&. Possible modes are -\fB"fail"\fR, -\fB"warn"\fR -(default) and -\fB"ignore"\fR\&. -.RE -.PP -\-n \fImode\fR -.RS 4 -Specify whether NS records should be checked to see if they are addresses\&. Possible modes are -\fB"fail"\fR -(default for -\fBnamed\-compilezone\fR), -\fB"warn"\fR -(default for -\fBnamed\-checkzone\fR) and -\fB"ignore"\fR\&. -.RE -.PP -\-o \fIfilename\fR -.RS 4 -Write zone output to -filename\&. If -filename -is -\- -then write to standard out\&. This is mandatory for -\fBnamed\-compilezone\fR\&. -.RE -.PP -\-r \fImode\fR -.RS 4 -Check for records that are treated as different by DNSSEC but are semantically equal in plain DNS\&. Possible modes are -\fB"fail"\fR, -\fB"warn"\fR -(default) and -\fB"ignore"\fR\&. -.RE -.PP -\-s \fIstyle\fR -.RS 4 -Specify the style of the dumped zone file\&. Possible styles are -\fB"full"\fR -(default) and -\fB"relative"\fR\&. The full format is most suitable for processing automatically by a separate script\&. On the other hand, the relative format is more human\-readable and is thus suitable for editing by hand\&. For -\fBnamed\-checkzone\fR -this does not cause any effects unless it dumps the zone contents\&. It also does not have any meaning if the output format is not text\&. -.RE -.PP -\-S \fImode\fR -.RS 4 -Check if a SRV record refers to a CNAME\&. Possible modes are -\fB"fail"\fR, -\fB"warn"\fR -(default) and -\fB"ignore"\fR\&. -.RE -.PP -\-t \fIdirectory\fR -.RS 4 -Chroot to -directory -so that include directives in the configuration file are processed as if run by a similarly chrooted -\fBnamed\fR\&. -.RE -.PP -\-T \fImode\fR -.RS 4 -Check if Sender Policy Framework (SPF) records exist and issues a warning if an SPF\-formatted TXT record is not also present\&. Possible modes are -\fB"warn"\fR -(default), -\fB"ignore"\fR\&. -.RE -.PP -\-w \fIdirectory\fR -.RS 4 -chdir to -directory -so that relative filenames in master file $INCLUDE directives work\&. This is similar to the directory clause in -named\&.conf\&. -.RE -.PP -\-D -.RS 4 -Dump zone file in canonical format\&. This is always enabled for -\fBnamed\-compilezone\fR\&. -.RE -.PP -\-W \fImode\fR -.RS 4 -Specify whether to check for non\-terminal wildcards\&. Non\-terminal wildcards are almost always the result of a failure to understand the wildcard matching algorithm (RFC 1034)\&. Possible modes are -\fB"warn"\fR -(default) and -\fB"ignore"\fR\&. -.RE -.PP -zonename -.RS 4 -The domain name of the zone being checked\&. -.RE -.PP -filename -.RS 4 -The name of the zone file\&. -.RE -.SH "RETURN VALUES" -.PP -\fBnamed\-checkzone\fR -returns an exit status of 1 if errors were detected and 0 otherwise\&. -.SH "SEE ALSO" -.PP -\fBnamed\fR(8), -\fBnamed-checkconf\fR(8), -RFC 1035, -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000-2002, 2004-2007, 2009-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/check/named-checkzone.docbook b/bin/check/named-checkzone.docbook deleted file mode 100644 index 2094d9b3c7..0000000000 --- a/bin/check/named-checkzone.docbook +++ /dev/null @@ -1,529 +0,0 @@ - - - - - - 2014-02-19 - - - ISC - Internet Systems Consortium, Inc. - - - - named-checkzone - 8 - BIND9 - - - - - 2000 - 2001 - 2002 - 2004 - 2005 - 2006 - 2007 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - named-checkzone - named-compilezone - zone file validity checking or converting tool - - - - - named-checkzone - - - - - - - - - - - - - - - - - - - - - - - - - - zonename - filename - - - named-compilezone - - - - - - - - - - - - - - - - - - - - - - - - zonename - filename - - - - DESCRIPTION - - named-checkzone - checks the syntax and integrity of a zone file. It performs the - same checks as named does when loading a - zone. This makes named-checkzone useful for - checking zone files before configuring them into a name server. - - - named-compilezone is similar to - named-checkzone, but it always dumps the - zone contents to a specified file in a specified format. - Additionally, it applies stricter check levels by default, - since the dump output will be used as an actual zone file - loaded by named. - When manually specified otherwise, the check levels must at - least be as strict as those specified in the - named configuration file. - - - - OPTIONS - - - - - -d - - - Enable debugging. - - - - - - -h - - - Print the usage summary and exit. - - - - - - -q - - - Quiet mode - exit code only. - - - - - - -v - - - Print the version of the named-checkzone - program and exit. - - - - - - -j - - - When loading a zone file, read the journal if it exists. - The journal file name is assumed to be the zone file name - appended with the string .jnl. - - - - - - -J filename - - - When loading the zone file read the journal from the given - file, if it exists. (Implies -j.) - - - - - - -c class - - - Specify the class of the zone. If not specified, "IN" is assumed. - - - - - - -i mode - - - Perform post-load zone integrity checks. Possible modes are - "full" (default), - "full-sibling", - "local", - "local-sibling" and - "none". - - - Mode "full" checks that MX records - refer to A or AAAA record (both in-zone and out-of-zone - hostnames). Mode "local" only - checks MX records which refer to in-zone hostnames. - - - Mode "full" checks that SRV records - refer to A or AAAA record (both in-zone and out-of-zone - hostnames). Mode "local" only - checks SRV records which refer to in-zone hostnames. - - - Mode "full" checks that delegation NS - records refer to A or AAAA record (both in-zone and out-of-zone - hostnames). It also checks that glue address records - in the zone match those advertised by the child. - Mode "local" only checks NS records which - refer to in-zone hostnames or that some required glue exists, - that is when the nameserver is in a child zone. - - - Mode "full-sibling" and - "local-sibling" disable sibling glue - checks but are otherwise the same as "full" - and "local" respectively. - - - Mode "none" disables the checks. - - - - - - -f format - - - Specify the format of the zone file. - Possible formats are "text" (default), - "raw", and "map". - - - - - - -F format - - - Specify the format of the output file specified. - For named-checkzone, - this does not cause any effects unless it dumps the zone - contents. - - - Possible formats are "text" (default), - which is the standard textual representation of the zone, - and "map", "raw", - and "raw=N", which store the zone in a - binary format for rapid loading by named. - "raw=N" specifies the format version of - the raw zone file: if N is 0, the raw file can be read by - any version of named; if N is 1, the file - can be read by release 9.9.0 or higher; the default is 1. - - - - - - -k mode - - - Perform "check-names" checks with the - specified failure mode. - Possible modes are "fail" - (default for named-compilezone), - "warn" - (default for named-checkzone) and - "ignore". - - - - - - -l ttl - - - Sets a maximum permissible TTL for the input file. - Any record with a TTL higher than this value will cause - the zone to be rejected. This is similar to using the - max-zone-ttl option in - named.conf. - - - - - - -L serial - - - When compiling a zone to "raw" or "map" format, set the - "source serial" value in the header to the specified serial - number. (This is expected to be used primarily for testing - purposes.) - - - - - - -m mode - - - Specify whether MX records should be checked to see if they - are addresses. Possible modes are "fail", - "warn" (default) and - "ignore". - - - - - - -M mode - - - Check if a MX record refers to a CNAME. - Possible modes are "fail", - "warn" (default) and - "ignore". - - - - - - -n mode - - - Specify whether NS records should be checked to see if they - are addresses. - Possible modes are "fail" - (default for named-compilezone), - "warn" - (default for named-checkzone) and - "ignore". - - - - - - -o filename - - - Write zone output to filename. - If filename is - then - write to standard out. - This is mandatory for named-compilezone. - - - - - - -r mode - - - Check for records that are treated as different by DNSSEC but - are semantically equal in plain DNS. - Possible modes are "fail", - "warn" (default) and - "ignore". - - - - - - -s style - - - Specify the style of the dumped zone file. - Possible styles are "full" (default) - and "relative". - The full format is most suitable for processing - automatically by a separate script. - On the other hand, the relative format is more - human-readable and is thus suitable for editing by hand. - For named-checkzone - this does not cause any effects unless it dumps the zone - contents. - It also does not have any meaning if the output format - is not text. - - - - - - -S mode - - - Check if a SRV record refers to a CNAME. - Possible modes are "fail", - "warn" (default) and - "ignore". - - - - - - -t directory - - - Chroot to directory so that - include - directives in the configuration file are processed as if - run by a similarly chrooted named. - - - - - - -T mode - - - Check if Sender Policy Framework (SPF) records exist - and issues a warning if an SPF-formatted TXT record is - not also present. Possible modes are "warn" - (default), "ignore". - - - - - - -w directory - - - chdir to directory so that - relative - filenames in master file $INCLUDE directives work. This - is similar to the directory clause in - named.conf. - - - - - - -D - - - Dump zone file in canonical format. - This is always enabled for named-compilezone. - - - - - - -W mode - - - Specify whether to check for non-terminal wildcards. - Non-terminal wildcards are almost always the result of a - failure to understand the wildcard matching algorithm (RFC 1034). - Possible modes are "warn" (default) - and - "ignore". - - - - - - zonename - - - The domain name of the zone being checked. - - - - - - filename - - - The name of the zone file. - - - - - - - - - RETURN VALUES - - named-checkzone - returns an exit status of 1 if - errors were detected and 0 otherwise. - - - - SEE ALSO - - - named8 - , - - named-checkconf8 - , - RFC 1035, - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/check/named-checkzone.html b/bin/check/named-checkzone.html deleted file mode 100644 index 5021689ef4..0000000000 --- a/bin/check/named-checkzone.html +++ /dev/null @@ -1,429 +0,0 @@ - - - - - -named-checkzone - - -
-
- - - - - - - -
-

Name

-

- named-checkzone, - named-compilezone - — zone file validity checking or converting tool -

-
- -
-

Synopsis

-

- named-checkzone - [-d] - [-h] - [-j] - [-q] - [-v] - [-c class] - [-f format] - [-F format] - [-J filename] - [-i mode] - [-k mode] - [-m mode] - [-M mode] - [-n mode] - [-l ttl] - [-L serial] - [-o filename] - [-r mode] - [-s style] - [-S mode] - [-t directory] - [-T mode] - [-w directory] - [-D] - [-W mode] - {zonename} - {filename} -

-

- named-compilezone - [-d] - [-j] - [-q] - [-v] - [-c class] - [-C mode] - [-f format] - [-F format] - [-J filename] - [-i mode] - [-k mode] - [-m mode] - [-n mode] - [-l ttl] - [-L serial] - [-r mode] - [-s style] - [-t directory] - [-T mode] - [-w directory] - [-D] - [-W mode] - {-o filename} - {zonename} - {filename} -

-
- -
-

DESCRIPTION

- -

named-checkzone - checks the syntax and integrity of a zone file. It performs the - same checks as named does when loading a - zone. This makes named-checkzone useful for - checking zone files before configuring them into a name server. -

-

- named-compilezone is similar to - named-checkzone, but it always dumps the - zone contents to a specified file in a specified format. - Additionally, it applies stricter check levels by default, - since the dump output will be used as an actual zone file - loaded by named. - When manually specified otherwise, the check levels must at - least be as strict as those specified in the - named configuration file. -

-
- -
-

OPTIONS

- - -
-
-d
-
-

- Enable debugging. -

-
-
-h
-
-

- Print the usage summary and exit. -

-
-
-q
-
-

- Quiet mode - exit code only. -

-
-
-v
-
-

- Print the version of the named-checkzone - program and exit. -

-
-
-j
-
-

- When loading a zone file, read the journal if it exists. - The journal file name is assumed to be the zone file name - appended with the string .jnl. -

-
-
-J filename
-
-

- When loading the zone file read the journal from the given - file, if it exists. (Implies -j.) -

-
-
-c class
-
-

- Specify the class of the zone. If not specified, "IN" is assumed. -

-
-
-i mode
-
-

- Perform post-load zone integrity checks. Possible modes are - "full" (default), - "full-sibling", - "local", - "local-sibling" and - "none". -

-

- Mode "full" checks that MX records - refer to A or AAAA record (both in-zone and out-of-zone - hostnames). Mode "local" only - checks MX records which refer to in-zone hostnames. -

-

- Mode "full" checks that SRV records - refer to A or AAAA record (both in-zone and out-of-zone - hostnames). Mode "local" only - checks SRV records which refer to in-zone hostnames. -

-

- Mode "full" checks that delegation NS - records refer to A or AAAA record (both in-zone and out-of-zone - hostnames). It also checks that glue address records - in the zone match those advertised by the child. - Mode "local" only checks NS records which - refer to in-zone hostnames or that some required glue exists, - that is when the nameserver is in a child zone. -

-

- Mode "full-sibling" and - "local-sibling" disable sibling glue - checks but are otherwise the same as "full" - and "local" respectively. -

-

- Mode "none" disables the checks. -

-
-
-f format
-
-

- Specify the format of the zone file. - Possible formats are "text" (default), - "raw", and "map". -

-
-
-F format
-
-

- Specify the format of the output file specified. - For named-checkzone, - this does not cause any effects unless it dumps the zone - contents. -

-

- Possible formats are "text" (default), - which is the standard textual representation of the zone, - and "map", "raw", - and "raw=N", which store the zone in a - binary format for rapid loading by named. - "raw=N" specifies the format version of - the raw zone file: if N is 0, the raw file can be read by - any version of named; if N is 1, the file - can be read by release 9.9.0 or higher; the default is 1. -

-
-
-k mode
-
-

- Perform "check-names" checks with the - specified failure mode. - Possible modes are "fail" - (default for named-compilezone), - "warn" - (default for named-checkzone) and - "ignore". -

-
-
-l ttl
-
-

- Sets a maximum permissible TTL for the input file. - Any record with a TTL higher than this value will cause - the zone to be rejected. This is similar to using the - max-zone-ttl option in - named.conf. -

-
-
-L serial
-
-

- When compiling a zone to "raw" or "map" format, set the - "source serial" value in the header to the specified serial - number. (This is expected to be used primarily for testing - purposes.) -

-
-
-m mode
-
-

- Specify whether MX records should be checked to see if they - are addresses. Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-M mode
-
-

- Check if a MX record refers to a CNAME. - Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-n mode
-
-

- Specify whether NS records should be checked to see if they - are addresses. - Possible modes are "fail" - (default for named-compilezone), - "warn" - (default for named-checkzone) and - "ignore". -

-
-
-o filename
-
-

- Write zone output to filename. - If filename is - then - write to standard out. - This is mandatory for named-compilezone. -

-
-
-r mode
-
-

- Check for records that are treated as different by DNSSEC but - are semantically equal in plain DNS. - Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-s style
-
-

- Specify the style of the dumped zone file. - Possible styles are "full" (default) - and "relative". - The full format is most suitable for processing - automatically by a separate script. - On the other hand, the relative format is more - human-readable and is thus suitable for editing by hand. - For named-checkzone - this does not cause any effects unless it dumps the zone - contents. - It also does not have any meaning if the output format - is not text. -

-
-
-S mode
-
-

- Check if a SRV record refers to a CNAME. - Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-t directory
-
-

- Chroot to directory so that - include - directives in the configuration file are processed as if - run by a similarly chrooted named. -

-
-
-T mode
-
-

- Check if Sender Policy Framework (SPF) records exist - and issues a warning if an SPF-formatted TXT record is - not also present. Possible modes are "warn" - (default), "ignore". -

-
-
-w directory
-
-

- chdir to directory so that - relative - filenames in master file $INCLUDE directives work. This - is similar to the directory clause in - named.conf. -

-
-
-D
-
-

- Dump zone file in canonical format. - This is always enabled for named-compilezone. -

-
-
-W mode
-
-

- Specify whether to check for non-terminal wildcards. - Non-terminal wildcards are almost always the result of a - failure to understand the wildcard matching algorithm (RFC 1034). - Possible modes are "warn" (default) - and - "ignore". -

-
-
zonename
-
-

- The domain name of the zone being checked. -

-
-
filename
-
-

- The name of the zone file. -

-
-
- -
- -
-

RETURN VALUES

- -

named-checkzone - returns an exit status of 1 if - errors were detected and 0 otherwise. -

-
- -
-

SEE ALSO

- -

- named(8) - , - - named-checkconf(8) - , - RFC 1035, - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/check/named-checkzone.rst b/bin/check/named-checkzone.rst new file mode 100644 index 0000000000..ee39e5e991 --- /dev/null +++ b/bin/check/named-checkzone.rst @@ -0,0 +1,214 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_named-checkzone: + +named-checkzone, named-compilezone - zone file validity checking or converting tool +----------------------------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named-checkzone` [**-d**] [**-h**] [**-j**] [**-q**] [**-v**] [**-c** class] [**-f** format] [**-F** format] [**-J** filename] [**-i** mode] [**-k** mode] [**-m** mode] [**-M** mode] [**-n** mode] [**-l** ttl] [**-L** serial] [**-o** filename] [**-r** mode] [**-s** style] [**-S** mode] [**-t** directory] [**-T** mode] [**-w** directory] [**-D**] [**-W** mode] {zonename} {filename} + +:program:`named-compilezone` [**-d**] [**-j**] [**-q**] [**-v**] [**-c** class] [**-C** mode] [**-f** format] [**-F** format] [**-J** filename] [**-i** mode] [**-k** mode] [**-m** mode] [**-n** mode] [**-l** ttl] [**-L** serial] [**-r** mode] [**-s** style] [**-t** directory] [**-T** mode] [**-w** directory] [**-D**] [**-W** mode] {**-o** filename} {zonename} {filename} + +Description +~~~~~~~~~~~ + +``named-checkzone`` checks the syntax and integrity of a zone file. It +performs the same checks as ``named`` does when loading a zone. This +makes ``named-checkzone`` useful for checking zone files before +configuring them into a name server. + +``named-compilezone`` is similar to ``named-checkzone``, but it always +dumps the zone contents to a specified file in a specified format. +Additionally, it applies stricter check levels by default, since the +dump output will be used as an actual zone file loaded by ``named``. +When manually specified otherwise, the check levels must at least be as +strict as those specified in the ``named`` configuration file. + +Options +~~~~~~~ + +**-d** + Enable debugging. + +**-h** + Print the usage summary and exit. + +**-q** + Quiet mode - exit code only. + +**-v** + Print the version of the ``named-checkzone`` program and exit. + +**-j** + When loading a zone file, read the journal if it exists. The journal + file name is assumed to be the zone file name appended with the + string ``.jnl``. + +**-J** filename + When loading the zone file read the journal from the given file, if + it exists. (Implies -j.) + +**-c** class + Specify the class of the zone. If not specified, "IN" is assumed. + +**-i** mode + Perform post-load zone integrity checks. Possible modes are + ``"full"`` (default), ``"full-sibling"``, ``"local"``, + ``"local-sibling"`` and ``"none"``. + + Mode ``"full"`` checks that MX records refer to A or AAAA record + (both in-zone and out-of-zone hostnames). Mode ``"local"`` only + checks MX records which refer to in-zone hostnames. + + Mode ``"full"`` checks that SRV records refer to A or AAAA record + (both in-zone and out-of-zone hostnames). Mode ``"local"`` only + checks SRV records which refer to in-zone hostnames. + + Mode ``"full"`` checks that delegation NS records refer to A or AAAA + record (both in-zone and out-of-zone hostnames). It also checks that + glue address records in the zone match those advertised by the child. + Mode ``"local"`` only checks NS records which refer to in-zone + hostnames or that some required glue exists, that is when the + nameserver is in a child zone. + + Mode ``"full-sibling"`` and ``"local-sibling"`` disable sibling glue + checks but are otherwise the same as ``"full"`` and ``"local"`` + respectively. + + Mode ``"none"`` disables the checks. + +**-f** format + Specify the format of the zone file. Possible formats are ``"text"`` + (default), ``"raw"``, and ``"map"``. + +**-F** format + Specify the format of the output file specified. For + ``named-checkzone``, this does not cause any effects unless it dumps + the zone contents. + + Possible formats are ``"text"`` (default), which is the standard + textual representation of the zone, and ``"map"``, ``"raw"``, and + ``"raw=N"``, which store the zone in a binary format for rapid + loading by ``named``. ``"raw=N"`` specifies the format version of the + raw zone file: if N is 0, the raw file can be read by any version of + ``named``; if N is 1, the file can be read by release 9.9.0 or + higher; the default is 1. + +**-k** mode + Perform ``"check-names"`` checks with the specified failure mode. + Possible modes are ``"fail"`` (default for ``named-compilezone``), + ``"warn"`` (default for ``named-checkzone``) and ``"ignore"``. + +**-l** ttl + Sets a maximum permissible TTL for the input file. Any record with a + TTL higher than this value will cause the zone to be rejected. This + is similar to using the ``max-zone-ttl`` option in ``named.conf``. + +**-L** serial + When compiling a zone to "raw" or "map" format, set the "source + serial" value in the header to the specified serial number. (This is + expected to be used primarily for testing purposes.) + +**-m** mode + Specify whether MX records should be checked to see if they are + addresses. Possible modes are ``"fail"``, ``"warn"`` (default) and + ``"ignore"``. + +**-M** mode + Check if a MX record refers to a CNAME. Possible modes are + ``"fail"``, ``"warn"`` (default) and ``"ignore"``. + +**-n** mode + Specify whether NS records should be checked to see if they are + addresses. Possible modes are ``"fail"`` (default for + ``named-compilezone``), ``"warn"`` (default for ``named-checkzone``) + and ``"ignore"``. + +**-o** filename + Write zone output to ``filename``. If ``filename`` is ``-`` then + write to standard out. This is mandatory for ``named-compilezone``. + +**-r** mode + Check for records that are treated as different by DNSSEC but are + semantically equal in plain DNS. Possible modes are ``"fail"``, + ``"warn"`` (default) and ``"ignore"``. + +**-s** style + Specify the style of the dumped zone file. Possible styles are + ``"full"`` (default) and ``"relative"``. The full format is most + suitable for processing automatically by a separate script. On the + other hand, the relative format is more human-readable and is thus + suitable for editing by hand. For ``named-checkzone`` this does not + cause any effects unless it dumps the zone contents. It also does not + have any meaning if the output format is not text. + +**-S** mode + Check if a SRV record refers to a CNAME. Possible modes are + ``"fail"``, ``"warn"`` (default) and ``"ignore"``. + +**-t** directory + Chroot to ``directory`` so that include directives in the + configuration file are processed as if run by a similarly chrooted + ``named``. + +**-T** mode + Check if Sender Policy Framework (SPF) records exist and issues a + warning if an SPF-formatted TXT record is not also present. Possible + modes are ``"warn"`` (default), ``"ignore"``. + +**-w** directory + chdir to ``directory`` so that relative filenames in master file + $INCLUDE directives work. This is similar to the directory clause in + ``named.conf``. + +**-D** + Dump zone file in canonical format. This is always enabled for + ``named-compilezone``. + +**-W** mode + Specify whether to check for non-terminal wildcards. Non-terminal + wildcards are almost always the result of a failure to understand the + wildcard matching algorithm (:rfc:`1034`). Possible modes are ``"warn"`` + (default) and ``"ignore"``. + +zonename + The domain name of the zone being checked. + +filename + The name of the zone file. + +Return Values +~~~~~~~~~~~~~ + +``named-checkzone`` returns an exit status of 1 if errors were detected +and 0 otherwise. + +See Also +~~~~~~~~ + +:manpage:`named(8)`, :manpage:`named-checkconf(8)`, :rfc:`1035`, BIND 9 Administrator Reference +Manual. diff --git a/bin/confgen/ddns-confgen.8 b/bin/confgen/ddns-confgen.8 deleted file mode 100644 index ef88cf20e0..0000000000 --- a/bin/confgen/ddns-confgen.8 +++ /dev/null @@ -1,148 +0,0 @@ -.\" Copyright (C) 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: ddns-confgen -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-03-06 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DDNS\-CONFGEN" "8" "2014\-03\-06" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -ddns-confgen \- ddns key generation tool -.SH "SYNOPSIS" -.HP \w'\fBtsig\-keygen\fR\ 'u -\fBtsig\-keygen\fR [\fB\-a\ \fR\fB\fIalgorithm\fR\fR] [\fB\-h\fR] [name] -.HP \w'\fBddns\-confgen\fR\ 'u -\fBddns\-confgen\fR [\fB\-a\ \fR\fB\fIalgorithm\fR\fR] [\fB\-h\fR] [\fB\-k\ \fR\fB\fIkeyname\fR\fR] [\fB\-q\fR] [\fB\-r\ \fR\fB\fIrandomfile\fR\fR] [\-s\ \fIname\fR | \-z\ \fIzone\fR] -.SH "DESCRIPTION" -.PP -\fBtsig\-keygen\fR -and -\fBddns\-confgen\fR -are invocation methods for a utility that generates keys for use in TSIG signing\&. The resulting keys can be used, for example, to secure dynamic DNS updates to a zone or for the -\fBrndc\fR -command channel\&. -.PP -When run as -\fBtsig\-keygen\fR, a domain name can be specified on the command line which will be used as the name of the generated key\&. If no name is specified, the default is -\fBtsig\-key\fR\&. -.PP -When run as -\fBddns\-confgen\fR, the generated key is accompanied by configuration text and instructions that can be used with -\fBnsupdate\fR -and -\fBnamed\fR -when setting up dynamic DNS, including an example -\fBupdate\-policy\fR -statement\&. (This usage similar to the -\fBrndc\-confgen\fR -command for setting up command channel security\&.) -.PP -Note that -\fBnamed\fR -itself can configure a local DDNS key for use with -\fBnsupdate \-l\fR: it does this when a zone is configured with -\fBupdate\-policy local;\fR\&. -\fBddns\-confgen\fR -is only needed when a more elaborate configuration is required: for instance, if -\fBnsupdate\fR -is to be used from a remote system\&. -.SH "OPTIONS" -.PP -\-a \fIalgorithm\fR -.RS 4 -Specifies the algorithm to use for the TSIG key\&. Available choices are: hmac\-md5, hmac\-sha1, hmac\-sha224, hmac\-sha256, hmac\-sha384 and hmac\-sha512\&. The default is hmac\-sha256\&. Options are case\-insensitive, and the "hmac\-" prefix may be omitted\&. -.RE -.PP -\-h -.RS 4 -Prints a short summary of options and arguments\&. -.RE -.PP -\-k \fIkeyname\fR -.RS 4 -Specifies the key name of the DDNS authentication key\&. The default is -\fBddns\-key\fR -when neither the -\fB\-s\fR -nor -\fB\-z\fR -option is specified; otherwise, the default is -\fBddns\-key\fR -as a separate label followed by the argument of the option, e\&.g\&., -\fBddns\-key\&.example\&.com\&.\fR -The key name must have the format of a valid domain name, consisting of letters, digits, hyphens and periods\&. -.RE -.PP -\-q -.RS 4 -(\fBddns\-confgen\fR -only\&.) Quiet mode: Print only the key, with no explanatory text or usage examples; This is essentially identical to -\fBtsig\-keygen\fR\&. -.RE -.PP -\-s \fIname\fR -.RS 4 -(\fBddns\-confgen\fR -only\&.) Generate configuration example to allow dynamic updates of a single hostname\&. The example -\fBnamed\&.conf\fR -text shows how to set an update policy for the specified -\fIname\fR -using the "name" nametype\&. The default key name is ddns\-key\&.\fIname\fR\&. Note that the "self" nametype cannot be used, since the name to be updated may differ from the key name\&. This option cannot be used with the -\fB\-z\fR -option\&. -.RE -.PP -\-z \fIzone\fR -.RS 4 -(\fBddns\-confgen\fR -only\&.) Generate configuration example to allow dynamic updates of a zone: The example -\fBnamed\&.conf\fR -text shows how to set an update policy for the specified -\fIzone\fR -using the "zonesub" nametype, allowing updates to all subdomain names within that -\fIzone\fR\&. This option cannot be used with the -\fB\-s\fR -option\&. -.RE -.SH "SEE ALSO" -.PP -\fBnsupdate\fR(1), -\fBnamed.conf\fR(5), -\fBnamed\fR(8), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/confgen/ddns-confgen.docbook b/bin/confgen/ddns-confgen.docbook deleted file mode 100644 index c5342f4cf8..0000000000 --- a/bin/confgen/ddns-confgen.docbook +++ /dev/null @@ -1,213 +0,0 @@ - - - - - - 2014-03-06 - - - ISC - Internet Systems Consortium, Inc. - - - - ddns-confgen - 8 - BIND9 - - - - ddns-confgen - ddns key generation tool - - - - - 2009 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - tsig-keygen - - - name - - - ddns-confgen - - - - - - - -s name - -z zone - - - - - DESCRIPTION - - - tsig-keygen and ddns-confgen - are invocation methods for a utility that generates keys for use - in TSIG signing. The resulting keys can be used, for example, - to secure dynamic DNS updates to a zone or for the - rndc command channel. - - - - When run as tsig-keygen, a domain name - can be specified on the command line which will be used as - the name of the generated key. If no name is specified, - the default is tsig-key. - - - - When run as ddns-confgen, the generated - key is accompanied by configuration text and instructions - that can be used with nsupdate and - named when setting up dynamic DNS, - including an example update-policy - statement. (This usage similar to the - rndc-confgen command for setting - up command channel security.) - - - - Note that named itself can configure a - local DDNS key for use with nsupdate -l: - it does this when a zone is configured with - update-policy local;. - ddns-confgen is only needed when a - more elaborate configuration is required: for instance, - if nsupdate is to be used from a remote - system. - - - - OPTIONS - - - - - -a algorithm - - - Specifies the algorithm to use for the TSIG key. Available - choices are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384 and hmac-sha512. The default is hmac-sha256. - Options are case-insensitive, and the "hmac-" prefix - may be omitted. - - - - - - -h - - - Prints a short summary of options and arguments. - - - - - - -k keyname - - - Specifies the key name of the DDNS authentication key. - The default is ddns-key when neither - the nor option is - specified; otherwise, the default - is ddns-key as a separate label - followed by the argument of the option, e.g., - ddns-key.example.com. - The key name must have the format of a valid domain name, - consisting of letters, digits, hyphens and periods. - - - - - - -q - - - (ddns-confgen only.) Quiet mode: Print - only the key, with no explanatory text or usage examples; - This is essentially identical to tsig-keygen. - - - - - - -s name - - - (ddns-confgen only.) - Generate configuration example to allow dynamic updates - of a single hostname. The example named.conf - text shows how to set an update policy for the specified - name - using the "name" nametype. The default key name is - ddns-key.name. - Note that the "self" nametype cannot be used, since - the name to be updated may differ from the key name. - This option cannot be used with the option. - - - - - - -z zone - - - (ddns-confgen only.) - Generate configuration example to allow dynamic updates - of a zone: The example named.conf text - shows how to set an update policy for the specified - zone - using the "zonesub" nametype, allowing updates to - all subdomain names within that - zone. - This option cannot be used with the option. - - - - - - - SEE ALSO - - - nsupdate1 - , - - named.conf5 - , - - named8 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/confgen/ddns-confgen.html b/bin/confgen/ddns-confgen.html deleted file mode 100644 index 775d45dbe6..0000000000 --- a/bin/confgen/ddns-confgen.html +++ /dev/null @@ -1,187 +0,0 @@ - - - - - -ddns-confgen - - -
-
- - - - - -
-

Name

-

- ddns-confgen - — ddns key generation tool -

-
- - - -
-

Synopsis

-

- tsig-keygen - [-a algorithm] - [-h] - [name] -

-

- ddns-confgen - [-a algorithm] - [-h] - [-k keyname] - [-q] - [-r randomfile] - [ - -s name - | -z zone - ] -

-
- -
-

DESCRIPTION

- -

- tsig-keygen and ddns-confgen - are invocation methods for a utility that generates keys for use - in TSIG signing. The resulting keys can be used, for example, - to secure dynamic DNS updates to a zone or for the - rndc command channel. -

- -

- When run as tsig-keygen, a domain name - can be specified on the command line which will be used as - the name of the generated key. If no name is specified, - the default is tsig-key. -

- -

- When run as ddns-confgen, the generated - key is accompanied by configuration text and instructions - that can be used with nsupdate and - named when setting up dynamic DNS, - including an example update-policy - statement. (This usage similar to the - rndc-confgen command for setting - up command channel security.) -

- -

- Note that named itself can configure a - local DDNS key for use with nsupdate -l: - it does this when a zone is configured with - update-policy local;. - ddns-confgen is only needed when a - more elaborate configuration is required: for instance, - if nsupdate is to be used from a remote - system. -

-
- -
-

OPTIONS

- - -
-
-a algorithm
-
-

- Specifies the algorithm to use for the TSIG key. Available - choices are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384 and hmac-sha512. The default is hmac-sha256. - Options are case-insensitive, and the "hmac-" prefix - may be omitted. -

-
-
-h
-
-

- Prints a short summary of options and arguments. -

-
-
-k keyname
-
-

- Specifies the key name of the DDNS authentication key. - The default is ddns-key when neither - the -s nor -z option is - specified; otherwise, the default - is ddns-key as a separate label - followed by the argument of the option, e.g., - ddns-key.example.com. - The key name must have the format of a valid domain name, - consisting of letters, digits, hyphens and periods. -

-
-
-q
-
-

- (ddns-confgen only.) Quiet mode: Print - only the key, with no explanatory text or usage examples; - This is essentially identical to tsig-keygen. -

-
-
-s name
-
-

- (ddns-confgen only.) - Generate configuration example to allow dynamic updates - of a single hostname. The example named.conf - text shows how to set an update policy for the specified - name - using the "name" nametype. The default key name is - ddns-key.name. - Note that the "self" nametype cannot be used, since - the name to be updated may differ from the key name. - This option cannot be used with the -z option. -

-
-
-z zone
-
-

- (ddns-confgen only.) - Generate configuration example to allow dynamic updates - of a zone: The example named.conf text - shows how to set an update policy for the specified - zone - using the "zonesub" nametype, allowing updates to - all subdomain names within that - zone. - This option cannot be used with the -s option. -

-
-
-
- -
-

SEE ALSO

- -

- nsupdate(1) - , - - named.conf(5) - , - - named(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/confgen/ddns-confgen.rst b/bin/confgen/ddns-confgen.rst new file mode 100644 index 0000000000..e0033e5cb9 --- /dev/null +++ b/bin/confgen/ddns-confgen.rst @@ -0,0 +1,103 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_ddns-confgen: + +ddns-confgen - ddns key generation tool +--------------------------------------- + +Synopsis +~~~~~~~~ +:program:`tsig-keygen` [**-a** algorithm] [**-h**] [**-r** randomfile] [**-s** name] + +:program:`ddns-confgen` [**-a** algorithm] [**-h**] [**-k** keyname] [**-q**] [**-r** randomfile] [**-s** name] [**-z** zone] + +Description +~~~~~~~~~~~ + +``tsig-keygen`` and ``ddns-confgen`` are invocation methods for a +utility that generates keys for use in TSIG signing. The resulting keys +can be used, for example, to secure dynamic DNS updates to a zone or for +the ``rndc`` command channel. + +When run as ``tsig-keygen``, a domain name can be specified on the +command line which will be used as the name of the generated key. If no +name is specified, the default is ``tsig-key``. + +When run as ``ddns-confgen``, the generated key is accompanied by +configuration text and instructions that can be used with ``nsupdate`` +and ``named`` when setting up dynamic DNS, including an example +``update-policy`` statement. (This usage similar to the ``rndc-confgen`` +command for setting up command channel security.) + +Note that ``named`` itself can configure a local DDNS key for use with +``nsupdate -l``: it does this when a zone is configured with +``update-policy local;``. ``ddns-confgen`` is only needed when a more +elaborate configuration is required: for instance, if ``nsupdate`` is to +be used from a remote system. + +Options +~~~~~~~ + +**-a** algorithm + Specifies the algorithm to use for the TSIG key. Available choices + are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, hmac-sha384 and + hmac-sha512. The default is hmac-sha256. Options are + case-insensitive, and the "hmac-" prefix may be omitted. + +**-h** + Prints a short summary of options and arguments. + +**-k** keyname + Specifies the key name of the DDNS authentication key. The default is + ``ddns-key`` when neither the ``-s`` nor ``-z`` option is specified; + otherwise, the default is ``ddns-key`` as a separate label followed + by the argument of the option, e.g., ``ddns-key.example.com.`` The + key name must have the format of a valid domain name, consisting of + letters, digits, hyphens and periods. + +**-q** + (``ddns-confgen`` only.) Quiet mode: Print only the key, with no + explanatory text or usage examples; This is essentially identical to + ``tsig-keygen``. + +**-s** name + (``ddns-confgen`` only.) Generate configuration example to allow + dynamic updates of a single hostname. The example ``named.conf`` text + shows how to set an update policy for the specified name using the + "name" nametype. The default key name is ddns-key.name. Note that the + "self" nametype cannot be used, since the name to be updated may + differ from the key name. This option cannot be used with the ``-z`` + option. + +**-z** zone + (``ddns-confgen`` only.) Generate configuration example to allow + dynamic updates of a zone: The example ``named.conf`` text shows how + to set an update policy for the specified zone using the "zonesub" + nametype, allowing updates to all subdomain names within that zone. + This option cannot be used with the ``-s`` option. + +See Also +~~~~~~~~ + +:manpage:`nsupdate(1)`, :manpage:`named.conf(5)`, :manpage:`named(8)`, BIND 9 Administrator Reference Manual. diff --git a/bin/confgen/rndc-confgen.8 b/bin/confgen/rndc-confgen.8 deleted file mode 100644 index 836b9c9982..0000000000 --- a/bin/confgen/rndc-confgen.8 +++ /dev/null @@ -1,210 +0,0 @@ -.\" Copyright (C) 2001, 2003-2005, 2007, 2009, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: rndc-confgen -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2013-03-14 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "RNDC\-CONFGEN" "8" "2013\-03\-14" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -rndc-confgen \- rndc key generation tool -.SH "SYNOPSIS" -.HP \w'\fBrndc\-confgen\fR\ 'u -\fBrndc\-confgen\fR [\fB\-a\fR] [\fB\-A\ \fR\fB\fIalgorithm\fR\fR] [\fB\-b\ \fR\fB\fIkeysize\fR\fR] [\fB\-c\ \fR\fB\fIkeyfile\fR\fR] [\fB\-h\fR] [\fB\-k\ \fR\fB\fIkeyname\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-s\ \fR\fB\fIaddress\fR\fR] [\fB\-t\ \fR\fB\fIchrootdir\fR\fR] [\fB\-u\ \fR\fB\fIuser\fR\fR] -.SH "DESCRIPTION" -.PP -\fBrndc\-confgen\fR -generates configuration files for -\fBrndc\fR\&. It can be used as a convenient alternative to writing the -rndc\&.conf -file and the corresponding -\fBcontrols\fR -and -\fBkey\fR -statements in -named\&.conf -by hand\&. Alternatively, it can be run with the -\fB\-a\fR -option to set up a -rndc\&.key -file and avoid the need for a -rndc\&.conf -file and a -\fBcontrols\fR -statement altogether\&. -.SH "OPTIONS" -.PP -\-a -.RS 4 -Do automatic -\fBrndc\fR -configuration\&. This creates a file -rndc\&.key -in -/etc -(or whatever -\fIsysconfdir\fR -was specified as when -BIND -was built) that is read by both -\fBrndc\fR -and -\fBnamed\fR -on startup\&. The -rndc\&.key -file defines a default command channel and authentication key allowing -\fBrndc\fR -to communicate with -\fBnamed\fR -on the local host with no further configuration\&. -.sp -Running -\fBrndc\-confgen \-a\fR -allows BIND 9 and -\fBrndc\fR -to be used as drop\-in replacements for BIND 8 and -\fBndc\fR, with no changes to the existing BIND 8 -named\&.conf -file\&. -.sp -If a more elaborate configuration than that generated by -\fBrndc\-confgen \-a\fR -is required, for example if rndc is to be used remotely, you should run -\fBrndc\-confgen\fR -without the -\fB\-a\fR -option and set up a -rndc\&.conf -and -named\&.conf -as directed\&. -.RE -.PP -\-A \fIalgorithm\fR -.RS 4 -Specifies the algorithm to use for the TSIG key\&. Available choices are: hmac\-md5, hmac\-sha1, hmac\-sha224, hmac\-sha256, hmac\-sha384 and hmac\-sha512\&. The default is hmac\-sha256\&. -.RE -.PP -\-b \fIkeysize\fR -.RS 4 -Specifies the size of the authentication key in bits\&. Must be between 1 and 512 bits; the default is the hash size\&. -.RE -.PP -\-c \fIkeyfile\fR -.RS 4 -Used with the -\fB\-a\fR -option to specify an alternate location for -rndc\&.key\&. -.RE -.PP -\-h -.RS 4 -Prints a short summary of the options and arguments to -\fBrndc\-confgen\fR\&. -.RE -.PP -\-k \fIkeyname\fR -.RS 4 -Specifies the key name of the rndc authentication key\&. This must be a valid domain name\&. The default is -\fBrndc\-key\fR\&. -.RE -.PP -\-p \fIport\fR -.RS 4 -Specifies the command channel port where -\fBnamed\fR -listens for connections from -\fBrndc\fR\&. The default is 953\&. -.RE -.PP -\-s \fIaddress\fR -.RS 4 -Specifies the IP address where -\fBnamed\fR -listens for command channel connections from -\fBrndc\fR\&. The default is the loopback address 127\&.0\&.0\&.1\&. -.RE -.PP -\-t \fIchrootdir\fR -.RS 4 -Used with the -\fB\-a\fR -option to specify a directory where -\fBnamed\fR -will run chrooted\&. An additional copy of the -rndc\&.key -will be written relative to this directory so that it will be found by the chrooted -\fBnamed\fR\&. -.RE -.PP -\-u \fIuser\fR -.RS 4 -Used with the -\fB\-a\fR -option to set the owner of the -rndc\&.key -file generated\&. If -\fB\-t\fR -is also specified only the file in the chroot area has its owner changed\&. -.RE -.SH "EXAMPLES" -.PP -To allow -\fBrndc\fR -to be used with no manual configuration, run -.PP -\fBrndc\-confgen \-a\fR -.PP -To print a sample -rndc\&.conf -file and corresponding -\fBcontrols\fR -and -\fBkey\fR -statements to be manually inserted into -named\&.conf, run -.PP -\fBrndc\-confgen\fR -.SH "SEE ALSO" -.PP -\fBrndc\fR(8), -\fBrndc.conf\fR(5), -\fBnamed\fR(8), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2001, 2003-2005, 2007, 2009, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/confgen/rndc-confgen.docbook b/bin/confgen/rndc-confgen.docbook deleted file mode 100644 index b747028c46..0000000000 --- a/bin/confgen/rndc-confgen.docbook +++ /dev/null @@ -1,271 +0,0 @@ - - - - - - 2013-03-14 - - - ISC - Internet Systems Consortium, Inc. - - - - rndc-confgen - 8 - BIND9 - - - - rndc-confgen - rndc key generation tool - - - - - 2001 - 2003 - 2004 - 2005 - 2007 - 2009 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - rndc-confgen - - - - - - - - - - - - - - DESCRIPTION - - rndc-confgen - generates configuration files - for rndc. It can be used as a - convenient alternative to writing the - rndc.conf file - and the corresponding controls - and key - statements in named.conf by hand. - Alternatively, it can be run with the -a - option to set up a rndc.key file and - avoid the need for a rndc.conf file - and a controls statement altogether. - - - - - OPTIONS - - - - - -a - - - Do automatic rndc configuration. - This creates a file rndc.key - in /etc (or whatever - sysconfdir - was specified as when BIND was - built) - that is read by both rndc - and named on startup. The - rndc.key file defines a default - command channel and authentication key allowing - rndc to communicate with - named on the local host - with no further configuration. - - - Running rndc-confgen -a allows - BIND 9 and rndc to be used as - drop-in - replacements for BIND 8 and ndc, - with no changes to the existing BIND 8 - named.conf file. - - - If a more elaborate configuration than that - generated by rndc-confgen -a - is required, for example if rndc is to be used remotely, - you should run rndc-confgen without - the - -a option and set up a - rndc.conf and - named.conf - as directed. - - - - - - -A algorithm - - - Specifies the algorithm to use for the TSIG key. Available - choices are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384 and hmac-sha512. The default is hmac-sha256. - - - - - - -b keysize - - - Specifies the size of the authentication key in bits. - Must be between 1 and 512 bits; the default is the - hash size. - - - - - - -c keyfile - - - Used with the -a option to specify - an alternate location for rndc.key. - - - - - - -h - - - Prints a short summary of the options and arguments to - rndc-confgen. - - - - - - -k keyname - - - Specifies the key name of the rndc authentication key. - This must be a valid domain name. - The default is rndc-key. - - - - - - -p port - - - Specifies the command channel port where named - listens for connections from rndc. - The default is 953. - - - - - - -s address - - - Specifies the IP address where named - listens for command channel connections from - rndc. The default is the loopback - address 127.0.0.1. - - - - - - -t chrootdir - - - Used with the -a option to specify - a directory where named will run - chrooted. An additional copy of the rndc.key - will be written relative to this directory so that - it will be found by the chrooted named. - - - - - - -u user - - - Used with the -a option to set the - owner - of the rndc.key file generated. - If - -t is also specified only the file - in - the chroot area has its owner changed. - - - - - - - - EXAMPLES - - - To allow rndc to be used with - no manual configuration, run - - rndc-confgen -a - - - To print a sample rndc.conf file and - corresponding controls and key - statements to be manually inserted into named.conf, - run - - rndc-confgen - - - - SEE ALSO - - - rndc8 - , - - rndc.conf5 - , - - named8 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/confgen/rndc-confgen.html b/bin/confgen/rndc-confgen.html deleted file mode 100644 index 161c9539bb..0000000000 --- a/bin/confgen/rndc-confgen.html +++ /dev/null @@ -1,226 +0,0 @@ - - - - - -rndc-confgen - - -
-
- - - - - -
-

Name

-

- rndc-confgen - — rndc key generation tool -

-
- - - -
-

Synopsis

-

- rndc-confgen - [-a] - [-A algorithm] - [-b keysize] - [-c keyfile] - [-h] - [-k keyname] - [-p port] - [-s address] - [-t chrootdir] - [-u user] -

-
- -
-

DESCRIPTION

- -

rndc-confgen - generates configuration files - for rndc. It can be used as a - convenient alternative to writing the - rndc.conf file - and the corresponding controls - and key - statements in named.conf by hand. - Alternatively, it can be run with the -a - option to set up a rndc.key file and - avoid the need for a rndc.conf file - and a controls statement altogether. -

- -
- -
-

OPTIONS

- - -
-
-a
-
-

- Do automatic rndc configuration. - This creates a file rndc.key - in /etc (or whatever - sysconfdir - was specified as when BIND was - built) - that is read by both rndc - and named on startup. The - rndc.key file defines a default - command channel and authentication key allowing - rndc to communicate with - named on the local host - with no further configuration. -

-

- Running rndc-confgen -a allows - BIND 9 and rndc to be used as - drop-in - replacements for BIND 8 and ndc, - with no changes to the existing BIND 8 - named.conf file. -

-

- If a more elaborate configuration than that - generated by rndc-confgen -a - is required, for example if rndc is to be used remotely, - you should run rndc-confgen without - the - -a option and set up a - rndc.conf and - named.conf - as directed. -

-
-
-A algorithm
-
-

- Specifies the algorithm to use for the TSIG key. Available - choices are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384 and hmac-sha512. The default is hmac-sha256. -

-
-
-b keysize
-
-

- Specifies the size of the authentication key in bits. - Must be between 1 and 512 bits; the default is the - hash size. -

-
-
-c keyfile
-
-

- Used with the -a option to specify - an alternate location for rndc.key. -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - rndc-confgen. -

-
-
-k keyname
-
-

- Specifies the key name of the rndc authentication key. - This must be a valid domain name. - The default is rndc-key. -

-
-
-p port
-
-

- Specifies the command channel port where named - listens for connections from rndc. - The default is 953. -

-
-
-s address
-
-

- Specifies the IP address where named - listens for command channel connections from - rndc. The default is the loopback - address 127.0.0.1. -

-
-
-t chrootdir
-
-

- Used with the -a option to specify - a directory where named will run - chrooted. An additional copy of the rndc.key - will be written relative to this directory so that - it will be found by the chrooted named. -

-
-
-u user
-
-

- Used with the -a option to set the - owner - of the rndc.key file generated. - If - -t is also specified only the file - in - the chroot area has its owner changed. -

-
-
-
- -
-

EXAMPLES

- -

- To allow rndc to be used with - no manual configuration, run -

-

rndc-confgen -a -

-

- To print a sample rndc.conf file and - corresponding controls and key - statements to be manually inserted into named.conf, - run -

-

rndc-confgen -

-
- -
-

SEE ALSO

- -

- rndc(8) - , - - rndc.conf(5) - , - - named(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/confgen/rndc-confgen.rst b/bin/confgen/rndc-confgen.rst new file mode 100644 index 0000000000..35900d05b0 --- /dev/null +++ b/bin/confgen/rndc-confgen.rst @@ -0,0 +1,120 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_rndc-confgen: + +rndc-confgen - rndc key generation tool +--------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`rndc-confgen` [**-a**] [**-A** algorithm] [**-b** keysize] [**-c** keyfile] [**-h**] [**-k** keyname] [**-p** port] [**-s** address] [**-t** chrootdir] [**-u** user] + +Description +~~~~~~~~~~~ + +``rndc-confgen`` generates configuration files for ``rndc``. It can be +used as a convenient alternative to writing the ``rndc.conf`` file and +the corresponding ``controls`` and ``key`` statements in ``named.conf`` +by hand. Alternatively, it can be run with the ``-a`` option to set up a +``rndc.key`` file and avoid the need for a ``rndc.conf`` file and a +``controls`` statement altogether. + +Arguments +~~~~~~~~~ + +**-a** + Do automatic ``rndc`` configuration. This creates a file ``rndc.key`` + in ``/etc`` (or whatever ``sysconfdir`` was specified as when BIND + was built) that is read by both ``rndc`` and ``named`` on startup. + The ``rndc.key`` file defines a default command channel and + authentication key allowing ``rndc`` to communicate with ``named`` on + the local host with no further configuration. + + Running ``rndc-confgen -a`` allows BIND 9 and ``rndc`` to be used as + drop-in replacements for BIND 8 and ``ndc``, with no changes to the + existing BIND 8 ``named.conf`` file. + + If a more elaborate configuration than that generated by + ``rndc-confgen -a`` is required, for example if rndc is to be used + remotely, you should run ``rndc-confgen`` without the ``-a`` option + and set up a ``rndc.conf`` and ``named.conf`` as directed. + +**-A** algorithm + Specifies the algorithm to use for the TSIG key. Available choices + are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, hmac-sha384 and + hmac-sha512. The default is hmac-sha256. + +**-b** keysize + Specifies the size of the authentication key in bits. Must be between + 1 and 512 bits; the default is the hash size. + +**-c** keyfile + Used with the ``-a`` option to specify an alternate location for + ``rndc.key``. + +**-h** + Prints a short summary of the options and arguments to + ``rndc-confgen``. + +**-k** keyname + Specifies the key name of the rndc authentication key. This must be a + valid domain name. The default is ``rndc-key``. + +**-p** port + Specifies the command channel port where ``named`` listens for + connections from ``rndc``. The default is 953. + +**-s** address + Specifies the IP address where ``named`` listens for command channel + connections from ``rndc``. The default is the loopback address + 127.0.0.1. + +**-t** chrootdir + Used with the ``-a`` option to specify a directory where ``named`` + will run chrooted. An additional copy of the ``rndc.key`` will be + written relative to this directory so that it will be found by the + chrooted ``named``. + +**-u** user + Used with the ``-a`` option to set the owner of the ``rndc.key`` file + generated. If ``-t`` is also specified only the file in the chroot + area has its owner changed. + +Examples +~~~~~~~~ + +To allow ``rndc`` to be used with no manual configuration, run + +``rndc-confgen -a`` + +To print a sample ``rndc.conf`` file and corresponding ``controls`` and +``key`` statements to be manually inserted into ``named.conf``, run + +``rndc-confgen`` + +See Also +~~~~~~~~ + +:manpage:`rndc(8)`, :manpage:`rndc.conf(5)`, :manpage:`named(8)`, BIND 9 Administrator Reference Manual. diff --git a/bin/delv/delv.1 b/bin/delv/delv.1 deleted file mode 100644 index 37958be217..0000000000 --- a/bin/delv/delv.1 +++ /dev/null @@ -1,437 +0,0 @@ -.\" Copyright (C) 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: delv -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-04-23 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DELV" "1" "2014\-04\-23" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -delv \- DNS lookup and validation utility -.SH "SYNOPSIS" -.HP \w'\fBdelv\fR\ 'u -\fBdelv\fR [@server] [[\fB\-4\fR] | [\fB\-6\fR]] [\fB\-a\ \fR\fB\fIanchor\-file\fR\fR] [\fB\-b\ \fR\fB\fIaddress\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-d\ \fR\fB\fIlevel\fR\fR] [\fB\-i\fR] [\fB\-m\fR] [\fB\-p\ \fR\fB\fIport#\fR\fR] [\fB\-q\ \fR\fB\fIname\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-x\ \fR\fB\fIaddr\fR\fR] [name] [type] [class] [queryopt...] -.HP \w'\fBdelv\fR\ 'u -\fBdelv\fR [\fB\-h\fR] -.HP \w'\fBdelv\fR\ 'u -\fBdelv\fR [\fB\-v\fR] -.HP \w'\fBdelv\fR\ 'u -\fBdelv\fR [queryopt...] [query...] -.SH "DESCRIPTION" -.PP -\fBdelv\fR -is a tool for sending DNS queries and validating the results, using the same internal resolver and validator logic as -\fBnamed\fR\&. -.PP -\fBdelv\fR -will send to a specified name server all queries needed to fetch and validate the requested data; this includes the original requested query, subsequent queries to follow CNAME or DNAME chains, and queries for DNSKEY and DS records to establish a chain of trust for DNSSEC validation\&. It does not perform iterative resolution, but simulates the behavior of a name server configured for DNSSEC validating and forwarding\&. -.PP -By default, responses are validated using built\-in DNSSEC trust anchor for the root zone ("\&.")\&. Records returned by -\fBdelv\fR -are either fully validated or were not signed\&. If validation fails, an explanation of the failure is included in the output; the validation process can be traced in detail\&. Because -\fBdelv\fR -does not rely on an external server to carry out validation, it can be used to check the validity of DNS responses in environments where local name servers may not be trustworthy\&. -.PP -Unless it is told to query a specific name server, -\fBdelv\fR -will try each of the servers listed in -/etc/resolv\&.conf\&. If no usable server addresses are found, -\fBdelv\fR -will send queries to the localhost addresses (127\&.0\&.0\&.1 for IPv4, ::1 for IPv6)\&. -.PP -When no command line arguments or options are given, -\fBdelv\fR -will perform an NS query for "\&." (the root zone)\&. -.SH "SIMPLE USAGE" -.PP -A typical invocation of -\fBdelv\fR -looks like: -.sp -.if n \{\ -.RS 4 -.\} -.nf - delv @server name type -.fi -.if n \{\ -.RE -.\} -.sp -where: -.PP -\fBserver\fR -.RS 4 -is the name or IP address of the name server to query\&. This can be an IPv4 address in dotted\-decimal notation or an IPv6 address in colon\-delimited notation\&. When the supplied -\fIserver\fR -argument is a hostname, -\fBdelv\fR -resolves that name before querying that name server (note, however, that this initial lookup is -\fInot\fR -validated by DNSSEC)\&. -.sp -If no -\fIserver\fR -argument is provided, -\fBdelv\fR -consults -/etc/resolv\&.conf; if an address is found there, it queries the name server at that address\&. If either of the -\fB\-4\fR -or -\fB\-6\fR -options are in use, then only addresses for the corresponding transport will be tried\&. If no usable addresses are found, -\fBdelv\fR -will send queries to the localhost addresses (127\&.0\&.0\&.1 for IPv4, ::1 for IPv6)\&. -.RE -.PP -\fBname\fR -.RS 4 -is the domain name to be looked up\&. -.RE -.PP -\fBtype\fR -.RS 4 -indicates what type of query is required \(em ANY, A, MX, etc\&. -\fItype\fR -can be any valid query type\&. If no -\fItype\fR -argument is supplied, -\fBdelv\fR -will perform a lookup for an A record\&. -.RE -.SH "OPTIONS" -.PP -\-a \fIanchor\-file\fR -.RS 4 -Specifies a file from which to read DNSSEC trust anchors\&. The default is -/etc/bind\&.keys, which is included with -BIND -9 and contains one or more trust anchors for the root zone ("\&.")\&. -.sp -Keys that do not match the root zone name are ignored\&. An alternate key name can be specified using the -\fB+root=NAME\fR -options\&. -.sp -Note: When reading the trust anchor file, -\fBdelv\fR -treats -\fBtrust\-anchors\fR\fBinitial\-key\fR -and -\fBstatic\-key\fR -entries identically\&. That is, even if a key is configured with -\fBinitial\-key\fR, indicating that it is meant to be used only as an initializing key for RFC 5011 key maintenance, it is still treated by -\fBdelv\fR -as if it had been configured as a -\fBstatic\-key\fR\&. -\fBdelv\fR -does not consult the managed keys database maintained by -\fBnamed\fR\&. This means that if either of the keys in -/etc/bind\&.keys -is revoked and rolled over, it will be necessary to update -/etc/bind\&.keys -to use DNSSEC validation in -\fBdelv\fR\&. -.RE -.PP -\-b \fIaddress\fR -.RS 4 -Sets the source IP address of the query to -\fIaddress\fR\&. This must be a valid address on one of the host\*(Aqs network interfaces or "0\&.0\&.0\&.0" or "::"\&. An optional source port may be specified by appending "#" -.RE -.PP -\-c \fIclass\fR -.RS 4 -Sets the query class for the requested data\&. Currently, only class "IN" is supported in -\fBdelv\fR -and any other value is ignored\&. -.RE -.PP -\-d \fIlevel\fR -.RS 4 -Set the systemwide debug level to -\fBlevel\fR\&. The allowed range is from 0 to 99\&. The default is 0 (no debugging)\&. Debugging traces from -\fBdelv\fR -become more verbose as the debug level increases\&. See the -\fB+mtrace\fR, -\fB+rtrace\fR, and -\fB+vtrace\fR -options below for additional debugging details\&. -.RE -.PP -\-h -.RS 4 -Display the -\fBdelv\fR -help usage output and exit\&. -.RE -.PP -\-i -.RS 4 -Insecure mode\&. This disables internal DNSSEC validation\&. (Note, however, this does not set the CD bit on upstream queries\&. If the server being queried is performing DNSSEC validation, then it will not return invalid data; this can cause -\fBdelv\fR -to time out\&. When it is necessary to examine invalid data to debug a DNSSEC problem, use -\fBdig +cd\fR\&.) -.RE -.PP -\-m -.RS 4 -Enables memory usage debugging\&. -.RE -.PP -\-p \fIport#\fR -.RS 4 -Specifies a destination port to use for queries instead of the standard DNS port number 53\&. This option would be used with a name server that has been configured to listen for queries on a non\-standard port number\&. -.RE -.PP -\-q \fIname\fR -.RS 4 -Sets the query name to -\fIname\fR\&. While the query name can be specified without using the -\fB\-q\fR, it is sometimes necessary to disambiguate names from types or classes (for example, when looking up the name "ns", which could be misinterpreted as the type NS, or "ch", which could be misinterpreted as class CH)\&. -.RE -.PP -\-t \fItype\fR -.RS 4 -Sets the query type to -\fItype\fR, which can be any valid query type supported in BIND 9 except for zone transfer types AXFR and IXFR\&. As with -\fB\-q\fR, this is useful to distinguish query name type or class when they are ambiguous\&. it is sometimes necessary to disambiguate names from types\&. -.sp -The default query type is "A", unless the -\fB\-x\fR -option is supplied to indicate a reverse lookup, in which case it is "PTR"\&. -.RE -.PP -\-v -.RS 4 -Print the -\fBdelv\fR -version and exit\&. -.RE -.PP -\-x \fIaddr\fR -.RS 4 -Performs a reverse lookup, mapping an addresses to a name\&. -\fIaddr\fR -is an IPv4 address in dotted\-decimal notation, or a colon\-delimited IPv6 address\&. When -\fB\-x\fR -is used, there is no need to provide the -\fIname\fR -or -\fItype\fR -arguments\&. -\fBdelv\fR -automatically performs a lookup for a name like -11\&.12\&.13\&.10\&.in\-addr\&.arpa -and sets the query type to PTR\&. IPv6 addresses are looked up using nibble format under the IP6\&.ARPA domain\&. -.RE -.PP -\-4 -.RS 4 -Forces -\fBdelv\fR -to only use IPv4\&. -.RE -.PP -\-6 -.RS 4 -Forces -\fBdelv\fR -to only use IPv6\&. -.RE -.SH "QUERY OPTIONS" -.PP -\fBdelv\fR -provides a number of query options which affect the way results are displayed, and in some cases the way lookups are performed\&. -.PP -Each query option is identified by a keyword preceded by a plus sign (+)\&. Some keywords set or reset an option\&. These may be preceded by the string -no -to negate the meaning of that keyword\&. Other keywords assign values to options like the timeout interval\&. They have the form -\fB+keyword=value\fR\&. The query options are: -.PP -\fB+[no]cdflag\fR -.RS 4 -Controls whether to set the CD (checking disabled) bit in queries sent by -\fBdelv\fR\&. This may be useful when troubleshooting DNSSEC problems from behind a validating resolver\&. A validating resolver will block invalid responses, making it difficult to retrieve them for analysis\&. Setting the CD flag on queries will cause the resolver to return invalid responses, which -\fBdelv\fR -can then validate internally and report the errors in detail\&. -.RE -.PP -\fB+[no]class\fR -.RS 4 -Controls whether to display the CLASS when printing a record\&. The default is to display the CLASS\&. -.RE -.PP -\fB+[no]ttl\fR -.RS 4 -Controls whether to display the TTL when printing a record\&. The default is to display the TTL\&. -.RE -.PP -\fB+[no]rtrace\fR -.RS 4 -Toggle resolver fetch logging\&. This reports the name and type of each query sent by -\fBdelv\fR -in the process of carrying out the resolution and validation process: this includes including the original query and all subsequent queries to follow CNAMEs and to establish a chain of trust for DNSSEC validation\&. -.sp -This is equivalent to setting the debug level to 1 in the "resolver" logging category\&. Setting the systemwide debug level to 1 using the -\fB\-d\fR -option will product the same output (but will affect other logging categories as well)\&. -.RE -.PP -\fB+[no]mtrace\fR -.RS 4 -Toggle message logging\&. This produces a detailed dump of the responses received by -\fBdelv\fR -in the process of carrying out the resolution and validation process\&. -.sp -This is equivalent to setting the debug level to 10 for the "packets" module of the "resolver" logging category\&. Setting the systemwide debug level to 10 using the -\fB\-d\fR -option will produce the same output (but will affect other logging categories as well)\&. -.RE -.PP -\fB+[no]vtrace\fR -.RS 4 -Toggle validation logging\&. This shows the internal process of the validator as it determines whether an answer is validly signed, unsigned, or invalid\&. -.sp -This is equivalent to setting the debug level to 3 for the "validator" module of the "dnssec" logging category\&. Setting the systemwide debug level to 3 using the -\fB\-d\fR -option will produce the same output (but will affect other logging categories as well)\&. -.RE -.PP -\fB+[no]short\fR -.RS 4 -Provide a terse answer\&. The default is to print the answer in a verbose form\&. -.RE -.PP -\fB+[no]comments\fR -.RS 4 -Toggle the display of comment lines in the output\&. The default is to print comments\&. -.RE -.PP -\fB+[no]rrcomments\fR -.RS 4 -Toggle the display of per\-record comments in the output (for example, human\-readable key information about DNSKEY records)\&. The default is to print per\-record comments\&. -.RE -.PP -\fB+[no]crypto\fR -.RS 4 -Toggle the display of cryptographic fields in DNSSEC records\&. The contents of these field are unnecessary to debug most DNSSEC validation failures and removing them makes it easier to see the common failures\&. The default is to display the fields\&. When omitted they are replaced by the string "[omitted]" or in the DNSKEY case the key id is displayed as the replacement, e\&.g\&. "[ key id = value ]"\&. -.RE -.PP -\fB+[no]trust\fR -.RS 4 -Controls whether to display the trust level when printing a record\&. The default is to display the trust level\&. -.RE -.PP -\fB+[no]split[=W]\fR -.RS 4 -Split long hex\- or base64\-formatted fields in resource records into chunks of -\fIW\fR -characters (where -\fIW\fR -is rounded up to the nearest multiple of 4)\&. -\fI+nosplit\fR -or -\fI+split=0\fR -causes fields not to be split at all\&. The default is 56 characters, or 44 characters when multiline mode is active\&. -.RE -.PP -\fB+[no]all\fR -.RS 4 -Set or clear the display options -\fB+[no]comments\fR, -\fB+[no]rrcomments\fR, and -\fB+[no]trust\fR -as a group\&. -.RE -.PP -\fB+[no]multiline\fR -.RS 4 -Print long records (such as RRSIG, DNSKEY, and SOA records) in a verbose multi\-line format with human\-readable comments\&. The default is to print each record on a single line, to facilitate machine parsing of the -\fBdelv\fR -output\&. -.RE -.PP -\fB+[no]dnssec\fR -.RS 4 -Indicates whether to display RRSIG records in the -\fBdelv\fR -output\&. The default is to do so\&. Note that (unlike in -\fBdig\fR) this does -\fInot\fR -control whether to request DNSSEC records or whether to validate them\&. DNSSEC records are always requested, and validation will always occur unless suppressed by the use of -\fB\-i\fR -or -\fB+noroot\fR\&. -.RE -.PP -\fB+[no]root[=ROOT]\fR -.RS 4 -Indicates whether to perform conventional DNSSEC validation, and if so, specifies the name of a trust anchor\&. The default is to validate using a trust anchor of "\&." (the root zone), for which there is a built\-in key\&. If specifying a different trust anchor, then -\fB\-a\fR -must be used to specify a file containing the key\&. -.RE -.PP -\fB+[no]tcp\fR -.RS 4 -Controls whether to use TCP when sending queries\&. The default is to use UDP unless a truncated response has been received\&. -.RE -.PP -\fB+[no]unknownformat\fR -.RS 4 -Print all RDATA in unknown RR type presentation format (RFC 3597)\&. The default is to print RDATA for known types in the type\*(Aqs presentation format\&. -.RE -.PP -\fB+[no]yaml\fR -.RS 4 -Print response data in YAML format\&. -.RE -.SH "FILES" -.PP -/etc/bind\&.keys -.PP -/etc/resolv\&.conf -.SH "SEE ALSO" -.PP -\fBdig\fR(1), -\fBnamed\fR(8), -RFC4034, -RFC4035, -RFC4431, -RFC5074, -RFC5155\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/delv/delv.docbook b/bin/delv/delv.docbook deleted file mode 100644 index b130808b20..0000000000 --- a/bin/delv/delv.docbook +++ /dev/null @@ -1,699 +0,0 @@ -]> - - - - - - 2014-04-23 - - - ISC - Internet Systems Consortium, Inc. - - - - delv - 1 - BIND9 - - - - delv - DNS lookup and validation utility - - - - - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - delv - @server - - - - - - - - - - - - - - - name - type - class - queryopt - - - - delv - - - - - delv - - - - - delv - queryopt - query - - - - DESCRIPTION - - delv - is a tool for sending - DNS queries and validating the results, using the same internal - resolver and validator logic as named. - - - delv will send to a specified name server all - queries needed to fetch and validate the requested data; this - includes the original requested query, subsequent queries to follow - CNAME or DNAME chains, and queries for DNSKEY and DS records - to establish a chain of trust for DNSSEC validation. - It does not perform iterative resolution, but simulates the - behavior of a name server configured for DNSSEC validating and - forwarding. - - - By default, responses are validated using built-in DNSSEC trust - anchor for the root zone ("."). Records returned by - delv are either fully validated or - were not signed. If validation fails, an explanation of - the failure is included in the output; the validation process - can be traced in detail. Because delv does - not rely on an external server to carry out validation, it can - be used to check the validity of DNS responses in environments - where local name servers may not be trustworthy. - - - Unless it is told to query a specific name server, - delv will try each of the servers listed in - /etc/resolv.conf. If no usable server - addresses are found, delv will send - queries to the localhost addresses (127.0.0.1 for IPv4, ::1 - for IPv6). - - - When no command line arguments or options are given, - delv will perform an NS query for "." - (the root zone). - - - - SIMPLE USAGE - - - - A typical invocation of delv looks like: - delv @server name type - where: - - - - server - - - is the name or IP address of the name server to query. This - can be an IPv4 address in dotted-decimal notation or an IPv6 - address in colon-delimited notation. When the supplied - server argument is a hostname, - delv resolves that name before - querying that name server (note, however, that this - initial lookup is not validated - by DNSSEC). - - - If no server argument is - provided, delv consults - /etc/resolv.conf; if an - address is found there, it queries the name server at - that address. If either of the or - options are in use, then - only addresses for the corresponding transport - will be tried. If no usable addresses are found, - delv will send queries to - the localhost addresses (127.0.0.1 for IPv4, - ::1 for IPv6). - - - - - - name - - - is the domain name to be looked up. - - - - - - type - - - indicates what type of query is required — - ANY, A, MX, etc. - type can be any valid query - type. If no - type argument is supplied, - delv will perform a lookup for an - A record. - - - - - - - - - - OPTIONS - - - - - -a anchor-file - - - Specifies a file from which to read DNSSEC trust anchors. - The default is /etc/bind.keys, which - is included with BIND 9 and contains - one or more trust anchors for the root zone ("."). - - - Keys that do not match the root zone name are ignored. - An alternate key name can be specified using the - options. - - - Note: When reading the trust anchor file, - delv treats - and - entries identically. That is, even if a key is configured - with initial-key, indicating that it is - meant to be used only as an initializing key for RFC 5011 - key maintenance, it is still treated by delv - as if it had been configured as a static-key. - delv does not consult the managed keys - database maintained by named. This means - that if either of the keys in - /etc/bind.keys is revoked - and rolled over, it will be necessary to update - /etc/bind.keys to use DNSSEC - validation in delv. - - - - - - -b address - - - Sets the source IP address of the query to - address. This must be a valid address - on one of the host's network interfaces or "0.0.0.0" or "::". - An optional source port may be specified by appending - "#<port>" - - - - - - -c class - - - Sets the query class for the requested data. Currently, - only class "IN" is supported in delv - and any other value is ignored. - - - - - - -d level - - - Set the systemwide debug level to . - The allowed range is from 0 to 99. - The default is 0 (no debugging). - Debugging traces from delv become - more verbose as the debug level increases. - See the , , - and options below for additional - debugging details. - - - - - - -h - - - Display the delv help usage output and exit. - - - - - - -i - - - Insecure mode. This disables internal DNSSEC validation. - (Note, however, this does not set the CD bit on upstream - queries. If the server being queried is performing DNSSEC - validation, then it will not return invalid data; this - can cause delv to time out. When it - is necessary to examine invalid data to debug a DNSSEC - problem, use dig +cd.) - - - - - - -m - - - Enables memory usage debugging. - - - - - - -p port# - - - Specifies a destination port to use for queries instead of - the standard DNS port number 53. This option would be used - with a name server that has been configured to listen - for queries on a non-standard port number. - - - - - - -q name - - - Sets the query name to name. - While the query name can be specified without using the - , it is sometimes necessary to disambiguate - names from types or classes (for example, when looking up the - name "ns", which could be misinterpreted as the type NS, - or "ch", which could be misinterpreted as class CH). - - - - - - -t type - - - Sets the query type to type, which - can be any valid query type supported in BIND 9 except - for zone transfer types AXFR and IXFR. As with - , this is useful to distinguish - query name type or class when they are ambiguous. - it is sometimes necessary to disambiguate names from types. - - - The default query type is "A", unless the - option is supplied to indicate a reverse lookup, in which case - it is "PTR". - - - - - - -v - - - Print the delv version and exit. - - - - - - -x addr - - - Performs a reverse lookup, mapping an addresses to - a name. addr is an IPv4 address in - dotted-decimal notation, or a colon-delimited IPv6 address. - When is used, there is no need to provide - the name or type - arguments. delv automatically performs a - lookup for a name like 11.12.13.10.in-addr.arpa - and sets the query type to PTR. IPv6 addresses are looked up - using nibble format under the IP6.ARPA domain. - - - - - - -4 - - - Forces delv to only use IPv4. - - - - - - -6 - - - Forces delv to only use IPv6. - - - - - - - - QUERY OPTIONS - - - delv - provides a number of query options which affect the way results are - displayed, and in some cases the way lookups are performed. - - - - Each query option is identified by a keyword preceded by a plus sign - (+). Some keywords set or reset an - option. These may be preceded by the string - no to negate the meaning of that keyword. - Other keywords assign values to options like the timeout interval. - They have the form . - The query options are: - - - - - - - Controls whether to set the CD (checking disabled) bit in - queries sent by delv. This may be useful - when troubleshooting DNSSEC problems from behind a validating - resolver. A validating resolver will block invalid responses, - making it difficult to retrieve them for analysis. Setting - the CD flag on queries will cause the resolver to return - invalid responses, which delv can then - validate internally and report the errors in detail. - - - - - - - - - Controls whether to display the CLASS when printing - a record. The default is to display the CLASS. - - - - - - - - - Controls whether to display the TTL when printing - a record. The default is to display the TTL. - - - - - - - - - Toggle resolver fetch logging. This reports the - name and type of each query sent by delv - in the process of carrying out the resolution and validation - process: this includes including the original query and - all subsequent queries to follow CNAMEs and to establish a - chain of trust for DNSSEC validation. - - - This is equivalent to setting the debug level to 1 in - the "resolver" logging category. Setting the systemwide - debug level to 1 using the option will - product the same output (but will affect other logging - categories as well). - - - - - - - - - Toggle message logging. This produces a detailed dump of - the responses received by delv in the - process of carrying out the resolution and validation process. - - - This is equivalent to setting the debug level to 10 - for the "packets" module of the "resolver" logging - category. Setting the systemwide debug level to 10 using - the option will produce the same output - (but will affect other logging categories as well). - - - - - - - - - Toggle validation logging. This shows the internal - process of the validator as it determines whether an - answer is validly signed, unsigned, or invalid. - - - This is equivalent to setting the debug level to 3 - for the "validator" module of the "dnssec" logging - category. Setting the systemwide debug level to 3 using - the option will produce the same output - (but will affect other logging categories as well). - - - - - - - - - Provide a terse answer. The default is to print the answer in a - verbose form. - - - - - - - - - Toggle the display of comment lines in the output. The default - is to print comments. - - - - - - - - - Toggle the display of per-record comments in the output (for - example, human-readable key information about DNSKEY records). - The default is to print per-record comments. - - - - - - - - - Toggle the display of cryptographic fields in DNSSEC records. - The contents of these field are unnecessary to debug most DNSSEC - validation failures and removing them makes it easier to see - the common failures. The default is to display the fields. - When omitted they are replaced by the string "[omitted]" or - in the DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". - - - - - - - - - Controls whether to display the trust level when printing - a record. The default is to display the trust level. - - - - - - - - - Split long hex- or base64-formatted fields in resource - records into chunks of W characters - (where W is rounded up to the nearest - multiple of 4). - +nosplit or - +split=0 causes fields not to be - split at all. The default is 56 characters, or 44 characters - when multiline mode is active. - - - - - - - - - Set or clear the display options - , - , and - as a group. - - - - - - - - - Print long records (such as RRSIG, DNSKEY, and SOA records) - in a verbose multi-line format with human-readable comments. - The default is to print each record on a single line, to - facilitate machine parsing of the delv - output. - - - - - - - - - Indicates whether to display RRSIG records in the - delv output. The default is to - do so. Note that (unlike in dig) - this does not control whether to - request DNSSEC records or whether to validate them. - DNSSEC records are always requested, and validation - will always occur unless suppressed by the use of - or . - - - - - - - - - Indicates whether to perform conventional - DNSSEC validation, and if so, specifies the - name of a trust anchor. The default is to validate using - a trust anchor of "." (the root zone), for which there is - a built-in key. If specifying a different trust anchor, - then must be used to specify a file - containing the key. - - - - - - - - - Controls whether to use TCP when sending queries. - The default is to use UDP unless a truncated - response has been received. - - - - - - - - - Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. - - - - - - - - - Print response data in YAML format. - - - - - - - - - - FILES - - /etc/bind.keys - /etc/resolv.conf - - - SEE ALSO - - - dig1 - , - - named8 - , - RFC4034, - RFC4035, - RFC4431, - RFC5074, - RFC5155. - - - - diff --git a/bin/delv/delv.html b/bin/delv/delv.html deleted file mode 100644 index 7f8ea878f6..0000000000 --- a/bin/delv/delv.html +++ /dev/null @@ -1,588 +0,0 @@ - - - - - -delv - - -
-
- - - - - -
-

Name

-

- delv - — DNS lookup and validation utility -

-
- - - -
-

Synopsis

-

- delv - [@server] - [ - [-4] - | [-6] - ] - [-a anchor-file] - [-b address] - [-c class] - [-d level] - [-i] - [-m] - [-p port#] - [-q name] - [-t type] - [-x addr] - [name] - [type] - [class] - [queryopt...] -

- -

- delv - [-h] -

- -

- delv - [-v] -

- -

- delv - [queryopt...] - [query...] -

-
- -
-

DESCRIPTION

- -

delv - is a tool for sending - DNS queries and validating the results, using the same internal - resolver and validator logic as named. -

-

- delv will send to a specified name server all - queries needed to fetch and validate the requested data; this - includes the original requested query, subsequent queries to follow - CNAME or DNAME chains, and queries for DNSKEY and DS records - to establish a chain of trust for DNSSEC validation. - It does not perform iterative resolution, but simulates the - behavior of a name server configured for DNSSEC validating and - forwarding. -

-

- By default, responses are validated using built-in DNSSEC trust - anchor for the root zone ("."). Records returned by - delv are either fully validated or - were not signed. If validation fails, an explanation of - the failure is included in the output; the validation process - can be traced in detail. Because delv does - not rely on an external server to carry out validation, it can - be used to check the validity of DNS responses in environments - where local name servers may not be trustworthy. -

-

- Unless it is told to query a specific name server, - delv will try each of the servers listed in - /etc/resolv.conf. If no usable server - addresses are found, delv will send - queries to the localhost addresses (127.0.0.1 for IPv4, ::1 - for IPv6). -

-

- When no command line arguments or options are given, - delv will perform an NS query for "." - (the root zone). -

-
- -
-

SIMPLE USAGE

- - -

- A typical invocation of delv looks like: -

-
 delv @server name type 
-

- where: - -

-
-
server
-
-

- is the name or IP address of the name server to query. This - can be an IPv4 address in dotted-decimal notation or an IPv6 - address in colon-delimited notation. When the supplied - server argument is a hostname, - delv resolves that name before - querying that name server (note, however, that this - initial lookup is not validated - by DNSSEC). -

-

- If no server argument is - provided, delv consults - /etc/resolv.conf; if an - address is found there, it queries the name server at - that address. If either of the -4 or - -6 options are in use, then - only addresses for the corresponding transport - will be tried. If no usable addresses are found, - delv will send queries to - the localhost addresses (127.0.0.1 for IPv4, - ::1 for IPv6). -

-
-
name
-
-

- is the domain name to be looked up. -

-
-
type
-
-

- indicates what type of query is required — - ANY, A, MX, etc. - type can be any valid query - type. If no - type argument is supplied, - delv will perform a lookup for an - A record. -

-
-
-

-

- -
- -
-

OPTIONS

- -
-
-a anchor-file
-
-

- Specifies a file from which to read DNSSEC trust anchors. - The default is /etc/bind.keys, which - is included with BIND 9 and contains - one or more trust anchors for the root zone ("."). -

-

- Keys that do not match the root zone name are ignored. - An alternate key name can be specified using the - +root=NAME options. -

-

- Note: When reading the trust anchor file, - delv treats trust-anchors - initial-key and static-key - entries identically. That is, even if a key is configured - with initial-key, indicating that it is - meant to be used only as an initializing key for RFC 5011 - key maintenance, it is still treated by delv - as if it had been configured as a static-key. - delv does not consult the managed keys - database maintained by named. This means - that if either of the keys in - /etc/bind.keys is revoked - and rolled over, it will be necessary to update - /etc/bind.keys to use DNSSEC - validation in delv. -

-
-
-b address
-
-

- Sets the source IP address of the query to - address. This must be a valid address - on one of the host's network interfaces or "0.0.0.0" or "::". - An optional source port may be specified by appending - "#<port>" -

-
-
-c class
-
-

- Sets the query class for the requested data. Currently, - only class "IN" is supported in delv - and any other value is ignored. -

-
-
-d level
-
-

- Set the systemwide debug level to level. - The allowed range is from 0 to 99. - The default is 0 (no debugging). - Debugging traces from delv become - more verbose as the debug level increases. - See the +mtrace, +rtrace, - and +vtrace options below for additional - debugging details. -

-
-
-h
-
-

- Display the delv help usage output and exit. -

-
-
-i
-
-

- Insecure mode. This disables internal DNSSEC validation. - (Note, however, this does not set the CD bit on upstream - queries. If the server being queried is performing DNSSEC - validation, then it will not return invalid data; this - can cause delv to time out. When it - is necessary to examine invalid data to debug a DNSSEC - problem, use dig +cd.) -

-
-
-m
-
-

- Enables memory usage debugging. -

-
-
-p port#
-
-

- Specifies a destination port to use for queries instead of - the standard DNS port number 53. This option would be used - with a name server that has been configured to listen - for queries on a non-standard port number. -

-
-
-q name
-
-

- Sets the query name to name. - While the query name can be specified without using the - -q, it is sometimes necessary to disambiguate - names from types or classes (for example, when looking up the - name "ns", which could be misinterpreted as the type NS, - or "ch", which could be misinterpreted as class CH). -

-
-
-t type
-
-

- Sets the query type to type, which - can be any valid query type supported in BIND 9 except - for zone transfer types AXFR and IXFR. As with - -q, this is useful to distinguish - query name type or class when they are ambiguous. - it is sometimes necessary to disambiguate names from types. -

-

- The default query type is "A", unless the -x - option is supplied to indicate a reverse lookup, in which case - it is "PTR". -

-
-
-v
-
-

- Print the delv version and exit. -

-
-
-x addr
-
-

- Performs a reverse lookup, mapping an addresses to - a name. addr is an IPv4 address in - dotted-decimal notation, or a colon-delimited IPv6 address. - When -x is used, there is no need to provide - the name or type - arguments. delv automatically performs a - lookup for a name like 11.12.13.10.in-addr.arpa - and sets the query type to PTR. IPv6 addresses are looked up - using nibble format under the IP6.ARPA domain. -

-
-
-4
-
-

- Forces delv to only use IPv4. -

-
-
-6
-
-

- Forces delv to only use IPv6. -

-
-
-
- -
-

QUERY OPTIONS

- - -

delv - provides a number of query options which affect the way results are - displayed, and in some cases the way lookups are performed. -

- -

- Each query option is identified by a keyword preceded by a plus sign - (+). Some keywords set or reset an - option. These may be preceded by the string - no to negate the meaning of that keyword. - Other keywords assign values to options like the timeout interval. - They have the form +keyword=value. - The query options are: - -

-
-
+[no]cdflag
-
-

- Controls whether to set the CD (checking disabled) bit in - queries sent by delv. This may be useful - when troubleshooting DNSSEC problems from behind a validating - resolver. A validating resolver will block invalid responses, - making it difficult to retrieve them for analysis. Setting - the CD flag on queries will cause the resolver to return - invalid responses, which delv can then - validate internally and report the errors in detail. -

-
-
+[no]class
-
-

- Controls whether to display the CLASS when printing - a record. The default is to display the CLASS. -

-
-
+[no]ttl
-
-

- Controls whether to display the TTL when printing - a record. The default is to display the TTL. -

-
-
+[no]rtrace
-
-

- Toggle resolver fetch logging. This reports the - name and type of each query sent by delv - in the process of carrying out the resolution and validation - process: this includes including the original query and - all subsequent queries to follow CNAMEs and to establish a - chain of trust for DNSSEC validation. -

-

- This is equivalent to setting the debug level to 1 in - the "resolver" logging category. Setting the systemwide - debug level to 1 using the -d option will - product the same output (but will affect other logging - categories as well). -

-
-
+[no]mtrace
-
-

- Toggle message logging. This produces a detailed dump of - the responses received by delv in the - process of carrying out the resolution and validation process. -

-

- This is equivalent to setting the debug level to 10 - for the "packets" module of the "resolver" logging - category. Setting the systemwide debug level to 10 using - the -d option will produce the same output - (but will affect other logging categories as well). -

-
-
+[no]vtrace
-
-

- Toggle validation logging. This shows the internal - process of the validator as it determines whether an - answer is validly signed, unsigned, or invalid. -

-

- This is equivalent to setting the debug level to 3 - for the "validator" module of the "dnssec" logging - category. Setting the systemwide debug level to 3 using - the -d option will produce the same output - (but will affect other logging categories as well). -

-
-
+[no]short
-
-

- Provide a terse answer. The default is to print the answer in a - verbose form. -

-
-
+[no]comments
-
-

- Toggle the display of comment lines in the output. The default - is to print comments. -

-
-
+[no]rrcomments
-
-

- Toggle the display of per-record comments in the output (for - example, human-readable key information about DNSKEY records). - The default is to print per-record comments. -

-
-
+[no]crypto
-
-

- Toggle the display of cryptographic fields in DNSSEC records. - The contents of these field are unnecessary to debug most DNSSEC - validation failures and removing them makes it easier to see - the common failures. The default is to display the fields. - When omitted they are replaced by the string "[omitted]" or - in the DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". -

-
-
+[no]trust
-
-

- Controls whether to display the trust level when printing - a record. The default is to display the trust level. -

-
-
+[no]split[=W]
-
-

- Split long hex- or base64-formatted fields in resource - records into chunks of W characters - (where W is rounded up to the nearest - multiple of 4). - +nosplit or - +split=0 causes fields not to be - split at all. The default is 56 characters, or 44 characters - when multiline mode is active. -

-
-
+[no]all
-
-

- Set or clear the display options - +[no]comments, - +[no]rrcomments, and - +[no]trust as a group. -

-
-
+[no]multiline
-
-

- Print long records (such as RRSIG, DNSKEY, and SOA records) - in a verbose multi-line format with human-readable comments. - The default is to print each record on a single line, to - facilitate machine parsing of the delv - output. -

-
-
+[no]dnssec
-
-

- Indicates whether to display RRSIG records in the - delv output. The default is to - do so. Note that (unlike in dig) - this does not control whether to - request DNSSEC records or whether to validate them. - DNSSEC records are always requested, and validation - will always occur unless suppressed by the use of - -i or +noroot. -

-
-
+[no]root[=ROOT]
-
-

- Indicates whether to perform conventional - DNSSEC validation, and if so, specifies the - name of a trust anchor. The default is to validate using - a trust anchor of "." (the root zone), for which there is - a built-in key. If specifying a different trust anchor, - then -a must be used to specify a file - containing the key. -

-
-
+[no]tcp
-
-

- Controls whether to use TCP when sending queries. - The default is to use UDP unless a truncated - response has been received. -

-
-
+[no]unknownformat
-
-

- Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. -

-
-
+[no]yaml
-
-

- Print response data in YAML format. -

-
-
-

- -

-
- -
-

FILES

- -

/etc/bind.keys

-

/etc/resolv.conf

-
- -
-

SEE ALSO

- -

- dig(1) - , - - named(8) - , - RFC4034, - RFC4035, - RFC4431, - RFC5074, - RFC5155. -

-
- -
- diff --git a/bin/delv/delv.rst b/bin/delv/delv.rst new file mode 100644 index 0000000000..e1b10dce6e --- /dev/null +++ b/bin/delv/delv.rst @@ -0,0 +1,336 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_delv: + +delv - DNS lookup and validation utility +---------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`delv` [@server] [ [**-4**] | [**-6**] ] [**-a** anchor-file] [**-b** address] [**-c** class] [**-d** level] [**-i**] [**-m**] [**-p** port#] [**-q** name] [**-t** type] [**-x** addr] [name] [type] [class] [queryopt...] + +:program:`delv` [**-h**] + +:program:`delv` [**-v**] + +:program:`delv` [queryopt...] [query...] + +Description +~~~~~~~~~~~ + +``delv`` is a tool for sending DNS queries and validating the results, +using the same internal resolver and validator logic as ``named``. + +``delv`` will send to a specified name server all queries needed to +fetch and validate the requested data; this includes the original +requested query, subsequent queries to follow CNAME or DNAME chains, and +queries for DNSKEY, and DS records to establish a chain of trust for +DNSSEC validation. It does not perform iterative resolution, but +simulates the behavior of a name server configured for DNSSEC validating +and forwarding. + +By default, responses are validated using built-in DNSSEC trust anchor +for the root zone ("."). Records returned by ``delv`` are either fully +validated or were not signed. If validation fails, an explanation of the +failure is included in the output; the validation process can be traced +in detail. Because ``delv`` does not rely on an external server to carry +out validation, it can be used to check the validity of DNS responses in +environments where local name servers may not be trustworthy. + +Unless it is told to query a specific name server, ``delv`` will try +each of the servers listed in ``/etc/resolv.conf``. If no usable server +addresses are found, ``delv`` will send queries to the localhost +addresses (127.0.0.1 for IPv4, ::1 for IPv6). + +When no command line arguments or options are given, ``delv`` will +perform an NS query for "." (the root zone). + +Simple Usage +~~~~~~~~~~~~ + +A typical invocation of ``delv`` looks like: + +:: + + delv @server name type + +where: + +``server`` + is the name or IP address of the name server to query. This can be an + IPv4 address in dotted-decimal notation or an IPv6 address in + colon-delimited notation. When the supplied ``server`` argument is a + hostname, ``delv`` resolves that name before querying that name + server (note, however, that this initial lookup is *not* validated by + DNSSEC). + + If no ``server`` argument is provided, ``delv`` consults + ``/etc/resolv.conf``; if an address is found there, it queries the + name server at that address. If either of the ``-4`` or ``-6`` + options are in use, then only addresses for the corresponding + transport will be tried. If no usable addresses are found, ``delv`` + will send queries to the localhost addresses (127.0.0.1 for IPv4, ::1 + for IPv6). + +``name`` + is the domain name to be looked up. + +``type`` + indicates what type of query is required MDASH ANY, A, MX, etc. + ``type`` can be any valid query type. If no ``type`` argument is + supplied, ``delv`` will perform a lookup for an A record. + +Options +~~~~~~~ + +**-a** anchor-file + Specifies a file from which to read DNSSEC trust anchors. The default + is ``/etc/bind.keys``, which is included with BIND 9 and contains one + or more trust anchors for the root zone ("."). + + Keys that do not match the root zone name are ignored. An alternate + key name can be specified using the ``+root=NAME`` options. + + Note: When reading the trust anchor file, ``delv`` treat ``trust-anchors`` + ``initial-key`` and ``static-key`` identically. That is, for a managed key, + it is the *initial* key that is trusted; :rfc:`5011` key management is not + supported. ``delv`` will not consult the managed-keys database maintained by + ``named``. This means that if either of the keys in ``/etc/bind.keys`` is + revoked and rolled over, it will be necessary to update ``/etc/bind.keys`` to + use DNSSEC validation in ``delv``. + +**-b** address + Sets the source IP address of the query to ``address``. This must be + a valid address on one of the host's network interfaces or "0.0.0.0" + or "::". An optional source port may be specified by appending + "#" + +**-c** class + Sets the query class for the requested data. Currently, only class + "IN" is supported in ``delv`` and any other value is ignored. + +**-d** level + Set the systemwide debug level to ``level``. The allowed range is + from 0 to 99. The default is 0 (no debugging). Debugging traces from + ``delv`` become more verbose as the debug level increases. See the + ``+mtrace``, ``+rtrace``, and ``+vtrace`` options below for + additional debugging details. + +**-h** + Display the ``delv`` help usage output and exit. + +**-i** + Insecure mode. This disables internal DNSSEC validation. (Note, + however, this does not set the CD bit on upstream queries. If the + server being queried is performing DNSSEC validation, then it will + not return invalid data; this can cause ``delv`` to time out. When it + is necessary to examine invalid data to debug a DNSSEC problem, use + ``dig +cd``.) + +**-m** + Enables memory usage debugging. + +**-p** port# + Specifies a destination port to use for queries instead of the + standard DNS port number 53. This option would be used with a name + server that has been configured to listen for queries on a + non-standard port number. + +**-q** name + Sets the query name to ``name``. While the query name can be + specified without using the ``-q``, it is sometimes necessary to + disambiguate names from types or classes (for example, when looking + up the name "ns", which could be misinterpreted as the type NS, or + "ch", which could be misinterpreted as class CH). + +**-t** type + Sets the query type to ``type``, which can be any valid query type + supported in BIND 9 except for zone transfer types AXFR and IXFR. As + with ``-q``, this is useful to distinguish query name type or class + when they are ambiguous. it is sometimes necessary to disambiguate + names from types. + + The default query type is "A", unless the ``-x`` option is supplied + to indicate a reverse lookup, in which case it is "PTR". + +**-v** + Print the ``delv`` version and exit. + +**-x** addr + Performs a reverse lookup, mapping an addresses to a name. ``addr`` + is an IPv4 address in dotted-decimal notation, or a colon-delimited + IPv6 address. When ``-x`` is used, there is no need to provide the + ``name`` or ``type`` arguments. ``delv`` automatically performs a + lookup for a name like ``11.12.13.10.in-addr.arpa`` and sets the + query type to PTR. IPv6 addresses are looked up using nibble format + under the IP6.ARPA domain. + +**-4** + Forces ``delv`` to only use IPv4. + +**-6** + Forces ``delv`` to only use IPv6. + +Query Options +~~~~~~~~~~~~~ + +``delv`` provides a number of query options which affect the way results +are displayed, and in some cases the way lookups are performed. + +Each query option is identified by a keyword preceded by a plus sign +(``+``). Some keywords set or reset an option. These may be preceded by +the string ``no`` to negate the meaning of that keyword. Other keywords +assign values to options like the timeout interval. They have the form +``+keyword=value``. The query options are: + +``+[no]cdflag`` + Controls whether to set the CD (checking disabled) bit in queries + sent by ``delv``. This may be useful when troubleshooting DNSSEC + problems from behind a validating resolver. A validating resolver + will block invalid responses, making it difficult to retrieve them + for analysis. Setting the CD flag on queries will cause the resolver + to return invalid responses, which ``delv`` can then validate + internally and report the errors in detail. + +``+[no]class`` + Controls whether to display the CLASS when printing a record. The + default is to display the CLASS. + +``+[no]ttl`` + Controls whether to display the TTL when printing a record. The + default is to display the TTL. + +``+[no]rtrace`` + Toggle resolver fetch logging. This reports the name and type of each + query sent by ``delv`` in the process of carrying out the resolution + and validation process: this includes including the original query + and all subsequent queries to follow CNAMEs and to establish a chain + of trust for DNSSEC validation. + + This is equivalent to setting the debug level to 1 in the "resolver" + logging category. Setting the systemwide debug level to 1 using the + ``-d`` option will product the same output (but will affect other + logging categories as well). + +``+[no]mtrace`` + Toggle message logging. This produces a detailed dump of the + responses received by ``delv`` in the process of carrying out the + resolution and validation process. + + This is equivalent to setting the debug level to 10 for the "packets" + module of the "resolver" logging category. Setting the systemwide + debug level to 10 using the ``-d`` option will produce the same + output (but will affect other logging categories as well). + +``+[no]vtrace`` + Toggle validation logging. This shows the internal process of the + validator as it determines whether an answer is validly signed, + unsigned, or invalid. + + This is equivalent to setting the debug level to 3 for the + "validator" module of the "dnssec" logging category. Setting the + systemwide debug level to 3 using the ``-d`` option will produce the + same output (but will affect other logging categories as well). + +``+[no]short`` + Provide a terse answer. The default is to print the answer in a + verbose form. + +``+[no]comments`` + Toggle the display of comment lines in the output. The default is to + print comments. + +``+[no]rrcomments`` + Toggle the display of per-record comments in the output (for example, + human-readable key information about DNSKEY records). The default is + to print per-record comments. + +``+[no]crypto`` + Toggle the display of cryptographic fields in DNSSEC records. The + contents of these field are unnecessary to debug most DNSSEC + validation failures and removing them makes it easier to see the + common failures. The default is to display the fields. When omitted + they are replaced by the string "[omitted]" or in the DNSKEY case the + key id is displayed as the replacement, e.g. "[ key id = value ]". + +``+[no]trust`` + Controls whether to display the trust level when printing a record. + The default is to display the trust level. + +``+[no]split[=W]`` + Split long hex- or base64-formatted fields in resource records into + chunks of ``W`` characters (where ``W`` is rounded up to the nearest + multiple of 4). ``+nosplit`` or ``+split=0`` causes fields not to be + split at all. The default is 56 characters, or 44 characters when + multiline mode is active. + +``+[no]all`` + Set or clear the display options ``+[no]comments``, + ``+[no]rrcomments``, and ``+[no]trust`` as a group. + +``+[no]multiline`` + Print long records (such as RRSIG, DNSKEY, and SOA records) in a + verbose multi-line format with human-readable comments. The default + is to print each record on a single line, to facilitate machine + parsing of the ``delv`` output. + +``+[no]dnssec`` + Indicates whether to display RRSIG records in the ``delv`` output. + The default is to do so. Note that (unlike in ``dig``) this does + *not* control whether to request DNSSEC records or whether to + validate them. DNSSEC records are always requested, and validation + will always occur unless suppressed by the use of ``-i`` or + ``+noroot``. + +``+[no]root[=ROOT]`` + Indicates whether to perform conventional DNSSEC validation, and if so, + specifies the name of a trust anchor. The default is to validate using a + trust anchor of "." (the root zone), for which there is a built-in key. If + specifying a different trust anchor, then ``-a`` must be used to specify a + file containing the key. + +``+[no]tcp`` + Controls whether to use TCP when sending queries. The default is to + use UDP unless a truncated response has been received. + +``+[no]unknownformat`` + Print all RDATA in unknown RR type presentation format (:rfc:`3597`). + The default is to print RDATA for known types in the type's + presentation format. + +``+[no]yaml`` + Print response data in YAML format. + +Files +~~~~~ + +``/etc/bind.keys`` + +``/etc/resolv.conf`` + +See Also +~~~~~~~~ + +:manpage:`dig(1)`, :manpage:`named(8)`, :rfc:`4034`, :rfc:`4035`, :rfc:`4431`, :rfc:`5074`, :rfc:`5155`. diff --git a/bin/dig/dig.1 b/bin/dig/dig.1 deleted file mode 100644 index b191464a64..0000000000 --- a/bin/dig/dig.1 +++ /dev/null @@ -1,853 +0,0 @@ -.\" Copyright (C) 2000-2011, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dig -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-02-19 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DIG" "1" "2014\-02\-19" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dig \- DNS lookup utility -.SH "SYNOPSIS" -.HP \w'\fBdig\fR\ 'u -\fBdig\fR [@server] [\fB\-b\ \fR\fB\fIaddress\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-f\ \fR\fB\fIfilename\fR\fR] [\fB\-k\ \fR\fB\fIfilename\fR\fR] [\fB\-m\fR] [\fB\-p\ \fR\fB\fIport#\fR\fR] [\fB\-q\ \fR\fB\fIname\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-v\fR] [\fB\-x\ \fR\fB\fIaddr\fR\fR] [\fB\-y\ \fR\fB\fI[hmac:]\fR\fIname:key\fR\fR] [[\fB\-4\fR] | [\fB\-6\fR]] [name] [type] [class] [queryopt...] -.HP \w'\fBdig\fR\ 'u -\fBdig\fR [\fB\-h\fR] -.HP \w'\fBdig\fR\ 'u -\fBdig\fR [global\-queryopt...] [query...] -.SH "DESCRIPTION" -.PP -\fBdig\fR -is a flexible tool for interrogating DNS name servers\&. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried\&. Most DNS administrators use -\fBdig\fR -to troubleshoot DNS problems because of its flexibility, ease of use and clarity of output\&. Other lookup tools tend to have less functionality than -\fBdig\fR\&. -.PP -Although -\fBdig\fR -is normally used with command\-line arguments, it also has a batch mode of operation for reading lookup requests from a file\&. A brief summary of its command\-line arguments and options is printed when the -\fB\-h\fR -option is given\&. Unlike earlier versions, the BIND 9 implementation of -\fBdig\fR -allows multiple lookups to be issued from the command line\&. -.PP -Unless it is told to query a specific name server, -\fBdig\fR -will try each of the servers listed in -/etc/resolv\&.conf\&. If no usable server addresses are found, -\fBdig\fR -will send the query to the local host\&. -.PP -When no command line arguments or options are given, -\fBdig\fR -will perform an NS query for "\&." (the root)\&. -.PP -It is possible to set per\-user defaults for -\fBdig\fR -via -${HOME}/\&.digrc\&. This file is read and any options in it are applied before the command line arguments\&. The -\fB\-r\fR -option disables this feature, for scripts that need predictable behaviour\&. -.PP -The IN and CH class names overlap with the IN and CH top level domain names\&. Either use the -\fB\-t\fR -and -\fB\-c\fR -options to specify the type and class, use the -\fB\-q\fR -the specify the domain name, or use "IN\&." and "CH\&." when looking up these top level domains\&. -.SH "SIMPLE USAGE" -.PP -A typical invocation of -\fBdig\fR -looks like: -.sp -.if n \{\ -.RS 4 -.\} -.nf - dig @server name type -.fi -.if n \{\ -.RE -.\} -.sp -where: -.PP -\fBserver\fR -.RS 4 -is the name or IP address of the name server to query\&. This can be an IPv4 address in dotted\-decimal notation or an IPv6 address in colon\-delimited notation\&. When the supplied -\fIserver\fR -argument is a hostname, -\fBdig\fR -resolves that name before querying that name server\&. -.sp -If no -\fIserver\fR -argument is provided, -\fBdig\fR -consults -/etc/resolv\&.conf; if an address is found there, it queries the name server at that address\&. If either of the -\fB\-4\fR -or -\fB\-6\fR -options are in use, then only addresses for the corresponding transport will be tried\&. If no usable addresses are found, -\fBdig\fR -will send the query to the local host\&. The reply from the name server that responds is displayed\&. -.RE -.PP -\fBname\fR -.RS 4 -is the name of the resource record that is to be looked up\&. -.RE -.PP -\fBtype\fR -.RS 4 -indicates what type of query is required \(em ANY, A, MX, SIG, etc\&. -\fItype\fR -can be any valid query type\&. If no -\fItype\fR -argument is supplied, -\fBdig\fR -will perform a lookup for an A record\&. -.RE -.SH "OPTIONS" -.PP -\-4 -.RS 4 -Use IPv4 only\&. -.RE -.PP -\-6 -.RS 4 -Use IPv6 only\&. -.RE -.PP -\-b \fIaddress\fR\fI[#port]\fR -.RS 4 -Set the source IP address of the query\&. The -\fIaddress\fR -must be a valid address on one of the host\*(Aqs network interfaces, or "0\&.0\&.0\&.0" or "::"\&. An optional port may be specified by appending "#" -.RE -.PP -\-c \fIclass\fR -.RS 4 -Set the query class\&. The default -\fIclass\fR -is IN; other classes are HS for Hesiod records or CH for Chaosnet records\&. -.RE -.PP -\-f \fIfile\fR -.RS 4 -Batch mode: -\fBdig\fR -reads a list of lookup requests to process from the given -\fIfile\fR\&. Each line in the file should be organized in the same way they would be presented as queries to -\fBdig\fR -using the command\-line interface\&. -.RE -.PP -\-k \fIkeyfile\fR -.RS 4 -Sign queries using TSIG using a key read from the given file\&. Key files can be generated using -\fBtsig-keygen\fR(8)\&. When using TSIG authentication with -\fBdig\fR, the name server that is queried needs to know the key and algorithm that is being used\&. In BIND, this is done by providing appropriate -\fBkey\fR -and -\fBserver\fR -statements in -named\&.conf\&. -.RE -.PP -\-m -.RS 4 -Enable memory usage debugging\&. -.RE -.PP -\-p \fIport\fR -.RS 4 -Send the query to a non\-standard port on the server, instead of the default port 53\&. This option would be used to test a name server that has been configured to listen for queries on a non\-standard port number\&. -.RE -.PP -\-q \fIname\fR -.RS 4 -The domain name to query\&. This is useful to distinguish the -\fIname\fR -from other arguments\&. -.RE -.PP -\-r -.RS 4 -Do not read options from -${HOME}/\&.digrc\&. This is useful for scripts that need predictable behaviour\&. -.RE -.PP -\-t \fItype\fR -.RS 4 -The resource record type to query\&. It can be any valid query type\&. If it is a resource record type supported in BIND 9, it can be given by the type mnemonic (such as "NS" or "AAAA")\&. The default query type is "A", unless the -\fB\-x\fR -option is supplied to indicate a reverse lookup\&. A zone transfer can be requested by specifying a type of AXFR\&. When an incremental zone transfer (IXFR) is required, set the -\fItype\fR -to -ixfr=N\&. The incremental zone transfer will contain the changes made to the zone since the serial number in the zone\*(Aqs SOA record was -\fIN\fR\&. -.sp -All resource record types can be expressed as "TYPEnn", where "nn" is the number of the type\&. If the resource record type is not supported in BIND 9, the result will be displayed as described in RFC 3597\&. -.RE -.PP -\-u -.RS 4 -Print query times in microseconds instead of milliseconds\&. -.RE -.PP -\-v -.RS 4 -Print the version number and exit\&. -.RE -.PP -\-x \fIaddr\fR -.RS 4 -Simplified reverse lookups, for mapping addresses to names\&. The -\fIaddr\fR -is an IPv4 address in dotted\-decimal notation, or a colon\-delimited IPv6 address\&. When the -\fB\-x\fR -is used, there is no need to provide the -\fIname\fR, -\fIclass\fR -and -\fItype\fR -arguments\&. -\fBdig\fR -automatically performs a lookup for a name like -94\&.2\&.0\&.192\&.in\-addr\&.arpa -and sets the query type and class to PTR and IN respectively\&. IPv6 addresses are looked up using nibble format under the IP6\&.ARPA domain\&. -.RE -.PP -\-y \fI[hmac:]\fR\fIkeyname:secret\fR -.RS 4 -Sign queries using TSIG with the given authentication key\&. -\fIkeyname\fR -is the name of the key, and -\fIsecret\fR -is the base64 encoded shared secret\&. -\fIhmac\fR -is the name of the key algorithm; valid choices are -hmac\-md5, -hmac\-sha1, -hmac\-sha224, -hmac\-sha256, -hmac\-sha384, or -hmac\-sha512\&. If -\fIhmac\fR -is not specified, the default is -hmac\-md5 -or if MD5 was disabled -hmac\-sha256\&. -.sp -NOTE: You should use the -\fB\-k\fR -option and avoid the -\fB\-y\fR -option, because with -\fB\-y\fR -the shared secret is supplied as a command line argument in clear text\&. This may be visible in the output from -\fBps\fR(1) -or in a history file maintained by the user\*(Aqs shell\&. -.RE -.SH "QUERY OPTIONS" -.PP -\fBdig\fR -provides a number of query options which affect the way in which lookups are made and the results displayed\&. Some of these set or reset flag bits in the query header, some determine which sections of the answer get printed, and others determine the timeout and retry strategies\&. -.PP -Each query option is identified by a keyword preceded by a plus sign (+)\&. Some keywords set or reset an option\&. These may be preceded by the string -no -to negate the meaning of that keyword\&. Other keywords assign values to options like the timeout interval\&. They have the form -\fB+keyword=value\fR\&. Keywords may be abbreviated, provided the abbreviation is unambiguous; for example, -+cd -is equivalent to -+cdflag\&. The query options are: -.PP -\fB+[no]aaflag\fR -.RS 4 -A synonym for -\fI+[no]aaonly\fR\&. -.RE -.PP -\fB+[no]aaonly\fR -.RS 4 -Sets the "aa" flag in the query\&. -.RE -.PP -\fB+[no]additional\fR -.RS 4 -Display [do not display] the additional section of a reply\&. The default is to display it\&. -.RE -.PP -\fB+[no]adflag\fR -.RS 4 -Set [do not set] the AD (authentic data) bit in the query\&. This requests the server to return whether all of the answer and authority sections have all been validated as secure according to the security policy of the server\&. AD=1 indicates that all records have been validated as secure and the answer is not from a OPT\-OUT range\&. AD=0 indicate that some part of the answer was insecure or not validated\&. This bit is set by default\&. -.RE -.PP -\fB+[no]all\fR -.RS 4 -Set or clear all display flags\&. -.RE -.PP -\fB+[no]answer\fR -.RS 4 -Display [do not display] the answer section of a reply\&. The default is to display it\&. -.RE -.PP -\fB+[no]authority\fR -.RS 4 -Display [do not display] the authority section of a reply\&. The default is to display it\&. -.RE -.PP -\fB+[no]badcookie\fR -.RS 4 -Retry lookup with the new server cookie if a BADCOOKIE response is received\&. -.RE -.PP -\fB+[no]besteffort\fR -.RS 4 -Attempt to display the contents of messages which are malformed\&. The default is to not display malformed answers\&. -.RE -.PP -\fB+bufsize=B\fR -.RS 4 -Set the UDP message buffer size advertised using EDNS0 to -\fIB\fR -bytes\&. The maximum and minimum sizes of this buffer are 65535 and 0 respectively\&. Values outside this range are rounded up or down appropriately\&. Values other than zero will cause a EDNS query to be sent\&. -.RE -.PP -\fB+[no]cdflag\fR -.RS 4 -Set [do not set] the CD (checking disabled) bit in the query\&. This requests the server to not perform DNSSEC validation of responses\&. -.RE -.PP -\fB+[no]class\fR -.RS 4 -Display [do not display] the CLASS when printing the record\&. -.RE -.PP -\fB+[no]cmd\fR -.RS 4 -Toggles the printing of the initial comment in the output, identifying the version of -\fBdig\fR -and the query options that have been applied\&. This option always has global effect; it cannot be set globally and then overridden on a per\-lookup basis\&. The default is to print this comment\&. -.RE -.PP -\fB+[no]comments\fR -.RS 4 -Toggles the display of some comment lines in the output, containing information about the packet header and OPT pseudosection, and the names of the response section\&. The default is to print these comments\&. -.sp -Other types of comments in the output are not affected by this option, but can be controlled using other command line switches\&. These include -\fB+[no]cmd\fR, -\fB+[no]question\fR, -\fB+[no]stats\fR, and -\fB+[no]rrcomments\fR\&. -.RE -.PP -\fB+[no]cookie\fR\fB[=####]\fR -.RS 4 -Send a COOKIE EDNS option, with optional value\&. Replaying a COOKIE from a previous response will allow the server to identify a previous client\&. The default is -\fB+cookie\fR\&. -.sp -\fB+cookie\fR -is also set when +trace is set to better emulate the default queries from a nameserver\&. -.RE -.PP -\fB+[no]crypto\fR -.RS 4 -Toggle the display of cryptographic fields in DNSSEC records\&. The contents of these field are unnecessary to debug most DNSSEC validation failures and removing them makes it easier to see the common failures\&. The default is to display the fields\&. When omitted they are replaced by the string "[omitted]" or in the DNSKEY case the key id is displayed as the replacement, e\&.g\&. "[ key id = value ]"\&. -.RE -.PP -\fB+[no]defname\fR -.RS 4 -Deprecated, treated as a synonym for -\fI+[no]search\fR -.RE -.PP -\fB+[no]dnssec\fR -.RS 4 -Requests DNSSEC records be sent by setting the DNSSEC OK bit (DO) in the OPT record in the additional section of the query\&. -.RE -.PP -\fB+domain=somename\fR -.RS 4 -Set the search list to contain the single domain -\fIsomename\fR, as if specified in a -\fBdomain\fR -directive in -/etc/resolv\&.conf, and enable search list processing as if the -\fI+search\fR -option were given\&. -.RE -.PP -\fB+dscp=value\fR -.RS 4 -Set the DSCP code point to be used when sending the query\&. Valid DSCP code points are in the range [0\&.\&.63]\&. By default no code point is explicitly set\&. -.RE -.PP -\fB+[no]edns[=#]\fR -.RS 4 -Specify the EDNS version to query with\&. Valid values are 0 to 255\&. Setting the EDNS version will cause a EDNS query to be sent\&. -\fB+noedns\fR -clears the remembered EDNS version\&. EDNS is set to 0 by default\&. -.RE -.PP -\fB+[no]ednsflags[=#]\fR -.RS 4 -Set the must\-be\-zero EDNS flags bits (Z bits) to the specified value\&. Decimal, hex and octal encodings are accepted\&. Setting a named flag (e\&.g\&. DO) will silently be ignored\&. By default, no Z bits are set\&. -.RE -.PP -\fB+[no]ednsnegotiation\fR -.RS 4 -Enable / disable EDNS version negotiation\&. By default EDNS version negotiation is enabled\&. -.RE -.PP -\fB+[no]ednsopt[=code[:value]]\fR -.RS 4 -Specify EDNS option with code point -\fBcode\fR -and optionally payload of -\fBvalue\fR -as a hexadecimal string\&. -\fBcode\fR -can be either an EDNS option name (for example, -NSID -or -ECS), or an arbitrary numeric value\&. -\fB+noednsopt\fR -clears the EDNS options to be sent\&. -.RE -.PP -\fB+[no]expire\fR -.RS 4 -Send an EDNS Expire option\&. -.RE -.PP -\fB+[no]expandaaaa\fR -.RS 4 -When printing AAAA record print all zero nibbles rather than the default RFC 5952 preferred presentation format\&. -.RE -.PP -\fB+[no]fail\fR -.RS 4 -Do not try the next server if you receive a SERVFAIL\&. The default is to not try the next server which is the reverse of normal stub resolver behavior\&. -.RE -.PP -\fB+[no]header\-only\fR -.RS 4 -Send a query with a DNS header without a question section\&. The default is to add a question section\&. The query type and query name are ignored when this is set\&. -.RE -.PP -\fB+[no]identify\fR -.RS 4 -Show [or do not show] the IP address and port number that supplied the answer when the -\fI+short\fR -option is enabled\&. If short form answers are requested, the default is not to show the source address and port number of the server that provided the answer\&. -.RE -.PP -\fB+[no]idnin\fR -.RS 4 -Process [do not process] IDN domain names on input\&. This requires IDN SUPPORT to have been enabled at compile time\&. -.sp -The default is to process IDN input when standard output is a tty\&. The IDN processing on input is disabled when dig output is redirected to files, pipes, and other non\-tty file descriptors\&. -.RE -.PP -\fB+[no]idnout\fR -.RS 4 -Convert [do not convert] puny code on output\&. This requires IDN SUPPORT to have been enabled at compile time\&. -.sp -The default is to process puny code on output when standard output is a tty\&. The puny code processing on output is disabled when dig output is redirected to files, pipes, and other non\-tty file descriptors\&. -.RE -.PP -\fB+[no]ignore\fR -.RS 4 -Ignore truncation in UDP responses instead of retrying with TCP\&. By default, TCP retries are performed\&. -.RE -.PP -\fB+[no]keepalive\fR -.RS 4 -Send [or do not send] an EDNS Keepalive option\&. -.RE -.PP -\fB+[no]keepopen\fR -.RS 4 -Keep the TCP socket open between queries and reuse it rather than creating a new TCP socket for each lookup\&. The default is -\fB+nokeepopen\fR\&. -.RE -.PP -\fB+[no]mapped\fR -.RS 4 -Allow mapped IPv4 over IPv6 addresses to be used\&. The default is -\fB+mapped\fR\&. -.RE -.PP -\fB+[no]multiline\fR -.RS 4 -Print records like the SOA records in a verbose multi\-line format with human\-readable comments\&. The default is to print each record on a single line, to facilitate machine parsing of the -\fBdig\fR -output\&. -.RE -.PP -\fB+ndots=D\fR -.RS 4 -Set the number of dots that have to appear in -\fIname\fR -to -\fID\fR -for it to be considered absolute\&. The default value is that defined using the ndots statement in -/etc/resolv\&.conf, or 1 if no ndots statement is present\&. Names with fewer dots are interpreted as relative names and will be searched for in the domains listed in the -\fBsearch\fR -or -\fBdomain\fR -directive in -/etc/resolv\&.conf -if -\fB+search\fR -is set\&. -.RE -.PP -\fB+[no]nsid\fR -.RS 4 -Include an EDNS name server ID request when sending a query\&. -.RE -.PP -\fB+[no]nssearch\fR -.RS 4 -When this option is set, -\fBdig\fR -attempts to find the authoritative name servers for the zone containing the name being looked up and display the SOA record that each name server has for the zone\&. Addresses of servers that that did not respond are also printed\&. -.RE -.PP -\fB+[no]onesoa\fR -.RS 4 -Print only one (starting) SOA record when performing an AXFR\&. The default is to print both the starting and ending SOA records\&. -.RE -.PP -\fB+[no]opcode=value\fR -.RS 4 -Set [restore] the DNS message opcode to the specified value\&. The default value is QUERY (0)\&. -.RE -.PP -\fB+padding=value\fR -.RS 4 -Pad the size of the query packet using the EDNS Padding option to blocks of -\fIvalue\fR -bytes\&. For example, -\fB+padding=32\fR -would cause a 48\-byte query to be padded to 64 bytes\&. The default block size is 0, which disables padding\&. The maximum is 512\&. Values are ordinarily expected to be powers of two, such as 128; however, this is not mandatory\&. Responses to padded queries may also be padded, but only if the query uses TCP or DNS COOKIE\&. -.RE -.PP -\fB+[no]qr\fR -.RS 4 -Toggles the display of the query message as it is sent\&. By default, the query is not printed\&. -.RE -.PP -\fB+[no]question\fR -.RS 4 -Toggles the display of the question section of a query when an answer is returned\&. The default is to print the question section as a comment\&. -.RE -.PP -\fB+[no]raflag\fR -.RS 4 -Set [do not set] the RA (Recursion Available) bit in the query\&. The default is +noraflag\&. This bit should be ignored by the server for QUERY\&. -.RE -.PP -\fB+[no]rdflag\fR -.RS 4 -A synonym for -\fI+[no]recurse\fR\&. -.RE -.PP -\fB+[no]recurse\fR -.RS 4 -Toggle the setting of the RD (recursion desired) bit in the query\&. This bit is set by default, which means -\fBdig\fR -normally sends recursive queries\&. Recursion is automatically disabled when using the -\fI+nssearch\fR -option, and when using -\fI+trace\fR -except for an initial recursive query to get the list of root servers\&. -.RE -.PP -\fB+retry=T\fR -.RS 4 -Sets the number of times to retry UDP queries to server to -\fIT\fR -instead of the default, 2\&. Unlike -\fI+tries\fR, this does not include the initial query\&. -.RE -.PP -\fB+[no]rrcomments\fR -.RS 4 -Toggle the display of per\-record comments in the output (for example, human\-readable key information about DNSKEY records)\&. The default is not to print record comments unless multiline mode is active\&. -.RE -.PP -\fB+[no]search\fR -.RS 4 -Use [do not use] the search list defined by the searchlist or domain directive in -resolv\&.conf -(if any)\&. The search list is not used by default\&. -.sp -\*(Aqndots\*(Aq from -resolv\&.conf -(default 1) which may be overridden by -\fI+ndots\fR -determines if the name will be treated as relative or not and hence whether a search is eventually performed or not\&. -.RE -.PP -\fB+[no]short\fR -.RS 4 -Provide a terse answer\&. The default is to print the answer in a verbose form\&. This option always has global effect; it cannot be set globally and then overridden on a per\-lookup basis\&. -.RE -.PP -\fB+[no]showsearch\fR -.RS 4 -Perform [do not perform] a search showing intermediate results\&. -.RE -.PP -\fB+[no]sigchase\fR -.RS 4 -This feature is now obsolete and has been removed; use -\fBdelv\fR -instead\&. -.RE -.PP -\fB+split=W\fR -.RS 4 -Split long hex\- or base64\-formatted fields in resource records into chunks of -\fIW\fR -characters (where -\fIW\fR -is rounded up to the nearest multiple of 4)\&. -\fI+nosplit\fR -or -\fI+split=0\fR -causes fields not to be split at all\&. The default is 56 characters, or 44 characters when multiline mode is active\&. -.RE -.PP -\fB+[no]stats\fR -.RS 4 -Toggles the printing of statistics: when the query was made, the size of the reply and so on\&. The default behavior is to print the query statistics as a comment after each lookup\&. -.RE -.PP -\fB+[no]subnet=addr[/prefix\-length]\fR -.RS 4 -Send (don\*(Aqt send) an EDNS Client Subnet option with the specified IP address or network prefix\&. -.sp -\fBdig +subnet=0\&.0\&.0\&.0/0\fR, or simply -\fBdig +subnet=0\fR -for short, sends an EDNS CLIENT\-SUBNET option with an empty address and a source prefix\-length of zero, which signals a resolver that the client\*(Aqs address information must -\fInot\fR -be used when resolving this query\&. -.RE -.PP -\fB+[no]tcflag\fR -.RS 4 -Set [do not set] the TC (TrunCation) bit in the query\&. The default is +notcflag\&. This bit should be ignored by the server for QUERY\&. -.RE -.PP -\fB+[no]tcp\fR -.RS 4 -Use [do not use] TCP when querying name servers\&. The default behavior is to use UDP unless a type -any -or -ixfr=N -query is requested, in which case the default is TCP\&. AXFR queries always use TCP\&. -.RE -.PP -\fB+timeout=T\fR -.RS 4 -Sets the timeout for a query to -\fIT\fR -seconds\&. The default timeout is 5 seconds\&. An attempt to set -\fIT\fR -to less than 1 will result in a query timeout of 1 second being applied\&. -.RE -.PP -\fB+[no]topdown\fR -.RS 4 -This feature is related to -\fBdig +sigchase\fR, which is obsolete and has been removed\&. Use -\fBdelv\fR -instead\&. -.RE -.PP -\fB+[no]trace\fR -.RS 4 -Toggle tracing of the delegation path from the root name servers for the name being looked up\&. Tracing is disabled by default\&. When tracing is enabled, -\fBdig\fR -makes iterative queries to resolve the name being looked up\&. It will follow referrals from the root servers, showing the answer from each server that was used to resolve the lookup\&. -.sp -If @server is also specified, it affects only the initial query for the root zone name servers\&. -.sp -\fB+dnssec\fR -is also set when +trace is set to better emulate the default queries from a nameserver\&. -.RE -.PP -\fB+tries=T\fR -.RS 4 -Sets the number of times to try UDP queries to server to -\fIT\fR -instead of the default, 3\&. If -\fIT\fR -is less than or equal to zero, the number of tries is silently rounded up to 1\&. -.RE -.PP -\fB+trusted\-key=####\fR -.RS 4 -Formerly specified trusted keys for use with -\fBdig +sigchase\fR\&. This feature is now obsolete and has been removed; use -\fBdelv\fR -instead\&. -.RE -.PP -\fB+[no]ttlid\fR -.RS 4 -Display [do not display] the TTL when printing the record\&. -.RE -.PP -\fB+[no]ttlunits\fR -.RS 4 -Display [do not display] the TTL in friendly human\-readable time units of "s", "m", "h", "d", and "w", representing seconds, minutes, hours, days and weeks\&. Implies +ttlid\&. -.RE -.PP -\fB+[no]unexpected\fR -.RS 4 -Accept [do not accept] answers from unexpected sources\&. By default, -\fBdig\fR -won\*(Aqt accept a reply from a source other than the one to which it sent the query\&. -.RE -.PP -\fB+[no]unknownformat\fR -.RS 4 -Print all RDATA in unknown RR type presentation format (RFC 3597)\&. The default is to print RDATA for known types in the type\*(Aqs presentation format\&. -.RE -.PP -\fB+[no]vc\fR -.RS 4 -Use [do not use] TCP when querying name servers\&. This alternate syntax to -\fI+[no]tcp\fR -is provided for backwards compatibility\&. The "vc" stands for "virtual circuit"\&. -.RE -.PP -\fB+[no]yaml\fR -.RS 4 -Print the responses (and, if -\fB+qr\fR -is in use, also the outgoing queries) in a detailed YAML format\&. -.RE -.PP -\fB+[no]zflag\fR -.RS 4 -Set [do not set] the last unassigned DNS header flag in a DNS query\&. This flag is off by default\&. -.RE -.SH "MULTIPLE QUERIES" -.PP -The BIND 9 implementation of -\fBdig \fR -supports specifying multiple queries on the command line (in addition to supporting the -\fB\-f\fR -batch file option)\&. Each of those queries can be supplied with its own set of flags, options and query options\&. -.PP -In this case, each -\fIquery\fR -argument represent an individual query in the command\-line syntax described above\&. Each consists of any of the standard options and flags, the name to be looked up, an optional query type and class and any query options that should be applied to that query\&. -.PP -A global set of query options, which should be applied to all queries, can also be supplied\&. These global query options must precede the first tuple of name, class, type, options, flags, and query options supplied on the command line\&. Any global query options (except -\fB+[no]cmd\fR -and -\fB+[no]short\fR -options) can be overridden by a query\-specific set of query options\&. For example: -.sp -.if n \{\ -.RS 4 -.\} -.nf -dig +qr www\&.isc\&.org any \-x 127\&.0\&.0\&.1 isc\&.org ns +noqr -.fi -.if n \{\ -.RE -.\} -.sp -shows how -\fBdig\fR -could be used from the command line to make three lookups: an ANY query for -www\&.isc\&.org, a reverse lookup of 127\&.0\&.0\&.1 and a query for the NS records of -isc\&.org\&. A global query option of -\fI+qr\fR -is applied, so that -\fBdig\fR -shows the initial query it made for each lookup\&. The final query has a local query option of -\fI+noqr\fR -which means that -\fBdig\fR -will not print the initial query when it looks up the NS records for -isc\&.org\&. -.SH "IDN SUPPORT" -.PP -If -\fBdig\fR -has been built with IDN (internationalized domain name) support, it can accept and display non\-ASCII domain names\&. -\fBdig\fR -appropriately converts character encoding of domain name before sending a request to DNS server or displaying a reply from the server\&. If you\*(Aqd like to turn off the IDN support for some reason, use parameters -\fI+noidnin\fR -and -\fI+noidnout\fR -or define the -\fBIDN_DISABLE\fR -environment variable\&. -.SH "FILES" -.PP -/etc/resolv\&.conf -.PP -${HOME}/\&.digrc -.SH "SEE ALSO" -.PP -\fBdelv\fR(1), -\fBhost\fR(1), -\fBnamed\fR(8), -\fBdnssec-keygen\fR(8), -RFC 1035\&. -.SH "BUGS" -.PP -There are probably too many query options\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000-2011, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dig/dig.docbook b/bin/dig/dig.docbook deleted file mode 100644 index 07e27f9290..0000000000 --- a/bin/dig/dig.docbook +++ /dev/null @@ -1,1431 +0,0 @@ -]> - - - - - - 2014-02-19 - - - ISC - Internet Systems Consortium, Inc. - - - - dig - 1 - BIND9 - - - - dig - DNS lookup utility - - - - - 2000 - 2001 - 2002 - 2003 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dig - @server - - - - - - - - - - - - - - - - name - type - class - queryopt - - - - dig - - - - - dig - global-queryopt - query - - - - DESCRIPTION - - dig is a flexible tool - for interrogating DNS name servers. It performs DNS lookups and - displays the answers that are returned from the name server(s) that - were queried. Most DNS administrators use dig to - troubleshoot DNS problems because of its flexibility, ease of use and - clarity of output. Other lookup tools tend to have less functionality - than dig. - - - - Although dig is normally used with - command-line - arguments, it also has a batch mode of operation for reading lookup - requests from a file. A brief summary of its command-line arguments - and options is printed when the option is given. - Unlike earlier versions, the BIND 9 implementation of - dig allows multiple lookups to be issued - from the - command line. - - - - Unless it is told to query a specific name server, - dig will try each of the servers listed in - /etc/resolv.conf. If no usable server addresses - are found, dig will send the query to the local - host. - - - - When no command line arguments or options are given, - dig will perform an NS query for "." (the root). - - - - It is possible to set per-user defaults for dig via - ${HOME}/.digrc. This file is read and any - options in it are applied before the command line arguments. - The option disables this feature, for - scripts that need predictable behaviour. - - - - The IN and CH class names overlap with the IN and CH top level - domain names. Either use the and - options to specify the type and class, - use the the specify the domain name, or - use "IN." and "CH." when looking up these top level domains. - - - - - SIMPLE USAGE - - - - A typical invocation of dig looks like: - dig @server name type - where: - - - - - server - - - is the name or IP address of the name server to query. This - can be an IPv4 address in dotted-decimal notation or an IPv6 - address in colon-delimited notation. When the supplied - server argument is a hostname, - dig resolves that name before querying - that name server. - - - If no server argument is - provided, dig consults - /etc/resolv.conf; if an - address is found there, it queries the name server at - that address. If either of the or - options are in use, then - only addresses for the corresponding transport - will be tried. If no usable addresses are found, - dig will send the query to the - local host. The reply from the name server that - responds is displayed. - - - - - - name - - - is the name of the resource record that is to be looked up. - - - - - - type - - - indicates what type of query is required — - ANY, A, MX, SIG, etc. - type can be any valid query - type. If no - type argument is supplied, - dig will perform a lookup for an - A record. - - - - - - - - - - OPTIONS - - - - - -4 - - - Use IPv4 only. - - - - - - -6 - - - Use IPv6 only. - - - - - - -b address#port - - - Set the source IP address of the query. - The address must be a valid address on - one of the host's network interfaces, or "0.0.0.0" or "::". An - optional port may be specified by appending "#<port>" - - - - - - -c class - - - Set the query class. The - default class is IN; other classes - are HS for Hesiod records or CH for Chaosnet records. - - - - - - -f file - - - Batch mode: dig reads a list of lookup - requests to process from the - given file. Each line in the file - should be organized in the same way they would be - presented as queries to - dig using the command-line interface. - - - - - - -k keyfile - - - Sign queries using TSIG using a key read from the given file. - Key files can be generated using - - tsig-keygen8 - . - When using TSIG authentication with dig, - the name server that is queried needs to know the key and - algorithm that is being used. In BIND, this is done by - providing appropriate key - and server statements in - named.conf. - - - - - - -m - - - Enable memory usage debugging. - - - - - - - -p port - - - Send the query to a non-standard port on the server, - instead of the default port 53. This option would be used - to test a name server that has been configured to listen - for queries on a non-standard port number. - - - - - - -q name - - - The domain name to query. This is useful to distinguish - the name from other arguments. - - - - - - -r - - - Do not read options from ${HOME}/.digrc. - This is useful for scripts that need predictable behaviour. - - - - - - -t type - - - The resource record type to query. It can be any valid query - type. If it is a resource record type supported in BIND 9, it - can be given by the type mnemonic (such as "NS" or "AAAA"). - The default query type is "A", unless the - option is supplied to indicate a reverse lookup. A zone - transfer can be requested by specifying a type of AXFR. When - an incremental zone transfer (IXFR) is required, set the - type to ixfr=N. - The incremental zone transfer will contain the changes - made to the zone since the serial number in the zone's SOA - record was - N. - - - All resource record types can be expressed as "TYPEnn", where - "nn" is the number of the type. If the resource record type is - not supported in BIND 9, the result will be displayed as - described in RFC 3597. - - - - - - -u - - - Print query times in microseconds instead of milliseconds. - - - - - - -v - - - Print the version number and exit. - - - - - - -x addr - - - Simplified reverse lookups, for mapping addresses to - names. The addr is an IPv4 address - in dotted-decimal notation, or a colon-delimited IPv6 - address. When the is used, there is no - need to provide - the name, class - and type - arguments. dig automatically performs a - lookup for a name like - 94.2.0.192.in-addr.arpa and sets the - query type and class to PTR and IN respectively. IPv6 - addresses are looked up using nibble format under the - IP6.ARPA domain. - - - - - - -y hmac:keyname:secret - - - Sign queries using TSIG with the given authentication key. - keyname is the name of the key, and - secret is the base64 encoded shared secret. - hmac is the name of the key algorithm; - valid choices are hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384, or - hmac-sha512. If hmac - is not specified, the default is hmac-md5 - or if MD5 was disabled hmac-sha256. - - - NOTE: You should use the option and - avoid the option, because - with the shared secret is supplied as - a command line argument in clear text. This may be visible - in the output from - - ps1 - - or in a history file maintained by the user's shell. - - - - - - - - QUERY OPTIONS - - - dig - provides a number of query options which affect - the way in which lookups are made and the results displayed. Some of - these set or reset flag bits in the query header, some determine which - sections of the answer get printed, and others determine the timeout - and retry strategies. - - - - Each query option is identified by a keyword preceded by a plus sign - (+). Some keywords set or reset an - option. These may be preceded - by the string no to negate the meaning of - that keyword. Other - keywords assign values to options like the timeout interval. They - have the form . - Keywords may be abbreviated, provided the abbreviation is - unambiguous; for example, +cd is equivalent - to +cdflag. - The query options are: - - - - - - - - A synonym for +[no]aaonly. - - - - - - - - - Sets the "aa" flag in the query. - - - - - - - - - Display [do not display] the additional section of a - reply. The default is to display it. - - - - - - - - - Set [do not set] the AD (authentic data) bit in the - query. This requests the server to return whether - all of the answer and authority sections have all - been validated as secure according to the security - policy of the server. AD=1 indicates that all records - have been validated as secure and the answer is not - from a OPT-OUT range. AD=0 indicate that some part - of the answer was insecure or not validated. This - bit is set by default. - - - - - - - - - Set or clear all display flags. - - - - - - - - - Display [do not display] the answer section of a - reply. The default is to display it. - - - - - - - - - Display [do not display] the authority section of a - reply. The default is to display it. - - - - - - - - - Retry lookup with the new server cookie if a - BADCOOKIE response is received. - - - - - - - - - Attempt to display the contents of messages which are - malformed. The default is to not display malformed - answers. - - - - - - - - - Set the UDP message buffer size advertised using EDNS0 - to B bytes. The maximum and - minimum sizes of this buffer are 65535 and 0 respectively. - Values outside this range are rounded up or down - appropriately. Values other than zero will cause a - EDNS query to be sent. - - - - - - - - - Set [do not set] the CD (checking disabled) bit in - the query. This requests the server to not perform - DNSSEC validation of responses. - - - - - - - - - Display [do not display] the CLASS when printing the - record. - - - - - - - - - Toggles the printing of the initial comment in the - output, identifying the version of dig - and the query options that have been applied. This option - always has global effect; it cannot be set globally - and then overridden on a per-lookup basis. The default - is to print this comment. - - - - - - - - - Toggles the display of some comment lines in the output, - containing information about the packet header and - OPT pseudosection, and the names of the response - section. The default is to print these comments. - - - Other types of comments in the output are not affected by - this option, but can be controlled using other command - line switches. These include +[no]cmd, - +[no]question, - +[no]stats, and - +[no]rrcomments. - - - - - - - - - Send a COOKIE EDNS option, with optional - value. Replaying a COOKIE from a previous response will - allow the server to identify a previous client. The - default is . - - - +cookie is also set when +trace - is set to better emulate the default queries from a - nameserver. - - - - - - - - - Toggle the display of cryptographic fields in DNSSEC - records. The contents of these field are unnecessary - to debug most DNSSEC validation failures and removing - them makes it easier to see the common failures. The - default is to display the fields. When omitted they - are replaced by the string "[omitted]" or in the - DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". - - - - - - - - - Deprecated, treated as a synonym for - +[no]search - - - - - - - - - Requests DNSSEC records be sent by setting the DNSSEC - OK bit (DO) in the OPT record in the additional section - of the query. - - - - - - - - - Set the search list to contain the single domain - somename, as if specified in - a domain directive in - /etc/resolv.conf, and enable - search list processing as if the - +search option were given. - - - - - - - - Set the DSCP code point to be used when sending the - query. Valid DSCP code points are in the range - [0..63]. By default no code point is explicitly set. - - - - - - - - - Specify the EDNS version to query with. Valid values - are 0 to 255. Setting the EDNS version will cause - a EDNS query to be sent. - clears the remembered EDNS version. EDNS is set to - 0 by default. - - - - - - - - - Set the must-be-zero EDNS flags bits (Z bits) to the - specified value. Decimal, hex and octal encodings are - accepted. Setting a named flag (e.g. DO) will silently be - ignored. By default, no Z bits are set. - - - - - - - - - Enable / disable EDNS version negotiation. By default - EDNS version negotiation is enabled. - - - - - - - - - Specify EDNS option with code point - and optionally payload of as a - hexadecimal string. can be - either an EDNS option name (for example, - NSID or ECS), - or an arbitrary numeric value. - clears the EDNS options to be sent. - - - - - - - - - Send an EDNS Expire option. - - - - - - - - - When printing AAAA record print all zero nibbles rather - than the default RFC 5952 preferred presentation format. - - - - - - - - - Do not try the next server if you receive a SERVFAIL. - The default is to not try the next server which is - the reverse of normal stub resolver behavior. - - - - - - - - - Send a query with a DNS header without a question section. - The default is to add a question section. The query type - and query name are ignored when this is set. - - - - - - - - - Show [or do not show] the IP address and port number - that supplied the answer when the - +short option is enabled. If - short form answers are requested, the default is not - to show the source address and port number of the - server that provided the answer. - - - - - - - - - Process [do not process] IDN domain names on input. - This requires IDN SUPPORT to have been enabled at - compile time. - - - The default is to process IDN input when standard output - is a tty. The IDN processing on input is disabled when - dig output is redirected to files, pipes, and other - non-tty file descriptors. - - - - - - - - - Convert [do not convert] puny code on output. - This requires IDN SUPPORT to have been enabled at - compile time. - - - The default is to process puny code on output when - standard output is a tty. The puny code processing on - output is disabled when dig output is redirected to - files, pipes, and other non-tty file descriptors. - - - - - - - - - Ignore truncation in UDP responses instead of retrying - with TCP. By default, TCP retries are performed. - - - - - - - - - Send [or do not send] an EDNS Keepalive option. - - - - - - - - - Keep the TCP socket open between queries and reuse - it rather than creating a new TCP socket for each - lookup. The default is . - - - - - - - - - Allow mapped IPv4 over IPv6 addresses to be used. The - default is . - - - - - - - - - Print records like the SOA records in a verbose - multi-line format with human-readable comments. The - default is to print each record on a single line, to - facilitate machine parsing of the dig - output. - - - - - - - - - Set the number of dots that have to appear in - name to D - for it to be considered absolute. The default value - is that defined using the ndots statement in - /etc/resolv.conf, or 1 if no - ndots statement is present. Names with fewer dots - are interpreted as relative names and will be searched - for in the domains listed in the - or directive in - /etc/resolv.conf if - is set. - - - - - - - - - Include an EDNS name server ID request when sending - a query. - - - - - - - - - When this option is set, dig - attempts to find the authoritative name servers for - the zone containing the name being looked up and - display the SOA record that each name server has for - the zone. Addresses of servers that that did not - respond are also printed. - - - - - - - - - Print only one (starting) SOA record when performing - an AXFR. The default is to print both the starting - and ending SOA records. - - - - - - - - - Set [restore] the DNS message opcode to the specified - value. The default value is QUERY (0). - - - - - - - - - Pad the size of the query packet using the EDNS Padding option - to blocks of value bytes. For example, - would cause a 48-byte query to - be padded to 64 bytes. The default block size is 0, which - disables padding. The maximum is 512. Values are - ordinarily expected to be powers of two, such as 128; - however, this is not mandatory. Responses to - padded queries may also be padded, but only if the query - uses TCP or DNS COOKIE. - - - - - - - - - Toggles the display of the query message as it is sent. - By default, the query is not printed. - - - - - - - - - Toggles the display of the question section of a query - when an answer is returned. The default is to print - the question section as a comment. - - - - - - - - - Set [do not set] the RA (Recursion Available) bit in - the query. The default is +noraflag. This bit should - be ignored by the server for QUERY. - - - - - - - - - A synonym for +[no]recurse. - - - - - - - - - Toggle the setting of the RD (recursion desired) bit - in the query. This bit is set by default, which means - dig normally sends recursive - queries. Recursion is automatically disabled when - using the +nssearch option, and - when using +trace except for - an initial recursive query to get the list of root - servers. - - - - - - - - - Sets the number of times to retry UDP queries to - server to T instead of the - default, 2. Unlike +tries, - this does not include the initial query. - - - - - - - - - Toggle the display of per-record comments in the - output (for example, human-readable key information - about DNSKEY records). The default is not to print - record comments unless multiline mode is active. - - - - - - - - - Use [do not use] the search list defined by the - searchlist or domain directive in - resolv.conf (if any). The search - list is not used by default. - - - 'ndots' from resolv.conf (default 1) - which may be overridden by +ndots - determines if the name will be treated as relative - or not and hence whether a search is eventually - performed or not. - - - - - - - - - Provide a terse answer. The default is to print the - answer in a verbose form. This option always has global - effect; it cannot be set globally and then overridden on - a per-lookup basis. - - - - - - - - - Perform [do not perform] a search showing intermediate - results. - - - - - - - - - This feature is now obsolete and has been removed; - use delv instead. - - - - - - - - - Split long hex- or base64-formatted fields in resource - records into chunks of W - characters (where W is rounded - up to the nearest multiple of 4). - +nosplit or - +split=0 causes fields not to - be split at all. The default is 56 characters, or - 44 characters when multiline mode is active. - - - - - - - - - Toggles the printing of statistics: when the query was made, - the size of the reply and so on. The default behavior is to - print the query statistics as a comment after each lookup. - - - - - - - - - Send (don't send) an EDNS Client Subnet option with the - specified IP address or network prefix. - - - dig +subnet=0.0.0.0/0, or simply - dig +subnet=0 for short, sends an EDNS - CLIENT-SUBNET option with an empty address and a source - prefix-length of zero, which signals a resolver that - the client's address information must - not be used when resolving - this query. - - - - - - - - - Set [do not set] the TC (TrunCation) bit in the query. - The default is +notcflag. This bit should be ignored - by the server for QUERY. - - - - - - - - - Use [do not use] TCP when querying name servers. The - default behavior is to use UDP unless a type - any or ixfr=N - query is requested, in which case the default is TCP. - AXFR queries always use TCP. - - - - - - - - - - Sets the timeout for a query to - T seconds. The default - timeout is 5 seconds. - An attempt to set T to less - than 1 will result - in a query timeout of 1 second being applied. - - - - - - - - - This feature is related to dig +sigchase, - which is obsolete and has been removed. Use - delv instead. - - - - - - - - - Toggle tracing of the delegation path from the root - name servers for the name being looked up. Tracing - is disabled by default. When tracing is enabled, - dig makes iterative queries to - resolve the name being looked up. It will follow - referrals from the root servers, showing the answer - from each server that was used to resolve the lookup. - - If @server is also specified, it affects only the - initial query for the root zone name servers. - - +dnssec is also set when +trace - is set to better emulate the default queries from a - nameserver. - - - - - - - - - Sets the number of times to try UDP queries to server - to T instead of the default, - 3. If T is less than or equal - to zero, the number of tries is silently rounded up - to 1. - - - - - - - - - Formerly specified trusted keys for use with - dig +sigchase. This feature is now - obsolete and has been removed; use - delv instead. - - - - - - - - - Display [do not display] the TTL when printing the - record. - - - - - - - - - Display [do not display] the TTL in friendly human-readable - time units of "s", "m", "h", "d", and "w", representing - seconds, minutes, hours, days and weeks. Implies +ttlid. - - - - - - - - - Accept [do not accept] answers from unexpected sources. By - default, dig won't accept a reply from a - source other than the one to which it sent the query. - - - - - - - - - Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. - - - - - - - - - Use [do not use] TCP when querying name servers. This - alternate syntax to +[no]tcp - is provided for backwards compatibility. The "vc" - stands for "virtual circuit". - - - - - - - - - Print the responses (and, if is in use, - also the outgoing queries) in a detailed YAML format. - - - - - - - - - Set [do not set] the last unassigned DNS header flag in a - DNS query. This flag is off by default. - - - - - - - - - - MULTIPLE QUERIES - - - - The BIND 9 implementation of dig - supports - specifying multiple queries on the command line (in addition to - supporting the batch file option). Each of those - queries can be supplied with its own set of flags, options and query - options. - - - - In this case, each query argument - represent an - individual query in the command-line syntax described above. Each - consists of any of the standard options and flags, the name to be - looked up, an optional query type and class and any query options that - should be applied to that query. - - - - A global set of query options, which should be applied to all queries, - can also be supplied. These global query options must precede the - first tuple of name, class, type, options, flags, and query options - supplied on the command line. Any global query options (except - and options) - can be overridden by a query-specific set of query options. - For example: - -dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr - - shows how dig could be used from the - command line - to make three lookups: an ANY query for www.isc.org, a - reverse lookup of 127.0.0.1 and a query for the NS records of - isc.org. - - A global query option of +qr is - applied, so - that dig shows the initial query it made - for each - lookup. The final query has a local query option of - +noqr which means that dig - will not print the initial query when it looks up the NS records for - isc.org. - - - - - IDN SUPPORT - - - If dig has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - dig appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, use - parameters +noidnin and - +noidnout or define - the IDN_DISABLE environment variable. - - - - - FILES - - /etc/resolv.conf - - ${HOME}/.digrc - - - - SEE ALSO - - - delv1 - , - - host1 - , - - named8 - , - - dnssec-keygen8 - , - RFC 1035. - - - - BUGS - - - There are probably too many query options. - - - - diff --git a/bin/dig/dig.html b/bin/dig/dig.html deleted file mode 100644 index ac9f107df2..0000000000 --- a/bin/dig/dig.html +++ /dev/null @@ -1,1155 +0,0 @@ - - - - - -dig - - -
-
- - - - - -
-

Name

-

- dig - — DNS lookup utility -

-
- - - -
-

Synopsis

-

- dig - [@server] - [-b address] - [-c class] - [-f filename] - [-k filename] - [-m] - [-p port#] - [-q name] - [-t type] - [-v] - [-x addr] - [-y [hmac:]name:key] - [ - [-4] - | [-6] - ] - [name] - [type] - [class] - [queryopt...] -

- -

- dig - [-h] -

- -

- dig - [global-queryopt...] - [query...] -

-
- -
-

DESCRIPTION

- -

dig is a flexible tool - for interrogating DNS name servers. It performs DNS lookups and - displays the answers that are returned from the name server(s) that - were queried. Most DNS administrators use dig to - troubleshoot DNS problems because of its flexibility, ease of use and - clarity of output. Other lookup tools tend to have less functionality - than dig. -

- -

- Although dig is normally used with - command-line - arguments, it also has a batch mode of operation for reading lookup - requests from a file. A brief summary of its command-line arguments - and options is printed when the -h option is given. - Unlike earlier versions, the BIND 9 implementation of - dig allows multiple lookups to be issued - from the - command line. -

- -

- Unless it is told to query a specific name server, - dig will try each of the servers listed in - /etc/resolv.conf. If no usable server addresses - are found, dig will send the query to the local - host. -

- -

- When no command line arguments or options are given, - dig will perform an NS query for "." (the root). -

- -

- It is possible to set per-user defaults for dig via - ${HOME}/.digrc. This file is read and any - options in it are applied before the command line arguments. - The -r option disables this feature, for - scripts that need predictable behaviour. -

- -

- The IN and CH class names overlap with the IN and CH top level - domain names. Either use the -t and - -c options to specify the type and class, - use the -q the specify the domain name, or - use "IN." and "CH." when looking up these top level domains. -

- -
- -
-

SIMPLE USAGE

- - -

- A typical invocation of dig looks like: -

-
 dig @server name type 
-

- where: - -

-
-
server
-
-

- is the name or IP address of the name server to query. This - can be an IPv4 address in dotted-decimal notation or an IPv6 - address in colon-delimited notation. When the supplied - server argument is a hostname, - dig resolves that name before querying - that name server. -

-

- If no server argument is - provided, dig consults - /etc/resolv.conf; if an - address is found there, it queries the name server at - that address. If either of the -4 or - -6 options are in use, then - only addresses for the corresponding transport - will be tried. If no usable addresses are found, - dig will send the query to the - local host. The reply from the name server that - responds is displayed. -

-
-
name
-
-

- is the name of the resource record that is to be looked up. -

-
-
type
-
-

- indicates what type of query is required — - ANY, A, MX, SIG, etc. - type can be any valid query - type. If no - type argument is supplied, - dig will perform a lookup for an - A record. -

-
-
-

-

- -
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only. -

-
-
-6
-
-

- Use IPv6 only. -

-
-
-b address[#port]
-
-

- Set the source IP address of the query. - The address must be a valid address on - one of the host's network interfaces, or "0.0.0.0" or "::". An - optional port may be specified by appending "#<port>" -

-
-
-c class
-
-

- Set the query class. The - default class is IN; other classes - are HS for Hesiod records or CH for Chaosnet records. -

-
-
-f file
-
-

- Batch mode: dig reads a list of lookup - requests to process from the - given file. Each line in the file - should be organized in the same way they would be - presented as queries to - dig using the command-line interface. -

-
-
-k keyfile
-
-

- Sign queries using TSIG using a key read from the given file. - Key files can be generated using - - tsig-keygen(8) - . - When using TSIG authentication with dig, - the name server that is queried needs to know the key and - algorithm that is being used. In BIND, this is done by - providing appropriate key - and server statements in - named.conf. -

-
-
-m
-
-

- Enable memory usage debugging. - -

-
-
-p port
-
-

- Send the query to a non-standard port on the server, - instead of the default port 53. This option would be used - to test a name server that has been configured to listen - for queries on a non-standard port number. -

-
-
-q name
-
-

- The domain name to query. This is useful to distinguish - the name from other arguments. -

-
-
-r
-
-

- Do not read options from ${HOME}/.digrc. - This is useful for scripts that need predictable behaviour. -

-
-
-t type
-
-

- The resource record type to query. It can be any valid query - type. If it is a resource record type supported in BIND 9, it - can be given by the type mnemonic (such as "NS" or "AAAA"). - The default query type is "A", unless the -x - option is supplied to indicate a reverse lookup. A zone - transfer can be requested by specifying a type of AXFR. When - an incremental zone transfer (IXFR) is required, set the - type to ixfr=N. - The incremental zone transfer will contain the changes - made to the zone since the serial number in the zone's SOA - record was - N. -

-

- All resource record types can be expressed as "TYPEnn", where - "nn" is the number of the type. If the resource record type is - not supported in BIND 9, the result will be displayed as - described in RFC 3597. -

-
-
-u
-
-

- Print query times in microseconds instead of milliseconds. -

-
-
-v
-
-

- Print the version number and exit. -

-
-
-x addr
-
-

- Simplified reverse lookups, for mapping addresses to - names. The addr is an IPv4 address - in dotted-decimal notation, or a colon-delimited IPv6 - address. When the -x is used, there is no - need to provide - the name, class - and type - arguments. dig automatically performs a - lookup for a name like - 94.2.0.192.in-addr.arpa and sets the - query type and class to PTR and IN respectively. IPv6 - addresses are looked up using nibble format under the - IP6.ARPA domain. -

-
-
-y [hmac:]keyname:secret
-
-

- Sign queries using TSIG with the given authentication key. - keyname is the name of the key, and - secret is the base64 encoded shared secret. - hmac is the name of the key algorithm; - valid choices are hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384, or - hmac-sha512. If hmac - is not specified, the default is hmac-md5 - or if MD5 was disabled hmac-sha256. -

-

- NOTE: You should use the -k option and - avoid the -y option, because - with -y the shared secret is supplied as - a command line argument in clear text. This may be visible - in the output from - - ps(1) - - or in a history file maintained by the user's shell. -

-
-
-
- -
-

QUERY OPTIONS

- - -

dig - provides a number of query options which affect - the way in which lookups are made and the results displayed. Some of - these set or reset flag bits in the query header, some determine which - sections of the answer get printed, and others determine the timeout - and retry strategies. -

- -

- Each query option is identified by a keyword preceded by a plus sign - (+). Some keywords set or reset an - option. These may be preceded - by the string no to negate the meaning of - that keyword. Other - keywords assign values to options like the timeout interval. They - have the form +keyword=value. - Keywords may be abbreviated, provided the abbreviation is - unambiguous; for example, +cd is equivalent - to +cdflag. - The query options are: - -

-
-
+[no]aaflag
-
-

- A synonym for +[no]aaonly. -

-
-
+[no]aaonly
-
-

- Sets the "aa" flag in the query. -

-
-
+[no]additional
-
-

- Display [do not display] the additional section of a - reply. The default is to display it. -

-
-
+[no]adflag
-
-

- Set [do not set] the AD (authentic data) bit in the - query. This requests the server to return whether - all of the answer and authority sections have all - been validated as secure according to the security - policy of the server. AD=1 indicates that all records - have been validated as secure and the answer is not - from a OPT-OUT range. AD=0 indicate that some part - of the answer was insecure or not validated. This - bit is set by default. -

-
-
+[no]all
-
-

- Set or clear all display flags. -

-
-
+[no]answer
-
-

- Display [do not display] the answer section of a - reply. The default is to display it. -

-
-
+[no]authority
-
-

- Display [do not display] the authority section of a - reply. The default is to display it. -

-
-
+[no]badcookie
-
-

- Retry lookup with the new server cookie if a - BADCOOKIE response is received. -

-
-
+[no]besteffort
-
-

- Attempt to display the contents of messages which are - malformed. The default is to not display malformed - answers. -

-
-
+bufsize=B
-
-

- Set the UDP message buffer size advertised using EDNS0 - to B bytes. The maximum and - minimum sizes of this buffer are 65535 and 0 respectively. - Values outside this range are rounded up or down - appropriately. Values other than zero will cause a - EDNS query to be sent. -

-
-
+[no]cdflag
-
-

- Set [do not set] the CD (checking disabled) bit in - the query. This requests the server to not perform - DNSSEC validation of responses. -

-
-
+[no]class
-
-

- Display [do not display] the CLASS when printing the - record. -

-
-
+[no]cmd
-
-

- Toggles the printing of the initial comment in the - output, identifying the version of dig - and the query options that have been applied. This option - always has global effect; it cannot be set globally - and then overridden on a per-lookup basis. The default - is to print this comment. -

-
-
+[no]comments
-
-

- Toggles the display of some comment lines in the output, - containing information about the packet header and - OPT pseudosection, and the names of the response - section. The default is to print these comments. -

-

- Other types of comments in the output are not affected by - this option, but can be controlled using other command - line switches. These include +[no]cmd, - +[no]question, - +[no]stats, and - +[no]rrcomments. -

-
-
+[no]cookie[=####]
-
-

- Send a COOKIE EDNS option, with optional - value. Replaying a COOKIE from a previous response will - allow the server to identify a previous client. The - default is +cookie. -

-

- +cookie is also set when +trace - is set to better emulate the default queries from a - nameserver. -

-
-
+[no]crypto
-
-

- Toggle the display of cryptographic fields in DNSSEC - records. The contents of these field are unnecessary - to debug most DNSSEC validation failures and removing - them makes it easier to see the common failures. The - default is to display the fields. When omitted they - are replaced by the string "[omitted]" or in the - DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". -

-
-
+[no]defname
-
-

- Deprecated, treated as a synonym for - +[no]search -

-
-
+[no]dnssec
-
-

- Requests DNSSEC records be sent by setting the DNSSEC - OK bit (DO) in the OPT record in the additional section - of the query. -

-
-
+domain=somename
-
-

- Set the search list to contain the single domain - somename, as if specified in - a domain directive in - /etc/resolv.conf, and enable - search list processing as if the - +search option were given. -

-
-
+dscp=value
-
-

- Set the DSCP code point to be used when sending the - query. Valid DSCP code points are in the range - [0..63]. By default no code point is explicitly set. -

-
-
+[no]edns[=#]
-
-

- Specify the EDNS version to query with. Valid values - are 0 to 255. Setting the EDNS version will cause - a EDNS query to be sent. +noedns - clears the remembered EDNS version. EDNS is set to - 0 by default. -

-
-
+[no]ednsflags[=#]
-
-

- Set the must-be-zero EDNS flags bits (Z bits) to the - specified value. Decimal, hex and octal encodings are - accepted. Setting a named flag (e.g. DO) will silently be - ignored. By default, no Z bits are set. -

-
-
+[no]ednsnegotiation
-
-

- Enable / disable EDNS version negotiation. By default - EDNS version negotiation is enabled. -

-
-
+[no]ednsopt[=code[:value]]
-
-

- Specify EDNS option with code point code - and optionally payload of value as a - hexadecimal string. code can be - either an EDNS option name (for example, - NSID or ECS), - or an arbitrary numeric value. +noednsopt - clears the EDNS options to be sent. -

-
-
+[no]expire
-
-

- Send an EDNS Expire option. -

-
-
+[no]expandaaaa
-
-

- When printing AAAA record print all zero nibbles rather - than the default RFC 5952 preferred presentation format. -

-
-
+[no]fail
-
-

- Do not try the next server if you receive a SERVFAIL. - The default is to not try the next server which is - the reverse of normal stub resolver behavior. -

-
-
+[no]header-only
-
-

- Send a query with a DNS header without a question section. - The default is to add a question section. The query type - and query name are ignored when this is set. -

-
-
+[no]identify
-
-

- Show [or do not show] the IP address and port number - that supplied the answer when the - +short option is enabled. If - short form answers are requested, the default is not - to show the source address and port number of the - server that provided the answer. -

-
-
+[no]idnin
-
-

- Process [do not process] IDN domain names on input. - This requires IDN SUPPORT to have been enabled at - compile time. -

-

- The default is to process IDN input when standard output - is a tty. The IDN processing on input is disabled when - dig output is redirected to files, pipes, and other - non-tty file descriptors. -

-
-
+[no]idnout
-
-

- Convert [do not convert] puny code on output. - This requires IDN SUPPORT to have been enabled at - compile time. -

-

- The default is to process puny code on output when - standard output is a tty. The puny code processing on - output is disabled when dig output is redirected to - files, pipes, and other non-tty file descriptors. -

-
-
+[no]ignore
-
-

- Ignore truncation in UDP responses instead of retrying - with TCP. By default, TCP retries are performed. -

-
-
+[no]keepalive
-
-

- Send [or do not send] an EDNS Keepalive option. -

-
-
+[no]keepopen
-
-

- Keep the TCP socket open between queries and reuse - it rather than creating a new TCP socket for each - lookup. The default is +nokeepopen. -

-
-
+[no]mapped
-
-

- Allow mapped IPv4 over IPv6 addresses to be used. The - default is +mapped. -

-
-
+[no]multiline
-
-

- Print records like the SOA records in a verbose - multi-line format with human-readable comments. The - default is to print each record on a single line, to - facilitate machine parsing of the dig - output. -

-
-
+ndots=D
-
-

- Set the number of dots that have to appear in - name to D - for it to be considered absolute. The default value - is that defined using the ndots statement in - /etc/resolv.conf, or 1 if no - ndots statement is present. Names with fewer dots - are interpreted as relative names and will be searched - for in the domains listed in the search - or domain directive in - /etc/resolv.conf if - +search is set. -

-
-
+[no]nsid
-
-

- Include an EDNS name server ID request when sending - a query. -

-
-
+[no]nssearch
-
-

- When this option is set, dig - attempts to find the authoritative name servers for - the zone containing the name being looked up and - display the SOA record that each name server has for - the zone. Addresses of servers that that did not - respond are also printed. -

-
-
+[no]onesoa
-
-

- Print only one (starting) SOA record when performing - an AXFR. The default is to print both the starting - and ending SOA records. -

-
-
+[no]opcode=value
-
-

- Set [restore] the DNS message opcode to the specified - value. The default value is QUERY (0). -

-
-
+padding=value
-
-

- Pad the size of the query packet using the EDNS Padding option - to blocks of value bytes. For example, - +padding=32 would cause a 48-byte query to - be padded to 64 bytes. The default block size is 0, which - disables padding. The maximum is 512. Values are - ordinarily expected to be powers of two, such as 128; - however, this is not mandatory. Responses to - padded queries may also be padded, but only if the query - uses TCP or DNS COOKIE. -

-
-
+[no]qr
-
-

- Toggles the display of the query message as it is sent. - By default, the query is not printed. -

-
-
+[no]question
-
-

- Toggles the display of the question section of a query - when an answer is returned. The default is to print - the question section as a comment. -

-
-
+[no]raflag
-
-

- Set [do not set] the RA (Recursion Available) bit in - the query. The default is +noraflag. This bit should - be ignored by the server for QUERY. -

-
-
+[no]rdflag
-
-

- A synonym for +[no]recurse. -

-
-
+[no]recurse
-
-

- Toggle the setting of the RD (recursion desired) bit - in the query. This bit is set by default, which means - dig normally sends recursive - queries. Recursion is automatically disabled when - using the +nssearch option, and - when using +trace except for - an initial recursive query to get the list of root - servers. -

-
-
+retry=T
-
-

- Sets the number of times to retry UDP queries to - server to T instead of the - default, 2. Unlike +tries, - this does not include the initial query. -

-
-
+[no]rrcomments
-
-

- Toggle the display of per-record comments in the - output (for example, human-readable key information - about DNSKEY records). The default is not to print - record comments unless multiline mode is active. -

-
-
+[no]search
-
-

- Use [do not use] the search list defined by the - searchlist or domain directive in - resolv.conf (if any). The search - list is not used by default. -

-

- 'ndots' from resolv.conf (default 1) - which may be overridden by +ndots - determines if the name will be treated as relative - or not and hence whether a search is eventually - performed or not. -

-
-
+[no]short
-
-

- Provide a terse answer. The default is to print the - answer in a verbose form. This option always has global - effect; it cannot be set globally and then overridden on - a per-lookup basis. -

-
-
+[no]showsearch
-
-

- Perform [do not perform] a search showing intermediate - results. -

-
-
+[no]sigchase
-
-

- This feature is now obsolete and has been removed; - use delv instead. -

-
-
+split=W
-
-

- Split long hex- or base64-formatted fields in resource - records into chunks of W - characters (where W is rounded - up to the nearest multiple of 4). - +nosplit or - +split=0 causes fields not to - be split at all. The default is 56 characters, or - 44 characters when multiline mode is active. -

-
-
+[no]stats
-
-

- Toggles the printing of statistics: when the query was made, - the size of the reply and so on. The default behavior is to - print the query statistics as a comment after each lookup. -

-
-
+[no]subnet=addr[/prefix-length]
-
-

- Send (don't send) an EDNS Client Subnet option with the - specified IP address or network prefix. -

-

- dig +subnet=0.0.0.0/0, or simply - dig +subnet=0 for short, sends an EDNS - CLIENT-SUBNET option with an empty address and a source - prefix-length of zero, which signals a resolver that - the client's address information must - not be used when resolving - this query. -

-
-
+[no]tcflag
-
-

- Set [do not set] the TC (TrunCation) bit in the query. - The default is +notcflag. This bit should be ignored - by the server for QUERY. -

-
-
+[no]tcp
-
-

- Use [do not use] TCP when querying name servers. The - default behavior is to use UDP unless a type - any or ixfr=N - query is requested, in which case the default is TCP. - AXFR queries always use TCP. -

-
-
+timeout=T
-
-

- - Sets the timeout for a query to - T seconds. The default - timeout is 5 seconds. - An attempt to set T to less - than 1 will result - in a query timeout of 1 second being applied. -

-
-
+[no]topdown
-
-

- This feature is related to dig +sigchase, - which is obsolete and has been removed. Use - delv instead. -

-
-
+[no]trace
-
-

- Toggle tracing of the delegation path from the root - name servers for the name being looked up. Tracing - is disabled by default. When tracing is enabled, - dig makes iterative queries to - resolve the name being looked up. It will follow - referrals from the root servers, showing the answer - from each server that was used to resolve the lookup. -

- If @server is also specified, it affects only the - initial query for the root zone name servers. -

- +dnssec is also set when +trace - is set to better emulate the default queries from a - nameserver. -

-
-
+tries=T
-
-

- Sets the number of times to try UDP queries to server - to T instead of the default, - 3. If T is less than or equal - to zero, the number of tries is silently rounded up - to 1. -

-
-
+trusted-key=####
-
-

- Formerly specified trusted keys for use with - dig +sigchase. This feature is now - obsolete and has been removed; use - delv instead. -

-
-
+[no]ttlid
-
-

- Display [do not display] the TTL when printing the - record. -

-
-
+[no]ttlunits
-
-

- Display [do not display] the TTL in friendly human-readable - time units of "s", "m", "h", "d", and "w", representing - seconds, minutes, hours, days and weeks. Implies +ttlid. -

-
-
+[no]unexpected
-
-

- Accept [do not accept] answers from unexpected sources. By - default, dig won't accept a reply from a - source other than the one to which it sent the query. -

-
-
+[no]unknownformat
-
-

- Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. -

-
-
+[no]vc
-
-

- Use [do not use] TCP when querying name servers. This - alternate syntax to +[no]tcp - is provided for backwards compatibility. The "vc" - stands for "virtual circuit". -

-
-
+[no]yaml
-
-

- Print the responses (and, if +qr is in use, - also the outgoing queries) in a detailed YAML format. -

-
-
+[no]zflag
-
-

- Set [do not set] the last unassigned DNS header flag in a - DNS query. This flag is off by default. -

-
-
-

- -

-
- -
-

MULTIPLE QUERIES

- - -

- The BIND 9 implementation of dig - supports - specifying multiple queries on the command line (in addition to - supporting the -f batch file option). Each of those - queries can be supplied with its own set of flags, options and query - options. -

- -

- In this case, each query argument - represent an - individual query in the command-line syntax described above. Each - consists of any of the standard options and flags, the name to be - looked up, an optional query type and class and any query options that - should be applied to that query. -

- -

- A global set of query options, which should be applied to all queries, - can also be supplied. These global query options must precede the - first tuple of name, class, type, options, flags, and query options - supplied on the command line. Any global query options (except - +[no]cmd and +[no]short options) - can be overridden by a query-specific set of query options. - For example: -

-
-dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
-
-

- shows how dig could be used from the - command line - to make three lookups: an ANY query for www.isc.org, a - reverse lookup of 127.0.0.1 and a query for the NS records of - isc.org. - - A global query option of +qr is - applied, so - that dig shows the initial query it made - for each - lookup. The final query has a local query option of - +noqr which means that dig - will not print the initial query when it looks up the NS records for - isc.org. -

- -
- -
-

IDN SUPPORT

- -

- If dig has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - dig appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, use - parameters +noidnin and - +noidnout or define - the IDN_DISABLE environment variable. - -

-
- -
-

FILES

- -

/etc/resolv.conf -

-

${HOME}/.digrc -

-
- -
-

SEE ALSO

- -

- delv(1) - , - - host(1) - , - - named(8) - , - - dnssec-keygen(8) - , - RFC 1035. -

-
- -
-

BUGS

- -

- There are probably too many query options. -

-
- -
- diff --git a/bin/dig/dig.rst b/bin/dig/dig.rst new file mode 100644 index 0000000000..3c899ceebc --- /dev/null +++ b/bin/dig/dig.rst @@ -0,0 +1,634 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dig: + +dig - DNS lookup utility +---------------------------------- + +Synopsis +~~~~~~~~ +:program:`dig` [@server] [**-b** address] [**-c** class] [**-f** filename] [**-k** filename] [**-m**] [**-p** port#] [**-q** name] [**-t** type] [**-v**] [**-x** addr] [**-y** [hmac:]name:key] [ [**-4**] | [**-6**] ] [name] [type] [class] [queryopt...] + +:program:`dig` [**-h**] + +:program:`dig` [global-queryopt...] [query...] + +Description +~~~~~~~~~~~ + +``dig`` is a flexible tool for interrogating DNS name servers. It +performs DNS lookups and displays the answers that are returned from the +name server(s) that were queried. Most DNS administrators use ``dig`` to +troubleshoot DNS problems because of its flexibility, ease of use and +clarity of output. Other lookup tools tend to have less functionality +than ``dig``. + +Although ``dig`` is normally used with command-line arguments, it also +has a batch mode of operation for reading lookup requests from a file. A +brief summary of its command-line arguments and options is printed when +the ``-h`` option is given. Unlike earlier versions, the BIND 9 +implementation of ``dig`` allows multiple lookups to be issued from the +command line. + +Unless it is told to query a specific name server, ``dig`` will try each +of the servers listed in ``/etc/resolv.conf``. If no usable server +addresses are found, ``dig`` will send the query to the local host. + +When no command line arguments or options are given, ``dig`` will +perform an NS query for "." (the root). + +It is possible to set per-user defaults for ``dig`` via +``${HOME}/.digrc``. This file is read and any options in it are applied +before the command line arguments. The ``-r`` option disables this +feature, for scripts that need predictable behaviour. + +The IN and CH class names overlap with the IN and CH top level domain +names. Either use the ``-t`` and ``-c`` options to specify the type and +class, use the ``-q`` the specify the domain name, or use "IN." and +"CH." when looking up these top level domains. + +Simple Usage +~~~~~~~~~~~~ + +A typical invocation of ``dig`` looks like: + +:: + + dig @server name type + +where: + +``server`` + is the name or IP address of the name server to query. This can be an + IPv4 address in dotted-decimal notation or an IPv6 address in + colon-delimited notation. When the supplied ``server`` argument is a + hostname, ``dig`` resolves that name before querying that name + server. + + If no ``server`` argument is provided, ``dig`` consults + ``/etc/resolv.conf``; if an address is found there, it queries the + name server at that address. If either of the ``-4`` or ``-6`` + options are in use, then only addresses for the corresponding + transport will be tried. If no usable addresses are found, ``dig`` + will send the query to the local host. The reply from the name server + that responds is displayed. + +``name`` + is the name of the resource record that is to be looked up. + +``type`` + indicates what type of query is required MDASH ANY, A, MX, SIG, etc. + ``type`` can be any valid query type. If no ``type`` argument is + supplied, ``dig`` will perform a lookup for an A record. + +Options +~~~~~~~ + +**-4** + Use IPv4 only. + +**-6** + Use IPv6 only. + +**-b** address[#port] + Set the source IP address of the query. The ``address`` must be a + valid address on one of the host's network interfaces, or "0.0.0.0" + or "::". An optional port may be specified by appending "#" + +**-c** class + Set the query class. The default ``class`` is IN; other classes are + HS for Hesiod records or CH for Chaosnet records. + +**-f** file + Batch mode: ``dig`` reads a list of lookup requests to process from + the given ``file``. Each line in the file should be organized in the + same way they would be presented as queries to ``dig`` using the + command-line interface. + +**-k** keyfile + Sign queries using TSIG using a key read from the given file. Key + files can be generated using tsig-keygen8. When using TSIG + authentication with ``dig``, the name server that is queried needs to + know the key and algorithm that is being used. In BIND, this is done + by providing appropriate ``key`` and ``server`` statements in + ``named.conf``. + +**-m** + Enable memory usage debugging. + +**-p** port + Send the query to a non-standard port on the server, instead of the + default port 53. This option would be used to test a name server that + has been configured to listen for queries on a non-standard port + number. + +**-q** name + The domain name to query. This is useful to distinguish the ``name`` + from other arguments. + +**-r** + Do not read options from ``${HOME}/.digrc``. This is useful for + scripts that need predictable behaviour. + +**-t** type + The resource record type to query. It can be any valid query type. If + it is a resource record type supported in BIND 9, it can be given by + the type mnemonic (such as "NS" or "AAAA"). The default query type is + "A", unless the ``-x`` option is supplied to indicate a reverse + lookup. A zone transfer can be requested by specifying a type of + AXFR. When an incremental zone transfer (IXFR) is required, set the + ``type`` to ``ixfr=N``. The incremental zone transfer will contain + the changes made to the zone since the serial number in the zone's + SOA record was ``N``. + + All resource record types can be expressed as "TYPEnn", where "nn" is + the number of the type. If the resource record type is not supported + in BIND 9, the result will be displayed as described in :rfc:`3597`. + +**-u** + Print query times in microseconds instead of milliseconds. + +**-v** + Print the version number and exit. + +**-x** addr + Simplified reverse lookups, for mapping addresses to names. The + ``addr`` is an IPv4 address in dotted-decimal notation, or a + colon-delimited IPv6 address. When the ``-x`` is used, there is no + need to provide the ``name``, ``class`` and ``type`` arguments. + ``dig`` automatically performs a lookup for a name like + ``94.2.0.192.in-addr.arpa`` and sets the query type and class to PTR + and IN respectively. IPv6 addresses are looked up using nibble format + under the IP6.ARPA domain. + +**-y** [hmac:]keyname:secret + Sign queries using TSIG with the given authentication key. + ``keyname`` is the name of the key, and ``secret`` is the base64 + encoded shared secret. ``hmac`` is the name of the key algorithm; + valid choices are ``hmac-md5``, ``hmac-sha1``, ``hmac-sha224``, + ``hmac-sha256``, ``hmac-sha384``, or ``hmac-sha512``. If ``hmac`` is + not specified, the default is ``hmac-md5`` or if MD5 was disabled + ``hmac-sha256``. + +.. note:: You should use the ``-k`` option and avoid the ``-y`` option, + because with ``-y`` the shared secret is supplied as a command line + argument in clear text. This may be visible in the output from ps1 or + in a history file maintained by the user's shell. + +Query Options +~~~~~~~~~~~~~ + +``dig`` provides a number of query options which affect the way in which +lookups are made and the results displayed. Some of these set or reset +flag bits in the query header, some determine which sections of the +answer get printed, and others determine the timeout and retry +strategies. + +Each query option is identified by a keyword preceded by a plus sign +(``+``). Some keywords set or reset an option. These may be preceded by +the string ``no`` to negate the meaning of that keyword. Other keywords +assign values to options like the timeout interval. They have the form +``+keyword=value``. Keywords may be abbreviated, provided the +abbreviation is unambiguous; for example, ``+cd`` is equivalent to +``+cdflag``. The query options are: + +``+[no]aaflag`` + A synonym for ``+[no]aaonly``. + +``+[no]aaonly`` + Sets the "aa" flag in the query. + +``+[no]additional`` + Display [do not display] the additional section of a reply. The + default is to display it. + +``+[no]adflag`` + Set [do not set] the AD (authentic data) bit in the query. This + requests the server to return whether all of the answer and authority + sections have all been validated as secure according to the security + policy of the server. AD=1 indicates that all records have been + validated as secure and the answer is not from a OPT-OUT range. AD=0 + indicate that some part of the answer was insecure or not validated. + This bit is set by default. + +``+[no]all`` + Set or clear all display flags. + +``+[no]answer`` + Display [do not display] the answer section of a reply. The default + is to display it. + +``+[no]authority`` + Display [do not display] the authority section of a reply. The + default is to display it. + +``+[no]badcookie`` + Retry lookup with the new server cookie if a BADCOOKIE response is + received. + +``+[no]besteffort`` + Attempt to display the contents of messages which are malformed. The + default is to not display malformed answers. + +``+bufsize=B`` + Set the UDP message buffer size advertised using EDNS0 to ``B`` + bytes. The maximum and minimum sizes of this buffer are 65535 and 0 + respectively. Values outside this range are rounded up or down + appropriately. Values other than zero will cause a EDNS query to be + sent. + +``+[no]cdflag`` + Set [do not set] the CD (checking disabled) bit in the query. This + requests the server to not perform DNSSEC validation of responses. + +``+[no]class`` + Display [do not display] the CLASS when printing the record. + +``+[no]cmd`` + Toggles the printing of the initial comment in the output, identifying the + version of ``dig`` and the query options that have been applied. This option + always has global effect; it cannot be set globally and then overridden on a + per-lookup basis. The default is to print this comment. + +``+[no]comments`` + Toggles the display of some comment lines in the output, containing + information about the packet header and OPT pseudosection, and the names of + the response section. The default is to print these comments. + + Other types of comments in the output are not affected by this option, but + can be controlled using other command line switches. These include + ``+[no]cmd``, ``+[no]question``, ``+[no]stats``, and ``+[no]rrcomments``. + +``+[no]cookie=####`` + Send a COOKIE EDNS option, with optional value. Replaying a COOKIE + from a previous response will allow the server to identify a previous + client. The default is ``+cookie``. + + ``+cookie`` is also set when +trace is set to better emulate the + default queries from a nameserver. + +``+[no]crypto`` + Toggle the display of cryptographic fields in DNSSEC records. The + contents of these field are unnecessary to debug most DNSSEC + validation failures and removing them makes it easier to see the + common failures. The default is to display the fields. When omitted + they are replaced by the string "[omitted]" or in the DNSKEY case the + key id is displayed as the replacement, e.g. "[ key id = value ]". + +``+[no]defname`` + Deprecated, treated as a synonym for ``+[no]search`` + +``+[no]dnssec`` + Requests DNSSEC records be sent by setting the DNSSEC OK bit (DO) in + the OPT record in the additional section of the query. + +``+domain=somename`` + Set the search list to contain the single domain ``somename``, as if + specified in a ``domain`` directive in ``/etc/resolv.conf``, and + enable search list processing as if the ``+search`` option were + given. + +``+dscp=value`` + Set the DSCP code point to be used when sending the query. Valid DSCP + code points are in the range [0..63]. By default no code point is + explicitly set. + +``+[no]edns[=#]`` + Specify the EDNS version to query with. Valid values are 0 to 255. + Setting the EDNS version will cause a EDNS query to be sent. + ``+noedns`` clears the remembered EDNS version. EDNS is set to 0 by + default. + +``+[no]ednsflags[=#]`` + Set the must-be-zero EDNS flags bits (Z bits) to the specified value. + Decimal, hex and octal encodings are accepted. Setting a named flag + (e.g. DO) will silently be ignored. By default, no Z bits are set. + +``+[no]ednsnegotiation`` + Enable / disable EDNS version negotiation. By default EDNS version + negotiation is enabled. + +``+[no]ednsopt[=code[:value]]`` + Specify EDNS option with code point ``code`` and optionally payload + of ``value`` as a hexadecimal string. ``code`` can be either an EDNS + option name (for example, ``NSID`` or ``ECS``), or an arbitrary + numeric value. ``+noednsopt`` clears the EDNS options to be sent. + +``+[no]expire`` + Send an EDNS Expire option. + +``+[no]fail`` + Do not try the next server if you receive a SERVFAIL. The default is + to not try the next server which is the reverse of normal stub + resolver behavior. + +``+[no]header-only`` + Send a query with a DNS header without a question section. The + default is to add a question section. The query type and query name + are ignored when this is set. + +``+[no]identify`` + Show [or do not show] the IP address and port number that supplied + the answer when the ``+short`` option is enabled. If short form + answers are requested, the default is not to show the source address + and port number of the server that provided the answer. + +``+[no]idnin`` + Process [do not process] IDN domain names on input. This requires IDN + SUPPORT to have been enabled at compile time. + + The default is to process IDN input when standard output is a tty. + The IDN processing on input is disabled when dig output is redirected + to files, pipes, and other non-tty file descriptors. + +``+[no]idnout`` + Convert [do not convert] puny code on output. This requires IDN + SUPPORT to have been enabled at compile time. + + The default is to process puny code on output when standard output is + a tty. The puny code processing on output is disabled when dig output + is redirected to files, pipes, and other non-tty file descriptors. + +``+[no]ignore`` + Ignore truncation in UDP responses instead of retrying with TCP. By + default, TCP retries are performed. + +``+[no]keepalive`` + Send [or do not send] an EDNS Keepalive option. + +``+[no]keepopen`` + Keep the TCP socket open between queries and reuse it rather than + creating a new TCP socket for each lookup. The default is + ``+nokeepopen``. + +``+[no]mapped`` + Allow mapped IPv4 over IPv6 addresses to be used. The default is + ``+mapped``. + +``+[no]multiline`` + Print records like the SOA records in a verbose multi-line format + with human-readable comments. The default is to print each record on + a single line, to facilitate machine parsing of the ``dig`` output. + +``+ndots=D`` + Set the number of dots that have to appear in ``name`` to ``D`` for + it to be considered absolute. The default value is that defined using + the ndots statement in ``/etc/resolv.conf``, or 1 if no ndots + statement is present. Names with fewer dots are interpreted as + relative names and will be searched for in the domains listed in the + ``search`` or ``domain`` directive in ``/etc/resolv.conf`` if + ``+search`` is set. + +``+[no]nsid`` + Include an EDNS name server ID request when sending a query. + +``+[no]nssearch`` + When this option is set, ``dig`` attempts to find the authoritative + name servers for the zone containing the name being looked up and + display the SOA record that each name server has for the zone. + Addresses of servers that that did not respond are also printed. + +``+[no]onesoa`` + Print only one (starting) SOA record when performing an AXFR. The + default is to print both the starting and ending SOA records. + +``+[no]opcode=value`` + Set [restore] the DNS message opcode to the specified value. The + default value is QUERY (0). + +``+padding=value`` + Pad the size of the query packet using the EDNS Padding option to + blocks of ``value`` bytes. For example, ``+padding=32`` would cause a + 48-byte query to be padded to 64 bytes. The default block size is 0, + which disables padding. The maximum is 512. Values are ordinarily + expected to be powers of two, such as 128; however, this is not + mandatory. Responses to padded queries may also be padded, but only + if the query uses TCP or DNS COOKIE. + +``+[no]qr`` + Toggles the display of the query message as it is sent. By default, the query + is not printed. + +``+[no]question`` + Toggles the display of the question section of a query when an answer is + returned. The default is to print the question section as a comment. + +``+[no]raflag`` + Set [do not set] the RA (Recursion Available) bit in the query. The + default is +noraflag. This bit should be ignored by the server for + QUERY. + +``+[no]rdflag`` + A synonym for ``+[no]recurse``. + +``+[no]recurse`` + Toggle the setting of the RD (recursion desired) bit in the query. + This bit is set by default, which means ``dig`` normally sends + recursive queries. Recursion is automatically disabled when the + ``+nssearch`` or ``+trace`` query options are used. + +``+retry=T`` + Sets the number of times to retry UDP queries to server to ``T`` + instead of the default, 2. Unlike ``+tries``, this does not include + the initial query. + +``+[no]rrcomments`` + Toggle the display of per-record comments in the output (for example, + human-readable key information about DNSKEY records). The default is + not to print record comments unless multiline mode is active. + +``+[no]search`` + Use [do not use] the search list defined by the searchlist or domain + directive in ``resolv.conf`` (if any). The search list is not used by + default. + + 'ndots' from ``resolv.conf`` (default 1) which may be overridden by + ``+ndots`` determines if the name will be treated as relative or not + and hence whether a search is eventually performed or not. + +``+[no]short`` + Provide a terse answer. The default is to print the answer in a verbose + form. This option always has global effect; it cannot be set globally and + then overridden on a per-lookup basis. + +``+[no]showsearch`` + Perform [do not perform] a search showing intermediate results. + +``+[no]sigchase`` + This feature is now obsolete and has been removed; use ``delv`` + instead. + +``+split=W`` + Split long hex- or base64-formatted fields in resource records into + chunks of ``W`` characters (where ``W`` is rounded up to the nearest + multiple of 4). ``+nosplit`` or ``+split=0`` causes fields not to be + split at all. The default is 56 characters, or 44 characters when + multiline mode is active. + +``+[no]stats`` + Toggles the printing of statistics: when the query was made, the size of the + reply and so on. The default behavior is to print the query statistics as a + comment after each lookup. + +``+[no]subnet=addr[/prefix-length]`` + Send (don't send) an EDNS Client Subnet option with the specified IP + address or network prefix. + + ``dig +subnet=0.0.0.0/0``, or simply ``dig +subnet=0`` for short, + sends an EDNS CLIENT-SUBNET option with an empty address and a source + prefix-length of zero, which signals a resolver that the client's + address information must *not* be used when resolving this query. + +``+[no]tcflag`` + Set [do not set] the TC (TrunCation) bit in the query. The default is + +notcflag. This bit should be ignored by the server for QUERY. + +``+[no]tcp`` + Use [do not use] TCP when querying name servers. The default behavior + is to use UDP unless a type ``any`` or ``ixfr=N`` query is requested, + in which case the default is TCP. AXFR queries always use TCP. + +``+timeout=T`` + Sets the timeout for a query to ``T`` seconds. The default timeout is + 5 seconds. An attempt to set ``T`` to less than 1 will result in a + query timeout of 1 second being applied. + +``+[no]topdown`` + This feature is related to ``dig +sigchase``, which is obsolete and + has been removed. Use ``delv`` instead. + +``+[no]trace`` + Toggle tracing of the delegation path from the root name servers for + the name being looked up. Tracing is disabled by default. When + tracing is enabled, ``dig`` makes iterative queries to resolve the + name being looked up. It will follow referrals from the root servers, + showing the answer from each server that was used to resolve the + lookup. + + If @server is also specified, it affects only the initial query for + the root zone name servers. + + ``+dnssec`` is also set when +trace is set to better emulate the + default queries from a nameserver. + +``+tries=T`` + Sets the number of times to try UDP queries to server to ``T`` + instead of the default, 3. If ``T`` is less than or equal to zero, + the number of tries is silently rounded up to 1. + +``+trusted-key=####`` + Formerly specified trusted keys for use with ``dig +sigchase``. This + feature is now obsolete and has been removed; use ``delv`` instead. + +``+[no]ttlid`` + Display [do not display] the TTL when printing the record. + +``+[no]ttlunits`` + Display [do not display] the TTL in friendly human-readable time + units of "s", "m", "h", "d", and "w", representing seconds, minutes, + hours, days and weeks. Implies +ttlid. + +``+[no]unexpected`` + Accept [do not accept] answers from unexpected sources. By default, ``dig`` + won't accept a reply from a source other than the one to which it sent the + query. + +``+[no]unknownformat`` + Print all RDATA in unknown RR type presentation format (:rfc:`3597`). + The default is to print RDATA for known types in the type's + presentation format. + +``+[no]vc`` + Use [do not use] TCP when querying name servers. This alternate + syntax to ``+[no]tcp`` is provided for backwards compatibility. The + "vc" stands for "virtual circuit". + +``+[no]yaml`` + Print the responses (and, if is in use, also the + outgoing queries) in a detailed YAML format. + +``+[no]zflag`` + Set [do not set] the last unassigned DNS header flag in a DNS query. + This flag is off by default. + +Multiple Queries +~~~~~~~~~~~~~~~~ + +The BIND 9 implementation of ``dig`` supports specifying multiple +queries on the command line (in addition to supporting the ``-f`` batch +file option). Each of those queries can be supplied with its own set of +flags, options and query options. + +In this case, each ``query`` argument represent an individual query in +the command-line syntax described above. Each consists of any of the +standard options and flags, the name to be looked up, an optional query +type and class and any query options that should be applied to that +query. + +A global set of query options, which should be applied to all queries, +can also be supplied. These global query options must precede the first +tuple of name, class, type, options, flags, and query options supplied +on the command line. Any global query options (except ``+[no]cmd`` and +``+[no]short`` options) can be overridden by a query-specific set of +query options. For example: + +:: + + dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr + +shows how ``dig`` could be used from the command line to make three +lookups: an ANY query for ``www.isc.org``, a reverse lookup of 127.0.0.1 +and a query for the NS records of ``isc.org``. A global query option of +``+qr`` is applied, so that ``dig`` shows the initial query it made for +each lookup. The final query has a local query option of ``+noqr`` which +means that ``dig`` will not print the initial query when it looks up the +NS records for ``isc.org``. + +IDN Support +~~~~~~~~~~~ + +If ``dig`` has been built with IDN (internationalized domain name) +support, it can accept and display non-ASCII domain names. ``dig`` +appropriately converts character encoding of domain name before sending +a request to DNS server or displaying a reply from the server. If you'd +like to turn off the IDN support for some reason, use parameters +``+noidnin`` and ``+noidnout`` or define the IDN_DISABLE environment +variable. + +Files +~~~~~ + +``/etc/resolv.conf`` + +``${HOME}/.digrc`` + +See Also +~~~~~~~~ + +:manpage:`delv(1)`, :manpage:`host(1)`, :manpage:`named(8)`, :manpage:`dnssec-keygen(8)`, :rfc:`1035`. + +Bugs +~~~~ + +There are probably too many query options. diff --git a/bin/dig/host.1 b/bin/dig/host.1 deleted file mode 100644 index 6775a14cd5..0000000000 --- a/bin/dig/host.1 +++ /dev/null @@ -1,278 +0,0 @@ -.\" Copyright (C) 2000-2002, 2004, 2005, 2007-2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: host -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2009-01-20 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "HOST" "1" "2009\-01\-20" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -host \- DNS lookup utility -.SH "SYNOPSIS" -.HP \w'\fBhost\fR\ 'u -\fBhost\fR [\fB\-aACdlnrsTUwv\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-N\ \fR\fB\fIndots\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-R\ \fR\fB\fInumber\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-W\ \fR\fB\fIwait\fR\fR] [\fB\-m\ \fR\fB\fIflag\fR\fR] [[\fB\-4\fR] | [\fB\-6\fR]] [\fB\-v\fR] [\fB\-V\fR] {name} [server] -.SH "DESCRIPTION" -.PP -\fBhost\fR -is a simple utility for performing DNS lookups\&. It is normally used to convert names to IP addresses and vice versa\&. When no arguments or options are given, -\fBhost\fR -prints a short summary of its command line arguments and options\&. -.PP -\fIname\fR -is the domain name that is to be looked up\&. It can also be a dotted\-decimal IPv4 address or a colon\-delimited IPv6 address, in which case -\fBhost\fR -will by default perform a reverse lookup for that address\&. -\fIserver\fR -is an optional argument which is either the name or IP address of the name server that -\fBhost\fR -should query instead of the server or servers listed in -/etc/resolv\&.conf\&. -.SH "OPTIONS" -.PP -\-4 -.RS 4 -Use IPv4 only for query transport\&. See also the -\fB\-6\fR -option\&. -.RE -.PP -\-6 -.RS 4 -Use IPv6 only for query transport\&. See also the -\fB\-4\fR -option\&. -.RE -.PP -\-a -.RS 4 -"All"\&. The -\fB\-a\fR -option is normally equivalent to -\fB\-v \-t \fR\fBANY\fR\&. It also affects the behaviour of the -\fB\-l\fR -list zone option\&. -.RE -.PP -\-A -.RS 4 -"Almost all"\&. The -\fB\-A\fR -option is equivalent to -\fB\-a\fR -except RRSIG, NSEC, and NSEC3 records are omitted from the output\&. -.RE -.PP -\-c \fIclass\fR -.RS 4 -Query class: This can be used to lookup HS (Hesiod) or CH (Chaosnet) class resource records\&. The default class is IN (Internet)\&. -.RE -.PP -\-C -.RS 4 -Check consistency: -\fBhost\fR -will query the SOA records for zone -\fIname\fR -from all the listed authoritative name servers for that zone\&. The list of name servers is defined by the NS records that are found for the zone\&. -.RE -.PP -\-d -.RS 4 -Print debugging traces\&. Equivalent to the -\fB\-v\fR -verbose option\&. -.RE -.PP -\-l -.RS 4 -List zone: The -\fBhost\fR -command performs a zone transfer of zone -\fIname\fR -and prints out the NS, PTR and address records (A/AAAA)\&. -.sp -Together, the -\fB\-l \-a\fR -options print all records in the zone\&. -.RE -.PP -\-N \fIndots\fR -.RS 4 -The number of dots that have to be in -\fIname\fR -for it to be considered absolute\&. The default value is that defined using the ndots statement in -/etc/resolv\&.conf, or 1 if no ndots statement is present\&. Names with fewer dots are interpreted as relative names and will be searched for in the domains listed in the -\fBsearch\fR -or -\fBdomain\fR -directive in -/etc/resolv\&.conf\&. -.RE -.PP -\-p \fIport\fR -.RS 4 -Specify the port on the server to query\&. The default is 53\&. -.RE -.PP -\-r -.RS 4 -Non\-recursive query: Setting this option clears the RD (recursion desired) bit in the query\&. This should mean that the name server receiving the query will not attempt to resolve -\fIname\fR\&. The -\fB\-r\fR -option enables -\fBhost\fR -to mimic the behavior of a name server by making non\-recursive queries and expecting to receive answers to those queries that can be referrals to other name servers\&. -.RE -.PP -\-R \fInumber\fR -.RS 4 -Number of retries for UDP queries: If -\fInumber\fR -is negative or zero, the number of retries will default to 1\&. The default value is 1, or the value of the -\fIattempts\fR -option in -/etc/resolv\&.conf, if set\&. -.RE -.PP -\-s -.RS 4 -Do -\fInot\fR -send the query to the next nameserver if any server responds with a SERVFAIL response, which is the reverse of normal stub resolver behavior\&. -.RE -.PP -\-t \fItype\fR -.RS 4 -Query type: The -\fItype\fR -argument can be any recognized query type: CNAME, NS, SOA, TXT, DNSKEY, AXFR, etc\&. -.sp -When no query type is specified, -\fBhost\fR -automatically selects an appropriate query type\&. By default, it looks for A, AAAA, and MX records\&. If the -\fB\-C\fR -option is given, queries will be made for SOA records\&. If -\fIname\fR -is a dotted\-decimal IPv4 address or colon\-delimited IPv6 address, -\fBhost\fR -will query for PTR records\&. -.sp -If a query type of IXFR is chosen the starting serial number can be specified by appending an equal followed by the starting serial number (like -\fB\-t \fR\fBIXFR=12345678\fR)\&. -.RE -.PP -\-T, \-U -.RS 4 -TCP/UDP: By default, -\fBhost\fR -uses UDP when making queries\&. The -\fB\-T\fR -option makes it use a TCP connection when querying the name server\&. TCP will be automatically selected for queries that require it, such as zone transfer (AXFR) requests\&. Type ANY queries default to TCP but can be forced to UDP initially using -\fB\-U\fR\&. -.RE -.PP -\-m \fIflag\fR -.RS 4 -Memory usage debugging: the flag can be -\fIrecord\fR, -\fIusage\fR, or -\fItrace\fR\&. You can specify the -\fB\-m\fR -option more than once to set multiple flags\&. -.RE -.PP -\-v -.RS 4 -Verbose output\&. Equivalent to the -\fB\-d\fR -debug option\&. Verbose output can also be enabled by setting the -\fIdebug\fR -option in -/etc/resolv\&.conf\&. -.RE -.PP -\-V -.RS 4 -Print the version number and exit\&. -.RE -.PP -\-w -.RS 4 -Wait forever: The query timeout is set to the maximum possible\&. See also the -\fB\-W\fR -option\&. -.RE -.PP -\-W \fIwait\fR -.RS 4 -Timeout: Wait for up to -\fIwait\fR -seconds for a reply\&. If -\fIwait\fR -is less than one, the wait interval is set to one second\&. -.sp -By default, -\fBhost\fR -will wait for 5 seconds for UDP responses and 10 seconds for TCP connections\&. These defaults can be overridden by the -\fItimeout\fR -option in -/etc/resolv\&.conf\&. -.sp -See also the -\fB\-w\fR -option\&. -.RE -.SH "IDN SUPPORT" -.PP -If -\fBhost\fR -has been built with IDN (internationalized domain name) support, it can accept and display non\-ASCII domain names\&. -\fBhost\fR -appropriately converts character encoding of domain name before sending a request to DNS server or displaying a reply from the server\&. If you\*(Aqd like to turn off the IDN support for some reason, define the -\fBIDN_DISABLE\fR -environment variable\&. The IDN support is disabled if the variable is set when -\fBhost\fR -runs\&. -.SH "FILES" -.PP -/etc/resolv\&.conf -.SH "SEE ALSO" -.PP -\fBdig\fR(1), -\fBnamed\fR(8)\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000-2002, 2004, 2005, 2007-2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dig/host.docbook b/bin/dig/host.docbook deleted file mode 100644 index 8fb795d346..0000000000 --- a/bin/dig/host.docbook +++ /dev/null @@ -1,416 +0,0 @@ -]> - - - - - - 2009-01-20 - - - ISC - Internet Systems Consortium, Inc. - - - - host - 1 - BIND9 - - - - host - DNS lookup utility - - - - - 2000 - 2001 - 2002 - 2004 - 2005 - 2007 - 2008 - 2009 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - host - - - - - - - - - - - - - - - name - server - - - - DESCRIPTION - - - host - is a simple utility for performing DNS lookups. - It is normally used to convert names to IP addresses and vice versa. - When no arguments or options are given, - host - prints a short summary of its command line arguments and options. - - - name is the domain name that is to be - looked - up. It can also be a dotted-decimal IPv4 address or a colon-delimited - IPv6 address, in which case host will by - default - perform a reverse lookup for that address. - server is an optional argument which - is either - the name or IP address of the name server that host - should query instead of the server or servers listed in - /etc/resolv.conf. - - - - - OPTIONS - - - - - -4 - - - Use IPv4 only for query transport. - See also the option. - - - - - - -6 - - - Use IPv6 only for query transport. - See also the option. - - - - - - -a - - - "All". The option is normally equivalent - to . - It also affects the behaviour of the - list zone option. - - - - - - -A - - - "Almost all". The option is equivalent - to except RRSIG, NSEC, and NSEC3 - records are omitted from the output. - - - - - - -c class - - - Query class: This can be used to lookup HS (Hesiod) or CH - (Chaosnet) class resource records. The default class is IN - (Internet). - - - - - - -C - - - Check consistency: host will query the - SOA records for zone name from all - the listed authoritative name servers for that zone. The - list of name servers is defined by the NS records that are - found for the zone. - - - - - - -d - - - Print debugging traces. - Equivalent to the verbose option. - - - - - - -l - - - List zone: - The host command performs a zone transfer of - zone name and prints out the NS, - PTR and address records (A/AAAA). - - - Together, the - options print all records in the zone. - - - - - - -N ndots - - - The number of dots that have to be - in name for it to be considered - absolute. The default value is that defined using the - ndots statement in /etc/resolv.conf, - or 1 if no ndots statement is present. Names with fewer - dots are interpreted as relative names and will be - searched for in the domains listed in - the search or domain directive - in /etc/resolv.conf. - - - - - - -p port - - - Specify the port on the server to query. The default is 53. - - - - - - -r - - - Non-recursive query: - Setting this option clears the RD (recursion desired) bit - in the query. This should mean that the name server - receiving the query will not attempt to - resolve name. - The option - enables host to mimic the behavior of a - name server by making non-recursive queries and expecting - to receive answers to those queries that can be - referrals to other name servers. - - - - - - -R number - - - Number of retries for UDP queries: - If number is negative or zero, the - number of retries will default to 1. The default value is - 1, or the value of the attempts - option in /etc/resolv.conf, if set. - - - - - - -s - - - Do not send the query to the next - nameserver if any server responds with a SERVFAIL - response, which is the reverse of normal stub resolver - behavior. - - - - - - -t type - - - Query type: - The type argument can be any - recognized query type: CNAME, NS, SOA, TXT, DNSKEY, AXFR, etc. - - - When no query type is specified, host - automatically selects an appropriate query type. By default, it - looks for A, AAAA, and MX records. - If the option is given, queries will - be made for SOA records. - If name is a dotted-decimal IPv4 - address or colon-delimited IPv6 - address, host will query for PTR - records. - - - If a query type of IXFR is chosen the starting serial - number can be specified by appending an equal followed by - the starting serial number - (like ). - - - - - - -T - -U - - - TCP/UDP: - By default, host uses UDP when making - queries. The option makes it use a TCP - connection when querying the name server. TCP will be - automatically selected for queries that require it, such - as zone transfer (AXFR) requests. Type ANY queries default - to TCP but can be forced to UDP initially using . - - - - - - -m flag - - - Memory usage debugging: the flag can - be record, usage, - or trace. You can specify - the option more than once to set - multiple flags. - - - - - - -v - - - Verbose output. - Equivalent to the debug option. - Verbose output can also be enabled by setting - the debug option - in /etc/resolv.conf. - - - - - - -V - - - Print the version number and exit. - - - - - - -w - - - Wait forever: The query timeout is set to the maximum possible. - See also the option. - - - - - - -W wait - - - Timeout: Wait for up to wait - seconds for a reply. If wait is - less than one, the wait interval is set to one second. - - - By default, host will wait for 5 - seconds for UDP responses and 10 seconds for TCP - connections. These defaults can be overridden by - the timeout option - in /etc/resolv.conf. - - - See also the option. - - - - - - - - - IDN SUPPORT - - - If host has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - host appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, define - the IDN_DISABLE environment variable. - The IDN support is disabled if the variable is set when - host runs. - - - - FILES - - /etc/resolv.conf - - - - SEE ALSO - - - dig1 - , - - named8 - . - - - - diff --git a/bin/dig/host.html b/bin/dig/host.html deleted file mode 100644 index 1ebf702999..0000000000 --- a/bin/dig/host.html +++ /dev/null @@ -1,339 +0,0 @@ - - - - - -host - - -
-
- - - - - -
-

Name

-

- host - — DNS lookup utility -

-
- - - -
-

Synopsis

-

- host - [-aACdlnrsTUwv] - [-c class] - [-N ndots] - [-p port] - [-R number] - [-t type] - [-W wait] - [-m flag] - [ - [-4] - | [-6] - ] - [-v] - [-V] - {name} - [server] -

-
- -
-

DESCRIPTION

- - -

host - is a simple utility for performing DNS lookups. - It is normally used to convert names to IP addresses and vice versa. - When no arguments or options are given, - host - prints a short summary of its command line arguments and options. -

- -

name is the domain name that is to be - looked - up. It can also be a dotted-decimal IPv4 address or a colon-delimited - IPv6 address, in which case host will by - default - perform a reverse lookup for that address. - server is an optional argument which - is either - the name or IP address of the name server that host - should query instead of the server or servers listed in - /etc/resolv.conf. -

- -
- -
-

OPTIONS

- -
-
-4
-
-

- Use IPv4 only for query transport. - See also the -6 option. -

-
-
-6
-
-

- Use IPv6 only for query transport. - See also the -4 option. -

-
-
-a
-
-

- "All". The -a option is normally equivalent - to -v -t ANY. - It also affects the behaviour of the -l - list zone option. -

-
-
-A
-
-

- "Almost all". The -A option is equivalent - to -a except RRSIG, NSEC, and NSEC3 - records are omitted from the output. -

-
-
-c class
-
-

- Query class: This can be used to lookup HS (Hesiod) or CH - (Chaosnet) class resource records. The default class is IN - (Internet). -

-
-
-C
-
-

- Check consistency: host will query the - SOA records for zone name from all - the listed authoritative name servers for that zone. The - list of name servers is defined by the NS records that are - found for the zone. -

-
-
-d
-
-

- Print debugging traces. - Equivalent to the -v verbose option. -

-
-
-l
-
-

- List zone: - The host command performs a zone transfer of - zone name and prints out the NS, - PTR and address records (A/AAAA). -

-

- Together, the -l -a - options print all records in the zone. -

-
-
-N ndots
-
-

- The number of dots that have to be - in name for it to be considered - absolute. The default value is that defined using the - ndots statement in /etc/resolv.conf, - or 1 if no ndots statement is present. Names with fewer - dots are interpreted as relative names and will be - searched for in the domains listed in - the search or domain directive - in /etc/resolv.conf. -

-
-
-p port
-
-

- Specify the port on the server to query. The default is 53. -

-
-
-r
-
-

- Non-recursive query: - Setting this option clears the RD (recursion desired) bit - in the query. This should mean that the name server - receiving the query will not attempt to - resolve name. - The -r option - enables host to mimic the behavior of a - name server by making non-recursive queries and expecting - to receive answers to those queries that can be - referrals to other name servers. -

-
-
-R number
-
-

- Number of retries for UDP queries: - If number is negative or zero, the - number of retries will default to 1. The default value is - 1, or the value of the attempts - option in /etc/resolv.conf, if set. -

-
-
-s
-
-

- Do not send the query to the next - nameserver if any server responds with a SERVFAIL - response, which is the reverse of normal stub resolver - behavior. -

-
-
-t type
-
-

- Query type: - The type argument can be any - recognized query type: CNAME, NS, SOA, TXT, DNSKEY, AXFR, etc. -

-

- When no query type is specified, host - automatically selects an appropriate query type. By default, it - looks for A, AAAA, and MX records. - If the -C option is given, queries will - be made for SOA records. - If name is a dotted-decimal IPv4 - address or colon-delimited IPv6 - address, host will query for PTR - records. -

-

- If a query type of IXFR is chosen the starting serial - number can be specified by appending an equal followed by - the starting serial number - (like -t IXFR=12345678). -

-
-
--T, -U -
-
-

- TCP/UDP: - By default, host uses UDP when making - queries. The -T option makes it use a TCP - connection when querying the name server. TCP will be - automatically selected for queries that require it, such - as zone transfer (AXFR) requests. Type ANY queries default - to TCP but can be forced to UDP initially using -U. -

-
-
-m flag
-
-

- Memory usage debugging: the flag can - be record, usage, - or trace. You can specify - the -m option more than once to set - multiple flags. -

-
-
-v
-
-

- Verbose output. - Equivalent to the -d debug option. - Verbose output can also be enabled by setting - the debug option - in /etc/resolv.conf. -

-
-
-V
-
-

- Print the version number and exit. -

-
-
-w
-
-

- Wait forever: The query timeout is set to the maximum possible. - See also the -W option. -

-
-
-W wait
-
-

- Timeout: Wait for up to wait - seconds for a reply. If wait is - less than one, the wait interval is set to one second. -

-

- By default, host will wait for 5 - seconds for UDP responses and 10 seconds for TCP - connections. These defaults can be overridden by - the timeout option - in /etc/resolv.conf. -

-

- See also the -w option. -

-
-
- -
- -
-

IDN SUPPORT

- -

- If host has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - host appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, define - the IDN_DISABLE environment variable. - The IDN support is disabled if the variable is set when - host runs. -

-
- -
-

FILES

- -

/etc/resolv.conf -

-
- -
-

SEE ALSO

- -

- dig(1) - , - - named(8) - . -

-
- -
- diff --git a/bin/dig/host.rst b/bin/dig/host.rst new file mode 100644 index 0000000000..0b4de7d252 --- /dev/null +++ b/bin/dig/host.rst @@ -0,0 +1,181 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_host: + +host - DNS lookup utility +------------------------- + +Synopsis +~~~~~~~~ + +:program:`host` [**-aACdlnrsTUwv**] [**-c** class] [**-N** ndots] [**-p** port] [**-R** number] [**-t** type] [**-W** wait] [**-m** flag] [ [**-4**] | [**-6**] ] [**-v**] [**-V**] {name} [server] + +Description +~~~~~~~~~~~ + +``host`` is a simple utility for performing DNS lookups. It is normally +used to convert names to IP addresses and vice versa. When no arguments +or options are given, ``host`` prints a short summary of its command +line arguments and options. + +``name`` is the domain name that is to be looked up. It can also be a +dotted-decimal IPv4 address or a colon-delimited IPv6 address, in which +case ``host`` will by default perform a reverse lookup for that address. +``server`` is an optional argument which is either the name or IP +address of the name server that ``host`` should query instead of the +server or servers listed in ``/etc/resolv.conf``. + +Options +~~~~~~~ + +**-4** + Use IPv4 only for query transport. See also the ``-6`` option. + +**-6** + Use IPv6 only for query transport. See also the ``-4`` option. + +**-a** + "All". The ``-a`` option is normally equivalent to ``-v -t ANY``. It + also affects the behaviour of the ``-l`` list zone option. + +**-A** + "Almost all". The ``-A`` option is equivalent to ``-a`` except RRSIG, + NSEC, and NSEC3 records are omitted from the output. + +**-c** class + Query class: This can be used to lookup HS (Hesiod) or CH (Chaosnet) + class resource records. The default class is IN (Internet). + +**-C** + Check consistency: ``host`` will query the SOA records for zone + ``name`` from all the listed authoritative name servers for that + zone. The list of name servers is defined by the NS records that are + found for the zone. + +**-d** + Print debugging traces. Equivalent to the ``-v`` verbose option. + +**-l** + List zone: The ``host`` command performs a zone transfer of zone + ``name`` and prints out the NS, PTR and address records (A/AAAA). + + Together, the ``-l -a`` options print all records in the zone. + +**-N** ndots + The number of dots that have to be in ``name`` for it to be + considered absolute. The default value is that defined using the + ndots statement in ``/etc/resolv.conf``, or 1 if no ndots statement + is present. Names with fewer dots are interpreted as relative names + and will be searched for in the domains listed in the ``search`` or + ``domain`` directive in ``/etc/resolv.conf``. + +**-p** port + Specify the port on the server to query. The default is 53. + +**-r** + Non-recursive query: Setting this option clears the RD (recursion + desired) bit in the query. This should mean that the name server + receiving the query will not attempt to resolve ``name``. The ``-r`` + option enables ``host`` to mimic the behavior of a name server by + making non-recursive queries and expecting to receive answers to + those queries that can be referrals to other name servers. + +**-R** number + Number of retries for UDP queries: If ``number`` is negative or zero, + the number of retries will default to 1. The default value is 1, or + the value of the ``attempts`` option in ``/etc/resolv.conf``, if set. + +**-s** + Do *not* send the query to the next nameserver if any server responds + with a SERVFAIL response, which is the reverse of normal stub + resolver behavior. + +**-t** type + Query type: The ``type`` argument can be any recognized query type: + CNAME, NS, SOA, TXT, DNSKEY, AXFR, etc. + + When no query type is specified, ``host`` automatically selects an + appropriate query type. By default, it looks for A, AAAA, and MX + records. If the ``-C`` option is given, queries will be made for SOA + records. If ``name`` is a dotted-decimal IPv4 address or + colon-delimited IPv6 address, ``host`` will query for PTR records. + + If a query type of IXFR is chosen the starting serial number can be + specified by appending an equal followed by the starting serial + number (like ``-t IXFR=12345678``). + +**-T**; **-U** + TCP/UDP: By default, ``host`` uses UDP when making queries. The + ``-T`` option makes it use a TCP connection when querying the name + server. TCP will be automatically selected for queries that require + it, such as zone transfer (AXFR) requests. Type ANY queries default + to TCP but can be forced to UDP initially using ``-U``. + +**-m** flag + Memory usage debugging: the flag can be ``record``, ``usage``, or + ``trace``. You can specify the ``-m`` option more than once to set + multiple flags. + +**-v** + Verbose output. Equivalent to the ``-d`` debug option. Verbose output + can also be enabled by setting the ``debug`` option in + ``/etc/resolv.conf``. + +**-V** + Print the version number and exit. + +**-w** + Wait forever: The query timeout is set to the maximum possible. See + also the ``-W`` option. + +**-W** wait + Timeout: Wait for up to ``wait`` seconds for a reply. If ``wait`` is + less than one, the wait interval is set to one second. + + By default, ``host`` will wait for 5 seconds for UDP responses and 10 + seconds for TCP connections. These defaults can be overridden by the + ``timeout`` option in ``/etc/resolv.conf``. + + See also the ``-w`` option. + +IDN Support +~~~~~~~~~~~ + +If ``host`` has been built with IDN (internationalized domain name) +support, it can accept and display non-ASCII domain names. ``host`` +appropriately converts character encoding of domain name before sending +a request to DNS server or displaying a reply from the server. If you'd +like to turn off the IDN support for some reason, define the IDN_DISABLE +environment variable. The IDN support is disabled if the variable is set +when ``host`` runs. + +Files +~~~~~ + +``/etc/resolv.conf`` + +See Also +~~~~~~~~ + +:manpage:`dig(1)`, :manpage:`named(8)`. diff --git a/bin/dig/nslookup.1 b/bin/dig/nslookup.1 deleted file mode 100644 index 84afa0758e..0000000000 --- a/bin/dig/nslookup.1 +++ /dev/null @@ -1,308 +0,0 @@ -.\" Copyright (C) 2004-2007, 2010, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: nslookup -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-01-24 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NSLOOKUP" "1" "2014\-01\-24" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -nslookup \- query Internet name servers interactively -.SH "SYNOPSIS" -.HP \w'\fBnslookup\fR\ 'u -\fBnslookup\fR [\fB\-option\fR] [name\ |\ \-] [server] -.SH "DESCRIPTION" -.PP -\fBNslookup\fR -is a program to query Internet domain name servers\&. -\fBNslookup\fR -has two modes: interactive and non\-interactive\&. Interactive mode allows the user to query name servers for information about various hosts and domains or to print a list of hosts in a domain\&. Non\-interactive mode is used to print just the name and requested information for a host or domain\&. -.SH "ARGUMENTS" -.PP -Interactive mode is entered in the following cases: -.sp -.RS 4 -.ie n \{\ -\h'-04' 1.\h'+01'\c -.\} -.el \{\ -.sp -1 -.IP " 1." 4.2 -.\} -when no arguments are given (the default name server will be used) -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04' 2.\h'+01'\c -.\} -.el \{\ -.sp -1 -.IP " 2." 4.2 -.\} -when the first argument is a hyphen (\-) and the second argument is the host name or Internet address of a name server\&. -.RE -.PP -Non\-interactive mode is used when the name or Internet address of the host to be looked up is given as the first argument\&. The optional second argument specifies the host name or address of a name server\&. -.PP -Options can also be specified on the command line if they precede the arguments and are prefixed with a hyphen\&. For example, to change the default query type to host information, and the initial timeout to 10 seconds, type: -.sp -.if n \{\ -.RS 4 -.\} -.nf -nslookup \-query=hinfo \-timeout=10 -.fi -.if n \{\ -.RE -.\} -.PP -The -\fB\-version\fR -option causes -\fBnslookup\fR -to print the version number and immediately exits\&. -.SH "INTERACTIVE COMMANDS" -.PP -\fBhost\fR [server] -.RS 4 -Look up information for host using the current default server or using server, if specified\&. If host is an Internet address and the query type is A or PTR, the name of the host is returned\&. If host is a name and does not have a trailing period, the search list is used to qualify the name\&. -.sp -To look up a host not in the current domain, append a period to the name\&. -.RE -.PP -\fBserver\fR \fIdomain\fR -.RS 4 -.RE -.PP -\fBlserver\fR \fIdomain\fR -.RS 4 -Change the default server to -\fIdomain\fR; -\fBlserver\fR -uses the initial server to look up information about -\fIdomain\fR, while -\fBserver\fR -uses the current default server\&. If an authoritative answer can\*(Aqt be found, the names of servers that might have the answer are returned\&. -.RE -.PP -\fBroot\fR -.RS 4 -not implemented -.RE -.PP -\fBfinger\fR -.RS 4 -not implemented -.RE -.PP -\fBls\fR -.RS 4 -not implemented -.RE -.PP -\fBview\fR -.RS 4 -not implemented -.RE -.PP -\fBhelp\fR -.RS 4 -not implemented -.RE -.PP -\fB?\fR -.RS 4 -not implemented -.RE -.PP -\fBexit\fR -.RS 4 -Exits the program\&. -.RE -.PP -\fBset\fR \fIkeyword\fR\fI[=value]\fR -.RS 4 -This command is used to change state information that affects the lookups\&. Valid keywords are: -.PP -\fBall\fR -.RS 4 -Prints the current values of the frequently used options to -\fBset\fR\&. Information about the current default server and host is also printed\&. -.RE -.PP -\fBclass=\fR\fIvalue\fR -.RS 4 -Change the query class to one of: -.PP -\fBIN\fR -.RS 4 -the Internet class -.RE -.PP -\fBCH\fR -.RS 4 -the Chaos class -.RE -.PP -\fBHS\fR -.RS 4 -the Hesiod class -.RE -.PP -\fBANY\fR -.RS 4 -wildcard -.RE -.sp -The class specifies the protocol group of the information\&. -.sp -(Default = IN; abbreviation = cl) -.RE -.PP -\fB\fI[no]\fR\fR\fBdebug\fR -.RS 4 -Turn on or off the display of the full response packet and any intermediate response packets when searching\&. -.sp -(Default = nodebug; abbreviation = -[no]deb) -.RE -.PP -\fB\fI[no]\fR\fR\fBd2\fR -.RS 4 -Turn debugging mode on or off\&. This displays more about what nslookup is doing\&. -.sp -(Default = nod2) -.RE -.PP -\fBdomain=\fR\fIname\fR -.RS 4 -Sets the search list to -\fIname\fR\&. -.RE -.PP -\fB\fI[no]\fR\fR\fBsearch\fR -.RS 4 -If the lookup request contains at least one period but doesn\*(Aqt end with a trailing period, append the domain names in the domain search list to the request until an answer is received\&. -.sp -(Default = search) -.RE -.PP -\fBport=\fR\fIvalue\fR -.RS 4 -Change the default TCP/UDP name server port to -\fIvalue\fR\&. -.sp -(Default = 53; abbreviation = po) -.RE -.PP -\fBquerytype=\fR\fIvalue\fR -.RS 4 -.RE -.PP -\fBtype=\fR\fIvalue\fR -.RS 4 -Change the type of the information query\&. -.sp -(Default = A and then AAAA; abbreviations = q, ty) -.sp -\fBNote:\fR -It is only possible to specify one query type, only the default behavior looks up both when an alternative is not specified\&. -.RE -.PP -\fB\fI[no]\fR\fR\fBrecurse\fR -.RS 4 -Tell the name server to query other servers if it does not have the information\&. -.sp -(Default = recurse; abbreviation = [no]rec) -.RE -.PP -\fBndots=\fR\fInumber\fR -.RS 4 -Set the number of dots (label separators) in a domain that will disable searching\&. Absolute names always stop searching\&. -.RE -.PP -\fBretry=\fR\fInumber\fR -.RS 4 -Set the number of retries to number\&. -.RE -.PP -\fBtimeout=\fR\fInumber\fR -.RS 4 -Change the initial timeout interval for waiting for a reply to number seconds\&. -.RE -.PP -\fB\fI[no]\fR\fR\fBvc\fR -.RS 4 -Always use a virtual circuit when sending requests to the server\&. -.sp -(Default = novc) -.RE -.PP -\fB\fI[no]\fR\fR\fBfail\fR -.RS 4 -Try the next nameserver if a nameserver responds with SERVFAIL or a referral (nofail) or terminate query (fail) on such a response\&. -.sp -(Default = nofail) -.RE -.sp -.RE -.SH "RETURN VALUES" -.PP -\fBnslookup\fR -returns with an exit status of 1 if any query failed, and 0 otherwise\&. -.SH "IDN SUPPORT" -.PP -If -\fBnslookup\fR -has been built with IDN (internationalized domain name) support, it can accept and display non\-ASCII domain names\&. -\fBnslookup\fR -appropriately converts character encoding of domain name before sending a request to DNS server or displaying a reply from the server\&. If you\*(Aqd like to turn off the IDN support for some reason, define the -\fBIDN_DISABLE\fR -environment variable\&. The IDN support is disabled if the variable is set when -\fBnslookup\fR -runs or when the standard output is not a tty\&. -.SH "FILES" -.PP -/etc/resolv\&.conf -.SH "SEE ALSO" -.PP -\fBdig\fR(1), -\fBhost\fR(1), -\fBnamed\fR(8)\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2004-2007, 2010, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dig/nslookup.docbook b/bin/dig/nslookup.docbook deleted file mode 100644 index b349d7c1ec..0000000000 --- a/bin/dig/nslookup.docbook +++ /dev/null @@ -1,524 +0,0 @@ - - - - - - - 2014-01-24 - - - ISC - Internet Systems Consortium, Inc. - - - - nslookup - 1 - BIND9 - - - - nslookup - query Internet name servers interactively - - - - - 2004 - 2005 - 2006 - 2007 - 2010 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - nslookup - - name | - - server - - - - DESCRIPTION - - Nslookup - is a program to query Internet domain name servers. Nslookup - has two modes: interactive and non-interactive. Interactive mode allows - the user to query name servers for information about various hosts and - domains or to print a list of hosts in a domain. Non-interactive mode - is - used to print just the name and requested information for a host or - domain. - - - - ARGUMENTS - - - Interactive mode is entered in the following cases: - - - - when no arguments are given (the default name server will be used) - - - - - when the first argument is a hyphen (-) and the second argument is - the host name or Internet address of a name server. - - - - - - - Non-interactive mode is used when the name or Internet address of the - host to be looked up is given as the first argument. The optional second - argument specifies the host name or address of a name server. - - - - Options can also be specified on the command line if they precede the - arguments and are prefixed with a hyphen. For example, to - change the default query type to host information, and the initial - timeout to 10 seconds, type: - - -nslookup -query=hinfo -timeout=10 - - - - - The option causes - nslookup to print the version - number and immediately exits. - - - - - INTERACTIVE COMMANDS - - - - host server - - - Look up information for host using the current default server or - using server, if specified. If host is an Internet address and - the query type is A or PTR, the name of the host is returned. - If host is a name and does not have a trailing period, the - search list is used to qualify the name. - - - - To look up a host not in the current domain, append a period to - the name. - - - - - - server domain - - - - - - lserver domain - - - Change the default server to domain; lserver uses the initial - server to look up information about domain, while server uses - the current default server. If an authoritative answer can't be - found, the names of servers that might have the answer are - returned. - - - - - - root - - - not implemented - - - - - - finger - - - not implemented - - - - - - ls - - - not implemented - - - - - - view - - - not implemented - - - - - - help - - - not implemented - - - - - - ? - - - not implemented - - - - - - exit - - - Exits the program. - - - - - - set - keyword=value - - - This command is used to change state information that affects - the lookups. Valid keywords are: - - - all - - - Prints the current values of the frequently used - options to set. - Information about the current default - server and host is also printed. - - - - - - class=value - - - Change the query class to one of: - - - IN - - - the Internet class - - - - - CH - - - the Chaos class - - - - - HS - - - the Hesiod class - - - - - ANY - - - wildcard - - - - - The class specifies the protocol group of the information. - - - - (Default = IN; abbreviation = cl) - - - - - - nodebug - - - Turn on or off the display of the full response packet and - any intermediate response packets when searching. - - - (Default = nodebug; abbreviation = nodeb) - - - - - - nod2 - - - Turn debugging mode on or off. This displays more about - what nslookup is doing. - - - (Default = nod2) - - - - - - domain=name - - - Sets the search list to name. - - - - - - nosearch - - - If the lookup request contains at least one period but - doesn't end with a trailing period, append the domain - names in the domain search list to the request until an - answer is received. - - - (Default = search) - - - - - - port=value - - - Change the default TCP/UDP name server port to value. - - - (Default = 53; abbreviation = po) - - - - - - querytype=value - - - - - - - type=value - - - Change the type of the information query. - - - (Default = A and then AAAA; abbreviations = q, ty) - - - Note: It is - only possible to specify one query type, only - the default behavior looks up both when an - alternative is not specified. - - - - - - norecurse - - - Tell the name server to query other servers if it does not - have the - information. - - - (Default = recurse; abbreviation = [no]rec) - - - - - - ndots=number - - - Set the number of dots (label separators) in a domain - that will disable searching. Absolute names always - stop searching. - - - - - - retry=number - - - Set the number of retries to number. - - - - - - timeout=number - - - Change the initial timeout interval for waiting for a - reply to number seconds. - - - - - - novc - - - Always use a virtual circuit when sending requests to the - server. - - - (Default = novc) - - - - - - nofail - - - Try the next nameserver if a nameserver responds with - SERVFAIL or a referral (nofail) or terminate query - (fail) on such a response. - - - (Default = nofail) - - - - - - - - - - - - RETURN VALUES - - nslookup returns with an exit status of 1 - if any query failed, and 0 otherwise. - - - - IDN SUPPORT - - - If nslookup has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - nslookup appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, define - the IDN_DISABLE environment variable. - The IDN support is disabled if the variable is set when - nslookup runs or when the standard output is not - a tty. - - - - FILES - - /etc/resolv.conf - - - - SEE ALSO - - - dig1 - , - - host1 - , - - named8 - . - - - diff --git a/bin/dig/nslookup.html b/bin/dig/nslookup.html deleted file mode 100644 index 9ec3e4bfd6..0000000000 --- a/bin/dig/nslookup.html +++ /dev/null @@ -1,409 +0,0 @@ - - - - - -nslookup - - -
-
- - - - - -
-

Name

-

- nslookup - — query Internet name servers interactively -

-
- - - -
-

Synopsis

-

- nslookup - [-option] - [name | -] - [server] -

-
- -
-

DESCRIPTION

- -

Nslookup - is a program to query Internet domain name servers. Nslookup - has two modes: interactive and non-interactive. Interactive mode allows - the user to query name servers for information about various hosts and - domains or to print a list of hosts in a domain. Non-interactive mode - is - used to print just the name and requested information for a host or - domain. -

-
- -
-

ARGUMENTS

- -

- Interactive mode is entered in the following cases: -

-
    -
  1. -

    - when no arguments are given (the default name server will be used) -

    -
  2. -
  3. -

    - when the first argument is a hyphen (-) and the second argument is - the host name or Internet address of a name server. -

    -
  4. -
-

-

- -

- Non-interactive mode is used when the name or Internet address of the - host to be looked up is given as the first argument. The optional second - argument specifies the host name or address of a name server. -

- -

- Options can also be specified on the command line if they precede the - arguments and are prefixed with a hyphen. For example, to - change the default query type to host information, and the initial - timeout to 10 seconds, type: - -

-
-nslookup -query=hinfo  -timeout=10
-
-

- -

-

- The -version option causes - nslookup to print the version - number and immediately exits. -

- -
- -
-

INTERACTIVE COMMANDS

- -
-
host [server]
-
-

- Look up information for host using the current default server or - using server, if specified. If host is an Internet address and - the query type is A or PTR, the name of the host is returned. - If host is a name and does not have a trailing period, the - search list is used to qualify the name. -

- -

- To look up a host not in the current domain, append a period to - the name. -

-
-
server domain
-
-

-
-
lserver domain
-
-

- Change the default server to domain; lserver uses the initial - server to look up information about domain, while server uses - the current default server. If an authoritative answer can't be - found, the names of servers that might have the answer are - returned. -

-
-
root
-
-

- not implemented -

-
-
finger
-
-

- not implemented -

-
-
ls
-
-

- not implemented -

-
-
view
-
-

- not implemented -

-
-
help
-
-

- not implemented -

-
-
?
-
-

- not implemented -

-
-
exit
-
-

- Exits the program. -

-
-
set - keyword[=value]
-
-

- This command is used to change state information that affects - the lookups. Valid keywords are: -

-
-
all
-
-

- Prints the current values of the frequently used - options to set. - Information about the current default - server and host is also printed. -

-
-
class=value
-
-

- Change the query class to one of: -

-
-
IN
-
-

- the Internet class -

-
-
CH
-
-

- the Chaos class -

-
-
HS
-
-

- the Hesiod class -

-
-
ANY
-
-

- wildcard -

-
-
-

- The class specifies the protocol group of the information. - -

-

- (Default = IN; abbreviation = cl) -

-
-
[no]debug
-
-

- Turn on or off the display of the full response packet and - any intermediate response packets when searching. -

-

- (Default = nodebug; abbreviation = [no]deb) -

-
-
[no]d2
-
-

- Turn debugging mode on or off. This displays more about - what nslookup is doing. -

-

- (Default = nod2) -

-
-
domain=name
-
-

- Sets the search list to name. -

-
-
[no]search
-
-

- If the lookup request contains at least one period but - doesn't end with a trailing period, append the domain - names in the domain search list to the request until an - answer is received. -

-

- (Default = search) -

-
-
port=value
-
-

- Change the default TCP/UDP name server port to value. -

-

- (Default = 53; abbreviation = po) -

-
-
querytype=value
-
-

-
-
type=value
-
-

- Change the type of the information query. -

-

- (Default = A and then AAAA; abbreviations = q, ty) -

-

- Note: It is - only possible to specify one query type, only - the default behavior looks up both when an - alternative is not specified. -

-
-
[no]recurse
-
-

- Tell the name server to query other servers if it does not - have the - information. -

-

- (Default = recurse; abbreviation = [no]rec) -

-
-
ndots=number
-
-

- Set the number of dots (label separators) in a domain - that will disable searching. Absolute names always - stop searching. -

-
-
retry=number
-
-

- Set the number of retries to number. -

-
-
timeout=number
-
-

- Change the initial timeout interval for waiting for a - reply to number seconds. -

-
-
[no]vc
-
-

- Always use a virtual circuit when sending requests to the - server. -

-

- (Default = novc) -

-
-
[no]fail
-
-

- Try the next nameserver if a nameserver responds with - SERVFAIL or a referral (nofail) or terminate query - (fail) on such a response. -

-

- (Default = nofail) -

-
-
-

-

-
-
-
- -
-

RETURN VALUES

-

- nslookup returns with an exit status of 1 - if any query failed, and 0 otherwise. -

-
- -
-

IDN SUPPORT

- -

- If nslookup has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - nslookup appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, define - the IDN_DISABLE environment variable. - The IDN support is disabled if the variable is set when - nslookup runs or when the standard output is not - a tty. -

-
- -
-

FILES

- -

/etc/resolv.conf -

-
- -
-

SEE ALSO

- -

- dig(1) - , - - host(1) - , - - named(8) - . -

-
-
- diff --git a/bin/dig/nslookup.rst b/bin/dig/nslookup.rst new file mode 100644 index 0000000000..49e715a717 --- /dev/null +++ b/bin/dig/nslookup.rst @@ -0,0 +1,226 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_nslookup: + +nslookup - query Internet name servers interactively +---------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`nslookup` [-option] [name | -] [server] + +Description +~~~~~~~~~~~ + +``Nslookup`` is a program to query Internet domain name servers. +``Nslookup`` has two modes: interactive and non-interactive. Interactive +mode allows the user to query name servers for information about various +hosts and domains or to print a list of hosts in a domain. +Non-interactive mode is used to print just the name and requested +information for a host or domain. + +Arguments +~~~~~~~~~ + +Interactive mode is entered in the following cases: + +a. when no arguments are given (the default name server will be used) + +b. when the first argument is a hyphen (-) and the second argument is + the host name or Internet address of a name server. + +Non-interactive mode is used when the name or Internet address of the +host to be looked up is given as the first argument. The optional second +argument specifies the host name or address of a name server. + +Options can also be specified on the command line if they precede the +arguments and are prefixed with a hyphen. For example, to change the +default query type to host information, and the initial timeout to 10 +seconds, type: + +:: + + nslookup -query=hinfo -timeout=10 + +The ``-version`` option causes ``nslookup`` to print the version number +and immediately exits. + +Interactive Commands +~~~~~~~~~~~~~~~~~~~~ + +``host`` [server] + Look up information for host using the current default server or + using server, if specified. If host is an Internet address and the + query type is A or PTR, the name of the host is returned. If host is + a name and does not have a trailing period, the search list is used + to qualify the name. + + To look up a host not in the current domain, append a period to the + name. + +``server`` domain | ``lserver`` domain + Change the default server to domain; ``lserver`` uses the initial + server to look up information about domain, while ``server`` uses the + current default server. If an authoritative answer can't be found, + the names of servers that might have the answer are returned. + +``root`` + not implemented + +``finger`` + not implemented + +``ls`` + not implemented + +``view`` + not implemented + +``help`` + not implemented + +``?`` + not implemented + +``exit`` + Exits the program. + +``set`` keyword[=value] + This command is used to change state information that affects the + lookups. Valid keywords are: + + ``all`` + Prints the current values of the frequently used options to + ``set``. Information about the current default server and host is + also printed. + + ``class=``\ value + Change the query class to one of: + + ``IN`` + the Internet class + + ``CH`` + the Chaos class + + ``HS`` + the Hesiod class + + ``ANY`` + wildcard + + The class specifies the protocol group of the information. + + (Default = IN; abbreviation = cl) + + ``nodebug`` + Turn on or off the display of the full response packet and any + intermediate response packets when searching. + + (Default = nodebug; abbreviation = [no]deb) + + ``nod2`` + Turn debugging mode on or off. This displays more about what + nslookup is doing. + + (Default = nod2) + + ``domain=``\ name + Sets the search list to name. + + ``nosearch`` + If the lookup request contains at least one period but doesn't end + with a trailing period, append the domain names in the domain + search list to the request until an answer is received. + + (Default = search) + + ``port=``\ value + Change the default TCP/UDP name server port to value. + + (Default = 53; abbreviation = po) + + ``querytype=``\ value | ``type=``\ value + Change the type of the information query. + + (Default = A and then AAAA; abbreviations = q, ty) + + **Note:** It is only possible to specify one query type, only the default + behavior looks up both when an alternative is not specified. + + ``norecurse`` + Tell the name server to query other servers if it does not have + the information. + + (Default = recurse; abbreviation = [no]rec) + + ``ndots=``\ number + Set the number of dots (label separators) in a domain that will + disable searching. Absolute names always stop searching. + + ``retry=``\ number + Set the number of retries to number. + + ``timeout=``\ number + Change the initial timeout interval for waiting for a reply to + number seconds. + + ``novc`` + Always use a virtual circuit when sending requests to the server. + + (Default = novc) + + ``nofail`` + Try the next nameserver if a nameserver responds with SERVFAIL or + a referral (nofail) or terminate query (fail) on such a response. + + (Default = nofail) + +Return Values +~~~~~~~~~~~~~ + +``nslookup`` returns with an exit status of 1 if any query failed, and 0 +otherwise. + +IDN Support +~~~~~~~~~~~ + +If ``nslookup`` has been built with IDN (internationalized domain name) +support, it can accept and display non-ASCII domain names. ``nslookup`` +appropriately converts character encoding of domain name before sending +a request to DNS server or displaying a reply from the server. If you'd +like to turn off the IDN support for some reason, define the IDN_DISABLE +environment variable. The IDN support is disabled if the variable is set +when ``nslookup`` runs or when the standard output is not a tty. + +Files +~~~~~ + +``/etc/resolv.conf`` + +See Also +~~~~~~~~ + +:manpage:`dig(1)`, :manpage:`host(1)`, :manpage:`named(8)`. diff --git a/bin/dnssec/dnssec-cds.8 b/bin/dnssec/dnssec-cds.8 deleted file mode 100644 index 225d1da1ad..0000000000 --- a/bin/dnssec/dnssec-cds.8 +++ /dev/null @@ -1,297 +0,0 @@ -.\" Copyright (C) 2017-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-cds -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2017-10-02 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-CDS" "8" "2017\-10\-02" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-cds \- change DS records for a child zone based on CDS/CDNSKEY -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-cds\fR\ 'u -\fBdnssec\-cds\fR [\fB\-a\ \fR\fB\fIalg\fR\fR...] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-D\fR] {\fB\-d\ \fR\fB\fIdsset\-file\fR\fR} {\fB\-f\ \fR\fB\fIchild\-file\fR\fR} [\fB\-i\fR\ [\fIextension\fR]] [\fB\-s\ \fR\fB\fIstart\-time\fR\fR] [\fB\-T\ \fR\fB\fIttl\fR\fR] [\fB\-u\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-V\fR] {domain} -.SH "DESCRIPTION" -.PP -The -\fBdnssec\-cds\fR -command changes DS records at a delegation point based on CDS or CDNSKEY records published in the child zone\&. If both CDS and CDNSKEY records are present in the child zone, the CDS is preferred\&. This enables a child zone to inform its parent of upcoming changes to its key\-signing keys; by polling periodically with -\fBdnssec\-cds\fR, the parent can keep the DS records up to date and enable automatic rolling of KSKs\&. -.PP -Two input files are required\&. The -\fB\-f \fR\fB\fIchild\-file\fR\fR -option specifies a file containing the child\*(Aqs CDS and/or CDNSKEY records, plus RRSIG and DNSKEY records so that they can be authenticated\&. The -\fB\-d \fR\fB\fIpath\fR\fR -option specifies the location of a file containing the current DS records\&. For example, this could be a -dsset\- -file generated by -\fBdnssec\-signzone\fR, or the output of -\fBdnssec\-dsfromkey\fR, or the output of a previous run of -\fBdnssec\-cds\fR\&. -.PP -The -\fBdnssec\-cds\fR -command uses special DNSSEC validation logic specified by RFC 7344\&. It requires that the CDS and/or CDNSKEY records are validly signed by a key represented in the existing DS records\&. This will typically be the pre\-existing key\-signing key (KSK)\&. -.PP -For protection against replay attacks, the signatures on the child records must not be older than they were on a previous run of -\fBdnssec\-cds\fR\&. This time is obtained from the modification time of the -dsset\- -file, or from the -\fB\-s\fR -option\&. -.PP -To protect against breaking the delegation, -\fBdnssec\-cds\fR -ensures that the DNSKEY RRset can be verified by every key algorithm in the new DS RRset, and that the same set of keys are covered by every DS digest type\&. -.PP -By default, replacement DS records are written to the standard output; with the -\fB\-i\fR -option the input file is overwritten in place\&. The replacement DS records will be the same as the existing records when no change is required\&. The output can be empty if the CDS / CDNSKEY records specify that the child zone wants to go insecure\&. -.PP -Warning: Be careful not to delete the DS records when -\fBdnssec\-cds\fR -fails! -.PP -Alternatively, -\fBdnssec\-cds \-u\fR -writes an -\fBnsupdate\fR -script to the standard output\&. You can use the -\fB\-u\fR -and -\fB\-i\fR -options together to maintain a -dsset\- -file as well as emit an -\fBnsupdate\fR -script\&. -.SH "OPTIONS" -.PP -\-a \fIalgorithm\fR -.RS 4 -Specify a digest algorithm to use when converting CDNSKEY records to DS records\&. This option can be repeated, so that multiple DS records are created for each CDNSKEY record\&. This option has no effect when using CDS records\&. -.sp -The -\fIalgorithm\fR -must be one of SHA\-1, SHA\-256, or SHA\-384\&. These values are case insensitive, and the hyphen may be omitted\&. If no algorithm is specified, the default is SHA\-256\&. -.RE -.PP -\-c \fIclass\fR -.RS 4 -Specifies the DNS class of the zones\&. -.RE -.PP -\-D -.RS 4 -Generate DS records from CDNSKEY records if both CDS and CDNSKEY records are present in the child zone\&. By default CDS records are preferred\&. -.RE -.PP -\-d \fIpath\fR -.RS 4 -Location of the parent DS records\&. The -\fIpath\fR -can be the name of a file containing the DS records, or if it is a directory, -\fBdnssec\-cds\fR -looks for a -dsset\- -file for the -\fIdomain\fR -inside the directory\&. -.sp -To protect against replay attacks, child records are rejected if they were signed earlier than the modification time of the -dsset\- -file\&. This can be adjusted with the -\fB\-s\fR -option\&. -.RE -.PP -\-f \fIchild\-file\fR -.RS 4 -File containing the child\*(Aqs CDS and/or CDNSKEY records, plus its DNSKEY records and the covering RRSIG records so that they can be authenticated\&. -.sp -The EXAMPLES below describe how to generate this file\&. -.RE -.PP -\-i [\fIextension\fR] -.RS 4 -Update the -dsset\- -file in place, instead of writing DS records to the standard output\&. -.sp -There must be no space between the -\fB\-i\fR -and the -\fIextension\fR\&. If you provide no -\fIextension\fR -then the old -dsset\- -is discarded\&. If an -\fIextension\fR -is present, a backup of the old -dsset\- -file is kept with the -\fIextension\fR -appended to its filename\&. -.sp -To protect against replay attacks, the modification time of the -dsset\- -file is set to match the signature inception time of the child records, provided that is later than the file\*(Aqs current modification time\&. -.RE -.PP -\-s \fIstart\-time\fR -.RS 4 -Specify the date and time after which RRSIG records become acceptable\&. This can be either an absolute or relative time\&. An absolute start time is indicated by a number in YYYYMMDDHHMMSS notation; 20170827133700 denotes 13:37:00 UTC on August 27th, 2017\&. A time relative to the -dsset\- -file is indicated with \-N, which is N seconds before the file modification time\&. A time relative to the current time is indicated with now+N\&. -.sp -If no -\fIstart\-time\fR -is specified, the modification time of the -dsset\- -file is used\&. -.RE -.PP -\-T \fIttl\fR -.RS 4 -Specifies a TTL to be used for new DS records\&. If not specified, the default is the TTL of the old DS records\&. If they had no explicit TTL then the new DS records also have no explicit TTL\&. -.RE -.PP -\-u -.RS 4 -Write an -\fBnsupdate\fR -script to the standard output, instead of printing the new DS reords\&. The output will be empty if no change is needed\&. -.sp -Note: The TTL of new records needs to be specified, either in the original -dsset\- -file, or with the -\fB\-T\fR -option, or using the -\fBnsupdate\fR\fBttl\fR -command\&. -.RE -.PP -\-V -.RS 4 -Print version information\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. Level 1 is intended to be usefully verbose for general users; higher levels are intended for developers\&. -.RE -.PP -\fIdomain\fR -.RS 4 -The name of the delegation point / child zone apex\&. -.RE -.SH "EXIT STATUS" -.PP -The -\fBdnssec\-cds\fR -command exits 0 on success, or non\-zero if an error occurred\&. -.PP -In the success case, the DS records might or might not need to be changed\&. -.SH "EXAMPLES" -.PP -Before running -\fBdnssec\-signzone\fR, you can ensure that the delegations are up\-to\-date by running -\fBdnssec\-cds\fR -on every -dsset\- -file\&. -.PP -To fetch the child records required by -\fBdnssec\-cds\fR -you can invoke -\fBdig\fR -as in the script below\&. It\*(Aqs okay if the -\fBdig\fR -fails since -\fBdnssec\-cds\fR -performs all the necessary checking\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -for f in dsset\-* -do - d=${f#dsset\-} - dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | - dnssec\-cds \-i \-f /dev/stdin \-d $f $d -done -.fi -.if n \{\ -.RE -.\} -.PP -When the parent zone is automatically signed by -\fBnamed\fR, you can use -\fBdnssec\-cds\fR -with -\fBnsupdate\fR -to maintain a delegation as follows\&. The -dsset\- -file allows the script to avoid having to fetch and validate the parent DS records, and it keeps the replay attack protection time\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | -dnssec\-cds \-u \-i \-f /dev/stdin \-d $f $d | -nsupdate \-l -.fi -.if n \{\ -.RE -.\} -.SH "SEE ALSO" -.PP -\fBdig\fR(1), -\fBdnssec-settime\fR(8), -\fBdnssec-signzone\fR(8), -\fBnsupdate\fR(1), -BIND 9 Administrator Reference Manual, -RFC 7344\&. -.SH "AUTHORS" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.PP -\fBTony Finch\fR <\&dot@dotat\&.at\&>, <\&fanf2@cam\&.ac\&.uk\&> -.br -.RS 4 -.RE -.SH "COPYRIGHT" -.br -Copyright \(co 2017-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-cds.docbook b/bin/dnssec/dnssec-cds.docbook deleted file mode 100644 index 72d2c4b7e2..0000000000 --- a/bin/dnssec/dnssec-cds.docbook +++ /dev/null @@ -1,390 +0,0 @@ - - - - - 2017-10-02 - - - ISC - Internet Systems Consortium, Inc. - - Tony Finch - dot@dotat.at - fanf2@cam.ac.uk - Cambridge University Information Services - - - - - - dnssec-cds - 8 - BIND9 - - - - dnssec-cds - change DS records for a child zone based on CDS/CDNSKEY - - - - - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-cds - - - - - - extension - - - - - - domain - - - - DESCRIPTION - - - The dnssec-cds command changes DS records at - a delegation point based on CDS or CDNSKEY records published in - the child zone. If both CDS and CDNSKEY records are present in - the child zone, the CDS is preferred. This enables a child zone - to inform its parent of upcoming changes to its key-signing keys; - by polling periodically with dnssec-cds, the - parent can keep the DS records up to date and enable automatic - rolling of KSKs. - - - Two input files are required. The - - option specifies a file containing the child's CDS and/or CDNSKEY - records, plus RRSIG and DNSKEY records so that they can be - authenticated. The - - option specifies the location of a file containing the current DS - records. For example, this could be a dsset- - file generated by dnssec-signzone, or the output of - dnssec-dsfromkey, or the output of a previous - run of dnssec-cds. - - - The dnssec-cds command uses special DNSSEC - validation logic specified by RFC 7344. It requires that the CDS - and/or CDNSKEY records are validly signed by a key represented in the - existing DS records. This will typically be the pre-existing - key-signing key (KSK). - - - For protection against replay attacks, the signatures on the - child records must not be older than they were on a previous run - of dnssec-cds. This time is obtained from the - modification time of the dsset- file, or - from the option. - - - To protect against breaking the delegation, - dnssec-cds ensures that the DNSKEY RRset can be - verified by every key algorithm in the new DS RRset, and that the - same set of keys are covered by every DS digest type. - - - By default, replacement DS records are written to the standard - output; with the option the input file is - overwritten in place. The replacement DS records will be the - same as the existing records when no change is required. The - output can be empty if the CDS / CDNSKEY records specify that - the child zone wants to go insecure. - - - Warning: Be careful not to delete the DS records - when dnssec-cds fails! - - - Alternatively, dnssec-cds -u writes - an nsupdate script to the standard output. - You can use the and - options together to maintain a dsset- file - as well as emit an nsupdate script. - - - - - OPTIONS - - - - - -a algorithm - - - Specify a digest algorithm to use when converting CDNSKEY - records to DS records. This option can be repeated, so - that multiple DS records are created for each CDNSKEY - record. This option has no effect when using CDS records. - - - The algorithm must be one of - SHA-1, SHA-256, or SHA-384. These values are case insensitive, - and the hyphen may be omitted. If no algorithm is specified, - the default is SHA-256. - - - - - - -c class - - - Specifies the DNS class of the zones. - - - - - - -D - - - Generate DS records from CDNSKEY records if both CDS and - CDNSKEY records are present in the child zone. By default - CDS records are preferred. - - - - - - -d path - - - Location of the parent DS records. - The path can be the name of a file - containing the DS records, or if it is a - directory, dnssec-cds looks for - a dsset- file for - the domain inside the directory. - - - To protect against replay attacks, child records are - rejected if they were signed earlier than the modification - time of the dsset- file. This can be - adjusted with the option. - - - - - - -f child-file - - - File containing the child's CDS and/or CDNSKEY records, - plus its DNSKEY records and the covering RRSIG records so - that they can be authenticated. - - - The EXAMPLES below describe how to generate this file. - - - - - - -iextension - - - Update the dsset- file in place, - instead of writing DS records to the standard output. - - - There must be no space between the and - the extension. If you provide - no extension then the - old dsset- is discarded. If - an extension is present, a - backup of the old dsset- file is kept - with the extension appended to - its filename. - - - To protect against replay attacks, the modification time - of the dsset- file is set to match - the signature inception time of the child records, - provided that is later than the file's current - modification time. - - - - - - -s start-time - - - Specify the date and time after which RRSIG records become - acceptable. This can be either an absolute or relative - time. An absolute start time is indicated by a number in - YYYYMMDDHHMMSS notation; 20170827133700 denotes 13:37:00 - UTC on August 27th, 2017. A time relative to - the dsset- file is indicated with -N, - which is N seconds before the file modification time. A - time relative to the current time is indicated with now+N. - - - If no start-time is specified, the - modification time of the dsset- file - is used. - - - - - - -T ttl - - - Specifies a TTL to be used for new DS records. If not - specified, the default is the TTL of the old DS records. - If they had no explicit TTL then the new DS records also - have no explicit TTL. - - - - - - -u - - - Write an nsupdate script to the - standard output, instead of printing the new DS reords. - The output will be empty if no change is needed. - - - Note: The TTL of new records needs to be specified, either - in the original dsset- file, or with - the option, or using - the nsupdate ttl - command. - - - - - - -V - - - Print version information. - - - - - - -v level - - - Sets the debugging level. Level 1 is intended to be - usefully verbose for general users; higher levels are - intended for developers. - - - - - - domain - - - The name of the delegation point / child zone apex. - - - - - - - - EXIT STATUS - - - The dnssec-cds command exits 0 on success, or - non-zero if an error occurred. - - - In the success case, the DS records might or might not need - to be changed. - - - - - EXAMPLES - - - Before running dnssec-signzone, you can ensure - that the delegations are up-to-date by running - dnssec-cds on every dsset- file. - - - To fetch the child records required by dnssec-cds - you can invoke dig as in the script below. It's - okay if the dig fails since - dnssec-cds performs all the necessary checking. - -for f in dsset-* -do - d=${f#dsset-} - dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | - dnssec-cds -i -f /dev/stdin -d $f $d -done - - - - When the parent zone is automatically signed by - named, you can use dnssec-cds - with nsupdate to maintain a delegation as follows. - The dsset- file allows the script to avoid - having to fetch and validate the parent DS records, and it keeps the - replay attack protection time. - - -dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | -dnssec-cds -u -i -f /dev/stdin -d $f $d | -nsupdate -l - - - - SEE ALSO - - - - dig1 - , - - dnssec-settime8 - , - - dnssec-signzone8 - , - - nsupdate1 - , - BIND 9 Administrator Reference Manual, - RFC 7344. - - - - - diff --git a/bin/dnssec/dnssec-cds.html b/bin/dnssec/dnssec-cds.html deleted file mode 100644 index 8d35a8dcca..0000000000 --- a/bin/dnssec/dnssec-cds.html +++ /dev/null @@ -1,343 +0,0 @@ - - - - - -dnssec-cds - - -
-
- - - - - -
-

Name

-

- dnssec-cds - — change DS records for a child zone based on CDS/CDNSKEY -

-
- - - -
-

Synopsis

-

- dnssec-cds - [-a alg...] - [-c class] - [-D] - {-d dsset-file} - {-f child-file} - [-i [extension]] - [-s start-time] - [-T ttl] - [-u] - [-v level] - [-V] - {domain} -

-
- -
-

DESCRIPTION

- -

- The dnssec-cds command changes DS records at - a delegation point based on CDS or CDNSKEY records published in - the child zone. If both CDS and CDNSKEY records are present in - the child zone, the CDS is preferred. This enables a child zone - to inform its parent of upcoming changes to its key-signing keys; - by polling periodically with dnssec-cds, the - parent can keep the DS records up to date and enable automatic - rolling of KSKs. -

-

- Two input files are required. The - -f child-file - option specifies a file containing the child's CDS and/or CDNSKEY - records, plus RRSIG and DNSKEY records so that they can be - authenticated. The - -d path - option specifies the location of a file containing the current DS - records. For example, this could be a dsset- - file generated by dnssec-signzone, or the output of - dnssec-dsfromkey, or the output of a previous - run of dnssec-cds. -

-

- The dnssec-cds command uses special DNSSEC - validation logic specified by RFC 7344. It requires that the CDS - and/or CDNSKEY records are validly signed by a key represented in the - existing DS records. This will typically be the pre-existing - key-signing key (KSK). -

-

- For protection against replay attacks, the signatures on the - child records must not be older than they were on a previous run - of dnssec-cds. This time is obtained from the - modification time of the dsset- file, or - from the -s option. -

-

- To protect against breaking the delegation, - dnssec-cds ensures that the DNSKEY RRset can be - verified by every key algorithm in the new DS RRset, and that the - same set of keys are covered by every DS digest type. -

-

- By default, replacement DS records are written to the standard - output; with the -i option the input file is - overwritten in place. The replacement DS records will be the - same as the existing records when no change is required. The - output can be empty if the CDS / CDNSKEY records specify that - the child zone wants to go insecure. -

-

- Warning: Be careful not to delete the DS records - when dnssec-cds fails! -

-

- Alternatively, dnssec-cds -u writes - an nsupdate script to the standard output. - You can use the -u and -i - options together to maintain a dsset- file - as well as emit an nsupdate script. -

- -
- -
-

OPTIONS

- -
-
-a algorithm
-
-

- Specify a digest algorithm to use when converting CDNSKEY - records to DS records. This option can be repeated, so - that multiple DS records are created for each CDNSKEY - record. This option has no effect when using CDS records. -

-

- The algorithm must be one of - SHA-1, SHA-256, or SHA-384. These values are case insensitive, - and the hyphen may be omitted. If no algorithm is specified, - the default is SHA-256. -

-
-
-c class
-
-

- Specifies the DNS class of the zones. -

-
-
-D
-
-

- Generate DS records from CDNSKEY records if both CDS and - CDNSKEY records are present in the child zone. By default - CDS records are preferred. -

-
-
-d path
-
-

- Location of the parent DS records. - The path can be the name of a file - containing the DS records, or if it is a - directory, dnssec-cds looks for - a dsset- file for - the domain inside the directory. -

-

- To protect against replay attacks, child records are - rejected if they were signed earlier than the modification - time of the dsset- file. This can be - adjusted with the -s option. -

-
-
-f child-file
-
-

- File containing the child's CDS and/or CDNSKEY records, - plus its DNSKEY records and the covering RRSIG records so - that they can be authenticated. -

-

- The EXAMPLES below describe how to generate this file. -

-
-
-i[extension]
-
-

- Update the dsset- file in place, - instead of writing DS records to the standard output. -

-

- There must be no space between the -i and - the extension. If you provide - no extension then the - old dsset- is discarded. If - an extension is present, a - backup of the old dsset- file is kept - with the extension appended to - its filename. -

-

- To protect against replay attacks, the modification time - of the dsset- file is set to match - the signature inception time of the child records, - provided that is later than the file's current - modification time. -

-
-
-s start-time
-
-

- Specify the date and time after which RRSIG records become - acceptable. This can be either an absolute or relative - time. An absolute start time is indicated by a number in - YYYYMMDDHHMMSS notation; 20170827133700 denotes 13:37:00 - UTC on August 27th, 2017. A time relative to - the dsset- file is indicated with -N, - which is N seconds before the file modification time. A - time relative to the current time is indicated with now+N. -

-

- If no start-time is specified, the - modification time of the dsset- file - is used. -

-
-
-T ttl
-
-

- Specifies a TTL to be used for new DS records. If not - specified, the default is the TTL of the old DS records. - If they had no explicit TTL then the new DS records also - have no explicit TTL. -

-
-
-u
-
-

- Write an nsupdate script to the - standard output, instead of printing the new DS reords. - The output will be empty if no change is needed. -

-

- Note: The TTL of new records needs to be specified, either - in the original dsset- file, or with - the -T option, or using - the nsupdate ttl - command. -

-
-
-V
-
-

- Print version information. -

-
-
-v level
-
-

- Sets the debugging level. Level 1 is intended to be - usefully verbose for general users; higher levels are - intended for developers. -

-
-
domain
-
-

- The name of the delegation point / child zone apex. -

-
-
-
- -
-

EXIT STATUS

- -

- The dnssec-cds command exits 0 on success, or - non-zero if an error occurred. -

-

- In the success case, the DS records might or might not need - to be changed. -

- -
- -
-

EXAMPLES

- -

- Before running dnssec-signzone, you can ensure - that the delegations are up-to-date by running - dnssec-cds on every dsset- file. -

-

- To fetch the child records required by dnssec-cds - you can invoke dig as in the script below. It's - okay if the dig fails since - dnssec-cds performs all the necessary checking. -

-
for f in dsset-*
-do
-	d=${f#dsset-}
-	dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS |
-	dnssec-cds -i -f /dev/stdin -d $f $d
-done
-
- -

- When the parent zone is automatically signed by - named, you can use dnssec-cds - with nsupdate to maintain a delegation as follows. - The dsset- file allows the script to avoid - having to fetch and validate the parent DS records, and it keeps the - replay attack protection time. -

-
-dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS |
-dnssec-cds -u -i -f /dev/stdin -d $f $d |
-nsupdate -l
-
-
- -
-

SEE ALSO

- -

- - dig(1) - , - - dnssec-settime(8) - , - - dnssec-signzone(8) - , - - nsupdate(1) - , - BIND 9 Administrator Reference Manual, - RFC 7344. -

- -
- -
- diff --git a/bin/dnssec/dnssec-cds.rst b/bin/dnssec/dnssec-cds.rst new file mode 100644 index 0000000000..fa916b1c65 --- /dev/null +++ b/bin/dnssec/dnssec-cds.rst @@ -0,0 +1,212 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-cds: + +dnssec-cds - change DS records for a child zone based on CDS/CDNSKEY +-------------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`dnssec-cds` [**-a** alg...] [**-c** class] [**-D**] {**-d** dsset-file} {**-f** child-file} [**-i** [extension]] [**-s** start-time] [**-T** ttl] [**-u**] [**-v** level] [**-V**] {domain} + +Description +~~~~~~~~~~~ + +The ``dnssec-cds`` command changes DS records at a delegation point +based on CDS or CDNSKEY records published in the child zone. If both CDS +and CDNSKEY records are present in the child zone, the CDS is preferred. +This enables a child zone to inform its parent of upcoming changes to +its key-signing keys; by polling periodically with ``dnssec-cds``, the +parent can keep the DS records up to date and enable automatic rolling +of KSKs. + +Two input files are required. The ``-f child-file`` option specifies a +file containing the child's CDS and/or CDNSKEY records, plus RRSIG and +DNSKEY records so that they can be authenticated. The ``-d path`` option +specifies the location of a file containing the current DS records. For +example, this could be a ``dsset-`` file generated by +``dnssec-signzone``, or the output of ``dnssec-dsfromkey``, or the +output of a previous run of ``dnssec-cds``. + +The ``dnssec-cds`` command uses special DNSSEC validation logic +specified by :rfc:`7344`. It requires that the CDS and/or CDNSKEY records +are validly signed by a key represented in the existing DS records. This +will typically be the pre-existing key-signing key (KSK). + +For protection against replay attacks, the signatures on the child +records must not be older than they were on a previous run of +``dnssec-cds``. This time is obtained from the modification time of the +``dsset-`` file, or from the ``-s`` option. + +To protect against breaking the delegation, ``dnssec-cds`` ensures that +the DNSKEY RRset can be verified by every key algorithm in the new DS +RRset, and that the same set of keys are covered by every DS digest +type. + +By default, replacement DS records are written to the standard output; +with the ``-i`` option the input file is overwritten in place. The +replacement DS records will be the same as the existing records when no +change is required. The output can be empty if the CDS / CDNSKEY records +specify that the child zone wants to go insecure. + +Warning: Be careful not to delete the DS records when ``dnssec-cds`` +fails! + +Alternatively, ``dnssec-cds -u`` writes an ``nsupdate`` script to the +standard output. You can use the ``-u`` and ``-i`` options together to +maintain a ``dsset-`` file as well as emit an ``nsupdate`` script. + +Options +~~~~~~~ + +**-a** algorithm + Specify a digest algorithm to use when converting CDNSKEY records to + DS records. This option can be repeated, so that multiple DS records + are created for each CDNSKEY record. This option has no effect when + using CDS records. + + The algorithm must be one of SHA-1, SHA-256, or SHA-384. These values + are case insensitive, and the hyphen may be omitted. If no algorithm + is specified, the default is SHA-256. + +**-c** class + Specifies the DNS class of the zones. + +**-D** + Generate DS records from CDNSKEY records if both CDS and CDNSKEY + records are present in the child zone. By default CDS records are + preferred. + +**-d** path + Location of the parent DS records. The path can be the name of a file + containing the DS records, or if it is a directory, ``dnssec-cds`` + looks for a ``dsset-`` file for the domain inside the directory. + + To protect against replay attacks, child records are rejected if they + were signed earlier than the modification time of the ``dsset-`` + file. This can be adjusted with the ``-s`` option. + +**-f** child-file + File containing the child's CDS and/or CDNSKEY records, plus its + DNSKEY records and the covering RRSIG records so that they can be + authenticated. + + The EXAMPLES below describe how to generate this file. + +**-iextension** + Update the ``dsset-`` file in place, instead of writing DS records to + the standard output. + + There must be no space between the ``-i`` and the extension. If you + provide no extension then the old ``dsset-`` is discarded. If an + extension is present, a backup of the old ``dsset-`` file is kept + with the extension appended to its filename. + + To protect against replay attacks, the modification time of the + ``dsset-`` file is set to match the signature inception time of the + child records, provided that is later than the file's current + modification time. + +**-s** start-time + Specify the date and time after which RRSIG records become + acceptable. This can be either an absolute or relative time. An + absolute start time is indicated by a number in YYYYMMDDHHMMSS + notation; 20170827133700 denotes 13:37:00 UTC on August 27th, 2017. A + time relative to the ``dsset-`` file is indicated with -N, which is N + seconds before the file modification time. A time relative to the + current time is indicated with now+N. + + If no start-time is specified, the modification time of the + ``dsset-`` file is used. + +**-T** ttl + Specifies a TTL to be used for new DS records. If not specified, the + default is the TTL of the old DS records. If they had no explicit TTL + then the new DS records also have no explicit TTL. + +**-u** + Write an ``nsupdate`` script to the standard output, instead of + printing the new DS reords. The output will be empty if no change is + needed. + + Note: The TTL of new records needs to be specified, either in the + original ``dsset-`` file, or with the ``-T`` option, or using the + ``nsupdate`` ``ttl`` command. + +**-V** + Print version information. + +**-v** level + Sets the debugging level. Level 1 is intended to be usefully verbose + for general users; higher levels are intended for developers. + +domain + The name of the delegation point / child zone apex. + +Exit Status +~~~~~~~~~~~ + +The ``dnssec-cds`` command exits 0 on success, or non-zero if an error +occurred. + +In the success case, the DS records might or might not need to be +changed. + +Examples +~~~~~~~~ + +Before running ``dnssec-signzone``, you can ensure that the delegations +are up-to-date by running ``dnssec-cds`` on every ``dsset-`` file. + +To fetch the child records required by ``dnssec-cds`` you can invoke +``dig`` as in the script below. It's okay if the ``dig`` fails since +``dnssec-cds`` performs all the necessary checking. + +:: + + for f in dsset-* + do + d=${f#dsset-} + dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | + dnssec-cds -i -f /dev/stdin -d $f $d + done + +When the parent zone is automatically signed by ``named``, you can use +``dnssec-cds`` with ``nsupdate`` to maintain a delegation as follows. +The ``dsset-`` file allows the script to avoid having to fetch and +validate the parent DS records, and it keeps the replay attack +protection time. + +:: + + dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | + dnssec-cds -u -i -f /dev/stdin -d $f $d | + nsupdate -l + +See Also +~~~~~~~~ + +:manpage:`dig(1)`, :manpage:`dnssec-settime(8)`, :manpage:`dnssec-signzone(8)`, :manpage:`nsupdate(1)`, BIND 9 Administrator +Reference Manual, :rfc:`7344`. diff --git a/bin/dnssec/dnssec-dsfromkey.8 b/bin/dnssec/dnssec-dsfromkey.8 deleted file mode 100644 index d35c1f7726..0000000000 --- a/bin/dnssec/dnssec-dsfromkey.8 +++ /dev/null @@ -1,226 +0,0 @@ -.\" Copyright (C) 2008-2012, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-dsfromkey -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2019-05-08 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-DSFROMKEY" "8" "2019\-05\-08" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-dsfromkey \- DNSSEC DS RR generation tool -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-dsfromkey\fR\ 'u -\fBdnssec\-dsfromkey\fR [\fB\-1\fR | \fB\-2\fR | \fB\-a\ \fR\fB\fIalg\fR\fR] [\fB\-C\fR | \fB\-l\ \fR\fB\fIdomain\fR\fR] [\fB\-T\ \fR\fB\fITTL\fR\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-K\ \fR\fB\fIdirectory\fR\fR] {keyfile} -.HP \w'\fBdnssec\-dsfromkey\fR\ 'u -\fBdnssec\-dsfromkey\fR [\fB\-1\fR | \fB\-2\fR | \fB\-a\ \fR\fB\fIalg\fR\fR] [\fB\-C\fR | \fB\-l\ \fR\fB\fIdomain\fR\fR] [\fB\-T\ \fR\fB\fITTL\fR\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-A\fR] {\fB\-f\ \fR\fB\fIfile\fR\fR} [dnsname] -.HP \w'\fBdnssec\-dsfromkey\fR\ 'u -\fBdnssec\-dsfromkey\fR [\fB\-1\fR | \fB\-2\fR | \fB\-a\ \fR\fB\fIalg\fR\fR] [\fB\-C\fR | \fB\-l\ \fR\fB\fIdomain\fR\fR] [\fB\-T\ \fR\fB\fITTL\fR\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-K\ \fR\fB\fIdirectory\fR\fR] {\-s} {dnsname} -.HP \w'\fBdnssec\-dsfromkey\fR\ 'u -\fBdnssec\-dsfromkey\fR [\fB\-h\fR | \fB\-V\fR] -.SH "DESCRIPTION" -.PP -The -\fBdnssec\-dsfromkey\fR -command outputs DS (Delegation Signer) resource records (RRs), or CDS (Child DS) RRs with the -\fB\-C\fR -option\&. -.PP -The input keys can be specified in a number of ways: -.PP -By default, -\fBdnssec\-dsfromkey\fR -reads a key file named like -Knnnn\&.+aaa+iiiii\&.key, as generated by -\fBdnssec\-keygen\fR\&. -.PP -With the -\fB\-f \fR\fB\fIfile\fR\fR -option, -\fBdnssec\-dsfromkey\fR -reads keys from a zone file or partial zone file (which can contain just the DNSKEY records)\&. -.PP -With the -\fB\-s\fR -option, -\fBdnssec\-dsfromkey\fR -reads a -keyset\- -file, as generated by -\fBdnssec\-keygen\fR\fB\-C\fR\&. -.SH "OPTIONS" -.PP -\-1 -.RS 4 -An abbreviation for -\fB\-a SHA\-1\fR\&. (Note: The SHA\-1 algorithm is no longer recommended for use when generating new DS and CDS records\&.) -.RE -.PP -\-2 -.RS 4 -An abbreviation for -\fB\-a SHA\-256\fR\&. -.RE -.PP -\-a \fIalgorithm\fR -.RS 4 -Specify a digest algorithm to use when converting DNSKEY records to DS records\&. This option can be repeated, so that multiple DS records are created for each DNSKEY record\&. -.sp -The -\fIalgorithm\fR -must be one of SHA\-1, SHA\-256, or SHA\-384\&. These values are case insensitive, and the hyphen may be omitted\&. If no algorithm is specified, the default is SHA\-256\&. (Note: The SHA\-1 algorithm is no longer recommended for use when generating new DS and CDS records\&.) -.RE -.PP -\-A -.RS 4 -Include ZSKs when generating DS records\&. Without this option, only keys which have the KSK flag set will be converted to DS records and printed\&. Useful only in -\fB\-f\fR -zone file mode\&. -.RE -.PP -\-c \fIclass\fR -.RS 4 -Specifies the DNS class (default is IN)\&. Useful only in -\fB\-s\fR -keyset or -\fB\-f\fR -zone file mode\&. -.RE -.PP -\-C -.RS 4 -Generate CDS records rather than DS records\&. -.RE -.PP -\-f \fIfile\fR -.RS 4 -Zone file mode: -\fBdnssec\-dsfromkey\fR\*(Aqs final -\fIdnsname\fR -argument is the DNS domain name of a zone whose master file can be read from -\fBfile\fR\&. If the zone name is the same as -\fBfile\fR, then it may be omitted\&. -.sp -If -\fIfile\fR -is -"\-", then the zone data is read from the standard input\&. This makes it possible to use the output of the -\fBdig\fR -command as input, as in: -.sp -\fBdig dnskey example\&.com | dnssec\-dsfromkey \-f \- example\&.com\fR -.RE -.PP -\-h -.RS 4 -Prints usage information\&. -.RE -.PP -\-K \fIdirectory\fR -.RS 4 -Look for key files or -keyset\- -files in -\fBdirectory\fR\&. -.RE -.PP -\-s -.RS 4 -Keyset mode: -\fBdnssec\-dsfromkey\fR\*(Aqs final -\fIdnsname\fR -argument is the DNS domain name used to locate a -keyset\- -file\&. -.RE -.PP -\-T \fITTL\fR -.RS 4 -Specifies the TTL of the DS records\&. By default the TTL is omitted\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.SH "EXAMPLE" -.PP -To build the SHA\-256 DS RR from the -\fBKexample\&.com\&.+003+26160\fR -keyfile name, you can issue the following command: -.PP -\fBdnssec\-dsfromkey \-2 Kexample\&.com\&.+003+26160\fR -.PP -The command would print something like: -.PP -\fBexample\&.com\&. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0C5EA0B94\fR -.SH "FILES" -.PP -The keyfile can be designated by the key identification -Knnnn\&.+aaa+iiiii -or the full file name -Knnnn\&.+aaa+iiiii\&.key -as generated by -dnssec\-keygen(8)\&. -.PP -The keyset file name is built from the -\fBdirectory\fR, the string -keyset\- -and the -\fBdnsname\fR\&. -.SH "CAVEAT" -.PP -A keyfile error can give a "file not found" even if the file exists\&. -.SH "SEE ALSO" -.PP -\fBdnssec-keygen\fR(8), -\fBdnssec-signzone\fR(8), -BIND 9 Administrator Reference Manual, -RFC 3658 -(DS RRs), -RFC 4509 -(SHA\-256 for DS RRs), -RFC 6605 -(SHA\-384 for DS RRs), -RFC 7344 -(CDS and CDNSKEY RRs)\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2008-2012, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-dsfromkey.docbook b/bin/dnssec/dnssec-dsfromkey.docbook deleted file mode 100644 index 99b852d95f..0000000000 --- a/bin/dnssec/dnssec-dsfromkey.docbook +++ /dev/null @@ -1,355 +0,0 @@ - - - - - - 2019-05-08 - - - ISC - Internet Systems Consortium, Inc. - - - - dnssec-dsfromkey - 8 - BIND9 - - - - dnssec-dsfromkey - DNSSEC DS RR generation tool - - - - - 2008 - 2009 - 2010 - 2011 - 2012 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-dsfromkey - - - - - - - - - - - - - keyfile - - - dnssec-dsfromkey - - - - - - - - - - - - - - - dnsname - - - dnssec-dsfromkey - - - - - - - - - - - - - - -s - dnsname - - - dnssec-dsfromkey - - - - - - - - DESCRIPTION - - - The dnssec-dsfromkey command outputs DS (Delegation - Signer) resource records (RRs), or CDS (Child DS) RRs with the - option. - - - - The input keys can be specified in a number of ways: - - - - By default, dnssec-dsfromkey reads a key file - named like Knnnn.+aaa+iiiii.key, as generated - by dnssec-keygen. - - - - With the - option, dnssec-dsfromkey reads keys from a zone file - or partial zone file (which can contain just the DNSKEY records). - - - - With the - option, dnssec-dsfromkey reads - a keyset- file, as generated - by dnssec-keygen . - - - - - OPTIONS - - - - -1 - - - An abbreviation for . - (Note: The SHA-1 algorithm is no longer recommended for use - when generating new DS and CDS records.) - - - - - - -2 - - - An abbreviation for . - - - - - - -a algorithm - - - Specify a digest algorithm to use when converting DNSKEY - records to DS records. This option can be repeated, so - that multiple DS records are created for each DNSKEY - record. - - - The algorithm must be one of - SHA-1, SHA-256, or SHA-384. These values are case insensitive, - and the hyphen may be omitted. If no algorithm is specified, - the default is SHA-256. - (Note: The SHA-1 algorithm is no longer recommended for use - when generating new DS and CDS records.) - - - - - - -A - - - Include ZSKs when generating DS records. Without this option, only - keys which have the KSK flag set will be converted to DS records - and printed. Useful only in zone file mode. - - - - - - -c class - - - Specifies the DNS class (default is IN). Useful only - in keyset or - zone file mode. - - - - - - -C - - - Generate CDS records rather than DS records. - - - - - - -f file - - - Zone file mode: dnssec-dsfromkey's - final dnsname argument is - the DNS domain name of a zone whose master file can be read - from . If the zone name is the same as - , then it may be omitted. - - - If file is "-", then - the zone data is read from the standard input. This makes it - possible to use the output of the dig - command as input, as in: - - - dig dnskey example.com | dnssec-dsfromkey -f - example.com - - - - - - -h - - - Prints usage information. - - - - - - -K directory - - - Look for key files or keyset- files in - . - - - - - - -s - - - Keyset mode: dnssec-dsfromkey's - final dnsname argument is the DNS - domain name used to locate a keyset- file. - - - - - - -T TTL - - - Specifies the TTL of the DS records. By default the TTL is omitted. - - - - - - -v level - - - Sets the debugging level. - - - - - - -V - - - Prints version information. - - - - - - - EXAMPLE - - - To build the SHA-256 DS RR from the - Kexample.com.+003+26160 - keyfile name, you can issue the following command: - - dnssec-dsfromkey -2 Kexample.com.+003+26160 - - - The command would print something like: - - example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0C5EA0B94 - - - - - FILES - - - The keyfile can be designated by the key identification - Knnnn.+aaa+iiiii or the full file name - Knnnn.+aaa+iiiii.key as generated by - dnssec-keygen8. - - - The keyset file name is built from the , - the string keyset- and the - . - - - - CAVEAT - - - A keyfile error can give a "file not found" even if the file exists. - - - - SEE ALSO - - - dnssec-keygen8 - , - - dnssec-signzone8 - , - BIND 9 Administrator Reference Manual, - RFC 3658 (DS RRs), - RFC 4509 (SHA-256 for DS RRs), - RFC 6605 (SHA-384 for DS RRs), - RFC 7344 (CDS and CDNSKEY RRs). - - - - diff --git a/bin/dnssec/dnssec-dsfromkey.html b/bin/dnssec/dnssec-dsfromkey.html deleted file mode 100644 index 255268da0d..0000000000 --- a/bin/dnssec/dnssec-dsfromkey.html +++ /dev/null @@ -1,307 +0,0 @@ - - - - - -dnssec-dsfromkey - - -
-
- - - - - -
-

Name

-

- dnssec-dsfromkey - — DNSSEC DS RR generation tool -

-
- - - -
-

Synopsis

-

- dnssec-dsfromkey - [ - -1 - | -2 - | -a alg - ] - [ - -C - | -l domain - ] - [-T TTL] - [-v level] - [-K directory] - {keyfile} -

-

- dnssec-dsfromkey - [ - -1 - | -2 - | -a alg - ] - [ - -C - | -l domain - ] - [-T TTL] - [-v level] - [-c class] - [-A] - {-f file} - [dnsname] -

-

- dnssec-dsfromkey - [ - -1 - | -2 - | -a alg - ] - [ - -C - | -l domain - ] - [-T TTL] - [-v level] - [-c class] - [-K directory] - {-s} - {dnsname} -

-

- dnssec-dsfromkey - [ - -h - | -V - ] -

-
- -
-

DESCRIPTION

- -

- The dnssec-dsfromkey command outputs DS (Delegation - Signer) resource records (RRs), or CDS (Child DS) RRs with the - -C option. -

- -

- The input keys can be specified in a number of ways: -

- -

- By default, dnssec-dsfromkey reads a key file - named like Knnnn.+aaa+iiiii.key, as generated - by dnssec-keygen. -

- -

- With the -f file - option, dnssec-dsfromkey reads keys from a zone file - or partial zone file (which can contain just the DNSKEY records). -

- -

- With the -s - option, dnssec-dsfromkey reads - a keyset- file, as generated - by dnssec-keygen -C. -

- -
- -
-

OPTIONS

- -
-
-1
-
-

- An abbreviation for -a SHA-1. - (Note: The SHA-1 algorithm is no longer recommended for use - when generating new DS and CDS records.) -

-
-
-2
-
-

- An abbreviation for -a SHA-256. -

-
-
-a algorithm
-
-

- Specify a digest algorithm to use when converting DNSKEY - records to DS records. This option can be repeated, so - that multiple DS records are created for each DNSKEY - record. -

-

- The algorithm must be one of - SHA-1, SHA-256, or SHA-384. These values are case insensitive, - and the hyphen may be omitted. If no algorithm is specified, - the default is SHA-256. - (Note: The SHA-1 algorithm is no longer recommended for use - when generating new DS and CDS records.) -

-
-
-A
-
-

- Include ZSKs when generating DS records. Without this option, only - keys which have the KSK flag set will be converted to DS records - and printed. Useful only in -f zone file mode. -

-
-
-c class
-
-

- Specifies the DNS class (default is IN). Useful only - in -s keyset or -f - zone file mode. -

-
-
-C
-
-

- Generate CDS records rather than DS records. -

-
-
-f file
-
-

- Zone file mode: dnssec-dsfromkey's - final dnsname argument is - the DNS domain name of a zone whose master file can be read - from file. If the zone name is the same as - file, then it may be omitted. -

-

- If file is "-", then - the zone data is read from the standard input. This makes it - possible to use the output of the dig - command as input, as in: -

-

- dig dnskey example.com | dnssec-dsfromkey -f - example.com -

-
-
-h
-
-

- Prints usage information. -

-
-
-K directory
-
-

- Look for key files or keyset- files in - directory. -

-
-
-s
-
-

- Keyset mode: dnssec-dsfromkey's - final dnsname argument is the DNS - domain name used to locate a keyset- file. -

-
-
-T TTL
-
-

- Specifies the TTL of the DS records. By default the TTL is omitted. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-
- -
-

EXAMPLE

- -

- To build the SHA-256 DS RR from the - Kexample.com.+003+26160 - keyfile name, you can issue the following command: -

-

dnssec-dsfromkey -2 Kexample.com.+003+26160 -

-

- The command would print something like: -

-

example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0C5EA0B94 -

- -
- -
-

FILES

- -

- The keyfile can be designated by the key identification - Knnnn.+aaa+iiiii or the full file name - Knnnn.+aaa+iiiii.key as generated by - dnssec-keygen(8). -

-

- The keyset file name is built from the directory, - the string keyset- and the - dnsname. -

-
- -
-

CAVEAT

- -

- A keyfile error can give a "file not found" even if the file exists. -

-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 3658 (DS RRs), - RFC 4509 (SHA-256 for DS RRs), - RFC 6605 (SHA-384 for DS RRs), - RFC 7344 (CDS and CDNSKEY RRs). -

-
- -
- diff --git a/bin/dnssec/dnssec-dsfromkey.rst b/bin/dnssec/dnssec-dsfromkey.rst new file mode 100644 index 0000000000..0388afc945 --- /dev/null +++ b/bin/dnssec/dnssec-dsfromkey.rst @@ -0,0 +1,150 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-dsfromkey: + +dnssec-dsfromkey - DNSSEC DS RR generation tool +----------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`dnssec-dsfromkey` [ **-1** | **-2** | **-a** alg ] [ **-C** ] [**-T** TTL] [**-v** level] [**-K** directory] {keyfile} + +:program:`dnssec-dsfromkey` [ **-1** | **-2** | **-a** alg ] [ **-C** ] [**-T** TTL] [**-v** level] [**-c** class] [**-A**] {**-f** file} [dnsname] + +:program:`dnssec-dsfromkey` [ **-1** | **-2** | **-a** alg ] [ **-C** ] [**-T** TTL] [**-v** level] [**-c** class] [**-K** directory] {**-s**} {dnsname} + +:program:`dnssec-dsfromkey` [ **-h** | **-V** ] + +Description +~~~~~~~~~~~ + +The ``dnssec-dsfromkey`` command outputs DS (Delegation Signer) resource records +(RRs), or CDS (Child DS) RRs with the ``-C`` option. + +The input keys can be specified in a number of ways: + +By default, ``dnssec-dsfromkey`` reads a key file named like +``Knnnn.+aaa+iiiii.key``, as generated by ``dnssec-keygen``. + +With the ``-f file`` option, ``dnssec-dsfromkey`` reads keys from a zone +file or partial zone file (which can contain just the DNSKEY records). + +With the ``-s`` option, ``dnssec-dsfromkey`` reads a ``keyset-`` file, +as generated by ``dnssec-keygen`` ``-C``. + +Options +~~~~~~~ + +**-1** + An abbreviation for ``-a SHA1`` + +**-2** + An abbreviation for ``-a SHA-256`` + +**-a** algorithm + Specify a digest algorithm to use when converting DNSKEY records to + DS records. This option can be repeated, so that multiple DS records + are created for each DNSKEY record. + + The algorithm must be one of SHA-1, SHA-256, or SHA-384. These values + are case insensitive, and the hyphen may be omitted. If no algorithm + is specified, the default is SHA-256. + +**-A** + Include ZSKs when generating DS records. Without this option, only + keys which have the KSK flag set will be converted to DS records and + printed. Useful only in ``-f`` zone file mode. + +**-c** class + Specifies the DNS class (default is IN). Useful only in ``-s`` keyset + or ``-f`` zone file mode. + +**-C** + Generate CDS records rather than DS records. + +**-f** file + Zone file mode: ``dnssec-dsfromkey``'s final dnsname argument is the + DNS domain name of a zone whose master file can be read from + ``file``. If the zone name is the same as ``file``, then it may be + omitted. + + If file is ``"-"``, then the zone data is read from the standard + input. This makes it possible to use the output of the ``dig`` + command as input, as in: + + ``dig dnskey example.com | dnssec-dsfromkey -f - example.com`` + +**-h** + Prints usage information. + +**-K** directory + Look for key files or ``keyset-`` files in ``directory``. + +**-s** + Keyset mode: ``dnssec-dsfromkey``'s final dnsname argument is the DNS + domain name used to locate a ``keyset-`` file. + +**-T** TTL + Specifies the TTL of the DS records. By default the TTL is omitted. + +**-v** level + Sets the debugging level. + +**-V** + Prints version information. + +Example +~~~~~~~ + +To build the SHA-256 DS RR from the ``Kexample.com.+003+26160`` keyfile +name, you can issue the following command: + +``dnssec-dsfromkey -2 Kexample.com.+003+26160`` + +The command would print something like: + +``example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0C5EA0B94`` + +Files +~~~~~ + +The keyfile can be designated by the key identification +``Knnnn.+aaa+iiiii`` or the full file name ``Knnnn.+aaa+iiiii.key`` as +generated by dnssec-keygen8. + +The keyset file name is built from the ``directory``, the string +``keyset-`` and the ``dnsname``. + +Caveat +~~~~~~ + +A keyfile error can give a "file not found" even if the file exists. + +See Also +~~~~~~~~ + +:manpage:`dnssec-keygen(8)`, :manpage:`dnssec-signzone(8)`, BIND 9 Administrator Reference Manual, +:rfc:`3658` (DS RRs), :rfc:`4509` (SHA-256 for DS RRs), +:rfc:`6605` (SHA-384 for DS RRs), :rfc:`7344` (CDS and CDNSKEY RRs). diff --git a/bin/dnssec/dnssec-importkey.8 b/bin/dnssec/dnssec-importkey.8 deleted file mode 100644 index 5a91c45d1d..0000000000 --- a/bin/dnssec/dnssec-importkey.8 +++ /dev/null @@ -1,138 +0,0 @@ -.\" Copyright (C) 2013-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-importkey -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: August 21, 2015 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-IMPORTKEY" "8" "August 21, 2015" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-importkey \- import DNSKEY records from external systems so they can be managed -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-importkey\fR\ 'u -\fBdnssec\-importkey\fR [\fB\-K\ \fR\fB\fIdirectory\fR\fR] [\fB\-L\ \fR\fB\fIttl\fR\fR] [\fB\-P\ \fR\fB\fIdate/offset\fR\fR] [\fB\-P\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-h\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-V\fR] {\fBkeyfile\fR} -.HP \w'\fBdnssec\-importkey\fR\ 'u -\fBdnssec\-importkey\fR {\fB\-f\ \fR\fB\fIfilename\fR\fR} [\fB\-K\ \fR\fB\fIdirectory\fR\fR] [\fB\-L\ \fR\fB\fIttl\fR\fR] [\fB\-P\ \fR\fB\fIdate/offset\fR\fR] [\fB\-P\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-h\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-V\fR] [\fBdnsname\fR] -.SH "DESCRIPTION" -.PP -\fBdnssec\-importkey\fR -reads a public DNSKEY record and generates a pair of \&.key/\&.private files\&. The DNSKEY record may be read from an existing \&.key file, in which case a corresponding \&.private file will be generated, or it may be read from any other file or from the standard input, in which case both \&.key and \&.private files will be generated\&. -.PP -The newly\-created \&.private file does -\fInot\fR -contain private key data, and cannot be used for signing\&. However, having a \&.private file makes it possible to set publication (\fB\-P\fR) and deletion (\fB\-D\fR) times for the key, which means the public key can be added to and removed from the DNSKEY RRset on schedule even if the true private key is stored offline\&. -.SH "OPTIONS" -.PP -\-f \fIfilename\fR -.RS 4 -Zone file mode: instead of a public keyfile name, the argument is the DNS domain name of a zone master file, which can be read from -\fBfile\fR\&. If the domain name is the same as -\fBfile\fR, then it may be omitted\&. -.sp -If -\fBfile\fR -is set to -"\-", then the zone data is read from the standard input\&. -.RE -.PP -\-K \fIdirectory\fR -.RS 4 -Sets the directory in which the key files are to reside\&. -.RE -.PP -\-L \fIttl\fR -.RS 4 -Sets the default TTL to use for this key when it is converted into a DNSKEY RR\&. If the key is imported into a zone, this is the TTL that will be used for it, unless there was already a DNSKEY RRset in place, in which case the existing TTL would take precedence\&. Setting the default TTL to -0 -or -none -removes it\&. -.RE -.PP -\-h -.RS 4 -Emit usage message and exit\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.SH "TIMING OPTIONS" -.PP -Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS\&. If the argument begins with a \*(Aq+\*(Aq or \*(Aq\-\*(Aq, it is interpreted as an offset from the present time\&. For convenience, if such an offset is followed by one of the suffixes \*(Aqy\*(Aq, \*(Aqmo\*(Aq, \*(Aqw\*(Aq, \*(Aqd\*(Aq, \*(Aqh\*(Aq, or \*(Aqmi\*(Aq, then the offset is computed in years (defined as 365 24\-hour days, ignoring leap years), months (defined as 30 24\-hour days), weeks, days, hours, or minutes, respectively\&. Without a suffix, the offset is computed in seconds\&. To explicitly prevent a date from being set, use \*(Aqnone\*(Aq or \*(Aqnever\*(Aq\&. -.PP -\-P \fIdate/offset\fR -.RS 4 -Sets the date on which a key is to be published to the zone\&. After that date, the key will be included in the zone but will not be used to sign it\&. -.RE -.PP -\-P sync \fIdate/offset\fR -.RS 4 -Sets the date on which CDS and CDNSKEY records that match this key are to be published to the zone\&. -.RE -.PP -\-D \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be deleted\&. After that date, the key will no longer be included in the zone\&. (It may remain in the key repository, however\&.) -.RE -.PP -\-D sync \fIdate/offset\fR -.RS 4 -Sets the date on which the CDS and CDNSKEY records that match this key are to be deleted\&. -.RE -.SH "FILES" -.PP -A keyfile can be designed by the key identification -Knnnn\&.+aaa+iiiii -or the full file name -Knnnn\&.+aaa+iiiii\&.key -as generated by -dnssec\-keygen(8)\&. -.SH "SEE ALSO" -.PP -\fBdnssec-keygen\fR(8), -\fBdnssec-signzone\fR(8), -BIND 9 Administrator Reference Manual, -RFC 5011\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2013-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-importkey.docbook b/bin/dnssec/dnssec-importkey.docbook deleted file mode 100644 index 18fc0b3c30..0000000000 --- a/bin/dnssec/dnssec-importkey.docbook +++ /dev/null @@ -1,254 +0,0 @@ - - - - - - 2014-02-20 - - - August 21, 2015 - ISC - Internet Systems Consortium, Inc. - - - - dnssec-importkey - 8 - BIND9 - - - - dnssec-importkey - import DNSKEY records from external systems so they can be managed - - - - - 2013 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-importkey - - - - - - - - - - - - - dnssec-importkey - - - - - - - - - - - - - - - DESCRIPTION - - dnssec-importkey - reads a public DNSKEY record and generates a pair of - .key/.private files. The DNSKEY record may be read from an - existing .key file, in which case a corresponding .private file - will be generated, or it may be read from any other file or - from the standard input, in which case both .key and .private - files will be generated. - - - The newly-created .private file does not - contain private key data, and cannot be used for signing. - However, having a .private file makes it possible to set - publication () and deletion - () times for the key, which means the - public key can be added to and removed from the DNSKEY RRset - on schedule even if the true private key is stored offline. - - - - OPTIONS - - - - - -f filename - - - Zone file mode: instead of a public keyfile name, the argument - is the DNS domain name of a zone master file, which can be read - from . If the domain name is the same as - , then it may be omitted. - - - If is set to "-", then - the zone data is read from the standard input. - - - - - - -K directory - - - Sets the directory in which the key files are to reside. - - - - - - -L ttl - - - Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. Setting the default TTL to - 0 or none removes it. - - - - - - -h - - - Emit usage message and exit. - - - - - - -v level - - - Sets the debugging level. - - - - - - -V - - - Prints version information. - - - - - - - - TIMING OPTIONS - - - Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. - - - - - -P date/offset - - - Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. - - - - - - -P sync date/offset - - - Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. - - - - - - -D date/offset - - - Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) - - - - - - -D sync date/offset - - - Sets the date on which the CDS and CDNSKEY records that match - this key are to be deleted. - - - - - - - - FILES - - - A keyfile can be designed by the key identification - Knnnn.+aaa+iiiii or the full file name - Knnnn.+aaa+iiiii.key as generated by - dnssec-keygen8. - - - - SEE ALSO - - - dnssec-keygen8 - , - - dnssec-signzone8 - , - BIND 9 Administrator Reference Manual, - RFC 5011. - - - - diff --git a/bin/dnssec/dnssec-importkey.html b/bin/dnssec/dnssec-importkey.html deleted file mode 100644 index b26a854485..0000000000 --- a/bin/dnssec/dnssec-importkey.html +++ /dev/null @@ -1,216 +0,0 @@ - - - - - -dnssec-importkey - - -
-
- - - - - -
-

Name

-

- dnssec-importkey - — import DNSKEY records from external systems so they can be managed -

-
- - - -
-

Synopsis

-

- dnssec-importkey - [-K directory] - [-L ttl] - [-P date/offset] - [-P sync date/offset] - [-D date/offset] - [-D sync date/offset] - [-h] - [-v level] - [-V] - {keyfile} -

-

- dnssec-importkey - {-f filename} - [-K directory] - [-L ttl] - [-P date/offset] - [-P sync date/offset] - [-D date/offset] - [-D sync date/offset] - [-h] - [-v level] - [-V] - [dnsname] -

-
- -
-

DESCRIPTION

- -

dnssec-importkey - reads a public DNSKEY record and generates a pair of - .key/.private files. The DNSKEY record may be read from an - existing .key file, in which case a corresponding .private file - will be generated, or it may be read from any other file or - from the standard input, in which case both .key and .private - files will be generated. -

-

- The newly-created .private file does not - contain private key data, and cannot be used for signing. - However, having a .private file makes it possible to set - publication (-P) and deletion - (-D) times for the key, which means the - public key can be added to and removed from the DNSKEY RRset - on schedule even if the true private key is stored offline. -

-
- -
-

OPTIONS

- - -
-
-f filename
-
-

- Zone file mode: instead of a public keyfile name, the argument - is the DNS domain name of a zone master file, which can be read - from file. If the domain name is the same as - file, then it may be omitted. -

-

- If file is set to "-", then - the zone data is read from the standard input. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to reside. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. Setting the default TTL to - 0 or none removes it. -

-
-
-h
-
-

- Emit usage message and exit. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-
- -
-

TIMING OPTIONS

- -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. -

-
-
-P sync date/offset
-
-

- Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records that match - this key are to be deleted. -

-
-
-
- -
-

FILES

- -

- A keyfile can be designed by the key identification - Knnnn.+aaa+iiiii or the full file name - Knnnn.+aaa+iiiii.key as generated by - dnssec-keygen(8). -

-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 5011. -

-
- -
- diff --git a/bin/dnssec/dnssec-importkey.rst b/bin/dnssec/dnssec-importkey.rst new file mode 100644 index 0000000000..2cc1c40aad --- /dev/null +++ b/bin/dnssec/dnssec-importkey.rst @@ -0,0 +1,123 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-importkey: + +dnssec-importkey - import DNSKEY records from external systems so they can be managed +------------------------------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`dnssec-importkey` [**-K** directory] [**-L** ttl] [**-P** date/offset] [**-P** sync date/offset] [**-D** date/offset] [**-D** sync date/offset] [**-h**] [**-v** level] [**-V**] {keyfile} + +:program:`dnssec-importkey` {**-f** filename} [**-K** directory] [**-L** ttl] [**-P** date/offset] [**-P** sync date/offset] [**-D** date/offset] [**-D** sync date/offset] [**-h**] [**-v** level] [**-V**] [dnsname] + +Description +~~~~~~~~~~~ + +``dnssec-importkey`` reads a public DNSKEY record and generates a pair +of .key/.private files. The DNSKEY record may be read from an existing +.key file, in which case a corresponding .private file will be +generated, or it may be read from any other file or from the standard +input, in which case both .key and .private files will be generated. + +The newly-created .private file does *not* contain private key data, and +cannot be used for signing. However, having a .private file makes it +possible to set publication (``-P``) and deletion (``-D``) times for the +key, which means the public key can be added to and removed from the +DNSKEY RRset on schedule even if the true private key is stored offline. + +Options +~~~~~~~ + +**-f** filename + Zone file mode: instead of a public keyfile name, the argument is the + DNS domain name of a zone master file, which can be read from + ``file``. If the domain name is the same as ``file``, then it may be + omitted. + + If ``file`` is set to ``"-"``, then the zone data is read from the + standard input. + +**-K** directory + Sets the directory in which the key files are to reside. + +**-L** ttl + Sets the default TTL to use for this key when it is converted into a + DNSKEY RR. If the key is imported into a zone, this is the TTL that + will be used for it, unless there was already a DNSKEY RRset in + place, in which case the existing TTL would take precedence. Setting + the default TTL to ``0`` or ``none`` removes it. + +**-h** + Emit usage message and exit. + +**-v** level + Sets the debugging level. + +**-V** + Prints version information. + +Timing Options +~~~~~~~~~~~~~~ + +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a '+' or '-', it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the offset is +computed in years (defined as 365 24-hour days, ignoring leap years), +months (defined as 30 24-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +explicitly prevent a date from being set, use 'none' or 'never'. + +**-P** date/offset + Sets the date on which a key is to be published to the zone. After + that date, the key will be included in the zone but will not be used + to sign it. + +**-P** sync date/offset + Sets the date on which CDS and CDNSKEY records that match this key + are to be published to the zone. + +**-D** date/offset + Sets the date on which the key is to be deleted. After that date, the + key will no longer be included in the zone. (It may remain in the key + repository, however.) + +**-D** sync date/offset + Sets the date on which the CDS and CDNSKEY records that match this + key are to be deleted. + +Files +~~~~~ + +A keyfile can be designed by the key identification ``Knnnn.+aaa+iiiii`` +or the full file name ``Knnnn.+aaa+iiiii.key`` as generated by +dnssec-keygen8. + +See Also +-------- + +:manpage:`dnssec-keygen(8)`, :manpage:`dnssec-signzone(8)`, BIND 9 Administrator Reference Manual, +:rfc:`5011`. diff --git a/bin/dnssec/dnssec-keyfromlabel.8 b/bin/dnssec/dnssec-keyfromlabel.8 deleted file mode 100644 index 02ce4a8e59..0000000000 --- a/bin/dnssec/dnssec-keyfromlabel.8 +++ /dev/null @@ -1,311 +0,0 @@ -.\" Copyright (C) 2008-2012, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-keyfromlabel -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: August 27, 2015 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-KEYFROMLABEL" "8" "August 27, 2015" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-keyfromlabel \- DNSSEC key generation tool -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-keyfromlabel\fR\ 'u -\fBdnssec\-keyfromlabel\fR {\-l\ \fIlabel\fR} [\fB\-3\fR] [\fB\-a\ \fR\fB\fIalgorithm\fR\fR] [\fB\-A\ \fR\fB\fIdate/offset\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-D\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-E\ \fR\fB\fIengine\fR\fR] [\fB\-f\ \fR\fB\fIflag\fR\fR] [\fB\-G\fR] [\fB\-I\ \fR\fB\fIdate/offset\fR\fR] [\fB\-i\ \fR\fB\fIinterval\fR\fR] [\fB\-k\fR] [\fB\-K\ \fR\fB\fIdirectory\fR\fR] [\fB\-L\ \fR\fB\fIttl\fR\fR] [\fB\-n\ \fR\fB\fInametype\fR\fR] [\fB\-P\ \fR\fB\fIdate/offset\fR\fR] [\fB\-P\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-p\ \fR\fB\fIprotocol\fR\fR] [\fB\-R\ \fR\fB\fIdate/offset\fR\fR] [\fB\-S\ \fR\fB\fIkey\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-V\fR] [\fB\-y\fR] {name} -.SH "DESCRIPTION" -.PP -\fBdnssec\-keyfromlabel\fR -generates a key pair of files that referencing a key object stored in a cryptographic hardware service module (HSM)\&. The private key file can be used for DNSSEC signing of zone data as if it were a conventional signing key created by -\fBdnssec\-keygen\fR, but the key material is stored within the HSM, and the actual signing takes place there\&. -.PP -The -\fBname\fR -of the key is specified on the command line\&. This must match the name of the zone for which the key is being generated\&. -.SH "OPTIONS" -.PP -\-a \fIalgorithm\fR -.RS 4 -Selects the cryptographic algorithm\&. The value of -\fBalgorithm\fR -must be one of RSASHA1, NSEC3RSASHA1, RSASHA256, RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448\&. -.sp -If no algorithm is specified, then RSASHA1 will be used by default, unless the -\fB\-3\fR -option is specified, in which case NSEC3RSASHA1 will be used instead\&. (If -\fB\-3\fR -is used and an algorithm is specified, that algorithm will be checked for compatibility with NSEC3\&.) -.sp -These values are case insensitive\&. In some cases, abbreviations are supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for ECDSAP384SHA384\&. If RSASHA1 is specified along with the -\fB\-3\fR -option, then NSEC3RSASHA1 will be used instead\&. -.sp -As of BIND 9\&.12\&.0, this option is mandatory except when using the -\fB\-S\fR -option (which copies the algorithm from the predecessory key)\&. Previously, the default for newly generated keys was RSASHA1\&. -.RE -.PP -\-3 -.RS 4 -Use an NSEC3\-capable algorithm to generate a DNSSEC key\&. If this option is used with an algorithm that has both NSEC and NSEC3 versions, then the NSEC3 version will be used; for example, -\fBdnssec\-keygen \-3a RSASHA1\fR -specifies the NSEC3RSASHA1 algorithm\&. -.RE -.PP -\-E \fIengine\fR -.RS 4 -Specifies the cryptographic hardware to use\&. -.sp -When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module\&. When BIND is built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "\-\-with\-pkcs11"\&. -.RE -.PP -\-l \fIlabel\fR -.RS 4 -Specifies the label for a key pair in the crypto hardware\&. -.sp -When -BIND -9 is built with OpenSSL\-based PKCS#11 support, the label is an arbitrary string that identifies a particular key\&. -.sp -When -BIND -9 is built with native PKCS#11 support, the label is a PKCS#11 URI string in the format "pkcs11:\fBkeyword\fR=\fIvalue\fR[;\fBkeyword\fR=\fIvalue\fR;\&.\&.\&.]" Keywords include "token", which identifies the HSM; "object", which identifies the key; and "pin\-source", which identifies a file from which the HSM\*(Aqs PIN code can be obtained\&. The label will be stored in the on\-disk "private" file\&. -.sp -If the label contains a -\fBpin\-source\fR -field, tools using the generated key files will be able to use the HSM for signing and other operations without any need for an operator to manually enter a PIN\&. Note: Making the HSM\*(Aqs PIN accessible in this manner may reduce the security advantage of using an HSM; be sure this is what you want to do before making use of this feature\&. -.RE -.PP -\-n \fInametype\fR -.RS 4 -Specifies the owner type of the key\&. The value of -\fBnametype\fR -must either be ZONE (for a DNSSEC zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with a host (KEY)), USER (for a key associated with a user(KEY)) or OTHER (DNSKEY)\&. These values are case insensitive\&. -.RE -.PP -\-C -.RS 4 -Compatibility mode: generates an old\-style key, without any metadata\&. By default, -\fBdnssec\-keyfromlabel\fR -will include the key\*(Aqs creation date in the metadata stored with the private key, and other dates may be set there as well (publication date, activation date, etc)\&. Keys that include this data may be incompatible with older versions of BIND; the -\fB\-C\fR -option suppresses them\&. -.RE -.PP -\-c \fIclass\fR -.RS 4 -Indicates that the DNS record containing the key should have the specified class\&. If not specified, class IN is used\&. -.RE -.PP -\-f \fIflag\fR -.RS 4 -Set the specified flag in the flag field of the KEY/DNSKEY record\&. The only recognized flags are KSK (Key Signing Key) and REVOKE\&. -.RE -.PP -\-G -.RS 4 -Generate a key, but do not publish it or sign with it\&. This option is incompatible with \-P and \-A\&. -.RE -.PP -\-h -.RS 4 -Prints a short summary of the options and arguments to -\fBdnssec\-keyfromlabel\fR\&. -.RE -.PP -\-K \fIdirectory\fR -.RS 4 -Sets the directory in which the key files are to be written\&. -.RE -.PP -\-k -.RS 4 -Generate KEY records rather than DNSKEY records\&. -.RE -.PP -\-L \fIttl\fR -.RS 4 -Sets the default TTL to use for this key when it is converted into a DNSKEY RR\&. If the key is imported into a zone, this is the TTL that will be used for it, unless there was already a DNSKEY RRset in place, in which case the existing TTL would take precedence\&. Setting the default TTL to -0 -or -none -removes it\&. -.RE -.PP -\-p \fIprotocol\fR -.RS 4 -Sets the protocol value for the key\&. The protocol is a number between 0 and 255\&. The default is 3 (DNSSEC)\&. Other possible values for this argument are listed in RFC 2535 and its successors\&. -.RE -.PP -\-S \fIkey\fR -.RS 4 -Generate a key as an explicit successor to an existing key\&. The name, algorithm, size, and type of the key will be set to match the predecessor\&. The activation date of the new key will be set to the inactivation date of the existing one\&. The publication date will be set to the activation date minus the prepublication interval, which defaults to 30 days\&. -.RE -.PP -\-t \fItype\fR -.RS 4 -Indicates the use of the key\&. -\fBtype\fR -must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF\&. The default is AUTHCONF\&. AUTH refers to the ability to authenticate data, and CONF the ability to encrypt data\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.PP -\-y -.RS 4 -Allows DNSSEC key files to be generated even if the key ID would collide with that of an existing key, in the event of either key being revoked\&. (This is only safe to use if you are sure you won\*(Aqt be using RFC 5011 trust anchor maintenance with either of the keys involved\&.) -.RE -.SH "TIMING OPTIONS" -.PP -Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS\&. If the argument begins with a \*(Aq+\*(Aq or \*(Aq\-\*(Aq, it is interpreted as an offset from the present time\&. For convenience, if such an offset is followed by one of the suffixes \*(Aqy\*(Aq, \*(Aqmo\*(Aq, \*(Aqw\*(Aq, \*(Aqd\*(Aq, \*(Aqh\*(Aq, or \*(Aqmi\*(Aq, then the offset is computed in years (defined as 365 24\-hour days, ignoring leap years), months (defined as 30 24\-hour days), weeks, days, hours, or minutes, respectively\&. Without a suffix, the offset is computed in seconds\&. To explicitly prevent a date from being set, use \*(Aqnone\*(Aq or \*(Aqnever\*(Aq\&. -.PP -\-P \fIdate/offset\fR -.RS 4 -Sets the date on which a key is to be published to the zone\&. After that date, the key will be included in the zone but will not be used to sign it\&. If not set, and if the \-G option has not been used, the default is "now"\&. -.RE -.PP -\-P sync \fIdate/offset\fR -.RS 4 -Sets the date on which the CDS and CDNSKEY records which match this key are to be published to the zone\&. -.RE -.PP -\-A \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be activated\&. After that date, the key will be included in the zone and used to sign it\&. If not set, and if the \-G option has not been used, the default is "now"\&. -.RE -.PP -\-R \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be revoked\&. After that date, the key will be flagged as revoked\&. It will be included in the zone and will be used to sign it\&. -.RE -.PP -\-I \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be retired\&. After that date, the key will still be included in the zone, but it will not be used to sign it\&. -.RE -.PP -\-D \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be deleted\&. After that date, the key will no longer be included in the zone\&. (It may remain in the key repository, however\&.) -.RE -.PP -\-D sync \fIdate/offset\fR -.RS 4 -Sets the date on which the CDS and CDNSKEY records which match this key are to be deleted\&. -.RE -.PP -\-i \fIinterval\fR -.RS 4 -Sets the prepublication interval for a key\&. If set, then the publication and activation dates must be separated by at least this much time\&. If the activation date is specified but the publication date isn\*(Aqt, then the publication date will default to this much time before the activation date; conversely, if the publication date is specified but activation date isn\*(Aqt, then activation will be set to this much time after publication\&. -.sp -If the key is being created as an explicit successor to another key, then the default prepublication interval is 30 days; otherwise it is zero\&. -.sp -As with date offsets, if the argument is followed by one of the suffixes \*(Aqy\*(Aq, \*(Aqmo\*(Aq, \*(Aqw\*(Aq, \*(Aqd\*(Aq, \*(Aqh\*(Aq, or \*(Aqmi\*(Aq, then the interval is measured in years, months, weeks, days, hours, or minutes, respectively\&. Without a suffix, the interval is measured in seconds\&. -.RE -.SH "GENERATED KEY FILES" -.PP -When -\fBdnssec\-keyfromlabel\fR -completes successfully, it prints a string of the form -Knnnn\&.+aaa+iiiii -to the standard output\&. This is an identification string for the key files it has generated\&. -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -nnnn -is the key name\&. -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -aaa -is the numeric representation of the algorithm\&. -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -iiiii -is the key identifier (or footprint)\&. -.RE -.PP -\fBdnssec\-keyfromlabel\fR -creates two files, with names based on the printed string\&. -Knnnn\&.+aaa+iiiii\&.key -contains the public key, and -Knnnn\&.+aaa+iiiii\&.private -contains the private key\&. -.PP -The -\&.key -file contains a DNS KEY record that can be inserted into a zone file (directly or with a $INCLUDE statement)\&. -.PP -The -\&.private -file contains algorithm\-specific fields\&. For obvious security reasons, this file does not have general read permission\&. -.SH "SEE ALSO" -.PP -\fBdnssec-keygen\fR(8), -\fBdnssec-signzone\fR(8), -BIND 9 Administrator Reference Manual, -RFC 4034, -The PKCS#11 URI Scheme (draft\-pechanec\-pkcs11uri\-13)\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2008-2012, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-keyfromlabel.docbook b/bin/dnssec/dnssec-keyfromlabel.docbook deleted file mode 100644 index 71ded9ec06..0000000000 --- a/bin/dnssec/dnssec-keyfromlabel.docbook +++ /dev/null @@ -1,556 +0,0 @@ - - - - - - 2014-02-27 - - - August 27, 2015 - ISC - Internet Systems Consortium, Inc. - - - - dnssec-keyfromlabel - 8 - BIND9 - - - - dnssec-keyfromlabel - DNSSEC key generation tool - - - - - 2008 - 2009 - 2010 - 2011 - 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-keyfromlabel - -l label - - - - - - - - - - - - - - - - - - - - - - - - - name - - - - DESCRIPTION - - dnssec-keyfromlabel - generates a key pair of files that referencing a key object stored - in a cryptographic hardware service module (HSM). The private key - file can be used for DNSSEC signing of zone data as if it were a - conventional signing key created by dnssec-keygen, - but the key material is stored within the HSM, and the actual signing - takes place there. - - - The of the key is specified on the command - line. This must match the name of the zone for which the key is - being generated. - - - - OPTIONS - - - - - -a algorithm - - - Selects the cryptographic algorithm. The value of - must be one of RSASHA1, - NSEC3RSASHA1, RSASHA256, RSASHA512, - ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. - - - If no algorithm is specified, then RSASHA1 will be used by - default, unless the option is specified, - in which case NSEC3RSASHA1 will be used instead. (If - is used and an algorithm is specified, - that algorithm will be checked for compatibility with NSEC3.) - - - These values are case insensitive. In some cases, abbreviations - are supported, such as ECDSA256 for ECDSAP256SHA256 and - ECDSA384 for ECDSAP384SHA384. If RSASHA1 is specified - along with the option, then NSEC3RSASHA1 - will be used instead. - - - As of BIND 9.12.0, this option is mandatory except when using - the option (which copies the algorithm from - the predecessory key). Previously, the default for newly - generated keys was RSASHA1. - - - - - - -3 - - - Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used with an algorithm that has both - NSEC and NSEC3 versions, then the NSEC3 version will be - used; for example, dnssec-keygen -3a RSASHA1 - specifies the NSEC3RSASHA1 algorithm. - - - - - - -E engine - - - Specifies the cryptographic hardware to use. - - - When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". - - - - - - -l label - - - Specifies the label for a key pair in the crypto hardware. - - - When BIND 9 is built with OpenSSL-based - PKCS#11 support, the label is an arbitrary string that - identifies a particular key. - - - When BIND 9 is built with native PKCS#11 - support, the label is a PKCS#11 URI string in the format - "pkcs11:=value;=value;..." - Keywords include "token", which identifies the HSM; "object", which - identifies the key; and "pin-source", which identifies a file from - which the HSM's PIN code can be obtained. The label will be - stored in the on-disk "private" file. - - - If the label contains a - field, tools using the generated - key files will be able to use the HSM for signing and other - operations without any need for an operator to manually enter - a PIN. Note: Making the HSM's PIN accessible in this manner - may reduce the security advantage of using an HSM; be sure - this is what you want to do before making use of this feature. - - - - - - -n nametype - - - Specifies the owner type of the key. The value of - must either be ZONE (for a DNSSEC - zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with - a host (KEY)), - USER (for a key associated with a user(KEY)) or OTHER (DNSKEY). - These values are case insensitive. - - - - - - -C - - - Compatibility mode: generates an old-style key, without - any metadata. By default, dnssec-keyfromlabel - will include the key's creation date in the metadata stored - with the private key, and other dates may be set there as well - (publication date, activation date, etc). Keys that include - this data may be incompatible with older versions of BIND; the - option suppresses them. - - - - - - -c class - - - Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. - - - - - - -f flag - - - Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. - - - - - - -G - - - Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. - - - - - - -h - - - Prints a short summary of the options and arguments to - dnssec-keyfromlabel. - - - - - - -K directory - - - Sets the directory in which the key files are to be written. - - - - - - -k - - - Generate KEY records rather than DNSKEY records. - - - - - - -L ttl - - - Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. Setting the default TTL to - 0 or none removes it. - - - - - - -p protocol - - - Sets the protocol value for the key. The protocol - is a number between 0 and 255. The default is 3 (DNSSEC). - Other possible values for this argument are listed in - RFC 2535 and its successors. - - - - - - -S key - - - Generate a key as an explicit successor to an existing key. - The name, algorithm, size, and type of the key will be set - to match the predecessor. The activation date of the new - key will be set to the inactivation date of the existing - one. The publication date will be set to the activation - date minus the prepublication interval, which defaults to - 30 days. - - - - - - -t type - - - Indicates the use of the key. must be - one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default - is AUTHCONF. AUTH refers to the ability to authenticate - data, and CONF the ability to encrypt data. - - - - - - -v level - - - Sets the debugging level. - - - - - - -V - - - Prints version information. - - - - - - -y - - - Allows DNSSEC key files to be generated even if the key ID - would collide with that of an existing key, in the event of - either key being revoked. (This is only safe to use if you - are sure you won't be using RFC 5011 trust anchor maintenance - with either of the keys involved.) - - - - - - - - TIMING OPTIONS - - - - Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. - - - - - -P date/offset - - - Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". - - - - - - -P sync date/offset - - - Sets the date on which the CDS and CDNSKEY records which match - this key are to be published to the zone. - - - - - - -A date/offset - - - Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". - - - - - - -R date/offset - - - Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. - - - - - - -I date/offset - - - Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. - - - - - - -D date/offset - - - Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) - - - - - - -D sync date/offset - - - Sets the date on which the CDS and CDNSKEY records which match - this key are to be deleted. - - - - - - -i interval - - - Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. - - - If the key is being created as an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. - - - As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. - - - - - - - - GENERATED KEY FILES - - - When dnssec-keyfromlabel completes - successfully, - it prints a string of the form Knnnn.+aaa+iiiii - to the standard output. This is an identification string for - the key files it has generated. - - - - nnnn is the key name. - - - - aaa is the numeric representation - of the algorithm. - - - - iiiii is the key identifier (or - footprint). - - - - dnssec-keyfromlabel - creates two files, with names based - on the printed string. Knnnn.+aaa+iiiii.key - contains the public key, and - Knnnn.+aaa+iiiii.private contains the - private key. - - - The .key file contains a DNS KEY record - that - can be inserted into a zone file (directly or with a $INCLUDE - statement). - - - The .private file contains - algorithm-specific - fields. For obvious security reasons, this file does not have - general read permission. - - - - SEE ALSO - - - dnssec-keygen8 - , - - dnssec-signzone8 - , - BIND 9 Administrator Reference Manual, - RFC 4034, - The PKCS#11 URI Scheme (draft-pechanec-pkcs11uri-13). - - - - diff --git a/bin/dnssec/dnssec-keyfromlabel.html b/bin/dnssec/dnssec-keyfromlabel.html deleted file mode 100644 index 92c4e3cf4c..0000000000 --- a/bin/dnssec/dnssec-keyfromlabel.html +++ /dev/null @@ -1,462 +0,0 @@ - - - - - -dnssec-keyfromlabel - - -
-
- - - - - -
-

Name

-

- dnssec-keyfromlabel - — DNSSEC key generation tool -

-
- - - -
-

Synopsis

-

- dnssec-keyfromlabel - {-l label} - [-3] - [-a algorithm] - [-A date/offset] - [-c class] - [-D date/offset] - [-D sync date/offset] - [-E engine] - [-f flag] - [-G] - [-I date/offset] - [-i interval] - [-k] - [-K directory] - [-L ttl] - [-n nametype] - [-P date/offset] - [-P sync date/offset] - [-p protocol] - [-R date/offset] - [-S key] - [-t type] - [-v level] - [-V] - [-y] - {name} -

-
- -
-

DESCRIPTION

- -

dnssec-keyfromlabel - generates a key pair of files that referencing a key object stored - in a cryptographic hardware service module (HSM). The private key - file can be used for DNSSEC signing of zone data as if it were a - conventional signing key created by dnssec-keygen, - but the key material is stored within the HSM, and the actual signing - takes place there. -

-

- The name of the key is specified on the command - line. This must match the name of the zone for which the key is - being generated. -

-
- -
-

OPTIONS

- - -
-
-a algorithm
-
-

- Selects the cryptographic algorithm. The value of - algorithm must be one of RSASHA1, - NSEC3RSASHA1, RSASHA256, RSASHA512, - ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. -

-

- If no algorithm is specified, then RSASHA1 will be used by - default, unless the -3 option is specified, - in which case NSEC3RSASHA1 will be used instead. (If - -3 is used and an algorithm is specified, - that algorithm will be checked for compatibility with NSEC3.) -

-

- These values are case insensitive. In some cases, abbreviations - are supported, such as ECDSA256 for ECDSAP256SHA256 and - ECDSA384 for ECDSAP384SHA384. If RSASHA1 is specified - along with the -3 option, then NSEC3RSASHA1 - will be used instead. -

-

- As of BIND 9.12.0, this option is mandatory except when using - the -S option (which copies the algorithm from - the predecessory key). Previously, the default for newly - generated keys was RSASHA1. -

-
-
-3
-
-

- Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used with an algorithm that has both - NSEC and NSEC3 versions, then the NSEC3 version will be - used; for example, dnssec-keygen -3a RSASHA1 - specifies the NSEC3RSASHA1 algorithm. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-l label
-
-

- Specifies the label for a key pair in the crypto hardware. -

-

- When BIND 9 is built with OpenSSL-based - PKCS#11 support, the label is an arbitrary string that - identifies a particular key. -

-

- When BIND 9 is built with native PKCS#11 - support, the label is a PKCS#11 URI string in the format - "pkcs11:keyword=value[;keyword=value;...]" - Keywords include "token", which identifies the HSM; "object", which - identifies the key; and "pin-source", which identifies a file from - which the HSM's PIN code can be obtained. The label will be - stored in the on-disk "private" file. -

-

- If the label contains a - pin-source field, tools using the generated - key files will be able to use the HSM for signing and other - operations without any need for an operator to manually enter - a PIN. Note: Making the HSM's PIN accessible in this manner - may reduce the security advantage of using an HSM; be sure - this is what you want to do before making use of this feature. -

-
-
-n nametype
-
-

- Specifies the owner type of the key. The value of - nametype must either be ZONE (for a DNSSEC - zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with - a host (KEY)), - USER (for a key associated with a user(KEY)) or OTHER (DNSKEY). - These values are case insensitive. -

-
-
-C
-
-

- Compatibility mode: generates an old-style key, without - any metadata. By default, dnssec-keyfromlabel - will include the key's creation date in the metadata stored - with the private key, and other dates may be set there as well - (publication date, activation date, etc). Keys that include - this data may be incompatible with older versions of BIND; the - -C option suppresses them. -

-
-
-c class
-
-

- Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. -

-
-
-f flag
-
-

- Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. -

-
-
-G
-
-

- Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - dnssec-keyfromlabel. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to be written. -

-
-
-k
-
-

- Generate KEY records rather than DNSKEY records. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. Setting the default TTL to - 0 or none removes it. -

-
-
-p protocol
-
-

- Sets the protocol value for the key. The protocol - is a number between 0 and 255. The default is 3 (DNSSEC). - Other possible values for this argument are listed in - RFC 2535 and its successors. -

-
-
-S key
-
-

- Generate a key as an explicit successor to an existing key. - The name, algorithm, size, and type of the key will be set - to match the predecessor. The activation date of the new - key will be set to the inactivation date of the existing - one. The publication date will be set to the activation - date minus the prepublication interval, which defaults to - 30 days. -

-
-
-t type
-
-

- Indicates the use of the key. type must be - one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default - is AUTHCONF. AUTH refers to the ability to authenticate - data, and CONF the ability to encrypt data. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-y
-
-

- Allows DNSSEC key files to be generated even if the key ID - would collide with that of an existing key, in the event of - either key being revoked. (This is only safe to use if you - are sure you won't be using RFC 5011 trust anchor maintenance - with either of the keys involved.) -

-
-
-
- -
-

TIMING OPTIONS

- - -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". -

-
-
-P sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records which match - this key are to be published to the zone. -

-
-
-A date/offset
-
-

- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". -

-
-
-R date/offset
-
-

- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -

-
-
-I date/offset
-
-

- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records which match - this key are to be deleted. -

-
-
-i interval
-
-

- Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. -

-

- If the key is being created as an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. -

-

- As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. -

-
-
-
- -
-

GENERATED KEY FILES

- -

- When dnssec-keyfromlabel completes - successfully, - it prints a string of the form Knnnn.+aaa+iiiii - to the standard output. This is an identification string for - the key files it has generated. -

-
    -
  • -

    nnnn is the key name. -

    -
  • -
  • -

    aaa is the numeric representation - of the algorithm. -

    -
  • -
  • -

    iiiii is the key identifier (or - footprint). -

    -
  • -
-

dnssec-keyfromlabel - creates two files, with names based - on the printed string. Knnnn.+aaa+iiiii.key - contains the public key, and - Knnnn.+aaa+iiiii.private contains the - private key. -

-

- The .key file contains a DNS KEY record - that - can be inserted into a zone file (directly or with a $INCLUDE - statement). -

-

- The .private file contains - algorithm-specific - fields. For obvious security reasons, this file does not have - general read permission. -

-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 4034, - The PKCS#11 URI Scheme (draft-pechanec-pkcs11uri-13). -

-
- -
- diff --git a/bin/dnssec/dnssec-keyfromlabel.rst b/bin/dnssec/dnssec-keyfromlabel.rst new file mode 100644 index 0000000000..e524097f82 --- /dev/null +++ b/bin/dnssec/dnssec-keyfromlabel.rst @@ -0,0 +1,276 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-keyfromlabel: + +dnssec-keyfromlabel - DNSSEC key generation tool +------------------------------------------------ + +Synopsis +~~~~~~~~ + +:program:`dnssec-keyfromlabel` {**-l** label} [**-3**] [**-a** algorithm] [**-A** date/offset] [**-c** class] [**-D** date/offset] [**-D** sync date/offset] [**-E** engine] [**-f** flag] [**-G**] [**-I** date/offset] [**-i** interval] [**-k**] [**-K** directory] [**-L** ttl] [**-n** nametype] [**-P** date/offset] [**-P** sync date/offset] [**-p** protocol] [**-R** date/offset] [**-S** key] [**-t** type] [**-v** level] [**-V**] [**-y**] {name} + +Description +~~~~~~~~~~~ + +``dnssec-keyfromlabel`` generates a key pair of files that referencing a +key object stored in a cryptographic hardware service module (HSM). The +private key file can be used for DNSSEC signing of zone data as if it +were a conventional signing key created by ``dnssec-keygen``, but the +key material is stored within the HSM, and the actual signing takes +place there. + +The ``name`` of the key is specified on the command line. This must +match the name of the zone for which the key is being generated. + +Options +~~~~~~~ + +**-a** algorithm + Selects the cryptographic algorithm. The value of ``algorithm`` must + be one of RSASHA1, NSEC3RSASHA1, RSASHA256, RSASHA512, + ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. + + If no algorithm is specified, then RSASHA1 will be used by default, + unless the ``-3`` option is specified, in which case NSEC3RSASHA1 + will be used instead. (If ``-3`` is used and an algorithm is + specified, that algorithm will be checked for compatibility with + NSEC3.) + + These values are case insensitive. In some cases, abbreviations are + supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for + ECDSAP384SHA384. If RSASHA1 is specified along with the ``-3`` + option, then NSEC3RSASHA1 will be used instead. + + As of BIND 9.12.0, this option is mandatory except when using the + ``-S`` option (which copies the algorithm from the predecessory key). + Previously, the default for newly generated keys was RSASHA1. + +**-3** + Use an NSEC3-capable algorithm to generate a DNSSEC key. If this + option is used with an algorithm that has both NSEC and NSEC3 + versions, then the NSEC3 version will be used; for example, + ``dnssec-keygen -3a RSASHA1`` specifies the NSEC3RSASHA1 algorithm. + +**-E** engine + Specifies the cryptographic hardware to use. + + When BIND is built with OpenSSL PKCS#11 support, this defaults to the + string "pkcs11", which identifies an OpenSSL engine that can drive a + cryptographic accelerator or hardware service module. When BIND is + built with native PKCS#11 cryptography (--enable-native-pkcs11), it + defaults to the path of the PKCS#11 provider library specified via + "--with-pkcs11". + +**-l** label + Specifies the label for a key pair in the crypto hardware. + + When BIND 9 is built with OpenSSL-based PKCS#11 support, the label is + an arbitrary string that identifies a particular key. It may be + preceded by an optional OpenSSL engine name, followed by a colon, as + in "pkcs11:keylabel". + + When BIND 9 is built with native PKCS#11 support, the label is a + PKCS#11 URI string in the format + "pkcs11:``keyword``\ =value[;\ ``keyword``\ =value;...]" Keywords + include "token", which identifies the HSM; "object", which identifies + the key; and "pin-source", which identifies a file from which the + HSM's PIN code can be obtained. The label will be stored in the + on-disk "private" file. + + If the label contains a ``pin-source`` field, tools using the + generated key files will be able to use the HSM for signing and other + operations without any need for an operator to manually enter a PIN. + Note: Making the HSM's PIN accessible in this manner may reduce the + security advantage of using an HSM; be sure this is what you want to + do before making use of this feature. + +**-n** nametype + Specifies the owner type of the key. The value of ``nametype`` must + either be ZONE (for a DNSSEC zone key (KEY/DNSKEY)), HOST or ENTITY + (for a key associated with a host (KEY)), USER (for a key associated + with a user(KEY)) or OTHER (DNSKEY). These values are case + insensitive. + +**-C** + Compatibility mode: generates an old-style key, without any metadata. + By default, ``dnssec-keyfromlabel`` will include the key's creation + date in the metadata stored with the private key, and other dates may + be set there as well (publication date, activation date, etc). Keys + that include this data may be incompatible with older versions of + BIND; the ``-C`` option suppresses them. + +**-c** class + Indicates that the DNS record containing the key should have the + specified class. If not specified, class IN is used. + +**-f** flag + Set the specified flag in the flag field of the KEY/DNSKEY record. + The only recognized flags are KSK (Key Signing Key) and REVOKE. + +**-G** + Generate a key, but do not publish it or sign with it. This option is + incompatible with -P and -A. + +**-h** + Prints a short summary of the options and arguments to + ``dnssec-keyfromlabel``. + +**-K** directory + Sets the directory in which the key files are to be written. + +**-k** + Generate KEY records rather than DNSKEY records. + +**-L** ttl + Sets the default TTL to use for this key when it is converted into a + DNSKEY RR. If the key is imported into a zone, this is the TTL that + will be used for it, unless there was already a DNSKEY RRset in + place, in which case the existing TTL would take precedence. Setting + the default TTL to ``0`` or ``none`` removes it. + +**-p** protocol + Sets the protocol value for the key. The protocol is a number between + 0 and 255. The default is 3 (DNSSEC). Other possible values for this + argument are listed in :rfc:`2535` and its successors. + +**-S** key + Generate a key as an explicit successor to an existing key. The name, + algorithm, size, and type of the key will be set to match the + predecessor. The activation date of the new key will be set to the + inactivation date of the existing one. The publication date will be + set to the activation date minus the prepublication interval, which + defaults to 30 days. + +**-t** type + Indicates the use of the key. ``type`` must be one of AUTHCONF, + NOAUTHCONF, NOAUTH, or NOCONF. The default is AUTHCONF. AUTH refers + to the ability to authenticate data, and CONF the ability to encrypt + data. + +**-v** level + Sets the debugging level. + +**-V** + Prints version information. + +**-y** + Allows DNSSEC key files to be generated even if the key ID would + collide with that of an existing key, in the event of either key + being revoked. (This is only safe to use if you are sure you won't be + using :rfc:`5011` trust anchor maintenance with either of the keys + involved.) + +Timing Options +~~~~~~~~~~~~~~ + +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a '+' or '-', it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the offset is +computed in years (defined as 365 24-hour days, ignoring leap years), +months (defined as 30 24-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +explicitly prevent a date from being set, use 'none' or 'never'. + +**-P** date/offset + Sets the date on which a key is to be published to the zone. After + that date, the key will be included in the zone but will not be used + to sign it. If not set, and if the -G option has not been used, the + default is "now". + +**-P** sync date/offset + Sets the date on which the CDS and CDNSKEY records which match this + key are to be published to the zone. + +**-A** date/offset + Sets the date on which the key is to be activated. After that date, + the key will be included in the zone and used to sign it. If not set, + and if the -G option has not been used, the default is "now". + +**-R** date/offset + Sets the date on which the key is to be revoked. After that date, the + key will be flagged as revoked. It will be included in the zone and + will be used to sign it. + +**-I** date/offset + Sets the date on which the key is to be retired. After that date, the + key will still be included in the zone, but it will not be used to + sign it. + +**-D** date/offset + Sets the date on which the key is to be deleted. After that date, the + key will no longer be included in the zone. (It may remain in the key + repository, however.) + +**-D** sync date/offset + Sets the date on which the CDS and CDNSKEY records which match this + key are to be deleted. + +**-i** interval + Sets the prepublication interval for a key. If set, then the + publication and activation dates must be separated by at least this + much time. If the activation date is specified but the publication + date isn't, then the publication date will default to this much time + before the activation date; conversely, if the publication date is + specified but activation date isn't, then activation will be set to + this much time after publication. + + If the key is being created as an explicit successor to another key, + then the default prepublication interval is 30 days; otherwise it is + zero. + + As with date offsets, if the argument is followed by one of the + suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the interval is + measured in years, months, weeks, days, hours, or minutes, + respectively. Without a suffix, the interval is measured in seconds. + +Generated Key Files +~~~~~~~~~~~~~~~~~~~ + +When ``dnssec-keyfromlabel`` completes successfully, it prints a string +of the form ``Knnnn.+aaa+iiiii`` to the standard output. This is an +identification string for the key files it has generated. + +- ``nnnn`` is the key name. + +- ``aaa`` is the numeric representation of the algorithm. + +- ``iiiii`` is the key identifier (or footprint). + +``dnssec-keyfromlabel`` creates two files, with names based on the +printed string. ``Knnnn.+aaa+iiiii.key`` contains the public key, and +``Knnnn.+aaa+iiiii.private`` contains the private key. + +The ``.key`` file contains a DNS KEY record that can be inserted into a +zone file (directly or with a $INCLUDE statement). + +The ``.private`` file contains algorithm-specific fields. For obvious +security reasons, this file does not have general read permission. + +See Also +~~~~~~~~ + +:manpage:`dnssec-keygen(8)`, :manpage:`dnssec-signzone(8)`, BIND 9 Administrator Reference Manual, +:rfc:`4034`, The PKCS#11 URI Scheme (draft-pechanec-pkcs11uri-13). diff --git a/bin/dnssec/dnssec-keygen.8 b/bin/dnssec/dnssec-keygen.8 deleted file mode 100644 index d2619b94e0..0000000000 --- a/bin/dnssec/dnssec-keygen.8 +++ /dev/null @@ -1,378 +0,0 @@ -.\" Copyright (C) 2000-2005, 2007-2012, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-keygen -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: August 21, 2015 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-KEYGEN" "8" "August 21, 2015" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-keygen \- DNSSEC key generation tool -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-keygen\fR\ 'u -\fBdnssec\-keygen\fR [\fB\-3\fR] [\fB\-A\ \fR\fB\fIdate/offset\fR\fR] [\fB\-a\ \fR\fB\fIalgorithm\fR\fR] [\fB\-b\ \fR\fB\fIkeysize\fR\fR] [\fB\-C\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-D\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-d\ \fR\fB\fIbits\fR\fR] [\fB\-E\ \fR\fB\fIengine\fR\fR] [\fB\-f\ \fR\fB\fIflag\fR\fR] [\fB\-G\fR] [\fB\-g\ \fR\fB\fIgenerator\fR\fR] [\fB\-h\fR] [\fB\-I\ \fR\fB\fIdate/offset\fR\fR] [\fB\-i\ \fR\fB\fIinterval\fR\fR] [\fB\-K\ \fR\fB\fIdirectory\fR\fR] [\fB\-k\ \fR\fB\fIpolicy\fR\fR] [\fB\-L\ \fR\fB\fIttl\fR\fR] [\fB\-l\ \fR\fB\fIfile\fR\fR] [\fB\-n\ \fR\fB\fInametype\fR\fR] [\fB\-P\ \fR\fB\fIdate/offset\fR\fR] [\fB\-P\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-p\ \fR\fB\fIprotocol\fR\fR] [\fB\-q\fR] [\fB\-R\ \fR\fB\fIdate/offset\fR\fR] [\fB\-S\ \fR\fB\fIkey\fR\fR] [\fB\-s\ \fR\fB\fIstrength\fR\fR] [\fB\-T\ \fR\fB\fIrrtype\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-V\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] {name} -.SH "DESCRIPTION" -.PP -\fBdnssec\-keygen\fR -generates keys for DNSSEC (Secure DNS), as defined in RFC 2535 and RFC 4034\&. It can also generate keys for use with TSIG (Transaction Signatures) as defined in RFC 2845, or TKEY (Transaction Key) as defined in RFC 2930\&. -.PP -The -\fBname\fR -of the key is specified on the command line\&. For DNSSEC keys, this must match the name of the zone for which the key is being generated\&. -.PP -The -\fBdnssec\-keymgr\fR -command acts as a wrapper around -\fBdnssec\-keygen\fR, generating and updating keys as needed to enforce defined security policies such as key rollover scheduling\&. Using -\fBdnssec\-keymgr\fR -may be preferable to direct use of -\fBdnssec\-keygen\fR\&. -.SH "OPTIONS" -.PP -\-3 -.RS 4 -Use an NSEC3\-capable algorithm to generate a DNSSEC key\&. If this option is used with an algorithm that has both NSEC and NSEC3 versions, then the NSEC3 version will be used; for example, -\fBdnssec\-keygen \-3a RSASHA1\fR -specifies the NSEC3RSASHA1 algorithm\&. -.RE -.PP -\-a \fIalgorithm\fR -.RS 4 -Selects the cryptographic algorithm\&. For DNSSEC keys, the value of -\fBalgorithm\fR -must be one of RSASHA1, NSEC3RSASHA1, RSASHA256, RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448\&. For TKEY, the value must be DH (Diffie Hellman); specifying his value will automatically set the -\fB\-T KEY\fR -option as well\&. -.sp -These values are case insensitive\&. In some cases, abbreviations are supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for ECDSAP384SHA384\&. If RSASHA1 is specified along with the -\fB\-3\fR -option, then NSEC3RSASHA1 will be used instead\&. -.sp -This parameter -\fImust\fR -be specified except when using the -\fB\-S\fR -option, which copies the algorithm from the predecessor key\&. -.sp -In prior releases, HMAC algorithms could be generated for use as TSIG keys, but that feature has been removed as of BIND 9\&.13\&.0\&. Use -\fBtsig\-keygen\fR -to generate TSIG keys\&. -.RE -.PP -\-b \fIkeysize\fR -.RS 4 -Specifies the number of bits in the key\&. The choice of key size depends on the algorithm used\&. RSA keys must be between 1024 and 4096 bits\&. Diffie Hellman keys must be between 128 and 4096 bits\&. Elliptic curve algorithms don\*(Aqt need this parameter\&. -.sp -If the key size is not specified, some algorithms have pre\-defined defaults\&. For instance, RSA keys have a default size of 2048 bits\&. -.RE -.PP -\-C -.RS 4 -Compatibility mode: generates an old\-style key, without any timing metadata\&. By default, -\fBdnssec\-keygen\fR -will include the key\*(Aqs creation date in the metadata stored with the private key, and other dates may be set there as well (publication date, activation date, etc)\&. Keys that include this data may be incompatible with older versions of BIND; the -\fB\-C\fR -option suppresses them\&. -.RE -.PP -\-c \fIclass\fR -.RS 4 -Indicates that the DNS record containing the key should have the specified class\&. If not specified, class IN is used\&. -.RE -.PP -\-d \fIbits\fR -.RS 4 -Key size in bits\&. For the algorithms RSASHA1, NSEC3RSASA1, RSASHA256 and RSASHA512 the key size must be in range 1024\-4096\&. DH size is between 128 and 4096\&. This option is ignored for algorithms ECDSAP256SHA256, ECDSAP384SHA384, ED25519 and ED448\&. -.RE -.PP -\-E \fIengine\fR -.RS 4 -Specifies the cryptographic hardware to use, when applicable\&. -.sp -When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module\&. When BIND is built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "\-\-with\-pkcs11"\&. -.RE -.PP -\-f \fIflag\fR -.RS 4 -Set the specified flag in the flag field of the KEY/DNSKEY record\&. The only recognized flags are KSK (Key Signing Key) and REVOKE\&. -.RE -.PP -\-G -.RS 4 -Generate a key, but do not publish it or sign with it\&. This option is incompatible with \-P and \-A\&. -.RE -.PP -\-g \fIgenerator\fR -.RS 4 -If generating a Diffie Hellman key, use this generator\&. Allowed values are 2 and 5\&. If no generator is specified, a known prime from RFC 2539 will be used if possible; otherwise the default is 2\&. -.RE -.PP -\-h -.RS 4 -Prints a short summary of the options and arguments to -\fBdnssec\-keygen\fR\&. -.RE -.PP -\-K \fIdirectory\fR -.RS 4 -Sets the directory in which the key files are to be written\&. -.RE -.PP -\-k \fIpolicy\fR -.RS 4 -Create keys for a specific dnssec\-policy\&. If a policy uses multiple keys, -\fBdnssec\-keygen\fR -will generate multiple keys\&. This will also create a "\&.state" file to keep track of the key state\&. -.sp -This option creates keys according to the dnssec\-policy configuration, hence it cannot be used together with many of the other options that -\fBdnssec\-keygen\fR -provides\&. -.RE -.PP -\-L \fIttl\fR -.RS 4 -Sets the default TTL to use for this key when it is converted into a DNSKEY RR\&. If the key is imported into a zone, this is the TTL that will be used for it, unless there was already a DNSKEY RRset in place, in which case the existing TTL would take precedence\&. If this value is not set and there is no existing DNSKEY RRset, the TTL will default to the SOA TTL\&. Setting the default TTL to -0 -or -none -is the same as leaving it unset\&. -.RE -.PP -\-l \fIfile\fR -.RS 4 -Provide a configuration file that contains a dnssec\-policy statement (matching the policy set with -\fB\-k\fR)\&. -.RE -.PP -\-n \fInametype\fR -.RS 4 -Specifies the owner type of the key\&. The value of -\fBnametype\fR -must either be ZONE (for a DNSSEC zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with a host (KEY)), USER (for a key associated with a user(KEY)) or OTHER (DNSKEY)\&. These values are case insensitive\&. Defaults to ZONE for DNSKEY generation\&. -.RE -.PP -\-p \fIprotocol\fR -.RS 4 -Sets the protocol value for the generated key, for use with -\fB\-T KEY\fR\&. The protocol is a number between 0 and 255\&. The default is 3 (DNSSEC)\&. Other possible values for this argument are listed in RFC 2535 and its successors\&. -.RE -.PP -\-q -.RS 4 -Quiet mode: Suppresses unnecessary output, including progress indication\&. Without this option, when -\fBdnssec\-keygen\fR -is run interactively to generate an RSA or DSA key pair, it will print a string of symbols to -stderr -indicating the progress of the key generation\&. A \*(Aq\&.\*(Aq indicates that a random number has been found which passed an initial sieve test; \*(Aq+\*(Aq means a number has passed a single round of the Miller\-Rabin primality test; a space means that the number has passed all the tests and is a satisfactory key\&. -.RE -.PP -\-S \fIkey\fR -.RS 4 -Create a new key which is an explicit successor to an existing key\&. The name, algorithm, size, and type of the key will be set to match the existing key\&. The activation date of the new key will be set to the inactivation date of the existing one\&. The publication date will be set to the activation date minus the prepublication interval, which defaults to 30 days\&. -.RE -.PP -\-s \fIstrength\fR -.RS 4 -Specifies the strength value of the key\&. The strength is a number between 0 and 15, and currently has no defined purpose in DNSSEC\&. -.RE -.PP -\-T \fIrrtype\fR -.RS 4 -Specifies the resource record type to use for the key\&. -\fBrrtype\fR -must be either DNSKEY or KEY\&. The default is DNSKEY when using a DNSSEC algorithm, but it can be overridden to KEY for use with SIG(0)\&. -.RE -.PP -\-t \fItype\fR -.RS 4 -Indicates the use of the key, for use with -\fB\-T KEY\fR\&. -\fBtype\fR -must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF\&. The default is AUTHCONF\&. AUTH refers to the ability to authenticate data, and CONF the ability to encrypt data\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.SH "TIMING OPTIONS" -.PP -Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS\&. If the argument begins with a \*(Aq+\*(Aq or \*(Aq\-\*(Aq, it is interpreted as an offset from the present time\&. For convenience, if such an offset is followed by one of the suffixes \*(Aqy\*(Aq, \*(Aqmo\*(Aq, \*(Aqw\*(Aq, \*(Aqd\*(Aq, \*(Aqh\*(Aq, or \*(Aqmi\*(Aq, then the offset is computed in years (defined as 365 24\-hour days, ignoring leap years), months (defined as 30 24\-hour days), weeks, days, hours, or minutes, respectively\&. Without a suffix, the offset is computed in seconds\&. To explicitly prevent a date from being set, use \*(Aqnone\*(Aq or \*(Aqnever\*(Aq\&. -.PP -\-P \fIdate/offset\fR -.RS 4 -Sets the date on which a key is to be published to the zone\&. After that date, the key will be included in the zone but will not be used to sign it\&. If not set, and if the \-G option has not been used, the default is "now"\&. -.RE -.PP -\-P sync \fIdate/offset\fR -.RS 4 -Sets the date on which CDS and CDNSKEY records that match this key are to be published to the zone\&. -.RE -.PP -\-A \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be activated\&. After that date, the key will be included in the zone and used to sign it\&. If not set, and if the \-G option has not been used, the default is "now"\&. If set, if and \-P is not set, then the publication date will be set to the activation date minus the prepublication interval\&. -.RE -.PP -\-R \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be revoked\&. After that date, the key will be flagged as revoked\&. It will be included in the zone and will be used to sign it\&. -.RE -.PP -\-I \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be retired\&. After that date, the key will still be included in the zone, but it will not be used to sign it\&. -.RE -.PP -\-D \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be deleted\&. After that date, the key will no longer be included in the zone\&. (It may remain in the key repository, however\&.) -.RE -.PP -\-D sync \fIdate/offset\fR -.RS 4 -Sets the date on which the CDS and CDNSKEY records that match this key are to be deleted\&. -.RE -.PP -\-i \fIinterval\fR -.RS 4 -Sets the prepublication interval for a key\&. If set, then the publication and activation dates must be separated by at least this much time\&. If the activation date is specified but the publication date isn\*(Aqt, then the publication date will default to this much time before the activation date; conversely, if the publication date is specified but activation date isn\*(Aqt, then activation will be set to this much time after publication\&. -.sp -If the key is being created as an explicit successor to another key, then the default prepublication interval is 30 days; otherwise it is zero\&. -.sp -As with date offsets, if the argument is followed by one of the suffixes \*(Aqy\*(Aq, \*(Aqmo\*(Aq, \*(Aqw\*(Aq, \*(Aqd\*(Aq, \*(Aqh\*(Aq, or \*(Aqmi\*(Aq, then the interval is measured in years, months, weeks, days, hours, or minutes, respectively\&. Without a suffix, the interval is measured in seconds\&. -.RE -.SH "GENERATED KEYS" -.PP -When -\fBdnssec\-keygen\fR -completes successfully, it prints a string of the form -Knnnn\&.+aaa+iiiii -to the standard output\&. This is an identification string for the key it has generated\&. -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -nnnn -is the key name\&. -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -aaa -is the numeric representation of the algorithm\&. -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -iiiii -is the key identifier (or footprint)\&. -.RE -.PP -\fBdnssec\-keygen\fR -creates two files, with names based on the printed string\&. -Knnnn\&.+aaa+iiiii\&.key -contains the public key, and -Knnnn\&.+aaa+iiiii\&.private -contains the private key\&. -.PP -The -\&.key -file contains a DNSKEY or KEY record\&. When a zone is being signed by -\fBnamed\fR -or -\fBdnssec\-signzone\fR\fB\-S\fR, DNSKEY records are included automatically\&. In other cases, the -\&.key -file can be inserted into a zone file manually or with a -\fB$INCLUDE\fR -statement\&. -.PP -The -\&.private -file contains algorithm\-specific fields\&. For obvious security reasons, this file does not have general read permission\&. -.SH "EXAMPLE" -.PP -To generate an ECDSAP256SHA256 zone\-signing key for the zone -\fBexample\&.com\fR, issue the command: -.PP -\fBdnssec\-keygen \-a ECDSAP256SHA256 example\&.com\fR -.PP -The command would print a string of the form: -.PP -\fBKexample\&.com\&.+013+26160\fR -.PP -In this example, -\fBdnssec\-keygen\fR -creates the files -Kexample\&.com\&.+013+26160\&.key -and -Kexample\&.com\&.+013+26160\&.private\&. -.PP -To generate a matching key\-signing key, issue the command: -.PP -\fBdnssec\-keygen \-a ECDSAP256SHA256 \-f KSK example\&.com\fR -.SH "SEE ALSO" -.PP -\fBdnssec-signzone\fR(8), -BIND 9 Administrator Reference Manual, -RFC 2539, -RFC 2845, -RFC 4034\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000-2005, 2007-2012, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-keygen.docbook b/bin/dnssec/dnssec-keygen.docbook deleted file mode 100644 index 0768b302b2..0000000000 --- a/bin/dnssec/dnssec-keygen.docbook +++ /dev/null @@ -1,664 +0,0 @@ - - - - - - 2014-02-06 - - - August 21, 2015 - ISC - Internet Systems Consortium, Inc. - - - - dnssec-keygen - 8 - BIND9 - - - - dnssec-keygen - DNSSEC key generation tool - - - - - 2000 - 2001 - 2002 - 2003 - 2004 - 2005 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-keygen - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - name - - - - DESCRIPTION - - dnssec-keygen - generates keys for DNSSEC (Secure DNS), as defined in RFC 2535 - and RFC 4034. It can also generate keys for use with - TSIG (Transaction Signatures) as defined in RFC 2845, or TKEY - (Transaction Key) as defined in RFC 2930. - - - The of the key is specified on the command - line. For DNSSEC keys, this must match the name of the zone for - which the key is being generated. - - - - OPTIONS - - - - - - -3 - - - Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used with an algorithm that has both - NSEC and NSEC3 versions, then the NSEC3 version will be - used; for example, dnssec-keygen -3a RSASHA1 - specifies the NSEC3RSASHA1 algorithm. - - - - - - -a algorithm - - - Selects the cryptographic algorithm. For DNSSEC keys, the value - of must be one of RSASHA1, - NSEC3RSASHA1, RSASHA256, RSASHA512, - ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. For - TKEY, the value must be DH (Diffie Hellman); specifying - his value will automatically set the - option as well. - - - These values are case insensitive. In some cases, abbreviations - are supported, such as ECDSA256 for ECDSAP256SHA256 and - ECDSA384 for ECDSAP384SHA384. If RSASHA1 is specified - along with the option, then NSEC3RSASHA1 - will be used instead. - - - This parameter must be specified except - when using the option, which copies the - algorithm from the predecessor key. - - - In prior releases, HMAC algorithms could be generated for - use as TSIG keys, but that feature has been removed as of - BIND 9.13.0. Use tsig-keygen to generate - TSIG keys. - - - - - - -b keysize - - - Specifies the number of bits in the key. The choice of key - size depends on the algorithm used. RSA keys must be - between 1024 and 4096 bits. Diffie Hellman keys must be between - 128 and 4096 bits. Elliptic curve algorithms don't need this - parameter. - - - If the key size is not specified, some algorithms have - pre-defined defaults. For instance, RSA keys have a default - size of 2048 bits. - - - - - - -C - - - Compatibility mode: generates an old-style key, without any - timing metadata. By default, dnssec-keygen - will include the key's creation date in the metadata stored with - the private key, and other dates may be set there as well - (publication date, activation date, etc). Keys that include this - data may be incompatible with older versions of BIND; the - option suppresses them. - - - - - - -c class - - - Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. - - - - - - -d bits - - - Key size in bits. For the algorithms RSASHA1, NSEC3RSASA1, - RSASHA256 and RSASHA512 the key size must be in range 1024-4096. - DH size is between 128 and 4096. This option is ignored for - algorithms ECDSAP256SHA256, ECDSAP384SHA384, ED25519 and ED448. - - - - - - -E engine - - - Specifies the cryptographic hardware to use, when applicable. - - - When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". - - - - - - -f flag - - - Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. - - - - - - -G - - - Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. - - - - - - -g generator - - - If generating a Diffie Hellman key, use this generator. - Allowed values are 2 and 5. If no generator - is specified, a known prime from RFC 2539 will be used - if possible; otherwise the default is 2. - - - - - - -h - - - Prints a short summary of the options and arguments to - dnssec-keygen. - - - - - - -K directory - - - Sets the directory in which the key files are to be written. - - - - - - -k policy - - - Create keys for a specific dnssec-policy. If a policy uses - multiple keys, dnssec-keygen will generate - multiple keys. This will also create a ".state" file to keep - track of the key state. - - - This option creates keys according to the dnssec-policy - configuration, hence it cannot be used together with many of - the other options that dnssec-keygen - provides. - - - - - - -L ttl - - - Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. If this value is not set and there - is no existing DNSKEY RRset, the TTL will default to the - SOA TTL. Setting the default TTL to 0 - or none is the same as leaving it unset. - - - - - - -l file - - - Provide a configuration file that contains a dnssec-policy - statement (matching the policy set with -k). - - - - - - -n nametype - - - Specifies the owner type of the key. The value of - must either be ZONE (for a DNSSEC - zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated - with a host (KEY)), USER (for a key associated with a - user(KEY)) or OTHER (DNSKEY). These values are case - insensitive. Defaults to ZONE for DNSKEY generation. - - - - - - -p protocol - - - Sets the protocol value for the generated key, for use - with . The protocol is a number between 0 - and 255. The default is 3 (DNSSEC). Other possible values for - this argument are listed in RFC 2535 and its successors. - - - - - - -q - - - Quiet mode: Suppresses unnecessary output, including - progress indication. Without this option, when - dnssec-keygen is run interactively - to generate an RSA or DSA key pair, it will print a string - of symbols to stderr indicating the - progress of the key generation. A '.' indicates that a - random number has been found which passed an initial - sieve test; '+' means a number has passed a single - round of the Miller-Rabin primality test; a space - means that the number has passed all the tests and is - a satisfactory key. - - - - - - -S key - - - Create a new key which is an explicit successor to an - existing key. The name, algorithm, size, and type of the - key will be set to match the existing key. The activation - date of the new key will be set to the inactivation date of - the existing one. The publication date will be set to the - activation date minus the prepublication interval, which - defaults to 30 days. - - - - - - -s strength - - - Specifies the strength value of the key. The strength is - a number between 0 and 15, and currently has no defined - purpose in DNSSEC. - - - - - - -T rrtype - - - Specifies the resource record type to use for the key. - must be either DNSKEY or KEY. The - default is DNSKEY when using a DNSSEC algorithm, but it can be - overridden to KEY for use with SIG(0). - - - - - - -t type - - - Indicates the use of the key, for use with . must be one of AUTHCONF, - NOAUTHCONF, NOAUTH, or NOCONF. The default is AUTHCONF. AUTH - refers to the ability to authenticate data, and CONF the ability - to encrypt data. - - - - - - -V - - - Prints version information. - - - - - - -v level - - - Sets the debugging level. - - - - - - - - TIMING OPTIONS - - - - Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. - - - - - -P date/offset - - - Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". - - - - - - -P sync date/offset - - - Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. - - - - - - -A date/offset - - - Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". If set, if and -P is not set, then - the publication date will be set to the activation date - minus the prepublication interval. - - - - - - -R date/offset - - - Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. - - - - - - -I date/offset - - - Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. - - - - - - -D date/offset - - - Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) - - - - - - -D sync date/offset - - - Sets the date on which the CDS and CDNSKEY records that match this - key are to be deleted. - - - - - - -i interval - - - Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. - - - If the key is being created as an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. - - - As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. - - - - - - - - - GENERATED KEYS - - - When dnssec-keygen completes - successfully, - it prints a string of the form Knnnn.+aaa+iiiii - to the standard output. This is an identification string for - the key it has generated. - - - - nnnn is the key name. - - - - aaa is the numeric representation - of the - algorithm. - - - - iiiii is the key identifier (or - footprint). - - - - dnssec-keygen - creates two files, with names based - on the printed string. Knnnn.+aaa+iiiii.key - contains the public key, and - Knnnn.+aaa+iiiii.private contains the - private - key. - - - The .key file contains a DNSKEY or KEY record. - When a zone is being signed by named - or dnssec-signzone , DNSKEY - records are included automatically. In other cases, - the .key file can be inserted into a zone file - manually or with a $INCLUDE statement. - - - The .private file contains - algorithm-specific - fields. For obvious security reasons, this file does not have - general read permission. - - - - EXAMPLE - - - To generate an ECDSAP256SHA256 zone-signing key for the zone - example.com, issue the command: - - - dnssec-keygen -a ECDSAP256SHA256 example.com - - - The command would print a string of the form: - - Kexample.com.+013+26160 - - - In this example, dnssec-keygen creates - the files Kexample.com.+013+26160.key - and - Kexample.com.+013+26160.private. - - - To generate a matching key-signing key, issue the command: - - - dnssec-keygen -a ECDSAP256SHA256 -f KSK example.com - - - - SEE ALSO - - - dnssec-signzone8 - , - BIND 9 Administrator Reference Manual, - RFC 2539, - RFC 2845, - RFC 4034. - - - - diff --git a/bin/dnssec/dnssec-keygen.html b/bin/dnssec/dnssec-keygen.html deleted file mode 100644 index 9ee6ef10a9..0000000000 --- a/bin/dnssec/dnssec-keygen.html +++ /dev/null @@ -1,555 +0,0 @@ - - - - - -dnssec-keygen - - -
-
- - - - - -
-

Name

-

- dnssec-keygen - — DNSSEC key generation tool -

-
- - - -
-

Synopsis

-

- dnssec-keygen - [-3] - [-A date/offset] - [-a algorithm] - [-b keysize] - [-C] - [-c class] - [-D date/offset] - [-D sync date/offset] - [-d bits] - [-E engine] - [-f flag] - [-G] - [-g generator] - [-h] - [-I date/offset] - [-i interval] - [-K directory] - [-k policy] - [-L ttl] - [-l file] - [-n nametype] - [-P date/offset] - [-P sync date/offset] - [-p protocol] - [-q] - [-R date/offset] - [-S key] - [-s strength] - [-T rrtype] - [-t type] - [-V] - [-v level] - {name} -

-
- -
-

DESCRIPTION

- -

dnssec-keygen - generates keys for DNSSEC (Secure DNS), as defined in RFC 2535 - and RFC 4034. It can also generate keys for use with - TSIG (Transaction Signatures) as defined in RFC 2845, or TKEY - (Transaction Key) as defined in RFC 2930. -

-

- The name of the key is specified on the command - line. For DNSSEC keys, this must match the name of the zone for - which the key is being generated. -

-

- The dnssec-keymgr command acts as a wrapper - around dnssec-keygen, generating and updating keys - as needed to enforce defined security policies such as key rollover - scheduling. Using dnssec-keymgr may be preferable - to direct use of dnssec-keygen. -

-
- -
-

OPTIONS

- - -
-
-3
-
-

- Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used with an algorithm that has both - NSEC and NSEC3 versions, then the NSEC3 version will be - used; for example, dnssec-keygen -3a RSASHA1 - specifies the NSEC3RSASHA1 algorithm. -

-
-
-a algorithm
-
-

- Selects the cryptographic algorithm. For DNSSEC keys, the value - of algorithm must be one of RSASHA1, - NSEC3RSASHA1, RSASHA256, RSASHA512, - ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. For - TKEY, the value must be DH (Diffie Hellman); specifying - his value will automatically set the -T KEY - option as well. -

-

- These values are case insensitive. In some cases, abbreviations - are supported, such as ECDSA256 for ECDSAP256SHA256 and - ECDSA384 for ECDSAP384SHA384. If RSASHA1 is specified - along with the -3 option, then NSEC3RSASHA1 - will be used instead. -

-

- This parameter must be specified except - when using the -S option, which copies the - algorithm from the predecessor key. -

-

- In prior releases, HMAC algorithms could be generated for - use as TSIG keys, but that feature has been removed as of - BIND 9.13.0. Use tsig-keygen to generate - TSIG keys. -

-
-
-b keysize
-
-

- Specifies the number of bits in the key. The choice of key - size depends on the algorithm used. RSA keys must be - between 1024 and 4096 bits. Diffie Hellman keys must be between - 128 and 4096 bits. Elliptic curve algorithms don't need this - parameter. -

-

- If the key size is not specified, some algorithms have - pre-defined defaults. For instance, RSA keys have a default - size of 2048 bits. -

-
-
-C
-
-

- Compatibility mode: generates an old-style key, without any - timing metadata. By default, dnssec-keygen - will include the key's creation date in the metadata stored with - the private key, and other dates may be set there as well - (publication date, activation date, etc). Keys that include this - data may be incompatible with older versions of BIND; the - -C option suppresses them. -

-
-
-c class
-
-

- Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. -

-
-
-d bits
-
-

- Key size in bits. For the algorithms RSASHA1, NSEC3RSASA1, - RSASHA256 and RSASHA512 the key size must be in range 1024-4096. - DH size is between 128 and 4096. This option is ignored for - algorithms ECDSAP256SHA256, ECDSAP384SHA384, ED25519 and ED448. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-f flag
-
-

- Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. -

-
-
-G
-
-

- Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. -

-
-
-g generator
-
-

- If generating a Diffie Hellman key, use this generator. - Allowed values are 2 and 5. If no generator - is specified, a known prime from RFC 2539 will be used - if possible; otherwise the default is 2. -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - dnssec-keygen. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to be written. -

-
-
-k policy
-
-

- Create keys for a specific dnssec-policy. If a policy uses - multiple keys, dnssec-keygen will generate - multiple keys. This will also create a ".state" file to keep - track of the key state. -

-

- This option creates keys according to the dnssec-policy - configuration, hence it cannot be used together with many of - the other options that dnssec-keygen - provides. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. If this value is not set and there - is no existing DNSKEY RRset, the TTL will default to the - SOA TTL. Setting the default TTL to 0 - or none is the same as leaving it unset. -

-
-
-l file
-
-

- Provide a configuration file that contains a dnssec-policy - statement (matching the policy set with -k). -

-
-
-n nametype
-
-

- Specifies the owner type of the key. The value of - nametype must either be ZONE (for a DNSSEC - zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated - with a host (KEY)), USER (for a key associated with a - user(KEY)) or OTHER (DNSKEY). These values are case - insensitive. Defaults to ZONE for DNSKEY generation. -

-
-
-p protocol
-
-

- Sets the protocol value for the generated key, for use - with -T KEY. The protocol is a number between 0 - and 255. The default is 3 (DNSSEC). Other possible values for - this argument are listed in RFC 2535 and its successors. -

-
-
-q
-
-

- Quiet mode: Suppresses unnecessary output, including - progress indication. Without this option, when - dnssec-keygen is run interactively - to generate an RSA or DSA key pair, it will print a string - of symbols to stderr indicating the - progress of the key generation. A '.' indicates that a - random number has been found which passed an initial - sieve test; '+' means a number has passed a single - round of the Miller-Rabin primality test; a space - means that the number has passed all the tests and is - a satisfactory key. -

-
-
-S key
-
-

- Create a new key which is an explicit successor to an - existing key. The name, algorithm, size, and type of the - key will be set to match the existing key. The activation - date of the new key will be set to the inactivation date of - the existing one. The publication date will be set to the - activation date minus the prepublication interval, which - defaults to 30 days. -

-
-
-s strength
-
-

- Specifies the strength value of the key. The strength is - a number between 0 and 15, and currently has no defined - purpose in DNSSEC. -

-
-
-T rrtype
-
-

- Specifies the resource record type to use for the key. - rrtype must be either DNSKEY or KEY. The - default is DNSKEY when using a DNSSEC algorithm, but it can be - overridden to KEY for use with SIG(0). -

-
-
-t type
-
-

- Indicates the use of the key, for use with -T - KEY. type must be one of AUTHCONF, - NOAUTHCONF, NOAUTH, or NOCONF. The default is AUTHCONF. AUTH - refers to the ability to authenticate data, and CONF the ability - to encrypt data. -

-
-
-V
-
-

- Prints version information. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-
- -
-

TIMING OPTIONS

- - -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". -

-
-
-P sync date/offset
-
-

- Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. -

-
-
-A date/offset
-
-

- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". If set, if and -P is not set, then - the publication date will be set to the activation date - minus the prepublication interval. -

-
-
-R date/offset
-
-

- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -

-
-
-I date/offset
-
-

- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records that match this - key are to be deleted. -

-
-
-i interval
-
-

- Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. -

-

- If the key is being created as an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. -

-

- As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. -

-
-
-
- - -
-

GENERATED KEYS

- -

- When dnssec-keygen completes - successfully, - it prints a string of the form Knnnn.+aaa+iiiii - to the standard output. This is an identification string for - the key it has generated. -

-
    -
  • -

    nnnn is the key name. -

    -
  • -
  • -

    aaa is the numeric representation - of the - algorithm. -

    -
  • -
  • -

    iiiii is the key identifier (or - footprint). -

    -
  • -
-

dnssec-keygen - creates two files, with names based - on the printed string. Knnnn.+aaa+iiiii.key - contains the public key, and - Knnnn.+aaa+iiiii.private contains the - private - key. -

-

- The .key file contains a DNSKEY or KEY record. - When a zone is being signed by named - or dnssec-signzone -S, DNSKEY - records are included automatically. In other cases, - the .key file can be inserted into a zone file - manually or with a $INCLUDE statement. -

-

- The .private file contains - algorithm-specific - fields. For obvious security reasons, this file does not have - general read permission. -

-
- -
-

EXAMPLE

- -

- To generate an ECDSAP256SHA256 zone-signing key for the zone - example.com, issue the command: -

-

- dnssec-keygen -a ECDSAP256SHA256 example.com -

-

- The command would print a string of the form: -

-

Kexample.com.+013+26160 -

-

- In this example, dnssec-keygen creates - the files Kexample.com.+013+26160.key - and - Kexample.com.+013+26160.private. -

-

- To generate a matching key-signing key, issue the command: -

-

- dnssec-keygen -a ECDSAP256SHA256 -f KSK example.com -

-
- -
-

SEE ALSO

- -

- dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 2539, - RFC 2845, - RFC 4034. -

-
- -
- diff --git a/bin/dnssec/dnssec-keygen.rst b/bin/dnssec/dnssec-keygen.rst new file mode 100644 index 0000000000..b6e5820151 --- /dev/null +++ b/bin/dnssec/dnssec-keygen.rst @@ -0,0 +1,322 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-keygen: + +dnssec-keygen: DNSSEC key generation tool +----------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`dnssec-keygen` [**-3**] [**-A** date/offset] [**-a** algorithm] [**-b** keysize] [**-C**] [**-c** class] [**-D** date/offset] [**-d** bits] [**-D** sync date/offset] [**-E** engine] [**-f** flag] [**-G**] [**-g** generator] [**-h**] [**-I** date/offset] [**-i** interval] [**-K** directory] [**-k** policy] [**-L** ttl] [**-l** file] [**-n** nametype] [**-P** date/offset] [**-P** sync date/offset] [**-p** protocol] [**-q**] [**-R** date/offset] [**-S** key] [**-s** strength] [**-T** rrtype] [**-t** type] [**-V**] [**-v** level] {name} + +Description +~~~~~~~~~~~ + +``dnssec-keygen`` generates keys for DNSSEC (Secure DNS), as defined in +:rfc:`2535` and :rfc:`4034`. It can also generate keys for use with TSIG +(Transaction Signatures) as defined in :rfc:`2845`, or TKEY (Transaction +Key) as defined in :rfc:`2930`. + +The ``name`` of the key is specified on the command line. For DNSSEC +keys, this must match the name of the zone for which the key is being +generated. + +Options +~~~~~~~ + +**-3** + Use an NSEC3-capable algorithm to generate a DNSSEC key. If this + option is used with an algorithm that has both NSEC and NSEC3 + versions, then the NSEC3 version will be used; for example, + ``dnssec-keygen -3a RSASHA1`` specifies the NSEC3RSASHA1 algorithm. + +**-a** algorithm + Selects the cryptographic algorithm. For DNSSEC keys, the value of + ``algorithm`` must be one of RSASHA1, NSEC3RSASHA1, RSASHA256, + RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. For + TKEY, the value must be DH (Diffie Hellman); specifying his value + will automatically set the ``-T KEY`` option as well. + + These values are case insensitive. In some cases, abbreviations are + supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for + ECDSAP384SHA384. If RSASHA1 is specified along with the ``-3`` + option, then NSEC3RSASHA1 will be used instead. + + This parameter *must* be specified except when using the ``-S`` + option, which copies the algorithm from the predecessor key. + + In prior releases, HMAC algorithms could be generated for use as TSIG + keys, but that feature has been removed as of BIND 9.13.0. Use + ``tsig-keygen`` to generate TSIG keys. + +**-b** keysize + Specifies the number of bits in the key. The choice of key size + depends on the algorithm used. RSA keys must be between 1024 and 4096 + bits. Diffie Hellman keys must be between 128 and 4096 bits. Elliptic + curve algorithms don't need this parameter. + + If the key size is not specified, some algorithms have pre-defined + defaults. For example, RSA keys for use as DNSSEC zone signing keys + have a default size of 1024 bits; RSA keys for use as key signing + keys (KSKs, generated with ``-f KSK``) default to 2048 bits. + +**-C** + Compatibility mode: generates an old-style key, without any timing + metadata. By default, ``dnssec-keygen`` will include the key's + creation date in the metadata stored with the private key, and other + dates may be set there as well (publication date, activation date, + etc). Keys that include this data may be incompatible with older + versions of BIND; the ``-C`` option suppresses them. + +**-c** class + Indicates that the DNS record containing the key should have the + specified class. If not specified, class IN is used. + +**-d** bits + Key size in bits. For the algorithms RSASHA1, NSEC3RSASA1, RSASHA256 and + RSASHA512 the key size must be in range 1024-4096. DH size is between 128 + and 4096. This option is ignored for algorithms ECDSAP256SHA256, + ECDSAP384SHA384, ED25519 and ED448. + +**-E** engine + Specifies the cryptographic hardware to use, when applicable. + + When BIND is built with OpenSSL PKCS#11 support, this defaults to the + string "pkcs11", which identifies an OpenSSL engine that can drive a + cryptographic accelerator or hardware service module. When BIND is + built with native PKCS#11 cryptography (--enable-native-pkcs11), it + defaults to the path of the PKCS#11 provider library specified via + "--with-pkcs11". + +**-f** flag + Set the specified flag in the flag field of the KEY/DNSKEY record. + The only recognized flags are KSK (Key Signing Key) and REVOKE. + +**-G** + Generate a key, but do not publish it or sign with it. This option is + incompatible with -P and -A. + +**-g** generator + If generating a Diffie Hellman key, use this generator. Allowed + values are 2 and 5. If no generator is specified, a known prime from + :rfc:`2539` will be used if possible; otherwise the default is 2. + +**-h** + Prints a short summary of the options and arguments to + ``dnssec-keygen``. + +**-K** directory + Sets the directory in which the key files are to be written. + +**-k** policy + Create keys for a specific dnssec-policy. If a policy uses multiple keys, + ``dnssec-keygen`` will generate multiple keys. This will also + create a ".state" file to keep track of the key state. + + This option creates keys according to the dnssec-policy configuration, hence + it cannot be used together with many of the other options that + ``dnssec-keygen`` provides. + +**-L** ttl + Sets the default TTL to use for this key when it is converted into a + DNSKEY RR. If the key is imported into a zone, this is the TTL that + will be used for it, unless there was already a DNSKEY RRset in + place, in which case the existing TTL would take precedence. If this + value is not set and there is no existing DNSKEY RRset, the TTL will + default to the SOA TTL. Setting the default TTL to ``0`` or ``none`` + is the same as leaving it unset. + +**-l** file + Provide a configuration file that contains a dnssec-policy statement + (matching the policy set with ``-k``). + +**-n** nametype + Specifies the owner type of the key. The value of ``nametype`` must + either be ZONE (for a DNSSEC zone key (KEY/DNSKEY)), HOST or ENTITY + (for a key associated with a host (KEY)), USER (for a key associated + with a user(KEY)) or OTHER (DNSKEY). These values are case + insensitive. Defaults to ZONE for DNSKEY generation. + +**-p** protocol + Sets the protocol value for the generated key, for use with + ``-T KEY``. The protocol is a number between 0 and 255. The default + is 3 (DNSSEC). Other possible values for this argument are listed in + :rfc:`2535` and its successors. + +**-q** + Quiet mode: Suppresses unnecessary output, including progress + indication. Without this option, when ``dnssec-keygen`` is run + interactively to generate an RSA or DSA key pair, it will print a + string of symbols to ``stderr`` indicating the progress of the key + generation. A '.' indicates that a random number has been found which + passed an initial sieve test; '+' means a number has passed a single + round of the Miller-Rabin primality test; a space means that the + number has passed all the tests and is a satisfactory key. + +**-S** key + Create a new key which is an explicit successor to an existing key. + The name, algorithm, size, and type of the key will be set to match + the existing key. The activation date of the new key will be set to + the inactivation date of the existing one. The publication date will + be set to the activation date minus the prepublication interval, + which defaults to 30 days. + +**-s** strength + Specifies the strength value of the key. The strength is a number + between 0 and 15, and currently has no defined purpose in DNSSEC. + +**-T** rrtype + Specifies the resource record type to use for the key. ``rrtype`` + must be either DNSKEY or KEY. The default is DNSKEY when using a + DNSSEC algorithm, but it can be overridden to KEY for use with + SIG(0). + +**-t** type + Indicates the use of the key, for use with ``-T KEY``. ``type`` + must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default + is AUTHCONF. AUTH refers to the ability to authenticate data, and + CONF the ability to encrypt data. + +**-V** + Prints version information. + +**-v** level + Sets the debugging level. + +Timing Options +~~~~~~~~~~~~~~ + +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a '+' or '-', it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the offset is +computed in years (defined as 365 24-hour days, ignoring leap years), +months (defined as 30 24-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +explicitly prevent a date from being set, use 'none' or 'never'. + +**-P** date/offset + Sets the date on which a key is to be published to the zone. After + that date, the key will be included in the zone but will not be used + to sign it. If not set, and if the -G option has not been used, the + default is "now". + +**-P** sync date/offset + Sets the date on which CDS and CDNSKEY records that match this key + are to be published to the zone. + +**-A** date/offset + Sets the date on which the key is to be activated. After that date, + the key will be included in the zone and used to sign it. If not set, + and if the -G option has not been used, the default is "now". If set, + if and -P is not set, then the publication date will be set to the + activation date minus the prepublication interval. + +**-R** date/offset + Sets the date on which the key is to be revoked. After that date, the + key will be flagged as revoked. It will be included in the zone and + will be used to sign it. + +**-I** date/offset + Sets the date on which the key is to be retired. After that date, the + key will still be included in the zone, but it will not be used to + sign it. + +**-D** date/offset + Sets the date on which the key is to be deleted. After that date, the + key will no longer be included in the zone. (It may remain in the key + repository, however.) + +**-D** sync date/offset + Sets the date on which the CDS and CDNSKEY records that match this + key are to be deleted. + +**-i** interval + Sets the prepublication interval for a key. If set, then the + publication and activation dates must be separated by at least this + much time. If the activation date is specified but the publication + date isn't, then the publication date will default to this much time + before the activation date; conversely, if the publication date is + specified but activation date isn't, then activation will be set to + this much time after publication. + + If the key is being created as an explicit successor to another key, + then the default prepublication interval is 30 days; otherwise it is + zero. + + As with date offsets, if the argument is followed by one of the + suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the interval is + measured in years, months, weeks, days, hours, or minutes, + respectively. Without a suffix, the interval is measured in seconds. + +Generated Keys +~~~~~~~~~~~~~~ + +When ``dnssec-keygen`` completes successfully, it prints a string of the +form ``Knnnn.+aaa+iiiii`` to the standard output. This is an +identification string for the key it has generated. + +- ``nnnn`` is the key name. + +- ``aaa`` is the numeric representation of the algorithm. + +- ``iiiii`` is the key identifier (or footprint). + +``dnssec-keygen`` creates two files, with names based on the printed +string. ``Knnnn.+aaa+iiiii.key`` contains the public key, and +``Knnnn.+aaa+iiiii.private`` contains the private key. + +The ``.key`` file contains a DNSKEY or KEY record. When a zone is being +signed by ``named`` or ``dnssec-signzone`` ``-S``, DNSKEY records are +included automatically. In other cases, the ``.key`` file can be +inserted into a zone file manually or with a ``$INCLUDE`` statement. + +The ``.private`` file contains algorithm-specific fields. For obvious +security reasons, this file does not have general read permission. + +Example +~~~~~~~ + +To generate an ECDSAP256SHA256 zone-signing key for the zone +``example.com``, issue the command: + +``dnssec-keygen -a ECDSAP256SHA256 example.com`` + +The command would print a string of the form: + +``Kexample.com.+013+26160`` + +In this example, ``dnssec-keygen`` creates the files +``Kexample.com.+013+26160.key`` and ``Kexample.com.+013+26160.private``. + +To generate a matching key-signing key, issue the command: + +``dnssec-keygen -a ECDSAP256SHA256 -f KSK example.com`` + +See Also +~~~~~~~~ + +:manpage:`dnssec-signzone(8)`, BIND 9 Administrator Reference Manual, :rfc:`2539`, +:rfc:`2845`, :rfc:`4034`. diff --git a/bin/dnssec/dnssec-revoke.8 b/bin/dnssec/dnssec-revoke.8 deleted file mode 100644 index 61d23f85e2..0000000000 --- a/bin/dnssec/dnssec-revoke.8 +++ /dev/null @@ -1,103 +0,0 @@ -.\" Copyright (C) 2009, 2011, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-revoke -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-01-15 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-REVOKE" "8" "2014\-01\-15" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-revoke \- set the REVOKED bit on a DNSSEC key -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-revoke\fR\ 'u -\fBdnssec\-revoke\fR [\fB\-hr\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-V\fR] [\fB\-K\ \fR\fB\fIdirectory\fR\fR] [\fB\-E\ \fR\fB\fIengine\fR\fR] [\fB\-f\fR] [\fB\-R\fR] {keyfile} -.SH "DESCRIPTION" -.PP -\fBdnssec\-revoke\fR -reads a DNSSEC key file, sets the REVOKED bit on the key as defined in RFC 5011, and creates a new pair of key files containing the now\-revoked key\&. -.SH "OPTIONS" -.PP -\-h -.RS 4 -Emit usage message and exit\&. -.RE -.PP -\-K \fIdirectory\fR -.RS 4 -Sets the directory in which the key files are to reside\&. -.RE -.PP -\-r -.RS 4 -After writing the new keyset files remove the original keyset files\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.PP -\-E \fIengine\fR -.RS 4 -Specifies the cryptographic hardware to use, when applicable\&. -.sp -When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module\&. When BIND is built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "\-\-with\-pkcs11"\&. -.RE -.PP -\-f -.RS 4 -Force overwrite: Causes -\fBdnssec\-revoke\fR -to write the new key pair even if a file already exists matching the algorithm and key ID of the revoked key\&. -.RE -.PP -\-R -.RS 4 -Print the key tag of the key with the REVOKE bit set but do not revoke the key\&. -.RE -.SH "SEE ALSO" -.PP -\fBdnssec-keygen\fR(8), -BIND 9 Administrator Reference Manual, -RFC 5011\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2011, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-revoke.docbook b/bin/dnssec/dnssec-revoke.docbook deleted file mode 100644 index 7a425830a7..0000000000 --- a/bin/dnssec/dnssec-revoke.docbook +++ /dev/null @@ -1,170 +0,0 @@ - - - - - - 2014-01-15 - - - ISC - Internet Systems Consortium, Inc. - - - - dnssec-revoke - 8 - BIND9 - - - - dnssec-revoke - set the REVOKED bit on a DNSSEC key - - - - - 2009 - 2011 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-revoke - - - - - - - - keyfile - - - - DESCRIPTION - - dnssec-revoke - reads a DNSSEC key file, sets the REVOKED bit on the key as defined - in RFC 5011, and creates a new pair of key files containing the - now-revoked key. - - - - OPTIONS - - - - - -h - - - Emit usage message and exit. - - - - - - -K directory - - - Sets the directory in which the key files are to reside. - - - - - - -r - - - After writing the new keyset files remove the original keyset - files. - - - - - - -v level - - - Sets the debugging level. - - - - - - -V - - - Prints version information. - - - - - - -E engine - - - Specifies the cryptographic hardware to use, when applicable. - - - When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". - - - - - - -f - - - Force overwrite: Causes dnssec-revoke to - write the new key pair even if a file already exists matching - the algorithm and key ID of the revoked key. - - - - - - -R - - - Print the key tag of the key with the REVOKE bit set but do - not revoke the key. - - - - - - - SEE ALSO - - - dnssec-keygen8 - , - BIND 9 Administrator Reference Manual, - RFC 5011. - - - - diff --git a/bin/dnssec/dnssec-revoke.html b/bin/dnssec/dnssec-revoke.html deleted file mode 100644 index 09d1d92066..0000000000 --- a/bin/dnssec/dnssec-revoke.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - -dnssec-revoke - - -
-
- - - - - -
-

Name

-

- dnssec-revoke - — set the REVOKED bit on a DNSSEC key -

-
- - - -
-

Synopsis

-

- dnssec-revoke - [-hr] - [-v level] - [-V] - [-K directory] - [-E engine] - [-f] - [-R] - {keyfile} -

-
- -
-

DESCRIPTION

- -

dnssec-revoke - reads a DNSSEC key file, sets the REVOKED bit on the key as defined - in RFC 5011, and creates a new pair of key files containing the - now-revoked key. -

-
- -
-

OPTIONS

- - -
-
-h
-
-

- Emit usage message and exit. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to reside. -

-
-
-r
-
-

- After writing the new keyset files remove the original keyset - files. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-f
-
-

- Force overwrite: Causes dnssec-revoke to - write the new key pair even if a file already exists matching - the algorithm and key ID of the revoked key. -

-
-
-R
-
-

- Print the key tag of the key with the REVOKE bit set but do - not revoke the key. -

-
-
-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - BIND 9 Administrator Reference Manual, - RFC 5011. -

-
- -
- diff --git a/bin/dnssec/dnssec-revoke.rst b/bin/dnssec/dnssec-revoke.rst new file mode 100644 index 0000000000..e81d2d51ac --- /dev/null +++ b/bin/dnssec/dnssec-revoke.rst @@ -0,0 +1,81 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-revoke: + +dnssec-revoke - set the REVOKED bit on a DNSSEC key +--------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`dnssec-revoke` [**-hr**] [**-v** level] [**-V**] [**-K** directory] [**-E** engine] [**-f**] [**-R**] {keyfile} + +Description +~~~~~~~~~~~ + +``dnssec-revoke`` reads a DNSSEC key file, sets the REVOKED bit on the +key as defined in :rfc:`5011`, and creates a new pair of key files +containing the now-revoked key. + +Options +~~~~~~~ + +**-h** + Emit usage message and exit. + +**-K** directory + Sets the directory in which the key files are to reside. + +**-r** + After writing the new keyset files remove the original keyset files. + +**-v** level + Sets the debugging level. + +**-V** + Prints version information. + +**-E** engine + Specifies the cryptographic hardware to use, when applicable. + + When BIND is built with OpenSSL PKCS#11 support, this defaults to the + string "pkcs11", which identifies an OpenSSL engine that can drive a + cryptographic accelerator or hardware service module. When BIND is + built with native PKCS#11 cryptography (--enable-native-pkcs11), it + defaults to the path of the PKCS#11 provider library specified via + "--with-pkcs11". + +**-f** + Force overwrite: Causes ``dnssec-revoke`` to write the new key pair + even if a file already exists matching the algorithm and key ID of + the revoked key. + +**-R** + Print the key tag of the key with the REVOKE bit set but do not + revoke the key. + +See Also +~~~~~~~~ + +:manpage:`dnssec-keygen(8)`, BIND 9 Administrator Reference Manual, :rfc:`5011`. diff --git a/bin/dnssec/dnssec-settime.8 b/bin/dnssec/dnssec-settime.8 deleted file mode 100644 index a63b50de0f..0000000000 --- a/bin/dnssec/dnssec-settime.8 +++ /dev/null @@ -1,255 +0,0 @@ -.\" Copyright (C) 2009-2011, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-settime -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2015-08-21 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-SETTIME" "8" "2015\-08\-21" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-settime \- set the key timing metadata for a DNSSEC key -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-settime\fR\ 'u -\fBdnssec\-settime\fR [\fB\-f\fR] [\fB\-K\ \fR\fB\fIdirectory\fR\fR] [\fB\-L\ \fR\fB\fIttl\fR\fR] [\fB\-P\ \fR\fB\fIdate/offset\fR\fR] [\fB\-P\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-A\ \fR\fB\fIdate/offset\fR\fR] [\fB\-R\ \fR\fB\fIdate/offset\fR\fR] [\fB\-I\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ \fR\fB\fIdate/offset\fR\fR] [\fB\-D\ sync\ \fR\fB\fIdate/offset\fR\fR] [\fB\-S\ \fR\fB\fIkey\fR\fR] [\fB\-i\ \fR\fB\fIinterval\fR\fR] [\fB\-h\fR] [\fB\-V\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-E\ \fR\fB\fIengine\fR\fR] [\fB\-s\fR] [\fB\-g\ \fR\fB\fIstate\fR\fR] [\fB\-d\ \fR\fB\fIstate\fR\fR\fB\ \fR\fB\fIdate/offset\fR\fR] [\fB\-k\ \fR\fB\fIstate\fR\fR\fB\ \fR\fB\fIdate/offset\fR\fR] [\fB\-r\ \fR\fB\fIstate\fR\fR\fB\ \fR\fB\fIdate/offset\fR\fR] [\fB\-z\ \fR\fB\fIstate\fR\fR\fB\ \fR\fB\fIdate/offset\fR\fR] {keyfile} -.SH "DESCRIPTION" -.PP -\fBdnssec\-settime\fR -reads a DNSSEC private key file and sets the key timing metadata as specified by the -\fB\-P\fR, -\fB\-A\fR, -\fB\-R\fR, -\fB\-I\fR, and -\fB\-D\fR -options\&. The metadata can then be used by -\fBdnssec\-signzone\fR -or other signing software to determine when a key is to be published, whether it should be used for signing a zone, etc\&. -.PP -If none of these options is set on the command line, then -\fBdnssec\-settime\fR -simply prints the key timing metadata already stored in the key\&. -.PP -When key metadata fields are changed, both files of a key pair (Knnnn\&.+aaa+iiiii\&.key -and -Knnnn\&.+aaa+iiiii\&.private) are regenerated\&. -.PP -Metadata fields are stored in the private file\&. A human\-readable description of the metadata is also placed in comments in the key file\&. The private file\*(Aqs permissions are always set to be inaccessible to anyone other than the owner (mode 0600)\&. -.PP -When working with state files, it is possible to update the timing metadata in those files as well with -\fB\-s\fR\&. If this option is used you can also update key states with -\fB\-d\fR -(DS), -\fB\-k\fR -(DNSKEY), -\fB\-r\fR -(RRSIG of KSK), or -\fB\-z\fR -(RRSIG of ZSK)\&. Allowed states are HIDDEN, RUMOURED, OMNIPRESENT, and UNRETENTIVE\&. -.PP -You can also set the goal state of the key with -\fB\-g\fR\&. This should be either HIDDEN or OMNIPRESENT (representing whether the key should be removed from the zone, or published)\&. -.PP -It is NOT RECOMMENDED to manipulate state files manually except for testing purposes\&. -.SH "OPTIONS" -.PP -\-f -.RS 4 -Force an update of an old\-format key with no metadata fields\&. Without this option, -\fBdnssec\-settime\fR -will fail when attempting to update a legacy key\&. With this option, the key will be recreated in the new format, but with the original key data retained\&. The key\*(Aqs creation date will be set to the present time\&. If no other values are specified, then the key\*(Aqs publication and activation dates will also be set to the present time\&. -.RE -.PP -\-K \fIdirectory\fR -.RS 4 -Sets the directory in which the key files are to reside\&. -.RE -.PP -\-L \fIttl\fR -.RS 4 -Sets the default TTL to use for this key when it is converted into a DNSKEY RR\&. If the key is imported into a zone, this is the TTL that will be used for it, unless there was already a DNSKEY RRset in place, in which case the existing TTL would take precedence\&. If this value is not set and there is no existing DNSKEY RRset, the TTL will default to the SOA TTL\&. Setting the default TTL to -0 -or -none -removes it from the key\&. -.RE -.PP -\-h -.RS 4 -Emit usage message and exit\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.PP -\-E \fIengine\fR -.RS 4 -Specifies the cryptographic hardware to use, when applicable\&. -.sp -When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module\&. When BIND is built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "\-\-with\-pkcs11"\&. -.RE -.SH "TIMING OPTIONS" -.PP -Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS\&. If the argument begins with a \*(Aq+\*(Aq or \*(Aq\-\*(Aq, it is interpreted as an offset from the present time\&. For convenience, if such an offset is followed by one of the suffixes \*(Aqy\*(Aq, \*(Aqmo\*(Aq, \*(Aqw\*(Aq, \*(Aqd\*(Aq, \*(Aqh\*(Aq, or \*(Aqmi\*(Aq, then the offset is computed in years (defined as 365 24\-hour days, ignoring leap years), months (defined as 30 24\-hour days), weeks, days, hours, or minutes, respectively\&. Without a suffix, the offset is computed in seconds\&. To unset a date, use \*(Aqnone\*(Aq or \*(Aqnever\*(Aq\&. -.PP -\-P \fIdate/offset\fR -.RS 4 -Sets the date on which a key is to be published to the zone\&. After that date, the key will be included in the zone but will not be used to sign it\&. -.RE -.PP -\-P sync \fIdate/offset\fR -.RS 4 -Sets the date on which CDS and CDNSKEY records that match this key are to be published to the zone\&. -.RE -.PP -\-A \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be activated\&. After that date, the key will be included in the zone and used to sign it\&. -.RE -.PP -\-R \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be revoked\&. After that date, the key will be flagged as revoked\&. It will be included in the zone and will be used to sign it\&. -.RE -.PP -\-I \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be retired\&. After that date, the key will still be included in the zone, but it will not be used to sign it\&. -.RE -.PP -\-D \fIdate/offset\fR -.RS 4 -Sets the date on which the key is to be deleted\&. After that date, the key will no longer be included in the zone\&. (It may remain in the key repository, however\&.) -.RE -.PP -\-D sync \fIdate/offset\fR -.RS 4 -Sets the date on which the CDS and CDNSKEY records that match this key are to be deleted\&. -.RE -.PP -\-S \fIpredecessor key\fR -.RS 4 -Select a key for which the key being modified will be an explicit successor\&. The name, algorithm, size, and type of the predecessor key must exactly match those of the key being modified\&. The activation date of the successor key will be set to the inactivation date of the predecessor\&. The publication date will be set to the activation date minus the prepublication interval, which defaults to 30 days\&. -.RE -.PP -\-i \fIinterval\fR -.RS 4 -Sets the prepublication interval for a key\&. If set, then the publication and activation dates must be separated by at least this much time\&. If the activation date is specified but the publication date isn\*(Aqt, then the publication date will default to this much time before the activation date; conversely, if the publication date is specified but activation date isn\*(Aqt, then activation will be set to this much time after publication\&. -.sp -If the key is being set to be an explicit successor to another key, then the default prepublication interval is 30 days; otherwise it is zero\&. -.sp -As with date offsets, if the argument is followed by one of the suffixes \*(Aqy\*(Aq, \*(Aqmo\*(Aq, \*(Aqw\*(Aq, \*(Aqd\*(Aq, \*(Aqh\*(Aq, or \*(Aqmi\*(Aq, then the interval is measured in years, months, weeks, days, hours, or minutes, respectively\&. Without a suffix, the interval is measured in seconds\&. -.RE -.SH "KEY STATE OPTIONS" -.PP -Known key states are HIDDEN, RUMOURED, OMNIPRESENT and UNRETENTIVE\&. These should not be set manually except for testing purposes\&. -.PP -\-s -.RS 4 -When setting key timing data, also update the state file\&. -.RE -.PP -\-g -.RS 4 -Set the goal state for this key\&. Must be HIDDEN or OMNIPRESENT\&. -.RE -.PP -\-d -.RS 4 -Set the DS state for this key, and when it was last changed\&. -.RE -.PP -\-k -.RS 4 -Set the DNSKEY state for this key, and when it was last changed\&. -.RE -.PP -\-r -.RS 4 -Set the RRSIG (KSK) state for this key, and when it was last changed\&. -.RE -.PP -\-z -.RS 4 -Set the RRSIG (ZSK) state for this key, and when it was last changed\&. -.RE -.SH "PRINTING OPTIONS" -.PP -\fBdnssec\-settime\fR -can also be used to print the timing metadata associated with a key\&. -.PP -\-u -.RS 4 -Print times in UNIX epoch format\&. -.RE -.PP -\-p \fIC/P/Psync/A/R/I/D/Dsync/all\fR -.RS 4 -Print a specific metadata value or set of metadata values\&. The -\fB\-p\fR -option may be followed by one or more of the following letters or strings to indicate which value or values to print: -\fBC\fR -for the creation date, -\fBP\fR -for the publication date, -\fBPsync\fR -for the CDS and CDNSKEY publication date, -\fBA\fR -for the activation date, -\fBR\fR -for the revocation date, -\fBI\fR -for the inactivation date, -\fBD\fR -for the deletion date, and -\fBDsync\fR -for the CDS and CDNSKEY deletion date To print all of the metadata, use -\fB\-p all\fR\&. -.RE -.SH "SEE ALSO" -.PP -\fBdnssec-keygen\fR(8), -\fBdnssec-signzone\fR(8), -BIND 9 Administrator Reference Manual, -RFC 5011\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009-2011, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-settime.docbook b/bin/dnssec/dnssec-settime.docbook deleted file mode 100644 index d3492bb635..0000000000 --- a/bin/dnssec/dnssec-settime.docbook +++ /dev/null @@ -1,470 +0,0 @@ - - - - - - 2015-08-21 - - - ISC - Internet Systems Consortium, Inc. - - - - dnssec-settime - 8 - BIND9 - - - - dnssec-settime - set the key timing metadata for a DNSSEC key - - - - - 2009 - 2010 - 2011 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-settime - - - - - - - - - - - - - - - - - - - - - - - keyfile - - - - DESCRIPTION - - dnssec-settime - reads a DNSSEC private key file and sets the key timing metadata - as specified by the , , - , , and - options. The metadata can then be used by - dnssec-signzone or other signing software to - determine when a key is to be published, whether it should be - used for signing a zone, etc. - - - If none of these options is set on the command line, - then dnssec-settime simply prints the key timing - metadata already stored in the key. - - - When key metadata fields are changed, both files of a key - pair (Knnnn.+aaa+iiiii.key and - Knnnn.+aaa+iiiii.private) are regenerated. - - - Metadata fields are stored in the private file. A human-readable - description of the metadata is also placed in comments in the key - file. The private file's permissions are always set to be - inaccessible to anyone other than the owner (mode 0600). - - - When working with state files, it is possible to update the timing - metadata in those files as well with . If this - option is used you can also update key states with - (DS), (DNSKEY), (RRSIG of KSK), - or (RRSIG of ZSK). Allowed states are HIDDEN, - RUMOURED, OMNIPRESENT, and UNRETENTIVE. - - - You can also set the goal state of the key with . - This should be either HIDDEN or OMNIPRESENT (representing whether the - key should be removed from the zone, or published). - - - It is NOT RECOMMENDED to manipulate state files manually except for - testing purposes. - - - - OPTIONS - - - - - -f - - - Force an update of an old-format key with no metadata fields. - Without this option, dnssec-settime will - fail when attempting to update a legacy key. With this option, - the key will be recreated in the new format, but with the - original key data retained. The key's creation date will be - set to the present time. If no other values are specified, - then the key's publication and activation dates will also - be set to the present time. - - - - - - -K directory - - - Sets the directory in which the key files are to reside. - - - - - - -L ttl - - - Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. If this value is not set and there - is no existing DNSKEY RRset, the TTL will default to the - SOA TTL. Setting the default TTL to 0 - or none removes it from the key. - - - - - - -h - - - Emit usage message and exit. - - - - - - -V - - - Prints version information. - - - - - - -v level - - - Sets the debugging level. - - - - - - -E engine - - - Specifies the cryptographic hardware to use, when applicable. - - - When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". - - - - - - - TIMING OPTIONS - - - Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To unset a date, use 'none' or 'never'. - - - - - -P date/offset - - - Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. - - - - - - -P sync date/offset - - - Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. - - - - - - -A date/offset - - - Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. - - - - - - -R date/offset - - - Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. - - - - - - -I date/offset - - - Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. - - - - - - -D date/offset - - - Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) - - - - - - -D sync date/offset - - - Sets the date on which the CDS and CDNSKEY records that match this - key are to be deleted. - - - - - - -S predecessor key - - - Select a key for which the key being modified will be an - explicit successor. The name, algorithm, size, and type of the - predecessor key must exactly match those of the key being - modified. The activation date of the successor key will be set - to the inactivation date of the predecessor. The publication - date will be set to the activation date minus the prepublication - interval, which defaults to 30 days. - - - - - - -i interval - - - Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. - - - If the key is being set to be an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. - - - As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. - - - - - - - KEY STATE OPTIONS - - - Known key states are HIDDEN, RUMOURED, OMNIPRESENT and UNRETENTIVE. - These should not be set manually except for testing purposes. - - - - - - -s - - - When setting key timing data, also update the state file. - - - - - - -g - - - Set the goal state for this key. Must be HIDDEN or OMNIPRESENT. - - - - - - -d - - - Set the DS state for this key, and when it was last changed. - - - - - - -k - - - Set the DNSKEY state for this key, and when it was last changed. - - - - - - -r - - - Set the RRSIG (KSK) state for this key, and when it was last - changed. - - - - - - -z - - - Set the RRSIG (ZSK) state for this key, and when it was last - changed. - - - - - - - - PRINTING OPTIONS - - - dnssec-settime can also be used to print the - timing metadata associated with a key. - - - - - -u - - - Print times in UNIX epoch format. - - - - - - -p C/P/Psync/A/R/I/D/Dsync/all - - - Print a specific metadata value or set of metadata values. - The option may be followed by one or more - of the following letters or strings to indicate which value - or values to print: - for the creation date, - for the publication date, - for the CDS and CDNSKEY publication date, - for the activation date, - for the revocation date, - for the inactivation date, - for the deletion date, and - for the CDS and CDNSKEY deletion date - To print all of the metadata, use . - - - - - - - - SEE ALSO - - - dnssec-keygen8 - , - - dnssec-signzone8 - , - BIND 9 Administrator Reference Manual, - RFC 5011. - - - - diff --git a/bin/dnssec/dnssec-settime.html b/bin/dnssec/dnssec-settime.html deleted file mode 100644 index fb549ebb4a..0000000000 --- a/bin/dnssec/dnssec-settime.html +++ /dev/null @@ -1,390 +0,0 @@ - - - - - -dnssec-settime - - -
-
- - - - - -
-

Name

-

- dnssec-settime - — set the key timing metadata for a DNSSEC key -

-
- - - -
-

Synopsis

-

- dnssec-settime - [-f] - [-K directory] - [-L ttl] - [-P date/offset] - [-P sync date/offset] - [-A date/offset] - [-R date/offset] - [-I date/offset] - [-D date/offset] - [-D sync date/offset] - [-S key] - [-i interval] - [-h] - [-V] - [-v level] - [-E engine] - [-s] - [-g state] - [-d state date/offset] - [-k state date/offset] - [-r state date/offset] - [-z state date/offset] - {keyfile} -

-
- -
-

DESCRIPTION

- -

dnssec-settime - reads a DNSSEC private key file and sets the key timing metadata - as specified by the -P, -A, - -R, -I, and -D - options. The metadata can then be used by - dnssec-signzone or other signing software to - determine when a key is to be published, whether it should be - used for signing a zone, etc. -

-

- If none of these options is set on the command line, - then dnssec-settime simply prints the key timing - metadata already stored in the key. -

-

- When key metadata fields are changed, both files of a key - pair (Knnnn.+aaa+iiiii.key and - Knnnn.+aaa+iiiii.private) are regenerated. -

-

- Metadata fields are stored in the private file. A human-readable - description of the metadata is also placed in comments in the key - file. The private file's permissions are always set to be - inaccessible to anyone other than the owner (mode 0600). -

-

- When working with state files, it is possible to update the timing - metadata in those files as well with -s. If this - option is used you can also update key states with -d - (DS), -k (DNSKEY), -r (RRSIG of KSK), - or -z (RRSIG of ZSK). Allowed states are HIDDEN, - RUMOURED, OMNIPRESENT, and UNRETENTIVE. -

-

- You can also set the goal state of the key with -g. - This should be either HIDDEN or OMNIPRESENT (representing whether the - key should be removed from the zone, or published). -

-

- It is NOT RECOMMENDED to manipulate state files manually except for - testing purposes. -

-
- -
-

OPTIONS

- - -
-
-f
-
-

- Force an update of an old-format key with no metadata fields. - Without this option, dnssec-settime will - fail when attempting to update a legacy key. With this option, - the key will be recreated in the new format, but with the - original key data retained. The key's creation date will be - set to the present time. If no other values are specified, - then the key's publication and activation dates will also - be set to the present time. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to reside. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. If this value is not set and there - is no existing DNSKEY RRset, the TTL will default to the - SOA TTL. Setting the default TTL to 0 - or none removes it from the key. -

-
-
-h
-
-

- Emit usage message and exit. -

-
-
-V
-
-

- Prints version information. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-
- -
-

TIMING OPTIONS

- -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To unset a date, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. -

-
-
-P sync date/offset
-
-

- Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. -

-
-
-A date/offset
-
-

- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. -

-
-
-R date/offset
-
-

- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -

-
-
-I date/offset
-
-

- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records that match this - key are to be deleted. -

-
-
-S predecessor key
-
-

- Select a key for which the key being modified will be an - explicit successor. The name, algorithm, size, and type of the - predecessor key must exactly match those of the key being - modified. The activation date of the successor key will be set - to the inactivation date of the predecessor. The publication - date will be set to the activation date minus the prepublication - interval, which defaults to 30 days. -

-
-
-i interval
-
-

- Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. -

-

- If the key is being set to be an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. -

-

- As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. -

-
-
-
- -
-

KEY STATE OPTIONS

- -

- Known key states are HIDDEN, RUMOURED, OMNIPRESENT and UNRETENTIVE. - These should not be set manually except for testing purposes. -

- -
-
-s
-
-

- When setting key timing data, also update the state file. -

-
-
-g
-
-

- Set the goal state for this key. Must be HIDDEN or OMNIPRESENT. -

-
-
-d
-
-

- Set the DS state for this key, and when it was last changed. -

-
-
-k
-
-

- Set the DNSKEY state for this key, and when it was last changed. -

-
-
-r
-
-

- Set the RRSIG (KSK) state for this key, and when it was last - changed. -

-
-
-z
-
-

- Set the RRSIG (ZSK) state for this key, and when it was last - changed. -

-
-
-
- -
-

PRINTING OPTIONS

- -

- dnssec-settime can also be used to print the - timing metadata associated with a key. -

- -
-
-u
-
-

- Print times in UNIX epoch format. -

-
-
-p C/P/Psync/A/R/I/D/Dsync/all
-
-

- Print a specific metadata value or set of metadata values. - The -p option may be followed by one or more - of the following letters or strings to indicate which value - or values to print: - C for the creation date, - P for the publication date, - Psync for the CDS and CDNSKEY publication date, - A for the activation date, - R for the revocation date, - I for the inactivation date, - D for the deletion date, and - Dsync for the CDS and CDNSKEY deletion date - To print all of the metadata, use -p all. -

-
-
-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 5011. -

-
- -
- diff --git a/bin/dnssec/dnssec-settime.rst b/bin/dnssec/dnssec-settime.rst new file mode 100644 index 0000000000..e09947e3d0 --- /dev/null +++ b/bin/dnssec/dnssec-settime.rst @@ -0,0 +1,230 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-settime: + +dnssec-settime: set the key timing metadata for a DNSSEC key +------------------------------------------------------------ + +Synopsis +~~~~~~~~ + +:program:`dnssec-settime` [**-f**] [**-K** directory] [**-L** ttl] [**-P** date/offset] [**-P** sync date/offset] [**-A** date/offset] [**-R** date/offset] [**-I** date/offset] [**-D** date/offset] [**-D** sync date/offset] [**-S** key] [**-i** interval] [**-h**] [**-V**] [**-v** level] [**-E** engine] {keyfile} [**-s**] [**-g** state] [**-d** state date/offset] [**-k** state date/offset] [**-r** state date/offset] [**-z** state date/offset] + +Description +~~~~~~~~~~~ + +``dnssec-settime`` reads a DNSSEC private key file and sets the key +timing metadata as specified by the ``-P``, ``-A``, ``-R``, ``-I``, and +``-D`` options. The metadata can then be used by ``dnssec-signzone`` or +other signing software to determine when a key is to be published, +whether it should be used for signing a zone, etc. + +If none of these options is set on the command line, then +``dnssec-settime`` simply prints the key timing metadata already stored +in the key. + +When key metadata fields are changed, both files of a key pair +(``Knnnn.+aaa+iiiii.key`` and ``Knnnn.+aaa+iiiii.private``) are +regenerated. + +Metadata fields are stored in the private file. A +human-readable description of the metadata is also placed in comments in +the key file. The private file's permissions are always set to be +inaccessible to anyone other than the owner (mode 0600). + +When working with state files, it is possible to update the timing metadata in +those files as well with ``-s``. If this option is used you can also update key +states with ``-d`` (DS), ``-k`` (DNSKEY), ``-r`` (RRSIG of KSK), or ``-z`` +(RRSIG of ZSK). Allowed states are HIDDEN, RUMOURED, OMNIPRESENT, and +UNRETENTIVE. + +You can also set the goal state of the key with ``-g``. This should be either +HIDDEN or OMNIPRESENT (representing whether the key should be removed from the +zone, or published). + +It is NOT RECOMMENDED to manipulate state files manually except for testing +purposes. + +Options +~~~~~~~ + +**-f** + Force an update of an old-format key with no metadata fields. Without + this option, ``dnssec-settime`` will fail when attempting to update a + legacy key. With this option, the key will be recreated in the new + format, but with the original key data retained. The key's creation + date will be set to the present time. If no other values are + specified, then the key's publication and activation dates will also + be set to the present time. + +**-K** directory + Sets the directory in which the key files are to reside. + +**-L** ttl + Sets the default TTL to use for this key when it is converted into a + DNSKEY RR. If the key is imported into a zone, this is the TTL that + will be used for it, unless there was already a DNSKEY RRset in + place, in which case the existing TTL would take precedence. If this + value is not set and there is no existing DNSKEY RRset, the TTL will + default to the SOA TTL. Setting the default TTL to ``0`` or ``none`` + removes it from the key. + +**-h** + Emit usage message and exit. + +**-V** + Prints version information. + +**-v** level + Sets the debugging level. + +**-E** engine + Specifies the cryptographic hardware to use, when applicable. + + When BIND is built with OpenSSL PKCS#11 support, this defaults to the + string "pkcs11", which identifies an OpenSSL engine that can drive a + cryptographic accelerator or hardware service module. When BIND is + built with native PKCS#11 cryptography (--enable-native-pkcs11), it + defaults to the path of the PKCS#11 provider library specified via + "--with-pkcs11". + +Timing Options +~~~~~~~~~~~~~~ + +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a '+' or '-', it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the offset is +computed in years (defined as 365 24-hour days, ignoring leap years), +months (defined as 30 24-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +unset a date, use 'none' or 'never'. + +**-P** date/offset + Sets the date on which a key is to be published to the zone. After + that date, the key will be included in the zone but will not be used + to sign it. + +**-P** sync date/offset + Sets the date on which CDS and CDNSKEY records that match this key + are to be published to the zone. + +**-A** date/offset + Sets the date on which the key is to be activated. After that date, + the key will be included in the zone and used to sign it. + +**-R** date/offset + Sets the date on which the key is to be revoked. After that date, the + key will be flagged as revoked. It will be included in the zone and + will be used to sign it. + +**-I** date/offset + Sets the date on which the key is to be retired. After that date, the + key will still be included in the zone, but it will not be used to + sign it. + +**-D** date/offset + Sets the date on which the key is to be deleted. After that date, the + key will no longer be included in the zone. (It may remain in the key + repository, however.) + +**-D** sync date/offset + Sets the date on which the CDS and CDNSKEY records that match this + key are to be deleted. + +**-S** predecessor key + Select a key for which the key being modified will be an explicit + successor. The name, algorithm, size, and type of the predecessor key + must exactly match those of the key being modified. The activation + date of the successor key will be set to the inactivation date of the + predecessor. The publication date will be set to the activation date + minus the prepublication interval, which defaults to 30 days. + +**-i** interval + Sets the prepublication interval for a key. If set, then the + publication and activation dates must be separated by at least this + much time. If the activation date is specified but the publication + date isn't, then the publication date will default to this much time + before the activation date; conversely, if the publication date is + specified but activation date isn't, then activation will be set to + this much time after publication. + + If the key is being set to be an explicit successor to another key, + then the default prepublication interval is 30 days; otherwise it is + zero. + + As with date offsets, if the argument is followed by one of the + suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the interval is + measured in years, months, weeks, days, hours, or minutes, + respectively. Without a suffix, the interval is measured in seconds. + +Key State Options +~~~~~~~~~~~~~~~~~ + +Known key states are HIDDEN, RUMOURED, OMNIPRESENT and UNRETENTIVE. These should +not be set manually except for testing purposes. + +``-s`` + When setting key timing data, also update the state file. + +``-g`` + Set the goal state for this key. Must be HIDDEN or OMNIPRESENT. + +``-d`` + Set the DS state for this key, and when it was last changed. + +``-k`` + Set the DNSKEY state for this key, and when it was last changed. + +``-r`` + Set the RRSIG (KSK) state for this key, and when it was last changed. + +``-z`` + + Set the RRSIG (ZSK) state for this key, and when it was last changed. + +Printing Options +~~~~~~~~~~~~~~~~ + +``dnssec-settime`` can also be used to print the timing metadata +associated with a key. + +**-u** + Print times in UNIX epoch format. + +**-p** C/P/Psync/A/R/I/D/Dsync/all + Print a specific metadata value or set of metadata values. The ``-p`` + option may be followed by one or more of the following letters or + strings to indicate which value or values to print: ``C`` for the + creation date, ``P`` for the publication date, ``Psync`` for the CDS + and CDNSKEY publication date, ``A`` for the activation date, ``R`` + for the revocation date, ``I`` for the inactivation date, ``D`` for + the deletion date, and ``Dsync`` for the CDS and CDNSKEY deletion + date To print all of the metadata, use ``-p all``. + +See Also +~~~~~~~~ + +:manpage:`dnssec-keygen(8)`, :manpage:`dnssec-signzone(8)`, BIND 9 Administrator Reference Manual, +:rfc:`5011`. diff --git a/bin/dnssec/dnssec-signzone.8 b/bin/dnssec/dnssec-signzone.8 deleted file mode 100644 index 4967e05e81..0000000000 --- a/bin/dnssec/dnssec-signzone.8 +++ /dev/null @@ -1,474 +0,0 @@ -.\" Copyright (C) 2000-2009, 2011-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-signzone -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-02-18 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-SIGNZONE" "8" "2014\-02\-18" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-signzone \- DNSSEC zone signing tool -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-signzone\fR\ 'u -\fBdnssec\-signzone\fR [\fB\-a\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-d\ \fR\fB\fIdirectory\fR\fR] [\fB\-D\fR] [\fB\-E\ \fR\fB\fIengine\fR\fR] [\fB\-e\ \fR\fB\fIend\-time\fR\fR] [\fB\-f\ \fR\fB\fIoutput\-file\fR\fR] [\fB\-g\fR] [\fB\-h\fR] [\fB\-i\ \fR\fB\fIinterval\fR\fR] [\fB\-I\ \fR\fB\fIinput\-format\fR\fR] [\fB\-j\ \fR\fB\fIjitter\fR\fR] [\fB\-K\ \fR\fB\fIdirectory\fR\fR] [\fB\-k\ \fR\fB\fIkey\fR\fR] [\fB\-L\ \fR\fB\fIserial\fR\fR] [\fB\-l\ \fR\fB\fIdomain\fR\fR] [\fB\-M\ \fR\fB\fImaxttl\fR\fR] [\fB\-N\ \fR\fB\fIsoa\-serial\-format\fR\fR] [\fB\-o\ \fR\fB\fIorigin\fR\fR] [\fB\-O\ \fR\fB\fIoutput\-format\fR\fR] [\fB\-P\fR] [\fB\-Q\fR] [\fB\-q\fR] [\fB\-R\fR] [\fB\-S\fR] [\fB\-s\ \fR\fB\fIstart\-time\fR\fR] [\fB\-T\ \fR\fB\fIttl\fR\fR] [\fB\-t\fR] [\fB\-u\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-V\fR] [\fB\-X\ \fR\fB\fIextended\ end\-time\fR\fR] [\fB\-x\fR] [\fB\-z\fR] [\fB\-3\ \fR\fB\fIsalt\fR\fR] [\fB\-H\ \fR\fB\fIiterations\fR\fR] [\fB\-A\fR] {zonefile} [key...] -.SH "DESCRIPTION" -.PP -\fBdnssec\-signzone\fR -signs a zone\&. It generates NSEC and RRSIG records and produces a signed version of the zone\&. The security status of delegations from the signed zone (that is, whether the child zones are secure or not) is determined by the presence or absence of a -keyset -file for each child zone\&. -.SH "OPTIONS" -.PP -\-a -.RS 4 -Verify all generated signatures\&. -.RE -.PP -\-c \fIclass\fR -.RS 4 -Specifies the DNS class of the zone\&. -.RE -.PP -\-C -.RS 4 -Compatibility mode: Generate a -keyset\-\fIzonename\fR -file in addition to -dsset\-\fIzonename\fR -when signing a zone, for use by older versions of -\fBdnssec\-signzone\fR\&. -.RE -.PP -\-d \fIdirectory\fR -.RS 4 -Look for -dsset\- -or -keyset\- -files in -\fBdirectory\fR\&. -.RE -.PP -\-D -.RS 4 -Output only those record types automatically managed by -\fBdnssec\-signzone\fR, i\&.e\&. RRSIG, NSEC, NSEC3 and NSEC3PARAM records\&. If smart signing (\fB\-S\fR) is used, DNSKEY records are also included\&. The resulting file can be included in the original zone file with -\fB$INCLUDE\fR\&. This option cannot be combined with -\fB\-O raw\fR, -\fB\-O map\fR, or serial number updating\&. -.RE -.PP -\-E \fIengine\fR -.RS 4 -When applicable, specifies the hardware to use for cryptographic operations, such as a secure key store used for signing\&. -.sp -When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module\&. When BIND is built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "\-\-with\-pkcs11"\&. -.RE -.PP -\-g -.RS 4 -Generate DS records for child zones from -dsset\- -or -keyset\- -file\&. Existing DS records will be removed\&. -.RE -.PP -\-K \fIdirectory\fR -.RS 4 -Key repository: Specify a directory to search for DNSSEC keys\&. If not specified, defaults to the current directory\&. -.RE -.PP -\-k \fIkey\fR -.RS 4 -Treat specified key as a key signing key ignoring any key flags\&. This option may be specified multiple times\&. -.RE -.PP -\-M \fImaxttl\fR -.RS 4 -Sets the maximum TTL for the signed zone\&. Any TTL higher than -\fImaxttl\fR -in the input zone will be reduced to -\fImaxttl\fR -in the output\&. This provides certainty as to the largest possible TTL in the signed zone, which is useful to know when rolling keys because it is the longest possible time before signatures that have been retrieved by resolvers will expire from resolver caches\&. Zones that are signed with this option should be configured to use a matching -\fBmax\-zone\-ttl\fR -in -named\&.conf\&. (Note: This option is incompatible with -\fB\-D\fR, because it modifies non\-DNSSEC data in the output zone\&.) -.RE -.PP -\-s \fIstart\-time\fR -.RS 4 -Specify the date and time when the generated RRSIG records become valid\&. This can be either an absolute or relative time\&. An absolute start time is indicated by a number in YYYYMMDDHHMMSS notation; 20000530144500 denotes 14:45:00 UTC on May 30th, 2000\&. A relative start time is indicated by +N, which is N seconds from the current time\&. If no -\fBstart\-time\fR -is specified, the current time minus 1 hour (to allow for clock skew) is used\&. -.RE -.PP -\-e \fIend\-time\fR -.RS 4 -Specify the date and time when the generated RRSIG records expire\&. As with -\fBstart\-time\fR, an absolute time is indicated in YYYYMMDDHHMMSS notation\&. A time relative to the start time is indicated with +N, which is N seconds from the start time\&. A time relative to the current time is indicated with now+N\&. If no -\fBend\-time\fR -is specified, 30 days from the start time is used as a default\&. -\fBend\-time\fR -must be later than -\fBstart\-time\fR\&. -.RE -.PP -\-X \fIextended end\-time\fR -.RS 4 -Specify the date and time when the generated RRSIG records for the DNSKEY RRset will expire\&. This is to be used in cases when the DNSKEY signatures need to persist longer than signatures on other records; e\&.g\&., when the private component of the KSK is kept offline and the KSK signature is to be refreshed manually\&. -.sp -As with -\fBstart\-time\fR, an absolute time is indicated in YYYYMMDDHHMMSS notation\&. A time relative to the start time is indicated with +N, which is N seconds from the start time\&. A time relative to the current time is indicated with now+N\&. If no -\fBextended end\-time\fR -is specified, the value of -\fBend\-time\fR -is used as the default\&. (\fBend\-time\fR, in turn, defaults to 30 days from the start time\&.) -\fBextended end\-time\fR -must be later than -\fBstart\-time\fR\&. -.RE -.PP -\-f \fIoutput\-file\fR -.RS 4 -The name of the output file containing the signed zone\&. The default is to append -\&.signed -to the input filename\&. If -\fBoutput\-file\fR -is set to -"\-", then the signed zone is written to the standard output, with a default output format of "full"\&. -.RE -.PP -\-h -.RS 4 -Prints a short summary of the options and arguments to -\fBdnssec\-signzone\fR\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.PP -\-i \fIinterval\fR -.RS 4 -When a previously\-signed zone is passed as input, records may be resigned\&. The -\fBinterval\fR -option specifies the cycle interval as an offset from the current time (in seconds)\&. If a RRSIG record expires after the cycle interval, it is retained\&. Otherwise, it is considered to be expiring soon, and it will be replaced\&. -.sp -The default cycle interval is one quarter of the difference between the signature end and start times\&. So if neither -\fBend\-time\fR -or -\fBstart\-time\fR -are specified, -\fBdnssec\-signzone\fR -generates signatures that are valid for 30 days, with a cycle interval of 7\&.5 days\&. Therefore, if any existing RRSIG records are due to expire in less than 7\&.5 days, they would be replaced\&. -.RE -.PP -\-I \fIinput\-format\fR -.RS 4 -The format of the input zone file\&. Possible formats are -\fB"text"\fR -(default), -\fB"raw"\fR, and -\fB"map"\fR\&. This option is primarily intended to be used for dynamic signed zones so that the dumped zone file in a non\-text format containing updates can be signed directly\&. The use of this option does not make much sense for non\-dynamic zones\&. -.RE -.PP -\-j \fIjitter\fR -.RS 4 -When signing a zone with a fixed signature lifetime, all RRSIG records issued at the time of signing expires simultaneously\&. If the zone is incrementally signed, i\&.e\&. a previously\-signed zone is passed as input to the signer, all expired signatures have to be regenerated at about the same time\&. The -\fBjitter\fR -option specifies a jitter window that will be used to randomize the signature expire time, thus spreading incremental signature regeneration over time\&. -.sp -Signature lifetime jitter also to some extent benefits validators and servers by spreading out cache expiration, i\&.e\&. if large numbers of RRSIGs don\*(Aqt expire at the same time from all caches there will be less congestion than if all validators need to refetch at mostly the same time\&. -.RE -.PP -\-L \fIserial\fR -.RS 4 -When writing a signed zone to "raw" or "map" format, set the "source serial" value in the header to the specified serial number\&. (This is expected to be used primarily for testing purposes\&.) -.RE -.PP -\-n \fIncpus\fR -.RS 4 -Specifies the number of threads to use\&. By default, one thread is started for each detected CPU\&. -.RE -.PP -\-N \fIsoa\-serial\-format\fR -.RS 4 -The SOA serial number format of the signed zone\&. Possible formats are -\fB"keep"\fR -(default), -\fB"increment"\fR, -\fB"unixtime"\fR, and -\fB"date"\fR\&. -.PP -\fB"keep"\fR -.RS 4 -Do not modify the SOA serial number\&. -.RE -.PP -\fB"increment"\fR -.RS 4 -Increment the SOA serial number using RFC 1982 arithmetic\&. -.RE -.PP -\fB"unixtime"\fR -.RS 4 -Set the SOA serial number to the number of seconds since epoch\&. -.RE -.PP -\fB"date"\fR -.RS 4 -Set the SOA serial number to today\*(Aqs date in YYYYMMDDNN format\&. -.RE -.RE -.PP -\-o \fIorigin\fR -.RS 4 -The zone origin\&. If not specified, the name of the zone file is assumed to be the origin\&. -.RE -.PP -\-O \fIoutput\-format\fR -.RS 4 -The format of the output file containing the signed zone\&. Possible formats are -\fB"text"\fR -(default), which is the standard textual representation of the zone; -\fB"full"\fR, which is text output in a format suitable for processing by external scripts; and -\fB"map"\fR, -\fB"raw"\fR, and -\fB"raw=N"\fR, which store the zone in binary formats for rapid loading by -\fBnamed\fR\&. -\fB"raw=N"\fR -specifies the format version of the raw zone file: if N is 0, the raw file can be read by any version of -\fBnamed\fR; if N is 1, the file can be read by release 9\&.9\&.0 or higher; the default is 1\&. -.RE -.PP -\-P -.RS 4 -Disable post sign verification tests\&. -.sp -The post sign verification test ensures that for each algorithm in use there is at least one non revoked self signed KSK key, that all revoked KSK keys are self signed, and that all records in the zone are signed by the algorithm\&. This option skips these tests\&. -.RE -.PP -\-Q -.RS 4 -Remove signatures from keys that are no longer active\&. -.sp -Normally, when a previously\-signed zone is passed as input to the signer, and a DNSKEY record has been removed and replaced with a new one, signatures from the old key that are still within their validity period are retained\&. This allows the zone to continue to validate with cached copies of the old DNSKEY RRset\&. The -\fB\-Q\fR -forces -\fBdnssec\-signzone\fR -to remove signatures from keys that are no longer active\&. This enables ZSK rollover using the procedure described in RFC 4641, section 4\&.2\&.1\&.1 ("Pre\-Publish Key Rollover")\&. -.RE -.PP -\-q -.RS 4 -Quiet mode: Suppresses unnecessary output\&. Without this option, when -\fBdnssec\-signzone\fR -is run it will print to standard output the number of keys in use, the algorithms used to verify the zone was signed correctly and other status information, and finally the filename containing the signed zone\&. With it, that output is suppressed, leaving only the filename\&. -.RE -.PP -\-R -.RS 4 -Remove signatures from keys that are no longer published\&. -.sp -This option is similar to -\fB\-Q\fR, except it forces -\fBdnssec\-signzone\fR -to signatures from keys that are no longer published\&. This enables ZSK rollover using the procedure described in RFC 4641, section 4\&.2\&.1\&.2 ("Double Signature Zone Signing Key Rollover")\&. -.RE -.PP -\-S -.RS 4 -Smart signing: Instructs -\fBdnssec\-signzone\fR -to search the key repository for keys that match the zone being signed, and to include them in the zone if appropriate\&. -.sp -When a key is found, its timing metadata is examined to determine how it should be used, according to the following rules\&. Each successive rule takes priority over the prior ones: -.PP -.RS 4 -If no timing metadata has been set for the key, the key is published in the zone and used to sign the zone\&. -.RE -.PP -.RS 4 -If the key\*(Aqs publication date is set and is in the past, the key is published in the zone\&. -.RE -.PP -.RS 4 -If the key\*(Aqs activation date is set and in the past, the key is published (regardless of publication date) and used to sign the zone\&. -.RE -.PP -.RS 4 -If the key\*(Aqs revocation date is set and in the past, and the key is published, then the key is revoked, and the revoked key is used to sign the zone\&. -.RE -.PP -.RS 4 -If either of the key\*(Aqs unpublication or deletion dates are set and in the past, the key is NOT published or used to sign the zone, regardless of any other metadata\&. -.RE -.PP -.RS 4 -If key\*(Aqs sync publication date is set and in the past, synchronization records (type CDS and/or CDNSKEY) are created\&. -.RE -.PP -.RS 4 -If key\*(Aqs sync deletion date is set and in the past, synchronization records (type CDS and/or CDNSKEY) are removed\&. -.RE -.RE -.PP -\-T \fIttl\fR -.RS 4 -Specifies a TTL to be used for new DNSKEY records imported into the zone from the key repository\&. If not specified, the default is the TTL value from the zone\*(Aqs SOA record\&. This option is ignored when signing without -\fB\-S\fR, since DNSKEY records are not imported from the key repository in that case\&. It is also ignored if there are any pre\-existing DNSKEY records at the zone apex, in which case new records\*(Aq TTL values will be set to match them, or if any of the imported DNSKEY records had a default TTL value\&. In the event of a a conflict between TTL values in imported keys, the shortest one is used\&. -.RE -.PP -\-t -.RS 4 -Print statistics at completion\&. -.RE -.PP -\-u -.RS 4 -Update NSEC/NSEC3 chain when re\-signing a previously signed zone\&. With this option, a zone signed with NSEC can be switched to NSEC3, or a zone signed with NSEC3 can be switch to NSEC or to NSEC3 with different parameters\&. Without this option, -\fBdnssec\-signzone\fR -will retain the existing chain when re\-signing\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.PP -\-x -.RS 4 -Only sign the DNSKEY, CDNSKEY, and CDS RRsets with key\-signing keys, and omit signatures from zone\-signing keys\&. (This is similar to the -\fBdnssec\-dnskey\-kskonly yes;\fR -zone option in -\fBnamed\fR\&.) -.RE -.PP -\-z -.RS 4 -Ignore KSK flag on key when determining what to sign\&. This causes KSK\-flagged keys to sign all records, not just the DNSKEY RRset\&. (This is similar to the -\fBupdate\-check\-ksk no;\fR -zone option in -\fBnamed\fR\&.) -.RE -.PP -\-3 \fIsalt\fR -.RS 4 -Generate an NSEC3 chain with the given hex encoded salt\&. A dash (\fIsalt\fR) can be used to indicate that no salt is to be used when generating the NSEC3 chain\&. -.RE -.PP -\-H \fIiterations\fR -.RS 4 -When generating an NSEC3 chain, use this many iterations\&. The default is 10\&. -.RE -.PP -\-A -.RS 4 -When generating an NSEC3 chain set the OPTOUT flag on all NSEC3 records and do not generate NSEC3 records for insecure delegations\&. -.sp -Using this option twice (i\&.e\&., -\fB\-AA\fR) turns the OPTOUT flag off for all records\&. This is useful when using the -\fB\-u\fR -option to modify an NSEC3 chain which previously had OPTOUT set\&. -.RE -.PP -zonefile -.RS 4 -The file containing the zone to be signed\&. -.RE -.PP -key -.RS 4 -Specify which keys should be used to sign the zone\&. If no keys are specified, then the zone will be examined for DNSKEY records at the zone apex\&. If these are found and there are matching private keys, in the current directory, then these will be used for signing\&. -.RE -.SH "EXAMPLE" -.PP -The following command signs the -\fBexample\&.com\fR -zone with the ECDSAP256SHA256 key generated by key generated by -\fBdnssec\-keygen\fR -(Kexample\&.com\&.+013+17247)\&. Because the -\fB\-S\fR -option is not being used, the zone\*(Aqs keys must be in the master file (db\&.example\&.com)\&. This invocation looks for -dsset -files, in the current directory, so that DS records can be imported from them (\fB\-g\fR)\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -% dnssec\-signzone \-g \-o example\&.com db\&.example\&.com \e -Kexample\&.com\&.+013+17247 -db\&.example\&.com\&.signed -% -.fi -.if n \{\ -.RE -.\} -.PP -In the above example, -\fBdnssec\-signzone\fR -creates the file -db\&.example\&.com\&.signed\&. This file should be referenced in a zone statement in a -named\&.conf -file\&. -.PP -This example re\-signs a previously signed zone with default parameters\&. The private keys are assumed to be in the current directory\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -% cp db\&.example\&.com\&.signed db\&.example\&.com -% dnssec\-signzone \-o example\&.com db\&.example\&.com -db\&.example\&.com\&.signed -% -.fi -.if n \{\ -.RE -.\} -.SH "SEE ALSO" -.PP -\fBdnssec-keygen\fR(8), -BIND 9 Administrator Reference Manual, -RFC 4033, -RFC 4641\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000-2009, 2011-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-signzone.docbook b/bin/dnssec/dnssec-signzone.docbook deleted file mode 100644 index 262ab2ff86..0000000000 --- a/bin/dnssec/dnssec-signzone.docbook +++ /dev/null @@ -1,837 +0,0 @@ - - - - - - 2014-02-18 - - - ISC - Internet Systems Consortium, Inc. - - - - dnssec-signzone - 8 - BIND9 - - - - dnssec-signzone - DNSSEC zone signing tool - - - - - 2000 - 2001 - 2002 - 2003 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-signzone - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - zonefile - key - - - - DESCRIPTION - - dnssec-signzone - signs a zone. It generates - NSEC and RRSIG records and produces a signed version of the - zone. The security status of delegations from the signed zone - (that is, whether the child zones are secure or not) is - determined by the presence or absence of a - keyset file for each child zone. - - - - OPTIONS - - - - - -a - - - Verify all generated signatures. - - - - - - -c class - - - Specifies the DNS class of the zone. - - - - - - -C - - - Compatibility mode: Generate a - keyset-zonename - file in addition to - dsset-zonename - when signing a zone, for use by older versions of - dnssec-signzone. - - - - - - -d directory - - - Look for dsset- or - keyset- files in . - - - - - - -D - - - Output only those record types automatically managed by - dnssec-signzone, i.e. RRSIG, NSEC, - NSEC3 and NSEC3PARAM records. If smart signing - () is used, DNSKEY records are also - included. The resulting file can be included in the original - zone file with $INCLUDE. This option - cannot be combined with , - , or serial number updating. - - - - - - -E engine - - - When applicable, specifies the hardware to use for - cryptographic operations, such as a secure key store used - for signing. - - - When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". - - - - - - -g - - - Generate DS records for child zones from - dsset- or keyset- - file. Existing DS records will be removed. - - - - - - -K directory - - - Key repository: Specify a directory to search for DNSSEC keys. - If not specified, defaults to the current directory. - - - - - - -k key - - - Treat specified key as a key signing key ignoring any - key flags. This option may be specified multiple times. - - - - - - -M maxttl - - - Sets the maximum TTL for the signed zone. - Any TTL higher than maxttl in the - input zone will be reduced to maxttl - in the output. This provides certainty as to the largest - possible TTL in the signed zone, which is useful to know when - rolling keys because it is the longest possible time before - signatures that have been retrieved by resolvers will expire - from resolver caches. Zones that are signed with this - option should be configured to use a matching - in named.conf. - (Note: This option is incompatible with , - because it modifies non-DNSSEC data in the output zone.) - - - - - - -s start-time - - - Specify the date and time when the generated RRSIG records - become valid. This can be either an absolute or relative - time. An absolute start time is indicated by a number - in YYYYMMDDHHMMSS notation; 20000530144500 denotes - 14:45:00 UTC on May 30th, 2000. A relative start time is - indicated by +N, which is N seconds from the current time. - If no is specified, the current - time minus 1 hour (to allow for clock skew) is used. - - - - - - -e end-time - - - Specify the date and time when the generated RRSIG records - expire. As with , an absolute - time is indicated in YYYYMMDDHHMMSS notation. A time relative - to the start time is indicated with +N, which is N seconds from - the start time. A time relative to the current time is - indicated with now+N. If no is - specified, 30 days from the start time is used as a default. - must be later than - . - - - - - - -X extended end-time - - - Specify the date and time when the generated RRSIG records - for the DNSKEY RRset will expire. This is to be used in cases - when the DNSKEY signatures need to persist longer than - signatures on other records; e.g., when the private component - of the KSK is kept offline and the KSK signature is to be - refreshed manually. - - - As with , an absolute - time is indicated in YYYYMMDDHHMMSS notation. A time relative - to the start time is indicated with +N, which is N seconds from - the start time. A time relative to the current time is - indicated with now+N. If no is - specified, the value of is used as - the default. (, in turn, defaults to - 30 days from the start time.) - must be later than . - - - - - - -f output-file - - - The name of the output file containing the signed zone. The - default is to append .signed to - the input filename. If is - set to "-", then the signed zone is - written to the standard output, with a default output - format of "full". - - - - - - -h - - - Prints a short summary of the options and arguments to - dnssec-signzone. - - - - - - -V - - - Prints version information. - - - - - - -i interval - - - When a previously-signed zone is passed as input, records - may be resigned. The option - specifies the cycle interval as an offset from the current - time (in seconds). If a RRSIG record expires after the - cycle interval, it is retained. Otherwise, it is considered - to be expiring soon, and it will be replaced. - - - The default cycle interval is one quarter of the difference - between the signature end and start times. So if neither - or - are specified, dnssec-signzone - generates - signatures that are valid for 30 days, with a cycle - interval of 7.5 days. Therefore, if any existing RRSIG records - are due to expire in less than 7.5 days, they would be - replaced. - - - - - - -I input-format - - - The format of the input zone file. - Possible formats are "text" (default), - "raw", and "map". - This option is primarily intended to be used for dynamic - signed zones so that the dumped zone file in a non-text - format containing updates can be signed directly. - The use of this option does not make much sense for - non-dynamic zones. - - - - - - -j jitter - - - When signing a zone with a fixed signature lifetime, all - RRSIG records issued at the time of signing expires - simultaneously. If the zone is incrementally signed, i.e. - a previously-signed zone is passed as input to the signer, - all expired signatures have to be regenerated at about the - same time. The option specifies a - jitter window that will be used to randomize the signature - expire time, thus spreading incremental signature - regeneration over time. - - - Signature lifetime jitter also to some extent benefits - validators and servers by spreading out cache expiration, - i.e. if large numbers of RRSIGs don't expire at the same time - from all caches there will be less congestion than if all - validators need to refetch at mostly the same time. - - - - - - -L serial - - - When writing a signed zone to "raw" or "map" format, set the - "source serial" value in the header to the specified serial - number. (This is expected to be used primarily for testing - purposes.) - - - - - - -n ncpus - - - Specifies the number of threads to use. By default, one - thread is started for each detected CPU. - - - - - - -N soa-serial-format - - - The SOA serial number format of the signed zone. - Possible formats are "keep" (default), - "increment", "unixtime", - and "date". - - - - - "keep" - - Do not modify the SOA serial number. - - - - - "increment" - - Increment the SOA serial number using RFC 1982 - arithmetic. - - - - - "unixtime" - - Set the SOA serial number to the number of seconds - since epoch. - - - - - "date" - - Set the SOA serial number to today's date in - YYYYMMDDNN format. - - - - - - - - - -o origin - - - The zone origin. If not specified, the name of the zone file - is assumed to be the origin. - - - - - - -O output-format - - - The format of the output file containing the signed zone. - Possible formats are "text" (default), - which is the standard textual representation of the zone; - "full", which is text output in a - format suitable for processing by external scripts; - and "map", "raw", - and "raw=N", which store the zone in - binary formats for rapid loading by named. - "raw=N" specifies the format version of - the raw zone file: if N is 0, the raw file can be read by - any version of named; if N is 1, the file - can be read by release 9.9.0 or higher; the default is 1. - - - - - - -P - - - Disable post sign verification tests. - - - The post sign verification test ensures that for each algorithm - in use there is at least one non revoked self signed KSK key, - that all revoked KSK keys are self signed, and that all records - in the zone are signed by the algorithm. - This option skips these tests. - - - - - - -Q - - - Remove signatures from keys that are no longer active. - - - Normally, when a previously-signed zone is passed as input - to the signer, and a DNSKEY record has been removed and - replaced with a new one, signatures from the old key - that are still within their validity period are retained. - This allows the zone to continue to validate with cached - copies of the old DNSKEY RRset. The - forces dnssec-signzone to remove - signatures from keys that are no longer active. This - enables ZSK rollover using the procedure described in - RFC 4641, section 4.2.1.1 ("Pre-Publish Key Rollover"). - - - - - - -q - - - Quiet mode: Suppresses unnecessary output. Without this - option, when dnssec-signzone is run it - will print to standard output the number of keys in use, - the algorithms used to verify the zone was signed correctly - and other status information, and finally the filename - containing the signed zone. With it, that output is - suppressed, leaving only the filename. - - - - - - -R - - - Remove signatures from keys that are no longer published. - - - This option is similar to , except it - forces dnssec-signzone to signatures from - keys that are no longer published. This enables ZSK rollover - using the procedure described in RFC 4641, section 4.2.1.2 - ("Double Signature Zone Signing Key Rollover"). - - - - - -S - - - Smart signing: Instructs dnssec-signzone to - search the key repository for keys that match the zone being - signed, and to include them in the zone if appropriate. - - - When a key is found, its timing metadata is examined to - determine how it should be used, according to the following - rules. Each successive rule takes priority over the prior - ones: - - - - - - If no timing metadata has been set for the key, the key is - published in the zone and used to sign the zone. - - - - - - - - If the key's publication date is set and is in the past, the - key is published in the zone. - - - - - - - - If the key's activation date is set and in the past, the - key is published (regardless of publication date) and - used to sign the zone. - - - - - - - - If the key's revocation date is set and in the past, and the - key is published, then the key is revoked, and the revoked key - is used to sign the zone. - - - - - - - - If either of the key's unpublication or deletion dates are set - and in the past, the key is NOT published or used to sign the - zone, regardless of any other metadata. - - - - - - - - If key's sync publication date is set and in the past, - synchronization records (type CDS and/or CDNSKEY) are - created. - - - - - - - - If key's sync deletion date is set and in the past, - synchronization records (type CDS and/or CDNSKEY) are - removed. - - - - - - - - - -T ttl - - - Specifies a TTL to be used for new DNSKEY records imported - into the zone from the key repository. If not - specified, the default is the TTL value from the zone's SOA - record. This option is ignored when signing without - , since DNSKEY records are not imported - from the key repository in that case. It is also ignored if - there are any pre-existing DNSKEY records at the zone apex, - in which case new records' TTL values will be set to match - them, or if any of the imported DNSKEY records had a default - TTL value. In the event of a a conflict between TTL values in - imported keys, the shortest one is used. - - - - - - -t - - - Print statistics at completion. - - - - - - -u - - - Update NSEC/NSEC3 chain when re-signing a previously signed - zone. With this option, a zone signed with NSEC can be - switched to NSEC3, or a zone signed with NSEC3 can - be switch to NSEC or to NSEC3 with different parameters. - Without this option, dnssec-signzone will - retain the existing chain when re-signing. - - - - - - -v level - - - Sets the debugging level. - - - - - - -x - - - Only sign the DNSKEY, CDNSKEY, and CDS RRsets with - key-signing keys, and omit signatures from zone-signing - keys. (This is similar to the - dnssec-dnskey-kskonly yes; zone option in - named.) - - - - - - -z - - - Ignore KSK flag on key when determining what to sign. This - causes KSK-flagged keys to sign all records, not just the - DNSKEY RRset. (This is similar to the - update-check-ksk no; zone option in - named.) - - - - - - -3 salt - - - Generate an NSEC3 chain with the given hex encoded salt. - A dash (salt) can - be used to indicate that no salt is to be used when generating the NSEC3 chain. - - - - - - -H iterations - - - When generating an NSEC3 chain, use this many iterations. The - default is 10. - - - - - - -A - - - When generating an NSEC3 chain set the OPTOUT flag on all - NSEC3 records and do not generate NSEC3 records for insecure - delegations. - - - Using this option twice (i.e., ) - turns the OPTOUT flag off for all records. This is useful - when using the option to modify an NSEC3 - chain which previously had OPTOUT set. - - - - - - zonefile - - - The file containing the zone to be signed. - - - - - - key - - - Specify which keys should be used to sign the zone. If - no keys are specified, then the zone will be examined - for DNSKEY records at the zone apex. If these are found and - there are matching private keys, in the current directory, - then these will be used for signing. - - - - - - - - EXAMPLE - - - The following command signs the example.com - zone with the ECDSAP256SHA256 key generated by key generated by - dnssec-keygen (Kexample.com.+013+17247). - Because the -S option is not being used, - the zone's keys must be in the master file - (db.example.com). This invocation looks - for dsset files, in the current directory, - so that DS records can be imported from them (-g). - -% dnssec-signzone -g -o example.com db.example.com \ -Kexample.com.+013+17247 -db.example.com.signed -% - - In the above example, dnssec-signzone creates - the file db.example.com.signed. This - file should be referenced in a zone statement in a - named.conf file. - - - This example re-signs a previously signed zone with default parameters. - The private keys are assumed to be in the current directory. - -% cp db.example.com.signed db.example.com -% dnssec-signzone -o example.com db.example.com -db.example.com.signed -% - - - SEE ALSO - - - dnssec-keygen8 - , - BIND 9 Administrator Reference Manual, - RFC 4033, RFC 4641. - - - - diff --git a/bin/dnssec/dnssec-signzone.html b/bin/dnssec/dnssec-signzone.html deleted file mode 100644 index 89000357a5..0000000000 --- a/bin/dnssec/dnssec-signzone.html +++ /dev/null @@ -1,673 +0,0 @@ - - - - - -dnssec-signzone - - -
-
- - - - - -
-

Name

-

- dnssec-signzone - — DNSSEC zone signing tool -

-
- - - -
-

Synopsis

-

- dnssec-signzone - [-a] - [-c class] - [-d directory] - [-D] - [-E engine] - [-e end-time] - [-f output-file] - [-g] - [-h] - [-i interval] - [-I input-format] - [-j jitter] - [-K directory] - [-k key] - [-L serial] - [-l domain] - [-M maxttl] - [-N soa-serial-format] - [-o origin] - [-O output-format] - [-P] - [-Q] - [-q] - [-R] - [-S] - [-s start-time] - [-T ttl] - [-t] - [-u] - [-v level] - [-V] - [-X extended end-time] - [-x] - [-z] - [-3 salt] - [-H iterations] - [-A] - {zonefile} - [key...] -

-
- -
-

DESCRIPTION

- -

dnssec-signzone - signs a zone. It generates - NSEC and RRSIG records and produces a signed version of the - zone. The security status of delegations from the signed zone - (that is, whether the child zones are secure or not) is - determined by the presence or absence of a - keyset file for each child zone. -

-
- -
-

OPTIONS

- - -
-
-a
-
-

- Verify all generated signatures. -

-
-
-c class
-
-

- Specifies the DNS class of the zone. -

-
-
-C
-
-

- Compatibility mode: Generate a - keyset-zonename - file in addition to - dsset-zonename - when signing a zone, for use by older versions of - dnssec-signzone. -

-
-
-d directory
-
-

- Look for dsset- or - keyset- files in directory. -

-
-
-D
-
-

- Output only those record types automatically managed by - dnssec-signzone, i.e. RRSIG, NSEC, - NSEC3 and NSEC3PARAM records. If smart signing - (-S) is used, DNSKEY records are also - included. The resulting file can be included in the original - zone file with $INCLUDE. This option - cannot be combined with -O raw, - -O map, or serial number updating. -

-
-
-E engine
-
-

- When applicable, specifies the hardware to use for - cryptographic operations, such as a secure key store used - for signing. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-g
-
-

- Generate DS records for child zones from - dsset- or keyset- - file. Existing DS records will be removed. -

-
-
-K directory
-
-

- Key repository: Specify a directory to search for DNSSEC keys. - If not specified, defaults to the current directory. -

-
-
-k key
-
-

- Treat specified key as a key signing key ignoring any - key flags. This option may be specified multiple times. -

-
-
-M maxttl
-
-

- Sets the maximum TTL for the signed zone. - Any TTL higher than maxttl in the - input zone will be reduced to maxttl - in the output. This provides certainty as to the largest - possible TTL in the signed zone, which is useful to know when - rolling keys because it is the longest possible time before - signatures that have been retrieved by resolvers will expire - from resolver caches. Zones that are signed with this - option should be configured to use a matching - max-zone-ttl in named.conf. - (Note: This option is incompatible with -D, - because it modifies non-DNSSEC data in the output zone.) -

-
-
-s start-time
-
-

- Specify the date and time when the generated RRSIG records - become valid. This can be either an absolute or relative - time. An absolute start time is indicated by a number - in YYYYMMDDHHMMSS notation; 20000530144500 denotes - 14:45:00 UTC on May 30th, 2000. A relative start time is - indicated by +N, which is N seconds from the current time. - If no start-time is specified, the current - time minus 1 hour (to allow for clock skew) is used. -

-
-
-e end-time
-
-

- Specify the date and time when the generated RRSIG records - expire. As with start-time, an absolute - time is indicated in YYYYMMDDHHMMSS notation. A time relative - to the start time is indicated with +N, which is N seconds from - the start time. A time relative to the current time is - indicated with now+N. If no end-time is - specified, 30 days from the start time is used as a default. - end-time must be later than - start-time. -

-
-
-X extended end-time
-
-

- Specify the date and time when the generated RRSIG records - for the DNSKEY RRset will expire. This is to be used in cases - when the DNSKEY signatures need to persist longer than - signatures on other records; e.g., when the private component - of the KSK is kept offline and the KSK signature is to be - refreshed manually. -

-

- As with start-time, an absolute - time is indicated in YYYYMMDDHHMMSS notation. A time relative - to the start time is indicated with +N, which is N seconds from - the start time. A time relative to the current time is - indicated with now+N. If no extended end-time is - specified, the value of end-time is used as - the default. (end-time, in turn, defaults to - 30 days from the start time.) extended end-time - must be later than start-time. -

-
-
-f output-file
-
-

- The name of the output file containing the signed zone. The - default is to append .signed to - the input filename. If output-file is - set to "-", then the signed zone is - written to the standard output, with a default output - format of "full". -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - dnssec-signzone. -

-
-
-V
-
-

- Prints version information. -

-
-
-i interval
-
-

- When a previously-signed zone is passed as input, records - may be resigned. The interval option - specifies the cycle interval as an offset from the current - time (in seconds). If a RRSIG record expires after the - cycle interval, it is retained. Otherwise, it is considered - to be expiring soon, and it will be replaced. -

-

- The default cycle interval is one quarter of the difference - between the signature end and start times. So if neither - end-time or start-time - are specified, dnssec-signzone - generates - signatures that are valid for 30 days, with a cycle - interval of 7.5 days. Therefore, if any existing RRSIG records - are due to expire in less than 7.5 days, they would be - replaced. -

-
-
-I input-format
-
-

- The format of the input zone file. - Possible formats are "text" (default), - "raw", and "map". - This option is primarily intended to be used for dynamic - signed zones so that the dumped zone file in a non-text - format containing updates can be signed directly. - The use of this option does not make much sense for - non-dynamic zones. -

-
-
-j jitter
-
-

- When signing a zone with a fixed signature lifetime, all - RRSIG records issued at the time of signing expires - simultaneously. If the zone is incrementally signed, i.e. - a previously-signed zone is passed as input to the signer, - all expired signatures have to be regenerated at about the - same time. The jitter option specifies a - jitter window that will be used to randomize the signature - expire time, thus spreading incremental signature - regeneration over time. -

-

- Signature lifetime jitter also to some extent benefits - validators and servers by spreading out cache expiration, - i.e. if large numbers of RRSIGs don't expire at the same time - from all caches there will be less congestion than if all - validators need to refetch at mostly the same time. -

-
-
-L serial
-
-

- When writing a signed zone to "raw" or "map" format, set the - "source serial" value in the header to the specified serial - number. (This is expected to be used primarily for testing - purposes.) -

-
-
-n ncpus
-
-

- Specifies the number of threads to use. By default, one - thread is started for each detected CPU. -

-
-
-N soa-serial-format
-
-

- The SOA serial number format of the signed zone. - Possible formats are "keep" (default), - "increment", "unixtime", - and "date". -

- -
-
"keep"
-
-

Do not modify the SOA serial number.

-
-
"increment"
-
-

Increment the SOA serial number using RFC 1982 - arithmetic.

-
-
"unixtime"
-
-

Set the SOA serial number to the number of seconds - since epoch.

-
-
"date"
-
-

Set the SOA serial number to today's date in - YYYYMMDDNN format.

-
-
- -
-
-o origin
-
-

- The zone origin. If not specified, the name of the zone file - is assumed to be the origin. -

-
-
-O output-format
-
-

- The format of the output file containing the signed zone. - Possible formats are "text" (default), - which is the standard textual representation of the zone; - "full", which is text output in a - format suitable for processing by external scripts; - and "map", "raw", - and "raw=N", which store the zone in - binary formats for rapid loading by named. - "raw=N" specifies the format version of - the raw zone file: if N is 0, the raw file can be read by - any version of named; if N is 1, the file - can be read by release 9.9.0 or higher; the default is 1. -

-
-
-P
-
-

- Disable post sign verification tests. -

-

- The post sign verification test ensures that for each algorithm - in use there is at least one non revoked self signed KSK key, - that all revoked KSK keys are self signed, and that all records - in the zone are signed by the algorithm. - This option skips these tests. -

-
-
-Q
-
-

- Remove signatures from keys that are no longer active. -

-

- Normally, when a previously-signed zone is passed as input - to the signer, and a DNSKEY record has been removed and - replaced with a new one, signatures from the old key - that are still within their validity period are retained. - This allows the zone to continue to validate with cached - copies of the old DNSKEY RRset. The -Q - forces dnssec-signzone to remove - signatures from keys that are no longer active. This - enables ZSK rollover using the procedure described in - RFC 4641, section 4.2.1.1 ("Pre-Publish Key Rollover"). -

-
-
-q
-
-

- Quiet mode: Suppresses unnecessary output. Without this - option, when dnssec-signzone is run it - will print to standard output the number of keys in use, - the algorithms used to verify the zone was signed correctly - and other status information, and finally the filename - containing the signed zone. With it, that output is - suppressed, leaving only the filename. -

-
-
-R
-
-

- Remove signatures from keys that are no longer published. -

-

- This option is similar to -Q, except it - forces dnssec-signzone to signatures from - keys that are no longer published. This enables ZSK rollover - using the procedure described in RFC 4641, section 4.2.1.2 - ("Double Signature Zone Signing Key Rollover"). -

-
-
-S
-
-

- Smart signing: Instructs dnssec-signzone to - search the key repository for keys that match the zone being - signed, and to include them in the zone if appropriate. -

-

- When a key is found, its timing metadata is examined to - determine how it should be used, according to the following - rules. Each successive rule takes priority over the prior - ones: -

-
-
-
-

- If no timing metadata has been set for the key, the key is - published in the zone and used to sign the zone. -

-
-
-
-

- If the key's publication date is set and is in the past, the - key is published in the zone. -

-
-
-
-

- If the key's activation date is set and in the past, the - key is published (regardless of publication date) and - used to sign the zone. -

-
-
-
-

- If the key's revocation date is set and in the past, and the - key is published, then the key is revoked, and the revoked key - is used to sign the zone. -

-
-
-
-

- If either of the key's unpublication or deletion dates are set - and in the past, the key is NOT published or used to sign the - zone, regardless of any other metadata. -

-
-
-
-

- If key's sync publication date is set and in the past, - synchronization records (type CDS and/or CDNSKEY) are - created. -

-
-
-
-

- If key's sync deletion date is set and in the past, - synchronization records (type CDS and/or CDNSKEY) are - removed. -

-
-
-
-
-T ttl
-
-

- Specifies a TTL to be used for new DNSKEY records imported - into the zone from the key repository. If not - specified, the default is the TTL value from the zone's SOA - record. This option is ignored when signing without - -S, since DNSKEY records are not imported - from the key repository in that case. It is also ignored if - there are any pre-existing DNSKEY records at the zone apex, - in which case new records' TTL values will be set to match - them, or if any of the imported DNSKEY records had a default - TTL value. In the event of a a conflict between TTL values in - imported keys, the shortest one is used. -

-
-
-t
-
-

- Print statistics at completion. -

-
-
-u
-
-

- Update NSEC/NSEC3 chain when re-signing a previously signed - zone. With this option, a zone signed with NSEC can be - switched to NSEC3, or a zone signed with NSEC3 can - be switch to NSEC or to NSEC3 with different parameters. - Without this option, dnssec-signzone will - retain the existing chain when re-signing. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-x
-
-

- Only sign the DNSKEY, CDNSKEY, and CDS RRsets with - key-signing keys, and omit signatures from zone-signing - keys. (This is similar to the - dnssec-dnskey-kskonly yes; zone option in - named.) -

-
-
-z
-
-

- Ignore KSK flag on key when determining what to sign. This - causes KSK-flagged keys to sign all records, not just the - DNSKEY RRset. (This is similar to the - update-check-ksk no; zone option in - named.) -

-
-
-3 salt
-
-

- Generate an NSEC3 chain with the given hex encoded salt. - A dash (salt) can - be used to indicate that no salt is to be used when generating the NSEC3 chain. -

-
-
-H iterations
-
-

- When generating an NSEC3 chain, use this many iterations. The - default is 10. -

-
-
-A
-
-

- When generating an NSEC3 chain set the OPTOUT flag on all - NSEC3 records and do not generate NSEC3 records for insecure - delegations. -

-

- Using this option twice (i.e., -AA) - turns the OPTOUT flag off for all records. This is useful - when using the -u option to modify an NSEC3 - chain which previously had OPTOUT set. -

-
-
zonefile
-
-

- The file containing the zone to be signed. -

-
-
key
-
-

- Specify which keys should be used to sign the zone. If - no keys are specified, then the zone will be examined - for DNSKEY records at the zone apex. If these are found and - there are matching private keys, in the current directory, - then these will be used for signing. -

-
-
-
- -
-

EXAMPLE

- -

- The following command signs the example.com - zone with the ECDSAP256SHA256 key generated by key generated by - dnssec-keygen (Kexample.com.+013+17247). - Because the -S option is not being used, - the zone's keys must be in the master file - (db.example.com). This invocation looks - for dsset files, in the current directory, - so that DS records can be imported from them (-g). -

-
% dnssec-signzone -g -o example.com db.example.com \
-Kexample.com.+013+17247
-db.example.com.signed
-%
-

- In the above example, dnssec-signzone creates - the file db.example.com.signed. This - file should be referenced in a zone statement in a - named.conf file. -

-

- This example re-signs a previously signed zone with default parameters. - The private keys are assumed to be in the current directory. -

-
% cp db.example.com.signed db.example.com
-% dnssec-signzone -o example.com db.example.com
-db.example.com.signed
-%
-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - BIND 9 Administrator Reference Manual, - RFC 4033, RFC 4641. -

-
- -
- diff --git a/bin/dnssec/dnssec-signzone.rst b/bin/dnssec/dnssec-signzone.rst new file mode 100644 index 0000000000..de3a0315ea --- /dev/null +++ b/bin/dnssec/dnssec-signzone.rst @@ -0,0 +1,392 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-signzone: + +dnssec-signzone - DNSSEC zone signing tool +------------------------------------------ + +Synopsis +~~~~~~~~ + +:program:`dnssec-signzone` [**-a**] [**-c** class] [**-d** directory] [**-D**] [**-E** engine] [**-e** end-time] [**-f** output-file] [**-g**] [**-h**] [**-i** interval] [**-I** input-format] [**-j** jitter] [**-K** directory] [**-k** key] [**-L** serial] [**-M** maxttl] [**-N** soa-serial-format] [**-o** origin] [**-O** output-format] [**-P**] [**-Q**] [**-q**] [**-R**] [**-S**] [**-s** start-time] [**-T** ttl] [**-t**] [**-u**] [**-v** level] [**-V**] [**-X** extended end-time] [**-x**] [**-z**] [**-3** salt] [**-H** iterations] [**-A**] {zonefile} [key...] + +Description +~~~~~~~~~~~ + +``dnssec-signzone`` signs a zone. It generates NSEC and RRSIG records +and produces a signed version of the zone. The security status of +delegations from the signed zone (that is, whether the child zones are +secure or not) is determined by the presence or absence of a ``keyset`` +file for each child zone. + +Options +~~~~~~~ + +**-a** + Verify all generated signatures. + +**-c** class + Specifies the DNS class of the zone. + +**-C** + Compatibility mode: Generate a ``keyset-zonename`` file in addition + to ``dsset-zonename`` when signing a zone, for use by older versions + of ``dnssec-signzone``. + +**-d** directory + Look for ``dsset-`` or ``keyset-`` files in ``directory``. + +**-D** + Output only those record types automatically managed by + ``dnssec-signzone``, i.e. RRSIG, NSEC, NSEC3 and NSEC3PARAM records. + If smart signing (``-S``) is used, DNSKEY records are also included. + The resulting file can be included in the original zone file with + ``$INCLUDE``. This option cannot be combined with ``-O raw``, + ``-O map``, or serial number updating. + +**-E** engine + When applicable, specifies the hardware to use for cryptographic + operations, such as a secure key store used for signing. + + When BIND is built with OpenSSL PKCS#11 support, this defaults to the + string "pkcs11", which identifies an OpenSSL engine that can drive a + cryptographic accelerator or hardware service module. When BIND is + built with native PKCS#11 cryptography (--enable-native-pkcs11), it + defaults to the path of the PKCS#11 provider library specified via + "--with-pkcs11". + +**-g** + Generate DS records for child zones from ``dsset-`` or ``keyset-`` + file. Existing DS records will be removed. + +**-K** directory + Key repository: Specify a directory to search for DNSSEC keys. If not + specified, defaults to the current directory. + +**-k** key + Treat specified key as a key signing key ignoring any key flags. This + option may be specified multiple times. + +**-M** maxttl + Sets the maximum TTL for the signed zone. Any TTL higher than maxttl + in the input zone will be reduced to maxttl in the output. This + provides certainty as to the largest possible TTL in the signed zone, + which is useful to know when rolling keys because it is the longest + possible time before signatures that have been retrieved by resolvers + will expire from resolver caches. Zones that are signed with this + option should be configured to use a matching ``max-zone-ttl`` in + ``named.conf``. (Note: This option is incompatible with ``-D``, + because it modifies non-DNSSEC data in the output zone.) + +**-s** start-time + Specify the date and time when the generated RRSIG records become + valid. This can be either an absolute or relative time. An absolute + start time is indicated by a number in YYYYMMDDHHMMSS notation; + 20000530144500 denotes 14:45:00 UTC on May 30th, 2000. A relative + start time is indicated by +N, which is N seconds from the current + time. If no ``start-time`` is specified, the current time minus 1 + hour (to allow for clock skew) is used. + +**-e** end-time + Specify the date and time when the generated RRSIG records expire. As + with ``start-time``, an absolute time is indicated in YYYYMMDDHHMMSS + notation. A time relative to the start time is indicated with +N, + which is N seconds from the start time. A time relative to the + current time is indicated with now+N. If no ``end-time`` is + specified, 30 days from the start time is used as a default. + ``end-time`` must be later than ``start-time``. + +**-X** extended end-time + Specify the date and time when the generated RRSIG records for the + DNSKEY RRset will expire. This is to be used in cases when the DNSKEY + signatures need to persist longer than signatures on other records; + e.g., when the private component of the KSK is kept offline and the + KSK signature is to be refreshed manually. + + As with ``start-time``, an absolute time is indicated in + YYYYMMDDHHMMSS notation. A time relative to the start time is + indicated with +N, which is N seconds from the start time. A time + relative to the current time is indicated with now+N. If no + ``extended end-time`` is specified, the value of ``end-time`` is used + as the default. (``end-time``, in turn, defaults to 30 days from the + start time.) ``extended end-time`` must be later than ``start-time``. + +**-f** output-file + The name of the output file containing the signed zone. The default + is to append ``.signed`` to the input filename. If ``output-file`` is + set to ``"-"``, then the signed zone is written to the standard + output, with a default output format of "full". + +**-h** + Prints a short summary of the options and arguments to + ``dnssec-signzone``. + +**-V** + Prints version information. + +**-i** interval + When a previously-signed zone is passed as input, records may be + resigned. The ``interval`` option specifies the cycle interval as an + offset from the current time (in seconds). If a RRSIG record expires + after the cycle interval, it is retained. Otherwise, it is considered + to be expiring soon, and it will be replaced. + + The default cycle interval is one quarter of the difference between + the signature end and start times. So if neither ``end-time`` or + ``start-time`` are specified, ``dnssec-signzone`` generates + signatures that are valid for 30 days, with a cycle interval of 7.5 + days. Therefore, if any existing RRSIG records are due to expire in + less than 7.5 days, they would be replaced. + +**-I** input-format + The format of the input zone file. Possible formats are ``"text"`` + (default), ``"raw"``, and ``"map"``. This option is primarily + intended to be used for dynamic signed zones so that the dumped zone + file in a non-text format containing updates can be signed directly. + The use of this option does not make much sense for non-dynamic + zones. + +**-j** jitter + When signing a zone with a fixed signature lifetime, all RRSIG + records issued at the time of signing expires simultaneously. If the + zone is incrementally signed, i.e. a previously-signed zone is passed + as input to the signer, all expired signatures have to be regenerated + at about the same time. The ``jitter`` option specifies a jitter + window that will be used to randomize the signature expire time, thus + spreading incremental signature regeneration over time. + + Signature lifetime jitter also to some extent benefits validators and + servers by spreading out cache expiration, i.e. if large numbers of + RRSIGs don't expire at the same time from all caches there will be + less congestion than if all validators need to refetch at mostly the + same time. + +**-L** serial + When writing a signed zone to "raw" or "map" format, set the "source + serial" value in the header to the specified serial number. (This is + expected to be used primarily for testing purposes.) + +**-n** ncpus + Specifies the number of threads to use. By default, one thread is + started for each detected CPU. + +**-N** soa-serial-format + The SOA serial number format of the signed zone. Possible formats are + ``"keep"`` (default), ``"increment"``, ``"unixtime"``, and + ``"date"``. + + ``"keep"`` + Do not modify the SOA serial number. + + ``"increment"`` + Increment the SOA serial number using :rfc:`1982` arithmetic. + + ``"unixtime"`` + Set the SOA serial number to the number of seconds since epoch. + + ``"date"`` + Set the SOA serial number to today's date in YYYYMMDDNN format. + +**-o** origin + The zone origin. If not specified, the name of the zone file is + assumed to be the origin. + +**-O** output-format + The format of the output file containing the signed zone. Possible + formats are ``"text"`` (default), which is the standard textual + representation of the zone; ``"full"``, which is text output in a + format suitable for processing by external scripts; and ``"map"``, + ``"raw"``, and ``"raw=N"``, which store the zone in binary formats + for rapid loading by ``named``. ``"raw=N"`` specifies the format + version of the raw zone file: if N is 0, the raw file can be read by + any version of ``named``; if N is 1, the file can be read by release + 9.9.0 or higher; the default is 1. + +**-P** + Disable post sign verification tests. + + The post sign verification test ensures that for each algorithm in + use there is at least one non revoked self signed KSK key, that all + revoked KSK keys are self signed, and that all records in the zone + are signed by the algorithm. This option skips these tests. + +**-Q** + Remove signatures from keys that are no longer active. + + Normally, when a previously-signed zone is passed as input to the + signer, and a DNSKEY record has been removed and replaced with a new + one, signatures from the old key that are still within their validity + period are retained. This allows the zone to continue to validate + with cached copies of the old DNSKEY RRset. The ``-Q`` forces + ``dnssec-signzone`` to remove signatures from keys that are no longer + active. This enables ZSK rollover using the procedure described in + :rfc:`4641#4.2.1.1` ("Pre-Publish Key Rollover"). + +``-q`` + Quiet mode: Suppresses unnecessary output. Without this option, when + ``dnssec-signzone`` is run it will print to standard output the number of + keys in use, the algorithms used to verify the zone was signed correctly and + other status information, and finally the filename containing the signed + zone. With it, that output is suppressed, leaving only the filename. + +**-R** + Remove signatures from keys that are no longer published. + + This option is similar to ``-Q``, except it forces + ``dnssec-signzone`` to signatures from keys that are no longer + published. This enables ZSK rollover using the procedure described in + :rfc:`4641#4.2.1.2` ("Double Signature Zone Signing Key + Rollover"). + +**-S** + Smart signing: Instructs ``dnssec-signzone`` to search the key + repository for keys that match the zone being signed, and to include + them in the zone if appropriate. + + When a key is found, its timing metadata is examined to determine how + it should be used, according to the following rules. Each successive + rule takes priority over the prior ones: + + If no timing metadata has been set for the key, the key is + published in the zone and used to sign the zone. + + If the key's publication date is set and is in the past, the key + is published in the zone. + + If the key's activation date is set and in the past, the key is + published (regardless of publication date) and used to sign the + zone. + + If the key's revocation date is set and in the past, and the key + is published, then the key is revoked, and the revoked key is used + to sign the zone. + + If either of the key's unpublication or deletion dates are set and + in the past, the key is NOT published or used to sign the zone, + regardless of any other metadata. + + If key's sync publication date is set and in the past, + synchronization records (type CDS and/or CDNSKEY) are created. + + If key's sync deletion date is set and in the past, + synchronization records (type CDS and/or CDNSKEY) are removed. + +**-T** ttl + Specifies a TTL to be used for new DNSKEY records imported into the + zone from the key repository. If not specified, the default is the + TTL value from the zone's SOA record. This option is ignored when + signing without ``-S``, since DNSKEY records are not imported from + the key repository in that case. It is also ignored if there are any + pre-existing DNSKEY records at the zone apex, in which case new + records' TTL values will be set to match them, or if any of the + imported DNSKEY records had a default TTL value. In the event of a a + conflict between TTL values in imported keys, the shortest one is + used. + +**-t** + Print statistics at completion. + +**-u** + Update NSEC/NSEC3 chain when re-signing a previously signed zone. + With this option, a zone signed with NSEC can be switched to NSEC3, + or a zone signed with NSEC3 can be switch to NSEC or to NSEC3 with + different parameters. Without this option, ``dnssec-signzone`` will + retain the existing chain when re-signing. + +**-v** level + Sets the debugging level. + +**-x** + Only sign the DNSKEY, CDNSKEY, and CDS RRsets with key-signing keys, + and omit signatures from zone-signing keys. (This is similar to the + ``dnssec-dnskey-kskonly yes;`` zone option in ``named``.) + +**-z** + Ignore KSK flag on key when determining what to sign. This causes + KSK-flagged keys to sign all records, not just the DNSKEY RRset. + (This is similar to the ``update-check-ksk no;`` zone option in + ``named``.) + +**-3** salt + Generate an NSEC3 chain with the given hex encoded salt. A dash + (salt) can be used to indicate that no salt is to be used when + generating the NSEC3 chain. + +**-H** iterations + When generating an NSEC3 chain, use this many iterations. The default + is 10. + +**-A** + When generating an NSEC3 chain set the OPTOUT flag on all NSEC3 + records and do not generate NSEC3 records for insecure delegations. + + Using this option twice (i.e., ``-AA``) turns the OPTOUT flag off for + all records. This is useful when using the ``-u`` option to modify an + NSEC3 chain which previously had OPTOUT set. + +**zonefile** + The file containing the zone to be signed. + +**key** + Specify which keys should be used to sign the zone. If no keys are + specified, then the zone will be examined for DNSKEY records at the + zone apex. If these are found and there are matching private keys, in + the current directory, then these will be used for signing. + +Example +~~~~~~~ + +The following command signs the ``example.com`` zone with the +ECDSAP256SHA256 key generated by key generated by ``dnssec-keygen`` +(Kexample.com.+013+17247). Because the ``-S`` option is not being used, +the zone's keys must be in the master file (``db.example.com``). This +invocation looks for ``dsset`` files, in the current directory, so that +DS records can be imported from them (``-g``). + +:: + + % dnssec-signzone -g -o example.com db.example.com \ + Kexample.com.+013+17247 + db.example.com.signed + % + +In the above example, ``dnssec-signzone`` creates the file +``db.example.com.signed``. This file should be referenced in a zone +statement in a ``named.conf`` file. + +This example re-signs a previously signed zone with default parameters. +The private keys are assumed to be in the current directory. + +:: + + % cp db.example.com.signed db.example.com + % dnssec-signzone -o example.com db.example.com + db.example.com.signed + % + +See Also +~~~~~~~~ + +:manpage:`dnssec-keygen(8)`, BIND 9 Administrator Reference Manual, :rfc:`4033`, +:rfc:`4641`. diff --git a/bin/dnssec/dnssec-verify.8 b/bin/dnssec/dnssec-verify.8 deleted file mode 100644 index e87f5df715..0000000000 --- a/bin/dnssec/dnssec-verify.8 +++ /dev/null @@ -1,124 +0,0 @@ -.\" Copyright (C) 2012, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnssec-verify -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-01-15 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSSEC\-VERIFY" "8" "2014\-01\-15" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnssec-verify \- DNSSEC zone verification tool -.SH "SYNOPSIS" -.HP \w'\fBdnssec\-verify\fR\ 'u -\fBdnssec\-verify\fR [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-E\ \fR\fB\fIengine\fR\fR] [\fB\-I\ \fR\fB\fIinput\-format\fR\fR] [\fB\-o\ \fR\fB\fIorigin\fR\fR] [\fB\-q\fR] [\fB\-v\ \fR\fB\fIlevel\fR\fR] [\fB\-V\fR] [\fB\-x\fR] [\fB\-z\fR] {zonefile} -.SH "DESCRIPTION" -.PP -\fBdnssec\-verify\fR -verifies that a zone is fully signed for each algorithm found in the DNSKEY RRset for the zone, and that the NSEC / NSEC3 chains are complete\&. -.SH "OPTIONS" -.PP -\-c \fIclass\fR -.RS 4 -Specifies the DNS class of the zone\&. -.RE -.PP -\-E \fIengine\fR -.RS 4 -Specifies the cryptographic hardware to use, when applicable\&. -.sp -When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module\&. When BIND is built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "\-\-with\-pkcs11"\&. -.RE -.PP -\-I \fIinput\-format\fR -.RS 4 -The format of the input zone file\&. Possible formats are -\fB"text"\fR -(default) and -\fB"raw"\fR\&. This option is primarily intended to be used for dynamic signed zones so that the dumped zone file in a non\-text format containing updates can be verified independently\&. The use of this option does not make much sense for non\-dynamic zones\&. -.RE -.PP -\-o \fIorigin\fR -.RS 4 -The zone origin\&. If not specified, the name of the zone file is assumed to be the origin\&. -.RE -.PP -\-v \fIlevel\fR -.RS 4 -Sets the debugging level\&. -.RE -.PP -\-V -.RS 4 -Prints version information\&. -.RE -.PP -\-q -.RS 4 -Quiet mode: Suppresses output\&. Without this option, when -\fBdnssec\-verify\fR -is run it will print to standard output the number of keys in use, the algorithms used to verify the zone was signed correctly and other status information\&. With it, all non\-error output is suppressed, and only the exit code will indicate success\&. -.RE -.PP -\-x -.RS 4 -Only verify that the DNSKEY RRset is signed with key\-signing keys\&. Without this flag, it is assumed that the DNSKEY RRset will be signed by all active keys\&. When this flag is set, it will not be an error if the DNSKEY RRset is not signed by zone\-signing keys\&. This corresponds to the -\fB\-x\fR -option in -\fBdnssec\-signzone\fR\&. -.RE -.PP -\-z -.RS 4 -Ignore the KSK flag on the keys when determining whether the zone if correctly signed\&. Without this flag it is assumed that there will be a non\-revoked, self\-signed DNSKEY with the KSK flag set for each algorithm and that RRsets other than DNSKEY RRset will be signed with a different DNSKEY without the KSK flag set\&. -.sp -With this flag set, we only require that for each algorithm, there will be at least one non\-revoked, self\-signed DNSKEY, regardless of the KSK flag state, and that other RRsets will be signed by a non\-revoked key for the same algorithm that includes the self\-signed key; the same key may be used for both purposes\&. This corresponds to the -\fB\-z\fR -option in -\fBdnssec\-signzone\fR\&. -.RE -.PP -zonefile -.RS 4 -The file containing the zone to be signed\&. -.RE -.SH "SEE ALSO" -.PP -\fBdnssec-signzone\fR(8), -BIND 9 Administrator Reference Manual, -RFC 4033\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2012, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/dnssec/dnssec-verify.docbook b/bin/dnssec/dnssec-verify.docbook deleted file mode 100644 index 58268677f9..0000000000 --- a/bin/dnssec/dnssec-verify.docbook +++ /dev/null @@ -1,219 +0,0 @@ - - - - - - 2014-01-15 - - - ISC - Internet Systems Consortium, Inc. - - - - dnssec-verify - 8 - BIND9 - - - - dnssec-verify - DNSSEC zone verification tool - - - - - 2012 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnssec-verify - - - - - - - - - - zonefile - - - - DESCRIPTION - - dnssec-verify - verifies that a zone is fully signed for each algorithm found - in the DNSKEY RRset for the zone, and that the NSEC / NSEC3 - chains are complete. - - - - OPTIONS - - - - - -c class - - - Specifies the DNS class of the zone. - - - - - - -E engine - - - Specifies the cryptographic hardware to use, when applicable. - - - When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". - - - - - - -I input-format - - - The format of the input zone file. - Possible formats are "text" (default) - and "raw". - This option is primarily intended to be used for dynamic - signed zones so that the dumped zone file in a non-text - format containing updates can be verified independently. - The use of this option does not make much sense for - non-dynamic zones. - - - - - - -o origin - - - The zone origin. If not specified, the name of the zone file - is assumed to be the origin. - - - - - - -v level - - - Sets the debugging level. - - - - - - -V - - - Prints version information. - - - - - - -q - - - Quiet mode: Suppresses output. Without this option, when - dnssec-verify is run it will print to - standard output the number of keys in use, the algorithms - used to verify the zone was signed correctly and other - status information. With it, all non-error output is - suppressed, and only the exit code will indicate success. - - - - - - -x - - - Only verify that the DNSKEY RRset is signed with key-signing - keys. Without this flag, it is assumed that the DNSKEY RRset - will be signed by all active keys. When this flag is set, - it will not be an error if the DNSKEY RRset is not signed - by zone-signing keys. This corresponds to the - option in dnssec-signzone. - - - - - - -z - - - Ignore the KSK flag on the keys when determining whether - the zone if correctly signed. Without this flag it is - assumed that there will be a non-revoked, self-signed - DNSKEY with the KSK flag set for each algorithm and - that RRsets other than DNSKEY RRset will be signed with - a different DNSKEY without the KSK flag set. - - - With this flag set, we only require that for each algorithm, - there will be at least one non-revoked, self-signed DNSKEY, - regardless of the KSK flag state, and that other RRsets - will be signed by a non-revoked key for the same algorithm - that includes the self-signed key; the same key may be used - for both purposes. This corresponds to the - option in dnssec-signzone. - - - - - - zonefile - - - The file containing the zone to be signed. - - - - - - - - SEE ALSO - - - - dnssec-signzone8 - , - BIND 9 Administrator Reference Manual, - RFC 4033. - - - - diff --git a/bin/dnssec/dnssec-verify.html b/bin/dnssec/dnssec-verify.html deleted file mode 100644 index 949737b7bd..0000000000 --- a/bin/dnssec/dnssec-verify.html +++ /dev/null @@ -1,180 +0,0 @@ - - - - - -dnssec-verify - - -
-
- - - - - -
-

Name

-

- dnssec-verify - — DNSSEC zone verification tool -

-
- - - -
-

Synopsis

-

- dnssec-verify - [-c class] - [-E engine] - [-I input-format] - [-o origin] - [-q] - [-v level] - [-V] - [-x] - [-z] - {zonefile} -

-
- -
-

DESCRIPTION

- -

dnssec-verify - verifies that a zone is fully signed for each algorithm found - in the DNSKEY RRset for the zone, and that the NSEC / NSEC3 - chains are complete. -

-
- -
-

OPTIONS

- - -
-
-c class
-
-

- Specifies the DNS class of the zone. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-I input-format
-
-

- The format of the input zone file. - Possible formats are "text" (default) - and "raw". - This option is primarily intended to be used for dynamic - signed zones so that the dumped zone file in a non-text - format containing updates can be verified independently. - The use of this option does not make much sense for - non-dynamic zones. -

-
-
-o origin
-
-

- The zone origin. If not specified, the name of the zone file - is assumed to be the origin. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-q
-
-

- Quiet mode: Suppresses output. Without this option, when - dnssec-verify is run it will print to - standard output the number of keys in use, the algorithms - used to verify the zone was signed correctly and other - status information. With it, all non-error output is - suppressed, and only the exit code will indicate success. -

-
-
-x
-
-

- Only verify that the DNSKEY RRset is signed with key-signing - keys. Without this flag, it is assumed that the DNSKEY RRset - will be signed by all active keys. When this flag is set, - it will not be an error if the DNSKEY RRset is not signed - by zone-signing keys. This corresponds to the -x - option in dnssec-signzone. -

-
-
-z
-
-

- Ignore the KSK flag on the keys when determining whether - the zone if correctly signed. Without this flag it is - assumed that there will be a non-revoked, self-signed - DNSKEY with the KSK flag set for each algorithm and - that RRsets other than DNSKEY RRset will be signed with - a different DNSKEY without the KSK flag set. -

-

- With this flag set, we only require that for each algorithm, - there will be at least one non-revoked, self-signed DNSKEY, - regardless of the KSK flag state, and that other RRsets - will be signed by a non-revoked key for the same algorithm - that includes the self-signed key; the same key may be used - for both purposes. This corresponds to the -z - option in dnssec-signzone. -

-
-
zonefile
-
-

- The file containing the zone to be signed. -

-
-
-
- -
-

SEE ALSO

- -

- - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 4033. -

-
- -
- diff --git a/bin/dnssec/dnssec-verify.rst b/bin/dnssec/dnssec-verify.rst new file mode 100644 index 0000000000..cea81e164f --- /dev/null +++ b/bin/dnssec/dnssec-verify.rst @@ -0,0 +1,108 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnssec-verify: + +dnssec-verify - DNSSEC zone verification tool +--------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`dnssec-verify` [**-c** class] [**-E** engine] [**-I** input-format] [**-o** origin] [**-q**] [**-v** level] [**-V**] [**-x**] [**-z**] {zonefile} + +Description +~~~~~~~~~~~ + +``dnssec-verify`` verifies that a zone is fully signed for each +algorithm found in the DNSKEY RRset for the zone, and that the NSEC / +NSEC3 chains are complete. + +Options +~~~~~~~ + +**-c** class + Specifies the DNS class of the zone. + +**-E** engine + Specifies the cryptographic hardware to use, when applicable. + + When BIND is built with OpenSSL PKCS#11 support, this defaults to the + string "pkcs11", which identifies an OpenSSL engine that can drive a + cryptographic accelerator or hardware service module. When BIND is + built with native PKCS#11 cryptography (--enable-native-pkcs11), it + defaults to the path of the PKCS#11 provider library specified via + "--with-pkcs11". + +**-I** input-format + The format of the input zone file. Possible formats are ``"text"`` + (default) and ``"raw"``. This option is primarily intended to be used + for dynamic signed zones so that the dumped zone file in a non-text + format containing updates can be verified independently. The use of + this option does not make much sense for non-dynamic zones. + +**-o** origin + The zone origin. If not specified, the name of the zone file is + assumed to be the origin. + +**-v** level + Sets the debugging level. + +**-V** + Prints version information. + +``-q`` + Quiet mode: Suppresses output. Without this option, when ``dnssec-verify`` + is run it will print to standard output the number of keys in use, the + algorithms used to verify the zone was signed correctly and other status + information. With it, all non-error output is suppressed, and only the exit + code will indicate success. + +**-x** + Only verify that the DNSKEY RRset is signed with key-signing keys. + Without this flag, it is assumed that the DNSKEY RRset will be signed + by all active keys. When this flag is set, it will not be an error if + the DNSKEY RRset is not signed by zone-signing keys. This corresponds + to the ``-x`` option in ``dnssec-signzone``. + +**-z** + Ignore the KSK flag on the keys when determining whether the zone if + correctly signed. Without this flag it is assumed that there will be + a non-revoked, self-signed DNSKEY with the KSK flag set for each + algorithm and that RRsets other than DNSKEY RRset will be signed with + a different DNSKEY without the KSK flag set. + + With this flag set, we only require that for each algorithm, there + will be at least one non-revoked, self-signed DNSKEY, regardless of + the KSK flag state, and that other RRsets will be signed by a + non-revoked key for the same algorithm that includes the self-signed + key; the same key may be used for both purposes. This corresponds to + the ``-z`` option in ``dnssec-signzone``. + +**zonefile** + The file containing the zone to be signed. + +See Also +~~~~~~~~ + +:manpage:`dnssec-signzone(8)`, BIND 9 Administrator Reference Manual, :rfc:`4033`. diff --git a/bin/named/Makefile.am b/bin/named/Makefile.am index f0087ddde6..718cfd405d 100644 --- a/bin/named/Makefile.am +++ b/bin/named/Makefile.am @@ -106,3 +106,6 @@ if HAVE_JSON_C named_LDADD += \ $(JSON_C_LIBS) endif HAVE_JSON_C + +MAINTAINERCLEANFILES = \ + named.conf.rst diff --git a/bin/named/named.8 b/bin/named/named.8 deleted file mode 100644 index 1b95cf3fae..0000000000 --- a/bin/named/named.8 +++ /dev/null @@ -1,382 +0,0 @@ -.\" Copyright (C) 2000, 2001, 2003-2009, 2011, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: named -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-02-19 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NAMED" "8" "2014\-02\-19" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -named \- Internet domain name server -.SH "SYNOPSIS" -.HP \w'\fBnamed\fR\ 'u -\fBnamed\fR [[\fB\-4\fR] | [\fB\-6\fR]] [\fB\-c\ \fR\fB\fIconfig\-file\fR\fR] [\fB\-d\ \fR\fB\fIdebug\-level\fR\fR] [\fB\-D\ \fR\fB\fIstring\fR\fR] [\fB\-E\ \fR\fB\fIengine\-name\fR\fR] [\fB\-f\fR] [\fB\-g\fR] [\fB\-L\ \fR\fB\fIlogfile\fR\fR] [\fB\-M\ \fR\fB\fIoption\fR\fR] [\fB\-m\ \fR\fB\fIflag\fR\fR] [\fB\-n\ \fR\fB\fI#cpus\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-s\fR] [\fB\-S\ \fR\fB\fI#max\-socks\fR\fR] [\fB\-t\ \fR\fB\fIdirectory\fR\fR] [\fB\-U\ \fR\fB\fI#listeners\fR\fR] [\fB\-u\ \fR\fB\fIuser\fR\fR] [\fB\-v\fR] [\fB\-V\fR] [\fB\-X\ \fR\fB\fIlock\-file\fR\fR] [\fB\-x\ \fR\fB\fIcache\-file\fR\fR] -.SH "DESCRIPTION" -.PP -\fBnamed\fR -is a Domain Name System (DNS) server, part of the BIND 9 distribution from ISC\&. For more information on the DNS, see RFCs 1033, 1034, and 1035\&. -.PP -When invoked without arguments, -\fBnamed\fR -will read the default configuration file -/etc/named\&.conf, read any initial data, and listen for queries\&. -.SH "OPTIONS" -.PP -\-4 -.RS 4 -Use IPv4 only even if the host machine is capable of IPv6\&. -\fB\-4\fR -and -\fB\-6\fR -are mutually exclusive\&. -.RE -.PP -\-6 -.RS 4 -Use IPv6 only even if the host machine is capable of IPv4\&. -\fB\-4\fR -and -\fB\-6\fR -are mutually exclusive\&. -.RE -.PP -\-c \fIconfig\-file\fR -.RS 4 -Use -\fIconfig\-file\fR -as the configuration file instead of the default, -/etc/named\&.conf\&. To ensure that reloading the configuration file continues to work after the server has changed its working directory due to to a possible -\fBdirectory\fR -option in the configuration file, -\fIconfig\-file\fR -should be an absolute pathname\&. -.RE -.PP -\-d \fIdebug\-level\fR -.RS 4 -Set the daemon\*(Aqs debug level to -\fIdebug\-level\fR\&. Debugging traces from -\fBnamed\fR -become more verbose as the debug level increases\&. -.RE -.PP -\-D \fIstring\fR -.RS 4 -Specifies a string that is used to identify a instance of -\fBnamed\fR -in a process listing\&. The contents of -\fIstring\fR -are not examined\&. -.RE -.PP -\-E \fIengine\-name\fR -.RS 4 -When applicable, specifies the hardware to use for cryptographic operations, such as a secure key store used for signing\&. -.sp -When BIND is built with OpenSSL PKCS#11 support, this defaults to the string "pkcs11", which identifies an OpenSSL engine that can drive a cryptographic accelerator or hardware service module\&. When BIND is built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it defaults to the path of the PKCS#11 provider library specified via "\-\-with\-pkcs11"\&. -.RE -.PP -\-f -.RS 4 -Run the server in the foreground (i\&.e\&. do not daemonize)\&. -.RE -.PP -\-g -.RS 4 -Run the server in the foreground and force all logging to -stderr\&. -.RE -.PP -\-L \fIlogfile\fR -.RS 4 -Log to the file -\fBlogfile\fR -by default instead of the system log\&. -.RE -.PP -\-M \fIoption\fR -.RS 4 -Sets the default memory context options\&. If set to -\fIexternal\fR, this causes the internal memory manager to be bypassed in favor of system\-provided memory allocation functions\&. If set to -\fIfill\fR, blocks of memory will be filled with tag values when allocated or freed, to assist debugging of memory problems\&. (\fInofill\fR -disables this behavior, and is the default unless -\fBnamed\fR -has been compiled with developer options\&.) -.RE -.PP -\-m \fIflag\fR -.RS 4 -Turn on memory usage debugging flags\&. Possible flags are -\fIusage\fR, -\fItrace\fR, -\fIrecord\fR, -\fIsize\fR, and -\fImctx\fR\&. These correspond to the ISC_MEM_DEBUGXXXX flags described in -\&. -.RE -.PP -\-n \fI#cpus\fR -.RS 4 -Create -\fI#cpus\fR -worker threads to take advantage of multiple CPUs\&. If not specified, -\fBnamed\fR -will try to determine the number of CPUs present and create one thread per CPU\&. If it is unable to determine the number of CPUs, a single worker thread will be created\&. -.RE -.PP -\-p \fIport\fR -.RS 4 -Listen for queries on port -\fIport\fR\&. If not specified, the default is port 53\&. -.RE -.PP -\-s -.RS 4 -Write memory usage statistics to -stdout -on exit\&. -.if n \{\ -.sp -.\} -.RS 4 -.it 1 an-trap -.nr an-no-space-flag 1 -.nr an-break-flag 1 -.br -.ps +1 -\fBNote\fR -.ps -1 -.br -This option is mainly of interest to BIND 9 developers and may be removed or changed in a future release\&. -.sp .5v -.RE -.RE -.PP -\-S \fI#max\-socks\fR -.RS 4 -Allow -\fBnamed\fR -to use up to -\fI#max\-socks\fR -sockets\&. The default value is 21000 on systems built with default configuration options, and 4096 on systems built with "configure \-\-with\-tuning=small"\&. -.if n \{\ -.sp -.\} -.RS 4 -.it 1 an-trap -.nr an-no-space-flag 1 -.nr an-break-flag 1 -.br -.ps +1 -\fBWarning\fR -.ps -1 -.br -This option should be unnecessary for the vast majority of users\&. The use of this option could even be harmful because the specified value may exceed the limitation of the underlying system API\&. It is therefore set only when the default configuration causes exhaustion of file descriptors and the operational environment is known to support the specified number of sockets\&. Note also that the actual maximum number is normally a little fewer than the specified value because -\fBnamed\fR -reserves some file descriptors for its internal use\&. -.sp .5v -.RE -.RE -.PP -\-t \fIdirectory\fR -.RS 4 -Chroot to -\fIdirectory\fR -after processing the command line arguments, but before reading the configuration file\&. -.if n \{\ -.sp -.\} -.RS 4 -.it 1 an-trap -.nr an-no-space-flag 1 -.nr an-break-flag 1 -.br -.ps +1 -\fBWarning\fR -.ps -1 -.br -This option should be used in conjunction with the -\fB\-u\fR -option, as chrooting a process running as root doesn\*(Aqt enhance security on most systems; the way -\fBchroot(2)\fR -is defined allows a process with root privileges to escape a chroot jail\&. -.sp .5v -.RE -.RE -.PP -\-U \fI#listeners\fR -.RS 4 -Use -\fI#listeners\fR -worker threads to listen for incoming UDP packets on each address\&. If not specified, -\fBnamed\fR -will calculate a default value based on the number of detected CPUs: 1 for 1 CPU, and the number of detected CPUs minus one for machines with more than 1 CPU\&. This cannot be increased to a value higher than the number of CPUs\&. If -\fB\-n\fR -has been set to a higher value than the number of detected CPUs, then -\fB\-U\fR -may be increased as high as that value, but no higher\&. On Windows, the number of UDP listeners is hardwired to 1 and this option has no effect\&. -.RE -.PP -\-u \fIuser\fR -.RS 4 -Setuid to -\fIuser\fR -after completing privileged operations, such as creating sockets that listen on privileged ports\&. -.if n \{\ -.sp -.\} -.RS 4 -.it 1 an-trap -.nr an-no-space-flag 1 -.nr an-break-flag 1 -.br -.ps +1 -\fBNote\fR -.ps -1 -.br -On Linux, -\fBnamed\fR -uses the kernel\*(Aqs capability mechanism to drop all root privileges except the ability to -\fBbind(2)\fR -to a privileged port and set process resource limits\&. Unfortunately, this means that the -\fB\-u\fR -option only works when -\fBnamed\fR -is run on kernel 2\&.2\&.18 or later, or kernel 2\&.3\&.99\-pre3 or later, since previous kernels did not allow privileges to be retained after -\fBsetuid(2)\fR\&. -.sp .5v -.RE -.RE -.PP -\-v -.RS 4 -Report the version number and exit\&. -.RE -.PP -\-V -.RS 4 -Report the version number and build options, and exit\&. -.RE -.PP -\-X \fIlock\-file\fR -.RS 4 -Acquire a lock on the specified file at runtime; this helps to prevent duplicate -\fBnamed\fR -instances from running simultaneously\&. Use of this option overrides the -\fBlock\-file\fR -option in -named\&.conf\&. If set to -none, the lock file check is disabled\&. -.RE -.PP -\-x \fIcache\-file\fR -.RS 4 -Load data from -\fIcache\-file\fR -into the cache of the default view\&. -.if n \{\ -.sp -.\} -.RS 4 -.it 1 an-trap -.nr an-no-space-flag 1 -.nr an-break-flag 1 -.br -.ps +1 -\fBWarning\fR -.ps -1 -.br -This option must not be used\&. It is only of interest to BIND 9 developers and may be removed or changed in a future release\&. -.sp .5v -.RE -.RE -.SH "SIGNALS" -.PP -In routine operation, signals should not be used to control the nameserver; -\fBrndc\fR -should be used instead\&. -.PP -SIGHUP -.RS 4 -Force a reload of the server\&. -.RE -.PP -SIGINT, SIGTERM -.RS 4 -Shut down the server\&. -.RE -.PP -The result of sending any other signals to the server is undefined\&. -.SH "CONFIGURATION" -.PP -The -\fBnamed\fR -configuration file is too complex to describe in detail here\&. A complete description is provided in the -BIND 9 Administrator Reference Manual\&. -.PP -\fBnamed\fR -inherits the -\fBumask\fR -(file creation mode mask) from the parent process\&. If files created by -\fBnamed\fR, such as journal files, need to have custom permissions, the -\fBumask\fR -should be set explicitly in the script used to start the -\fBnamed\fR -process\&. -.SH "FILES" -.PP -/etc/named\&.conf -.RS 4 -The default configuration file\&. -.RE -.PP -/var/run/named/named\&.pid -.RS 4 -The default process\-id file\&. -.RE -.SH "SEE ALSO" -.PP -RFC 1033, -RFC 1034, -RFC 1035, -\fBnamed-checkconf\fR(8), -\fBnamed-checkzone\fR(8), -\fBrndc\fR(8), -\fBnamed.conf\fR(5), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000, 2001, 2003-2009, 2011, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/named/named.conf.5 b/bin/named/named.conf.5 deleted file mode 100644 index a3de94887c..0000000000 --- a/bin/named/named.conf.5 +++ /dev/null @@ -1,1114 +0,0 @@ -.\" Copyright (C) 2004-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: named.conf -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2020-02-07 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NAMED\&.CONF" "5" "2020\-02\-07" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -named.conf \- configuration file for \fBnamed\fR -.SH "SYNOPSIS" -.HP \w'\fBnamed\&.conf\fR\ 'u -\fBnamed\&.conf\fR -.SH "DESCRIPTION" -.PP -named\&.conf -is the configuration file for -\fBnamed\fR\&. Statements are enclosed in braces and terminated with a semi\-colon\&. Clauses in the statements are also semi\-colon terminated\&. The usual comment styles are supported: -.PP -C style: /* */ -.PP -C++ style: // to end of line -.PP -Unix style: # to end of line -.SH "ACL" -.sp -.if n \{\ -.RS 4 -.\} -.nf -acl \fIstring\fR { \fIaddress_match_element\fR; \&.\&.\&. }; -.fi -.if n \{\ -.RE -.\} -.SH "CONTROLS" -.sp -.if n \{\ -.RS 4 -.\} -.nf -controls { - inet ( \fIipv4_address\fR | \fIipv6_address\fR | - * ) [ port ( \fIinteger\fR | * ) ] allow - { \fIaddress_match_element\fR; \&.\&.\&. } [ - keys { \fIstring\fR; \&.\&.\&. } ] [ read\-only - \fIboolean\fR ]; - unix \fIquoted_string\fR perm \fIinteger\fR - owner \fIinteger\fR group \fIinteger\fR [ - keys { \fIstring\fR; \&.\&.\&. } ] [ read\-only - \fIboolean\fR ]; -}; -.fi -.if n \{\ -.RE -.\} -.SH "DLZ" -.sp -.if n \{\ -.RS 4 -.\} -.nf -dlz \fIstring\fR { - database \fIstring\fR; - search \fIboolean\fR; -}; -.fi -.if n \{\ -.RE -.\} -.SH "DNSSEC-POLICY" -.sp -.if n \{\ -.RS 4 -.\} -.nf -dnssec\-policy \fIstring\fR { - dnskey\-ttl \fIduration\fR; - keys { ( csk | ksk | zsk ) ( key\-directory ) lifetime ( \fIduration\fR | unlimited ) - algorithm \fIinteger\fR [ \fIinteger\fR ]; \&.\&.\&. }; - max\-zone\-ttl \fIduration\fR; - parent\-ds\-ttl \fIduration\fR; - parent\-propagation\-delay \fIduration\fR; - parent\-registration\-delay \fIduration\fR; - publish\-safety \fIduration\fR; - retire\-safety \fIduration\fR; - signatures\-refresh \fIduration\fR; - signatures\-validity \fIduration\fR; - signatures\-validity\-dnskey \fIduration\fR; - zone\-propagation\-delay \fIduration\fR; -}; -.fi -.if n \{\ -.RE -.\} -.SH "DYNDB" -.sp -.if n \{\ -.RS 4 -.\} -.nf -dyndb \fIstring\fR \fIquoted_string\fR { - \fIunspecified\-text\fR }; -.fi -.if n \{\ -.RE -.\} -.SH "KEY" -.sp -.if n \{\ -.RS 4 -.\} -.nf -key \fIstring\fR { - algorithm \fIstring\fR; - secret \fIstring\fR; -}; -.fi -.if n \{\ -.RE -.\} -.SH "LOGGING" -.sp -.if n \{\ -.RS 4 -.\} -.nf -logging { - category \fIstring\fR { \fIstring\fR; \&.\&.\&. }; - channel \fIstring\fR { - buffered \fIboolean\fR; - file \fIquoted_string\fR [ versions ( unlimited | \fIinteger\fR ) ] - [ size \fIsize\fR ] [ suffix ( increment | timestamp ) ]; - null; - print\-category \fIboolean\fR; - print\-severity \fIboolean\fR; - print\-time ( iso8601 | iso8601\-utc | local | \fIboolean\fR ); - severity \fIlog_severity\fR; - stderr; - syslog [ \fIsyslog_facility\fR ]; - }; -}; -.fi -.if n \{\ -.RE -.\} -.SH "MANAGED-KEYS" -.PP -Deprecated \- see DNSSEC\-KEYS\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -managed\-keys { \fIstring\fR ( static\-key - | initial\-key | static\-ds | - initial\-ds ) \fIinteger\fR \fIinteger\fR - \fIinteger\fR \fIquoted_string\fR; \&.\&.\&. }; deprecated -.fi -.if n \{\ -.RE -.\} -.SH "MASTERS" -.sp -.if n \{\ -.RS 4 -.\} -.nf -masters \fIstring\fR [ port \fIinteger\fR ] [ dscp - \fIinteger\fR ] { ( \fImasters\fR | \fIipv4_address\fR [ - port \fIinteger\fR ] | \fIipv6_address\fR [ port - \fIinteger\fR ] ) [ key \fIstring\fR ]; \&.\&.\&. }; -.fi -.if n \{\ -.RE -.\} -.SH "OPTIONS" -.sp -.if n \{\ -.RS 4 -.\} -.nf -options { - allow\-new\-zones \fIboolean\fR; - allow\-notify { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-cache { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-cache\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-recursion { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-recursion\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-transfer { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update\-forwarding { \fIaddress_match_element\fR; \&.\&.\&. }; - also\-notify [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fImasters\fR | - \fIipv4_address\fR [ port \fIinteger\fR ] | \fIipv6_address\fR [ port - \fIinteger\fR ] ) [ key \fIstring\fR ]; \&.\&.\&. }; - alt\-transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) - ] [ dscp \fIinteger\fR ]; - alt\-transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | - * ) ] [ dscp \fIinteger\fR ]; - answer\-cookie \fIboolean\fR; - attach\-cache \fIstring\fR; - auth\-nxdomain \fIboolean\fR; // default changed - auto\-dnssec ( allow | maintain | off ); - automatic\-interface\-scan \fIboolean\fR; - avoid\-v4\-udp\-ports { \fIportrange\fR; \&.\&.\&. }; - avoid\-v6\-udp\-ports { \fIportrange\fR; \&.\&.\&. }; - bindkeys\-file \fIquoted_string\fR; - blackhole { \fIaddress_match_element\fR; \&.\&.\&. }; - cache\-file \fIquoted_string\fR; - catalog\-zones { zone \fIstring\fR [ default\-masters [ port \fIinteger\fR ] - [ dscp \fIinteger\fR ] { ( \fImasters\fR | \fIipv4_address\fR [ port - \fIinteger\fR ] | \fIipv6_address\fR [ port \fIinteger\fR ] ) [ key - \fIstring\fR ]; \&.\&.\&. } ] [ zone\-directory \fIquoted_string\fR ] [ - in\-memory \fIboolean\fR ] [ min\-update\-interval \fIduration\fR ]; \&.\&.\&. }; - check\-dup\-records ( fail | warn | ignore ); - check\-integrity \fIboolean\fR; - check\-mx ( fail | warn | ignore ); - check\-mx\-cname ( fail | warn | ignore ); - check\-names ( primary | master | - secondary | slave | response ) ( - fail | warn | ignore ); - check\-sibling \fIboolean\fR; - check\-spf ( warn | ignore ); - check\-srv\-cname ( fail | warn | ignore ); - check\-wildcard \fIboolean\fR; - clients\-per\-query \fIinteger\fR; - cookie\-algorithm ( aes | siphash24 ); - cookie\-secret \fIstring\fR; - coresize ( default | unlimited | \fIsizeval\fR ); - datasize ( default | unlimited | \fIsizeval\fR ); - deny\-answer\-addresses { \fIaddress_match_element\fR; \&.\&.\&. } [ - except\-from { \fIstring\fR; \&.\&.\&. } ]; - deny\-answer\-aliases { \fIstring\fR; \&.\&.\&. } [ except\-from { \fIstring\fR; \&.\&.\&. - } ]; - dialup ( notify | notify\-passive | passive | refresh | \fIboolean\fR ); - directory \fIquoted_string\fR; - disable\-algorithms \fIstring\fR { \fIstring\fR; - \&.\&.\&. }; - disable\-ds\-digests \fIstring\fR { \fIstring\fR; - \&.\&.\&. }; - disable\-empty\-zone \fIstring\fR; - dns64 \fInetprefix\fR { - break\-dnssec \fIboolean\fR; - clients { \fIaddress_match_element\fR; \&.\&.\&. }; - exclude { \fIaddress_match_element\fR; \&.\&.\&. }; - mapped { \fIaddress_match_element\fR; \&.\&.\&. }; - recursive\-only \fIboolean\fR; - suffix \fIipv6_address\fR; - }; - dns64\-contact \fIstring\fR; - dns64\-server \fIstring\fR; - dnskey\-sig\-validity \fIinteger\fR; - dnsrps\-enable \fIboolean\fR; - dnsrps\-options { \fIunspecified\-text\fR }; - dnssec\-accept\-expired \fIboolean\fR; - dnssec\-dnskey\-kskonly \fIboolean\fR; - dnssec\-loadkeys\-interval \fIinteger\fR; - dnssec\-must\-be\-secure \fIstring\fR \fIboolean\fR; - dnssec\-policy \fIstring\fR; - dnssec\-secure\-to\-insecure \fIboolean\fR; - dnssec\-update\-mode ( maintain | no\-resign ); - dnssec\-validation ( yes | no | auto ); - dnstap { ( all | auth | client | forwarder | - resolver | update ) [ ( query | response ) ]; - \&.\&.\&. }; - dnstap\-identity ( \fIquoted_string\fR | none | - hostname ); - dnstap\-output ( file | unix ) \fIquoted_string\fR [ - size ( unlimited | \fIsize\fR ) ] [ versions ( - unlimited | \fIinteger\fR ) ] [ suffix ( increment - | timestamp ) ]; - dnstap\-version ( \fIquoted_string\fR | none ); - dscp \fIinteger\fR; - dual\-stack\-servers [ port \fIinteger\fR ] { ( \fIquoted_string\fR [ port - \fIinteger\fR ] [ dscp \fIinteger\fR ] | \fIipv4_address\fR [ port - \fIinteger\fR ] [ dscp \fIinteger\fR ] | \fIipv6_address\fR [ port - \fIinteger\fR ] [ dscp \fIinteger\fR ] ); \&.\&.\&. }; - dump\-file \fIquoted_string\fR; - edns\-udp\-size \fIinteger\fR; - empty\-contact \fIstring\fR; - empty\-server \fIstring\fR; - empty\-zones\-enable \fIboolean\fR; - fetch\-quota\-params \fIinteger\fR \fIfixedpoint\fR \fIfixedpoint\fR \fIfixedpoint\fR; - fetches\-per\-server \fIinteger\fR [ ( drop | fail ) ]; - fetches\-per\-zone \fIinteger\fR [ ( drop | fail ) ]; - files ( default | unlimited | \fIsizeval\fR ); - flush\-zones\-on\-shutdown \fIboolean\fR; - forward ( first | only ); - forwarders [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fIipv4_address\fR - | \fIipv6_address\fR ) [ port \fIinteger\fR ] [ dscp \fIinteger\fR ]; \&.\&.\&. }; - fstrm\-set\-buffer\-hint \fIinteger\fR; - fstrm\-set\-flush\-timeout \fIinteger\fR; - fstrm\-set\-input\-queue\-size \fIinteger\fR; - fstrm\-set\-output\-notify\-threshold \fIinteger\fR; - fstrm\-set\-output\-queue\-model ( mpsc | spsc ); - fstrm\-set\-output\-queue\-size \fIinteger\fR; - fstrm\-set\-reopen\-interval \fIduration\fR; - geoip\-directory ( \fIquoted_string\fR | none ); - glue\-cache \fIboolean\fR; - heartbeat\-interval \fIinteger\fR; - hostname ( \fIquoted_string\fR | none ); - inline\-signing \fIboolean\fR; - interface\-interval \fIduration\fR; - ixfr\-from\-differences ( primary | master | secondary | slave | - \fIboolean\fR ); - keep\-response\-order { \fIaddress_match_element\fR; \&.\&.\&. }; - key\-directory \fIquoted_string\fR; - lame\-ttl \fIduration\fR; - listen\-on [ port \fIinteger\fR ] [ dscp - \fIinteger\fR ] { - \fIaddress_match_element\fR; \&.\&.\&. }; - listen\-on\-v6 [ port \fIinteger\fR ] [ dscp - \fIinteger\fR ] { - \fIaddress_match_element\fR; \&.\&.\&. }; - lmdb\-mapsize \fIsizeval\fR; - lock\-file ( \fIquoted_string\fR | none ); - managed\-keys\-directory \fIquoted_string\fR; - masterfile\-format ( map | raw | text ); - masterfile\-style ( full | relative ); - match\-mapped\-addresses \fIboolean\fR; - max\-cache\-size ( default | unlimited | \fIsizeval\fR | \fIpercentage\fR ); - max\-cache\-ttl \fIduration\fR; - max\-clients\-per\-query \fIinteger\fR; - max\-journal\-size ( default | unlimited | \fIsizeval\fR ); - max\-ncache\-ttl \fIduration\fR; - max\-records \fIinteger\fR; - max\-recursion\-depth \fIinteger\fR; - max\-recursion\-queries \fIinteger\fR; - max\-refresh\-time \fIinteger\fR; - max\-retry\-time \fIinteger\fR; - max\-rsa\-exponent\-size \fIinteger\fR; - max\-stale\-ttl \fIduration\fR; - max\-transfer\-idle\-in \fIinteger\fR; - max\-transfer\-idle\-out \fIinteger\fR; - max\-transfer\-time\-in \fIinteger\fR; - max\-transfer\-time\-out \fIinteger\fR; - max\-udp\-size \fIinteger\fR; - max\-zone\-ttl ( unlimited | \fIduration\fR ); - memstatistics \fIboolean\fR; - memstatistics\-file \fIquoted_string\fR; - message\-compression \fIboolean\fR; - min\-cache\-ttl \fIduration\fR; - min\-ncache\-ttl \fIduration\fR; - min\-refresh\-time \fIinteger\fR; - min\-retry\-time \fIinteger\fR; - minimal\-any \fIboolean\fR; - minimal\-responses ( no\-auth | no\-auth\-recursive | \fIboolean\fR ); - multi\-master \fIboolean\fR; - new\-zones\-directory \fIquoted_string\fR; - no\-case\-compress { \fIaddress_match_element\fR; \&.\&.\&. }; - nocookie\-udp\-size \fIinteger\fR; - notify ( explicit | master\-only | \fIboolean\fR ); - notify\-delay \fIinteger\fR; - notify\-rate \fIinteger\fR; - notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) ] - [ dscp \fIinteger\fR ]; - notify\-to\-soa \fIboolean\fR; - nta\-lifetime \fIduration\fR; - nta\-recheck \fIduration\fR; - nxdomain\-redirect \fIstring\fR; - pid\-file ( \fIquoted_string\fR | none ); - port \fIinteger\fR; - preferred\-glue \fIstring\fR; - prefetch \fIinteger\fR [ \fIinteger\fR ]; - provide\-ixfr \fIboolean\fR; - qname\-minimization ( strict | relaxed | disabled | off ); - query\-source ( ( [ address ] ( \fIipv4_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] ) | ( [ [ address ] ( \fIipv4_address\fR | * ) ] - port ( \fIinteger\fR | * ) ) ) [ dscp \fIinteger\fR ]; - query\-source\-v6 ( ( [ address ] ( \fIipv6_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] ) | ( [ [ address ] ( \fIipv6_address\fR | * ) ] - port ( \fIinteger\fR | * ) ) ) [ dscp \fIinteger\fR ]; - querylog \fIboolean\fR; - random\-device ( \fIquoted_string\fR | none ); - rate\-limit { - all\-per\-second \fIinteger\fR; - errors\-per\-second \fIinteger\fR; - exempt\-clients { \fIaddress_match_element\fR; \&.\&.\&. }; - ipv4\-prefix\-length \fIinteger\fR; - ipv6\-prefix\-length \fIinteger\fR; - log\-only \fIboolean\fR; - max\-table\-size \fIinteger\fR; - min\-table\-size \fIinteger\fR; - nodata\-per\-second \fIinteger\fR; - nxdomains\-per\-second \fIinteger\fR; - qps\-scale \fIinteger\fR; - referrals\-per\-second \fIinteger\fR; - responses\-per\-second \fIinteger\fR; - slip \fIinteger\fR; - window \fIinteger\fR; - }; - recursing\-file \fIquoted_string\fR; - recursion \fIboolean\fR; - recursive\-clients \fIinteger\fR; - request\-expire \fIboolean\fR; - request\-ixfr \fIboolean\fR; - request\-nsid \fIboolean\fR; - require\-server\-cookie \fIboolean\fR; - reserved\-sockets \fIinteger\fR; - resolver\-nonbackoff\-tries \fIinteger\fR; - resolver\-query\-timeout \fIinteger\fR; - resolver\-retry\-interval \fIinteger\fR; - response\-padding { \fIaddress_match_element\fR; \&.\&.\&. } block\-size - \fIinteger\fR; - response\-policy { zone \fIstring\fR [ add\-soa \fIboolean\fR ] [ log - \fIboolean\fR ] [ max\-policy\-ttl \fIduration\fR ] [ min\-update\-interval - \fIduration\fR ] [ policy ( cname | disabled | drop | given | no\-op - | nodata | nxdomain | passthru | tcp\-only \fIquoted_string\fR ) ] [ - recursive\-only \fIboolean\fR ] [ nsip\-enable \fIboolean\fR ] [ - nsdname\-enable \fIboolean\fR ]; \&.\&.\&. } [ add\-soa \fIboolean\fR ] [ - break\-dnssec \fIboolean\fR ] [ max\-policy\-ttl \fIduration\fR ] [ - min\-update\-interval \fIduration\fR ] [ min\-ns\-dots \fIinteger\fR ] [ - nsip\-wait\-recurse \fIboolean\fR ] [ qname\-wait\-recurse \fIboolean\fR ] - [ recursive\-only \fIboolean\fR ] [ nsip\-enable \fIboolean\fR ] [ - nsdname\-enable \fIboolean\fR ] [ dnsrps\-enable \fIboolean\fR ] [ - dnsrps\-options { \fIunspecified\-text\fR } ]; - root\-delegation\-only [ exclude { \fIstring\fR; \&.\&.\&. } ]; - root\-key\-sentinel \fIboolean\fR; - rrset\-order { [ class \fIstring\fR ] [ type \fIstring\fR ] [ name - \fIquoted_string\fR ] \fIstring\fR \fIstring\fR; \&.\&.\&. }; - secroots\-file \fIquoted_string\fR; - send\-cookie \fIboolean\fR; - serial\-query\-rate \fIinteger\fR; - serial\-update\-method ( date | increment | unixtime ); - server\-id ( \fIquoted_string\fR | none | hostname ); - servfail\-ttl \fIduration\fR; - session\-keyalg \fIstring\fR; - session\-keyfile ( \fIquoted_string\fR | none ); - session\-keyname \fIstring\fR; - sig\-signing\-nodes \fIinteger\fR; - sig\-signing\-signatures \fIinteger\fR; - sig\-signing\-type \fIinteger\fR; - sig\-validity\-interval \fIinteger\fR [ \fIinteger\fR ]; - sortlist { \fIaddress_match_element\fR; \&.\&.\&. }; - stacksize ( default | unlimited | \fIsizeval\fR ); - stale\-answer\-enable \fIboolean\fR; - stale\-answer\-ttl \fIduration\fR; - startup\-notify\-rate \fIinteger\fR; - statistics\-file \fIquoted_string\fR; - synth\-from\-dnssec \fIboolean\fR; - tcp\-advertised\-timeout \fIinteger\fR; - tcp\-clients \fIinteger\fR; - tcp\-idle\-timeout \fIinteger\fR; - tcp\-initial\-timeout \fIinteger\fR; - tcp\-keepalive\-timeout \fIinteger\fR; - tcp\-listen\-queue \fIinteger\fR; - tkey\-dhkey \fIquoted_string\fR \fIinteger\fR; - tkey\-domain \fIquoted_string\fR; - tkey\-gssapi\-credential \fIquoted_string\fR; - tkey\-gssapi\-keytab \fIquoted_string\fR; - transfer\-format ( many\-answers | one\-answer ); - transfer\-message\-size \fIinteger\fR; - transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) - ] [ dscp \fIinteger\fR ]; - transfers\-in \fIinteger\fR; - transfers\-out \fIinteger\fR; - transfers\-per\-ns \fIinteger\fR; - trust\-anchor\-telemetry \fIboolean\fR; // experimental - try\-tcp\-refresh \fIboolean\fR; - update\-check\-ksk \fIboolean\fR; - use\-alt\-transfer\-source \fIboolean\fR; - use\-v4\-udp\-ports { \fIportrange\fR; \&.\&.\&. }; - use\-v6\-udp\-ports { \fIportrange\fR; \&.\&.\&. }; - v6\-bias \fIinteger\fR; - validate\-except { \fIstring\fR; \&.\&.\&. }; - version ( \fIquoted_string\fR | none ); - zero\-no\-soa\-ttl \fIboolean\fR; - zero\-no\-soa\-ttl\-cache \fIboolean\fR; - zone\-statistics ( full | terse | none | \fIboolean\fR ); -}; -.fi -.if n \{\ -.RE -.\} -.SH "PLUGIN" -.sp -.if n \{\ -.RS 4 -.\} -.nf -plugin ( query ) \fIstring\fR [ { \fIunspecified\-text\fR - } ]; -.fi -.if n \{\ -.RE -.\} -.SH "SERVER" -.sp -.if n \{\ -.RS 4 -.\} -.nf -server \fInetprefix\fR { - bogus \fIboolean\fR; - edns \fIboolean\fR; - edns\-udp\-size \fIinteger\fR; - edns\-version \fIinteger\fR; - keys \fIserver_key\fR; - max\-udp\-size \fIinteger\fR; - notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) ] - [ dscp \fIinteger\fR ]; - padding \fIinteger\fR; - provide\-ixfr \fIboolean\fR; - query\-source ( ( [ address ] ( \fIipv4_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] ) | ( [ [ address ] ( \fIipv4_address\fR | * ) ] - port ( \fIinteger\fR | * ) ) ) [ dscp \fIinteger\fR ]; - query\-source\-v6 ( ( [ address ] ( \fIipv6_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] ) | ( [ [ address ] ( \fIipv6_address\fR | * ) ] - port ( \fIinteger\fR | * ) ) ) [ dscp \fIinteger\fR ]; - request\-expire \fIboolean\fR; - request\-ixfr \fIboolean\fR; - request\-nsid \fIboolean\fR; - send\-cookie \fIboolean\fR; - tcp\-keepalive \fIboolean\fR; - tcp\-only \fIboolean\fR; - transfer\-format ( many\-answers | one\-answer ); - transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) - ] [ dscp \fIinteger\fR ]; - transfers \fIinteger\fR; -}; -.fi -.if n \{\ -.RE -.\} -.SH "STATISTICS-CHANNELS" -.sp -.if n \{\ -.RS 4 -.\} -.nf -statistics\-channels { - inet ( \fIipv4_address\fR | \fIipv6_address\fR | - * ) [ port ( \fIinteger\fR | * ) ] [ - allow { \fIaddress_match_element\fR; \&.\&.\&. - } ]; -}; -.fi -.if n \{\ -.RE -.\} -.SH "TRUST-ANCHORS" -.sp -.if n \{\ -.RS 4 -.\} -.nf -trust\-anchors { \fIstring\fR ( static\-key | - initial\-key | static\-ds | initial\-ds ) - \fIinteger\fR \fIinteger\fR \fIinteger\fR - \fIquoted_string\fR; \&.\&.\&. }; -.fi -.if n \{\ -.RE -.\} -.SH "TRUSTED-KEYS" -.PP -Deprecated \- see DNSSEC\-KEYS\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -trusted\-keys { \fIstring\fR \fIinteger\fR - \fIinteger\fR \fIinteger\fR - \fIquoted_string\fR; \&.\&.\&. }; deprecated -.fi -.if n \{\ -.RE -.\} -.SH "VIEW" -.sp -.if n \{\ -.RS 4 -.\} -.nf -view \fIstring\fR [ \fIclass\fR ] { - allow\-new\-zones \fIboolean\fR; - allow\-notify { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-cache { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-cache\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-recursion { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-recursion\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-transfer { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update\-forwarding { \fIaddress_match_element\fR; \&.\&.\&. }; - also\-notify [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fImasters\fR | - \fIipv4_address\fR [ port \fIinteger\fR ] | \fIipv6_address\fR [ port - \fIinteger\fR ] ) [ key \fIstring\fR ]; \&.\&.\&. }; - alt\-transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) - ] [ dscp \fIinteger\fR ]; - alt\-transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | - * ) ] [ dscp \fIinteger\fR ]; - attach\-cache \fIstring\fR; - auth\-nxdomain \fIboolean\fR; // default changed - auto\-dnssec ( allow | maintain | off ); - cache\-file \fIquoted_string\fR; - catalog\-zones { zone \fIstring\fR [ default\-masters [ port \fIinteger\fR ] - [ dscp \fIinteger\fR ] { ( \fImasters\fR | \fIipv4_address\fR [ port - \fIinteger\fR ] | \fIipv6_address\fR [ port \fIinteger\fR ] ) [ key - \fIstring\fR ]; \&.\&.\&. } ] [ zone\-directory \fIquoted_string\fR ] [ - in\-memory \fIboolean\fR ] [ min\-update\-interval \fIduration\fR ]; \&.\&.\&. }; - check\-dup\-records ( fail | warn | ignore ); - check\-integrity \fIboolean\fR; - check\-mx ( fail | warn | ignore ); - check\-mx\-cname ( fail | warn | ignore ); - check\-names ( primary | master | - secondary | slave | response ) ( - fail | warn | ignore ); - check\-sibling \fIboolean\fR; - check\-spf ( warn | ignore ); - check\-srv\-cname ( fail | warn | ignore ); - check\-wildcard \fIboolean\fR; - clients\-per\-query \fIinteger\fR; - deny\-answer\-addresses { \fIaddress_match_element\fR; \&.\&.\&. } [ - except\-from { \fIstring\fR; \&.\&.\&. } ]; - deny\-answer\-aliases { \fIstring\fR; \&.\&.\&. } [ except\-from { \fIstring\fR; \&.\&.\&. - } ]; - dialup ( notify | notify\-passive | passive | refresh | \fIboolean\fR ); - disable\-algorithms \fIstring\fR { \fIstring\fR; - \&.\&.\&. }; - disable\-ds\-digests \fIstring\fR { \fIstring\fR; - \&.\&.\&. }; - disable\-empty\-zone \fIstring\fR; - dlz \fIstring\fR { - database \fIstring\fR; - search \fIboolean\fR; - }; - dns64 \fInetprefix\fR { - break\-dnssec \fIboolean\fR; - clients { \fIaddress_match_element\fR; \&.\&.\&. }; - exclude { \fIaddress_match_element\fR; \&.\&.\&. }; - mapped { \fIaddress_match_element\fR; \&.\&.\&. }; - recursive\-only \fIboolean\fR; - suffix \fIipv6_address\fR; - }; - dns64\-contact \fIstring\fR; - dns64\-server \fIstring\fR; - dnskey\-sig\-validity \fIinteger\fR; - dnsrps\-enable \fIboolean\fR; - dnsrps\-options { \fIunspecified\-text\fR }; - dnssec\-accept\-expired \fIboolean\fR; - dnssec\-dnskey\-kskonly \fIboolean\fR; - dnssec\-loadkeys\-interval \fIinteger\fR; - dnssec\-must\-be\-secure \fIstring\fR \fIboolean\fR; - dnssec\-policy \fIstring\fR; - dnssec\-secure\-to\-insecure \fIboolean\fR; - dnssec\-update\-mode ( maintain | no\-resign ); - dnssec\-validation ( yes | no | auto ); - dnstap { ( all | auth | client | forwarder | - resolver | update ) [ ( query | response ) ]; - \&.\&.\&. }; - dual\-stack\-servers [ port \fIinteger\fR ] { ( \fIquoted_string\fR [ port - \fIinteger\fR ] [ dscp \fIinteger\fR ] | \fIipv4_address\fR [ port - \fIinteger\fR ] [ dscp \fIinteger\fR ] | \fIipv6_address\fR [ port - \fIinteger\fR ] [ dscp \fIinteger\fR ] ); \&.\&.\&. }; - dyndb \fIstring\fR \fIquoted_string\fR { - \fIunspecified\-text\fR }; - edns\-udp\-size \fIinteger\fR; - empty\-contact \fIstring\fR; - empty\-server \fIstring\fR; - empty\-zones\-enable \fIboolean\fR; - fetch\-quota\-params \fIinteger\fR \fIfixedpoint\fR \fIfixedpoint\fR \fIfixedpoint\fR; - fetches\-per\-server \fIinteger\fR [ ( drop | fail ) ]; - fetches\-per\-zone \fIinteger\fR [ ( drop | fail ) ]; - forward ( first | only ); - forwarders [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fIipv4_address\fR - | \fIipv6_address\fR ) [ port \fIinteger\fR ] [ dscp \fIinteger\fR ]; \&.\&.\&. }; - glue\-cache \fIboolean\fR; - inline\-signing \fIboolean\fR; - ixfr\-from\-differences ( primary | master | secondary | slave | - \fIboolean\fR ); - key \fIstring\fR { - algorithm \fIstring\fR; - secret \fIstring\fR; - }; - key\-directory \fIquoted_string\fR; - lame\-ttl \fIduration\fR; - lmdb\-mapsize \fIsizeval\fR; - managed\-keys { \fIstring\fR ( - static\-key | initial\-key - | static\-ds | initial\-ds - ) \fIinteger\fR \fIinteger\fR - \fIinteger\fR - \fIquoted_string\fR; \&.\&.\&. }; deprecated - masterfile\-format ( map | raw | text ); - masterfile\-style ( full | relative ); - match\-clients { \fIaddress_match_element\fR; \&.\&.\&. }; - match\-destinations { \fIaddress_match_element\fR; \&.\&.\&. }; - match\-recursive\-only \fIboolean\fR; - max\-cache\-size ( default | unlimited | \fIsizeval\fR | \fIpercentage\fR ); - max\-cache\-ttl \fIduration\fR; - max\-clients\-per\-query \fIinteger\fR; - max\-journal\-size ( default | unlimited | \fIsizeval\fR ); - max\-ncache\-ttl \fIduration\fR; - max\-records \fIinteger\fR; - max\-recursion\-depth \fIinteger\fR; - max\-recursion\-queries \fIinteger\fR; - max\-refresh\-time \fIinteger\fR; - max\-retry\-time \fIinteger\fR; - max\-stale\-ttl \fIduration\fR; - max\-transfer\-idle\-in \fIinteger\fR; - max\-transfer\-idle\-out \fIinteger\fR; - max\-transfer\-time\-in \fIinteger\fR; - max\-transfer\-time\-out \fIinteger\fR; - max\-udp\-size \fIinteger\fR; - max\-zone\-ttl ( unlimited | \fIduration\fR ); - message\-compression \fIboolean\fR; - min\-cache\-ttl \fIduration\fR; - min\-ncache\-ttl \fIduration\fR; - min\-refresh\-time \fIinteger\fR; - min\-retry\-time \fIinteger\fR; - minimal\-any \fIboolean\fR; - minimal\-responses ( no\-auth | no\-auth\-recursive | \fIboolean\fR ); - multi\-master \fIboolean\fR; - new\-zones\-directory \fIquoted_string\fR; - no\-case\-compress { \fIaddress_match_element\fR; \&.\&.\&. }; - nocookie\-udp\-size \fIinteger\fR; - notify ( explicit | master\-only | \fIboolean\fR ); - notify\-delay \fIinteger\fR; - notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) ] - [ dscp \fIinteger\fR ]; - notify\-to\-soa \fIboolean\fR; - nta\-lifetime \fIduration\fR; - nta\-recheck \fIduration\fR; - nxdomain\-redirect \fIstring\fR; - plugin ( query ) \fIstring\fR [ { - \fIunspecified\-text\fR } ]; - preferred\-glue \fIstring\fR; - prefetch \fIinteger\fR [ \fIinteger\fR ]; - provide\-ixfr \fIboolean\fR; - qname\-minimization ( strict | relaxed | disabled | off ); - query\-source ( ( [ address ] ( \fIipv4_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] ) | ( [ [ address ] ( \fIipv4_address\fR | * ) ] - port ( \fIinteger\fR | * ) ) ) [ dscp \fIinteger\fR ]; - query\-source\-v6 ( ( [ address ] ( \fIipv6_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] ) | ( [ [ address ] ( \fIipv6_address\fR | * ) ] - port ( \fIinteger\fR | * ) ) ) [ dscp \fIinteger\fR ]; - rate\-limit { - all\-per\-second \fIinteger\fR; - errors\-per\-second \fIinteger\fR; - exempt\-clients { \fIaddress_match_element\fR; \&.\&.\&. }; - ipv4\-prefix\-length \fIinteger\fR; - ipv6\-prefix\-length \fIinteger\fR; - log\-only \fIboolean\fR; - max\-table\-size \fIinteger\fR; - min\-table\-size \fIinteger\fR; - nodata\-per\-second \fIinteger\fR; - nxdomains\-per\-second \fIinteger\fR; - qps\-scale \fIinteger\fR; - referrals\-per\-second \fIinteger\fR; - responses\-per\-second \fIinteger\fR; - slip \fIinteger\fR; - window \fIinteger\fR; - }; - recursion \fIboolean\fR; - request\-expire \fIboolean\fR; - request\-ixfr \fIboolean\fR; - request\-nsid \fIboolean\fR; - require\-server\-cookie \fIboolean\fR; - resolver\-nonbackoff\-tries \fIinteger\fR; - resolver\-query\-timeout \fIinteger\fR; - resolver\-retry\-interval \fIinteger\fR; - response\-padding { \fIaddress_match_element\fR; \&.\&.\&. } block\-size - \fIinteger\fR; - response\-policy { zone \fIstring\fR [ add\-soa \fIboolean\fR ] [ log - \fIboolean\fR ] [ max\-policy\-ttl \fIduration\fR ] [ min\-update\-interval - \fIduration\fR ] [ policy ( cname | disabled | drop | given | no\-op - | nodata | nxdomain | passthru | tcp\-only \fIquoted_string\fR ) ] [ - recursive\-only \fIboolean\fR ] [ nsip\-enable \fIboolean\fR ] [ - nsdname\-enable \fIboolean\fR ]; \&.\&.\&. } [ add\-soa \fIboolean\fR ] [ - break\-dnssec \fIboolean\fR ] [ max\-policy\-ttl \fIduration\fR ] [ - min\-update\-interval \fIduration\fR ] [ min\-ns\-dots \fIinteger\fR ] [ - nsip\-wait\-recurse \fIboolean\fR ] [ qname\-wait\-recurse \fIboolean\fR ] - [ recursive\-only \fIboolean\fR ] [ nsip\-enable \fIboolean\fR ] [ - nsdname\-enable \fIboolean\fR ] [ dnsrps\-enable \fIboolean\fR ] [ - dnsrps\-options { \fIunspecified\-text\fR } ]; - root\-delegation\-only [ exclude { \fIstring\fR; \&.\&.\&. } ]; - root\-key\-sentinel \fIboolean\fR; - rrset\-order { [ class \fIstring\fR ] [ type \fIstring\fR ] [ name - \fIquoted_string\fR ] \fIstring\fR \fIstring\fR; \&.\&.\&. }; - send\-cookie \fIboolean\fR; - serial\-update\-method ( date | increment | unixtime ); - server \fInetprefix\fR { - bogus \fIboolean\fR; - edns \fIboolean\fR; - edns\-udp\-size \fIinteger\fR; - edns\-version \fIinteger\fR; - keys \fIserver_key\fR; - max\-udp\-size \fIinteger\fR; - notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * - ) ] [ dscp \fIinteger\fR ]; - notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR - | * ) ] [ dscp \fIinteger\fR ]; - padding \fIinteger\fR; - provide\-ixfr \fIboolean\fR; - query\-source ( ( [ address ] ( \fIipv4_address\fR | * ) [ port - ( \fIinteger\fR | * ) ] ) | ( [ [ address ] ( - \fIipv4_address\fR | * ) ] port ( \fIinteger\fR | * ) ) ) [ - dscp \fIinteger\fR ]; - query\-source\-v6 ( ( [ address ] ( \fIipv6_address\fR | * ) [ - port ( \fIinteger\fR | * ) ] ) | ( [ [ address ] ( - \fIipv6_address\fR | * ) ] port ( \fIinteger\fR | * ) ) ) [ - dscp \fIinteger\fR ]; - request\-expire \fIboolean\fR; - request\-ixfr \fIboolean\fR; - request\-nsid \fIboolean\fR; - send\-cookie \fIboolean\fR; - tcp\-keepalive \fIboolean\fR; - tcp\-only \fIboolean\fR; - transfer\-format ( many\-answers | one\-answer ); - transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | - * ) ] [ dscp \fIinteger\fR ]; - transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] [ dscp \fIinteger\fR ]; - transfers \fIinteger\fR; - }; - servfail\-ttl \fIduration\fR; - sig\-signing\-nodes \fIinteger\fR; - sig\-signing\-signatures \fIinteger\fR; - sig\-signing\-type \fIinteger\fR; - sig\-validity\-interval \fIinteger\fR [ \fIinteger\fR ]; - sortlist { \fIaddress_match_element\fR; \&.\&.\&. }; - stale\-answer\-enable \fIboolean\fR; - stale\-answer\-ttl \fIduration\fR; - synth\-from\-dnssec \fIboolean\fR; - transfer\-format ( many\-answers | one\-answer ); - transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) - ] [ dscp \fIinteger\fR ]; - trust\-anchor\-telemetry \fIboolean\fR; // experimental - trust\-anchors { \fIstring\fR ( static\-key | - initial\-key | static\-ds | initial\-ds - ) \fIinteger\fR \fIinteger\fR \fIinteger\fR - \fIquoted_string\fR; \&.\&.\&. }; - trusted\-keys { \fIstring\fR - \fIinteger\fR \fIinteger\fR - \fIinteger\fR - \fIquoted_string\fR; \&.\&.\&. }; deprecated - try\-tcp\-refresh \fIboolean\fR; - update\-check\-ksk \fIboolean\fR; - use\-alt\-transfer\-source \fIboolean\fR; - v6\-bias \fIinteger\fR; - validate\-except { \fIstring\fR; \&.\&.\&. }; - zero\-no\-soa\-ttl \fIboolean\fR; - zero\-no\-soa\-ttl\-cache \fIboolean\fR; - zone \fIstring\fR [ \fIclass\fR ] { - allow\-notify { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-transfer { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update\-forwarding { \fIaddress_match_element\fR; \&.\&.\&. }; - also\-notify [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( - \fImasters\fR | \fIipv4_address\fR [ port \fIinteger\fR ] | - \fIipv6_address\fR [ port \fIinteger\fR ] ) [ key \fIstring\fR ]; - \&.\&.\&. }; - alt\-transfer\-source ( \fIipv4_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] [ dscp \fIinteger\fR ]; - alt\-transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] [ dscp \fIinteger\fR ]; - auto\-dnssec ( allow | maintain | off ); - check\-dup\-records ( fail | warn | ignore ); - check\-integrity \fIboolean\fR; - check\-mx ( fail | warn | ignore ); - check\-mx\-cname ( fail | warn | ignore ); - check\-names ( fail | warn | ignore ); - check\-sibling \fIboolean\fR; - check\-spf ( warn | ignore ); - check\-srv\-cname ( fail | warn | ignore ); - check\-wildcard \fIboolean\fR; - database \fIstring\fR; - delegation\-only \fIboolean\fR; - dialup ( notify | notify\-passive | passive | refresh | - \fIboolean\fR ); - dlz \fIstring\fR; - dnskey\-sig\-validity \fIinteger\fR; - dnssec\-dnskey\-kskonly \fIboolean\fR; - dnssec\-loadkeys\-interval \fIinteger\fR; - dnssec\-policy \fIstring\fR; - dnssec\-secure\-to\-insecure \fIboolean\fR; - dnssec\-update\-mode ( maintain | no\-resign ); - file \fIquoted_string\fR; - forward ( first | only ); - forwarders [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( - \fIipv4_address\fR | \fIipv6_address\fR ) [ port \fIinteger\fR ] [ - dscp \fIinteger\fR ]; \&.\&.\&. }; - in\-view \fIstring\fR; - inline\-signing \fIboolean\fR; - ixfr\-from\-differences \fIboolean\fR; - journal \fIquoted_string\fR; - key\-directory \fIquoted_string\fR; - masterfile\-format ( map | raw | text ); - masterfile\-style ( full | relative ); - masters [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fImasters\fR - | \fIipv4_address\fR [ port \fIinteger\fR ] | \fIipv6_address\fR [ - port \fIinteger\fR ] ) [ key \fIstring\fR ]; \&.\&.\&. }; - max\-journal\-size ( default | unlimited | \fIsizeval\fR ); - max\-records \fIinteger\fR; - max\-refresh\-time \fIinteger\fR; - max\-retry\-time \fIinteger\fR; - max\-transfer\-idle\-in \fIinteger\fR; - max\-transfer\-idle\-out \fIinteger\fR; - max\-transfer\-time\-in \fIinteger\fR; - max\-transfer\-time\-out \fIinteger\fR; - max\-zone\-ttl ( unlimited | \fIduration\fR ); - min\-refresh\-time \fIinteger\fR; - min\-retry\-time \fIinteger\fR; - multi\-master \fIboolean\fR; - notify ( explicit | master\-only | \fIboolean\fR ); - notify\-delay \fIinteger\fR; - notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * - ) ] [ dscp \fIinteger\fR ]; - notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR - | * ) ] [ dscp \fIinteger\fR ]; - notify\-to\-soa \fIboolean\fR; - request\-expire \fIboolean\fR; - request\-ixfr \fIboolean\fR; - serial\-update\-method ( date | increment | unixtime ); - server\-addresses { ( \fIipv4_address\fR | \fIipv6_address\fR ); \&.\&.\&. }; - server\-names { \fIstring\fR; \&.\&.\&. }; - sig\-signing\-nodes \fIinteger\fR; - sig\-signing\-signatures \fIinteger\fR; - sig\-signing\-type \fIinteger\fR; - sig\-validity\-interval \fIinteger\fR [ \fIinteger\fR ]; - transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | - * ) ] [ dscp \fIinteger\fR ]; - transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( - \fIinteger\fR | * ) ] [ dscp \fIinteger\fR ]; - try\-tcp\-refresh \fIboolean\fR; - type ( primary | master | secondary | slave | mirror | - delegation\-only | forward | hint | redirect | - static\-stub | stub ); - update\-check\-ksk \fIboolean\fR; - update\-policy ( local | { ( deny | grant ) \fIstring\fR ( - 6to4\-self | external | krb5\-self | krb5\-selfsub | - krb5\-subdomain | ms\-self | ms\-selfsub | ms\-subdomain | - name | self | selfsub | selfwild | subdomain | tcp\-self - | wildcard | zonesub ) [ \fIstring\fR ] \fIrrtypelist\fR; \&.\&.\&. }; - use\-alt\-transfer\-source \fIboolean\fR; - zero\-no\-soa\-ttl \fIboolean\fR; - zone\-statistics ( full | terse | none | \fIboolean\fR ); - }; - zone\-statistics ( full | terse | none | \fIboolean\fR ); -}; -.fi -.if n \{\ -.RE -.\} -.SH "ZONE" -.sp -.if n \{\ -.RS 4 -.\} -.nf -zone \fIstring\fR [ \fIclass\fR ] { - allow\-notify { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-query\-on { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-transfer { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update { \fIaddress_match_element\fR; \&.\&.\&. }; - allow\-update\-forwarding { \fIaddress_match_element\fR; \&.\&.\&. }; - also\-notify [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fImasters\fR | - \fIipv4_address\fR [ port \fIinteger\fR ] | \fIipv6_address\fR [ port - \fIinteger\fR ] ) [ key \fIstring\fR ]; \&.\&.\&. }; - alt\-transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) - ] [ dscp \fIinteger\fR ]; - alt\-transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | - * ) ] [ dscp \fIinteger\fR ]; - auto\-dnssec ( allow | maintain | off ); - check\-dup\-records ( fail | warn | ignore ); - check\-integrity \fIboolean\fR; - check\-mx ( fail | warn | ignore ); - check\-mx\-cname ( fail | warn | ignore ); - check\-names ( fail | warn | ignore ); - check\-sibling \fIboolean\fR; - check\-spf ( warn | ignore ); - check\-srv\-cname ( fail | warn | ignore ); - check\-wildcard \fIboolean\fR; - database \fIstring\fR; - delegation\-only \fIboolean\fR; - dialup ( notify | notify\-passive | passive | refresh | \fIboolean\fR ); - dlz \fIstring\fR; - dnskey\-sig\-validity \fIinteger\fR; - dnssec\-dnskey\-kskonly \fIboolean\fR; - dnssec\-loadkeys\-interval \fIinteger\fR; - dnssec\-policy \fIstring\fR; - dnssec\-secure\-to\-insecure \fIboolean\fR; - dnssec\-update\-mode ( maintain | no\-resign ); - file \fIquoted_string\fR; - forward ( first | only ); - forwarders [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fIipv4_address\fR - | \fIipv6_address\fR ) [ port \fIinteger\fR ] [ dscp \fIinteger\fR ]; \&.\&.\&. }; - in\-view \fIstring\fR; - inline\-signing \fIboolean\fR; - ixfr\-from\-differences \fIboolean\fR; - journal \fIquoted_string\fR; - key\-directory \fIquoted_string\fR; - masterfile\-format ( map | raw | text ); - masterfile\-style ( full | relative ); - masters [ port \fIinteger\fR ] [ dscp \fIinteger\fR ] { ( \fImasters\fR | - \fIipv4_address\fR [ port \fIinteger\fR ] | \fIipv6_address\fR [ port - \fIinteger\fR ] ) [ key \fIstring\fR ]; \&.\&.\&. }; - max\-journal\-size ( default | unlimited | \fIsizeval\fR ); - max\-records \fIinteger\fR; - max\-refresh\-time \fIinteger\fR; - max\-retry\-time \fIinteger\fR; - max\-transfer\-idle\-in \fIinteger\fR; - max\-transfer\-idle\-out \fIinteger\fR; - max\-transfer\-time\-in \fIinteger\fR; - max\-transfer\-time\-out \fIinteger\fR; - max\-zone\-ttl ( unlimited | \fIduration\fR ); - min\-refresh\-time \fIinteger\fR; - min\-retry\-time \fIinteger\fR; - multi\-master \fIboolean\fR; - notify ( explicit | master\-only | \fIboolean\fR ); - notify\-delay \fIinteger\fR; - notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) ] - [ dscp \fIinteger\fR ]; - notify\-to\-soa \fIboolean\fR; - request\-expire \fIboolean\fR; - request\-ixfr \fIboolean\fR; - serial\-update\-method ( date | increment | unixtime ); - server\-addresses { ( \fIipv4_address\fR | \fIipv6_address\fR ); \&.\&.\&. }; - server\-names { \fIstring\fR; \&.\&.\&. }; - sig\-signing\-nodes \fIinteger\fR; - sig\-signing\-signatures \fIinteger\fR; - sig\-signing\-type \fIinteger\fR; - sig\-validity\-interval \fIinteger\fR [ \fIinteger\fR ]; - transfer\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ] [ - dscp \fIinteger\fR ]; - transfer\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | * ) - ] [ dscp \fIinteger\fR ]; - try\-tcp\-refresh \fIboolean\fR; - type ( primary | master | secondary | slave | mirror | - delegation\-only | forward | hint | redirect | static\-stub | - stub ); - update\-check\-ksk \fIboolean\fR; - update\-policy ( local | { ( deny | grant ) \fIstring\fR ( 6to4\-self | - external | krb5\-self | krb5\-selfsub | krb5\-subdomain | ms\-self - | ms\-selfsub | ms\-subdomain | name | self | selfsub | selfwild - | subdomain | tcp\-self | wildcard | zonesub ) [ \fIstring\fR ] - \fIrrtypelist\fR; \&.\&.\&. }; - use\-alt\-transfer\-source \fIboolean\fR; - zero\-no\-soa\-ttl \fIboolean\fR; - zone\-statistics ( full | terse | none | \fIboolean\fR ); -}; -.fi -.if n \{\ -.RE -.\} -.SH "FILES" -.PP -/etc/named\&.conf -.SH "SEE ALSO" -.PP -\fBddns-confgen\fR(8), -\fBnamed\fR(8), -\fBnamed-checkconf\fR(8), -\fBrndc\fR(8), -\fBrndc-confgen\fR(8), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2004-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/named/named.conf.docbook b/bin/named/named.conf.docbook deleted file mode 100644 index 22c1c780c2..0000000000 --- a/bin/named/named.conf.docbook +++ /dev/null @@ -1,1066 +0,0 @@ - - - - - - - 2020-02-07 - - - ISC - Internet Systems Consortium, Inc. - - - - named.conf - 5 - BIND9 - - - - named.conf - configuration file for named - - - - - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - named.conf - - - - DESCRIPTION - - named.conf is the configuration file - for - named. Statements are enclosed - in braces and terminated with a semi-colon. Clauses in - the statements are also semi-colon terminated. The usual - comment styles are supported: - - - C style: /* */ - - - C++ style: // to end of line - - - Unix style: # to end of line - - - - ACL - -acl string { address_match_element; ... }; - - - - CONTROLS - -controls { - inet ( ipv4_address | ipv6_address | - * ) [ port ( integer | * ) ] allow - { address_match_element; ... } [ - keys { string; ... } ] [ read-only - boolean ]; - unix quoted_string perm integer - owner integer group integer [ - keys { string; ... } ] [ read-only - boolean ]; -}; - - - - DLZ - -dlz string { - database string; - search boolean; -}; - - - - DNSSEC-POLICY - -dnssec-policy string { - dnskey-ttl duration; - keys { ( csk | ksk | zsk ) ( key-directory ) lifetime ( duration | unlimited ) - algorithm integer [ integer ]; ... }; - max-zone-ttl duration; - parent-ds-ttl duration; - parent-propagation-delay duration; - parent-registration-delay duration; - publish-safety duration; - retire-safety duration; - signatures-refresh duration; - signatures-validity duration; - signatures-validity-dnskey duration; - zone-propagation-delay duration; -}; - - - - DYNDB - -dyndb string quoted_string { - unspecified-text }; - - - - KEY - -key string { - algorithm string; - secret string; -}; - - - - LOGGING - -logging { - category string { string; ... }; - channel string { - buffered boolean; - file quoted_string [ versions ( unlimited | integer ) ] - [ size size ] [ suffix ( increment | timestamp ) ]; - null; - print-category boolean; - print-severity boolean; - print-time ( iso8601 | iso8601-utc | local | boolean ); - severity log_severity; - stderr; - syslog [ syslog_facility ]; - }; -}; - - - - MANAGED-KEYS - Deprecated - see TRUST-ANCHORS. - -managed-keys { string ( static-key - | initial-key | static-ds | - initial-ds ) integer integer - integer quoted_string; ... }; deprecated - - - - MASTERS - -masters string [ port integer ] [ dscp - integer ] { ( masters | ipv4_address [ - port integer ] | ipv6_address [ port - integer ] ) [ key string ]; ... }; - - - - OPTIONS - -options { - allow-new-zones boolean; - allow-notify { address_match_element; ... }; - allow-query { address_match_element; ... }; - allow-query-cache { address_match_element; ... }; - allow-query-cache-on { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-recursion { address_match_element; ... }; - allow-recursion-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update { address_match_element; ... }; - allow-update-forwarding { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( masters | - ipv4_address [ port integer ] | ipv6_address [ port - integer ] ) [ key string ]; ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | - * ) ] [ dscp integer ]; - answer-cookie boolean; - attach-cache string; - auth-nxdomain boolean; // default changed - auto-dnssec ( allow | maintain | off ); - automatic-interface-scan boolean; - avoid-v4-udp-ports { portrange; ... }; - avoid-v6-udp-ports { portrange; ... }; - bindkeys-file quoted_string; - blackhole { address_match_element; ... }; - cache-file quoted_string; - catalog-zones { zone string [ default-masters [ port integer ] - [ dscp integer ] { ( masters | ipv4_address [ port - integer ] | ipv6_address [ port integer ] ) [ key - string ]; ... } ] [ zone-directory quoted_string ] [ - in-memory boolean ] [ min-update-interval duration ]; ... }; - check-dup-records ( fail | warn | ignore ); - check-integrity boolean; - check-mx ( fail | warn | ignore ); - check-mx-cname ( fail | warn | ignore ); - check-names ( primary | master | - secondary | slave | response ) ( - fail | warn | ignore ); - check-sibling boolean; - check-spf ( warn | ignore ); - check-srv-cname ( fail | warn | ignore ); - check-wildcard boolean; - clients-per-query integer; - cookie-algorithm ( aes | siphash24 ); - cookie-secret string; - coresize ( default | unlimited | sizeval ); - datasize ( default | unlimited | sizeval ); - deny-answer-addresses { address_match_element; ... } [ - except-from { string; ... } ]; - deny-answer-aliases { string; ... } [ except-from { string; ... - } ]; - dialup ( notify | notify-passive | passive | refresh | boolean ); - directory quoted_string; - disable-algorithms string { string; - ... }; - disable-ds-digests string { string; - ... }; - disable-empty-zone string; - dns64 netprefix { - break-dnssec boolean; - clients { address_match_element; ... }; - exclude { address_match_element; ... }; - mapped { address_match_element; ... }; - recursive-only boolean; - suffix ipv6_address; - }; - dns64-contact string; - dns64-server string; - dnskey-sig-validity integer; - dnsrps-enable boolean; - dnsrps-options { unspecified-text }; - dnssec-accept-expired boolean; - dnssec-dnskey-kskonly boolean; - dnssec-loadkeys-interval integer; - dnssec-must-be-secure string boolean; - dnssec-policy string; - dnssec-secure-to-insecure boolean; - dnssec-update-mode ( maintain | no-resign ); - dnssec-validation ( yes | no | auto ); - dnstap { ( all | auth | client | forwarder | - resolver | update ) [ ( query | response ) ]; - ... }; - dnstap-identity ( quoted_string | none | - hostname ); - dnstap-output ( file | unix ) quoted_string [ - size ( unlimited | size ) ] [ versions ( - unlimited | integer ) ] [ suffix ( increment - | timestamp ) ]; - dnstap-version ( quoted_string | none ); - dscp integer; - dual-stack-servers [ port integer ] { ( quoted_string [ port - integer ] [ dscp integer ] | ipv4_address [ port - integer ] [ dscp integer ] | ipv6_address [ port - integer ] [ dscp integer ] ); ... }; - dump-file quoted_string; - edns-udp-size integer; - empty-contact string; - empty-server string; - empty-zones-enable boolean; - fetch-quota-params integer fixedpoint fixedpoint fixedpoint; - fetches-per-server integer [ ( drop | fail ) ]; - fetches-per-zone integer [ ( drop | fail ) ]; - files ( default | unlimited | sizeval ); - flush-zones-on-shutdown boolean; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address - | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - fstrm-set-buffer-hint integer; - fstrm-set-flush-timeout integer; - fstrm-set-input-queue-size integer; - fstrm-set-output-notify-threshold integer; - fstrm-set-output-queue-model ( mpsc | spsc ); - fstrm-set-output-queue-size integer; - fstrm-set-reopen-interval duration; - geoip-directory ( quoted_string | none ); - glue-cache boolean; - heartbeat-interval integer; - hostname ( quoted_string | none ); - inline-signing boolean; - interface-interval duration; - ixfr-from-differences ( primary | master | secondary | slave | - boolean ); - keep-response-order { address_match_element; ... }; - key-directory quoted_string; - lame-ttl duration; - listen-on [ port integer ] [ dscp - integer ] { - address_match_element; ... }; - listen-on-v6 [ port integer ] [ dscp - integer ] { - address_match_element; ... }; - lmdb-mapsize sizeval; - lock-file ( quoted_string | none ); - managed-keys-directory quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - match-mapped-addresses boolean; - max-cache-size ( default | unlimited | sizeval | percentage ); - max-cache-ttl duration; - max-clients-per-query integer; - max-journal-size ( default | unlimited | sizeval ); - max-ncache-ttl duration; - max-records integer; - max-recursion-depth integer; - max-recursion-queries integer; - max-refresh-time integer; - max-retry-time integer; - max-rsa-exponent-size integer; - max-stale-ttl duration; - max-transfer-idle-in integer; - max-transfer-idle-out integer; - max-transfer-time-in integer; - max-transfer-time-out integer; - max-udp-size integer; - max-zone-ttl ( unlimited | duration ); - memstatistics boolean; - memstatistics-file quoted_string; - message-compression boolean; - min-cache-ttl duration; - min-ncache-ttl duration; - min-refresh-time integer; - min-retry-time integer; - minimal-any boolean; - minimal-responses ( no-auth | no-auth-recursive | boolean ); - multi-master boolean; - new-zones-directory quoted_string; - no-case-compress { address_match_element; ... }; - nocookie-udp-size integer; - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-rate integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] - [ dscp integer ]; - notify-to-soa boolean; - nta-lifetime duration; - nta-recheck duration; - nxdomain-redirect string; - pid-file ( quoted_string | none ); - port integer; - preferred-glue string; - prefetch integer [ integer ]; - provide-ixfr boolean; - qname-minimization ( strict | relaxed | disabled | off ); - query-source ( ( [ address ] ( ipv4_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - querylog boolean; - random-device ( quoted_string | none ); - rate-limit { - all-per-second integer; - errors-per-second integer; - exempt-clients { address_match_element; ... }; - ipv4-prefix-length integer; - ipv6-prefix-length integer; - log-only boolean; - max-table-size integer; - min-table-size integer; - nodata-per-second integer; - nxdomains-per-second integer; - qps-scale integer; - referrals-per-second integer; - responses-per-second integer; - slip integer; - window integer; - }; - recursing-file quoted_string; - recursion boolean; - recursive-clients integer; - request-expire boolean; - request-ixfr boolean; - request-nsid boolean; - require-server-cookie boolean; - reserved-sockets integer; - resolver-nonbackoff-tries integer; - resolver-query-timeout integer; - resolver-retry-interval integer; - response-padding { address_match_element; ... } block-size - integer; - response-policy { zone string [ add-soa boolean ] [ log - boolean ] [ max-policy-ttl duration ] [ min-update-interval - duration ] [ policy ( cname | disabled | drop | given | no-op - | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [ - recursive-only boolean ] [ nsip-enable boolean ] [ - nsdname-enable boolean ]; ... } [ add-soa boolean ] [ - break-dnssec boolean ] [ max-policy-ttl duration ] [ - min-update-interval duration ] [ min-ns-dots integer ] [ - nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ] - [ recursive-only boolean ] [ nsip-enable boolean ] [ - nsdname-enable boolean ] [ dnsrps-enable boolean ] [ - dnsrps-options { unspecified-text } ]; - root-delegation-only [ exclude { string; ... } ]; - root-key-sentinel boolean; - rrset-order { [ class string ] [ type string ] [ name - quoted_string ] string string; ... }; - secroots-file quoted_string; - send-cookie boolean; - serial-query-rate integer; - serial-update-method ( date | increment | unixtime ); - server-id ( quoted_string | none | hostname ); - servfail-ttl duration; - session-keyalg string; - session-keyfile ( quoted_string | none ); - session-keyname string; - sig-signing-nodes integer; - sig-signing-signatures integer; - sig-signing-type integer; - sig-validity-interval integer [ integer ]; - sortlist { address_match_element; ... }; - stacksize ( default | unlimited | sizeval ); - stale-answer-enable boolean; - stale-answer-ttl duration; - startup-notify-rate integer; - statistics-file quoted_string; - synth-from-dnssec boolean; - tcp-advertised-timeout integer; - tcp-clients integer; - tcp-idle-timeout integer; - tcp-initial-timeout integer; - tcp-keepalive-timeout integer; - tcp-listen-queue integer; - tkey-dhkey quoted_string integer; - tkey-domain quoted_string; - tkey-gssapi-credential quoted_string; - tkey-gssapi-keytab quoted_string; - transfer-format ( many-answers | one-answer ); - transfer-message-size integer; - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - transfers-in integer; - transfers-out integer; - transfers-per-ns integer; - trust-anchor-telemetry boolean; // experimental - try-tcp-refresh boolean; - update-check-ksk boolean; - use-alt-transfer-source boolean; - use-v4-udp-ports { portrange; ... }; - use-v6-udp-ports { portrange; ... }; - v6-bias integer; - validate-except { string; ... }; - version ( quoted_string | none ); - zero-no-soa-ttl boolean; - zero-no-soa-ttl-cache boolean; - zone-statistics ( full | terse | none | boolean ); -}; - - - - PLUGIN - -plugin ( query ) string [ { unspecified-text - } ]; - - - - SERVER - -server netprefix { - bogus boolean; - edns boolean; - edns-udp-size integer; - edns-version integer; - keys server_key; - max-udp-size integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] - [ dscp integer ]; - padding integer; - provide-ixfr boolean; - query-source ( ( [ address ] ( ipv4_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - request-expire boolean; - request-ixfr boolean; - request-nsid boolean; - send-cookie boolean; - tcp-keepalive boolean; - tcp-only boolean; - transfer-format ( many-answers | one-answer ); - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - transfers integer; -}; - - - - STATISTICS-CHANNELS - -statistics-channels { - inet ( ipv4_address | ipv6_address | - * ) [ port ( integer | * ) ] [ - allow { address_match_element; ... - } ]; -}; - - - - TRUST-ANCHORS - -trust-anchors { string ( static-key | - initial-key | static-ds | initial-ds ) - integer integer integer - quoted_string; ... }; - - - - TRUSTED-KEYS - Deprecated - see TRUST-ANCHORS. - -trusted-keys { string integer - integer integer - quoted_string; ... }; deprecated - - - - VIEW - -view string [ class ] { - allow-new-zones boolean; - allow-notify { address_match_element; ... }; - allow-query { address_match_element; ... }; - allow-query-cache { address_match_element; ... }; - allow-query-cache-on { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-recursion { address_match_element; ... }; - allow-recursion-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update { address_match_element; ... }; - allow-update-forwarding { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( masters | - ipv4_address [ port integer ] | ipv6_address [ port - integer ] ) [ key string ]; ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | - * ) ] [ dscp integer ]; - attach-cache string; - auth-nxdomain boolean; // default changed - auto-dnssec ( allow | maintain | off ); - cache-file quoted_string; - catalog-zones { zone string [ default-masters [ port integer ] - [ dscp integer ] { ( masters | ipv4_address [ port - integer ] | ipv6_address [ port integer ] ) [ key - string ]; ... } ] [ zone-directory quoted_string ] [ - in-memory boolean ] [ min-update-interval duration ]; ... }; - check-dup-records ( fail | warn | ignore ); - check-integrity boolean; - check-mx ( fail | warn | ignore ); - check-mx-cname ( fail | warn | ignore ); - check-names ( primary | master | - secondary | slave | response ) ( - fail | warn | ignore ); - check-sibling boolean; - check-spf ( warn | ignore ); - check-srv-cname ( fail | warn | ignore ); - check-wildcard boolean; - clients-per-query integer; - deny-answer-addresses { address_match_element; ... } [ - except-from { string; ... } ]; - deny-answer-aliases { string; ... } [ except-from { string; ... - } ]; - dialup ( notify | notify-passive | passive | refresh | boolean ); - disable-algorithms string { string; - ... }; - disable-ds-digests string { string; - ... }; - disable-empty-zone string; - dlz string { - database string; - search boolean; - }; - dns64 netprefix { - break-dnssec boolean; - clients { address_match_element; ... }; - exclude { address_match_element; ... }; - mapped { address_match_element; ... }; - recursive-only boolean; - suffix ipv6_address; - }; - dns64-contact string; - dns64-server string; - dnskey-sig-validity integer; - dnsrps-enable boolean; - dnsrps-options { unspecified-text }; - dnssec-accept-expired boolean; - dnssec-dnskey-kskonly boolean; - dnssec-loadkeys-interval integer; - dnssec-must-be-secure string boolean; - dnssec-policy string; - dnssec-secure-to-insecure boolean; - dnssec-update-mode ( maintain | no-resign ); - dnssec-validation ( yes | no | auto ); - dnstap { ( all | auth | client | forwarder | - resolver | update ) [ ( query | response ) ]; - ... }; - dual-stack-servers [ port integer ] { ( quoted_string [ port - integer ] [ dscp integer ] | ipv4_address [ port - integer ] [ dscp integer ] | ipv6_address [ port - integer ] [ dscp integer ] ); ... }; - dyndb string quoted_string { - unspecified-text }; - edns-udp-size integer; - empty-contact string; - empty-server string; - empty-zones-enable boolean; - fetch-quota-params integer fixedpoint fixedpoint fixedpoint; - fetches-per-server integer [ ( drop | fail ) ]; - fetches-per-zone integer [ ( drop | fail ) ]; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address - | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - glue-cache boolean; - inline-signing boolean; - ixfr-from-differences ( primary | master | secondary | slave | - boolean ); - key string { - algorithm string; - secret string; - }; - key-directory quoted_string; - lame-ttl duration; - lmdb-mapsize sizeval; - managed-keys { string ( - static-key | initial-key - | static-ds | initial-ds - ) integer integer - integer - quoted_string; ... }; deprecated - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - match-clients { address_match_element; ... }; - match-destinations { address_match_element; ... }; - match-recursive-only boolean; - max-cache-size ( default | unlimited | sizeval | percentage ); - max-cache-ttl duration; - max-clients-per-query integer; - max-journal-size ( default | unlimited | sizeval ); - max-ncache-ttl duration; - max-records integer; - max-recursion-depth integer; - max-recursion-queries integer; - max-refresh-time integer; - max-retry-time integer; - max-stale-ttl duration; - max-transfer-idle-in integer; - max-transfer-idle-out integer; - max-transfer-time-in integer; - max-transfer-time-out integer; - max-udp-size integer; - max-zone-ttl ( unlimited | duration ); - message-compression boolean; - min-cache-ttl duration; - min-ncache-ttl duration; - min-refresh-time integer; - min-retry-time integer; - minimal-any boolean; - minimal-responses ( no-auth | no-auth-recursive | boolean ); - multi-master boolean; - new-zones-directory quoted_string; - no-case-compress { address_match_element; ... }; - nocookie-udp-size integer; - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] - [ dscp integer ]; - notify-to-soa boolean; - nta-lifetime duration; - nta-recheck duration; - nxdomain-redirect string; - plugin ( query ) string [ { - unspecified-text } ]; - preferred-glue string; - prefetch integer [ integer ]; - provide-ixfr boolean; - qname-minimization ( strict | relaxed | disabled | off ); - query-source ( ( [ address ] ( ipv4_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - rate-limit { - all-per-second integer; - errors-per-second integer; - exempt-clients { address_match_element; ... }; - ipv4-prefix-length integer; - ipv6-prefix-length integer; - log-only boolean; - max-table-size integer; - min-table-size integer; - nodata-per-second integer; - nxdomains-per-second integer; - qps-scale integer; - referrals-per-second integer; - responses-per-second integer; - slip integer; - window integer; - }; - recursion boolean; - request-expire boolean; - request-ixfr boolean; - request-nsid boolean; - require-server-cookie boolean; - resolver-nonbackoff-tries integer; - resolver-query-timeout integer; - resolver-retry-interval integer; - response-padding { address_match_element; ... } block-size - integer; - response-policy { zone string [ add-soa boolean ] [ log - boolean ] [ max-policy-ttl duration ] [ min-update-interval - duration ] [ policy ( cname | disabled | drop | given | no-op - | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [ - recursive-only boolean ] [ nsip-enable boolean ] [ - nsdname-enable boolean ]; ... } [ add-soa boolean ] [ - break-dnssec boolean ] [ max-policy-ttl duration ] [ - min-update-interval duration ] [ min-ns-dots integer ] [ - nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ] - [ recursive-only boolean ] [ nsip-enable boolean ] [ - nsdname-enable boolean ] [ dnsrps-enable boolean ] [ - dnsrps-options { unspecified-text } ]; - root-delegation-only [ exclude { string; ... } ]; - root-key-sentinel boolean; - rrset-order { [ class string ] [ type string ] [ name - quoted_string ] string string; ... }; - send-cookie boolean; - serial-update-method ( date | increment | unixtime ); - server netprefix { - bogus boolean; - edns boolean; - edns-udp-size integer; - edns-version integer; - keys server_key; - max-udp-size integer; - notify-source ( ipv4_address | * ) [ port ( integer | * - ) ] [ dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer - | * ) ] [ dscp integer ]; - padding integer; - provide-ixfr boolean; - query-source ( ( [ address ] ( ipv4_address | * ) [ port - ( integer | * ) ] ) | ( [ [ address ] ( - ipv4_address | * ) ] port ( integer | * ) ) ) [ - dscp integer ]; - query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ - port ( integer | * ) ] ) | ( [ [ address ] ( - ipv6_address | * ) ] port ( integer | * ) ) ) [ - dscp integer ]; - request-expire boolean; - request-ixfr boolean; - request-nsid boolean; - send-cookie boolean; - tcp-keepalive boolean; - tcp-only boolean; - transfer-format ( many-answers | one-answer ); - transfer-source ( ipv4_address | * ) [ port ( integer | - * ) ] [ dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( - integer | * ) ] [ dscp integer ]; - transfers integer; - }; - servfail-ttl duration; - sig-signing-nodes integer; - sig-signing-signatures integer; - sig-signing-type integer; - sig-validity-interval integer [ integer ]; - sortlist { address_match_element; ... }; - stale-answer-enable boolean; - stale-answer-ttl duration; - synth-from-dnssec boolean; - transfer-format ( many-answers | one-answer ); - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - trust-anchor-telemetry boolean; // experimental - trust-anchors { string ( static-key | - initial-key | static-ds | initial-ds - ) integer integer integer - quoted_string; ... }; - trusted-keys { string - integer integer - integer - quoted_string; ... }; deprecated - try-tcp-refresh boolean; - update-check-ksk boolean; - use-alt-transfer-source boolean; - v6-bias integer; - validate-except { string; ... }; - zero-no-soa-ttl boolean; - zero-no-soa-ttl-cache boolean; - zone string [ class ] { - allow-notify { address_match_element; ... }; - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update { address_match_element; ... }; - allow-update-forwarding { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( - masters | ipv4_address [ port integer ] | - ipv6_address [ port integer ] ) [ key string ]; - ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( - integer | * ) ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( - integer | * ) ] [ dscp integer ]; - auto-dnssec ( allow | maintain | off ); - check-dup-records ( fail | warn | ignore ); - check-integrity boolean; - check-mx ( fail | warn | ignore ); - check-mx-cname ( fail | warn | ignore ); - check-names ( fail | warn | ignore ); - check-sibling boolean; - check-spf ( warn | ignore ); - check-srv-cname ( fail | warn | ignore ); - check-wildcard boolean; - database string; - delegation-only boolean; - dialup ( notify | notify-passive | passive | refresh | - boolean ); - dlz string; - dnskey-sig-validity integer; - dnssec-dnskey-kskonly boolean; - dnssec-loadkeys-interval integer; - dnssec-policy string; - dnssec-secure-to-insecure boolean; - dnssec-update-mode ( maintain | no-resign ); - file quoted_string; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( - ipv4_address | ipv6_address ) [ port integer ] [ - dscp integer ]; ... }; - in-view string; - inline-signing boolean; - ixfr-from-differences boolean; - journal quoted_string; - key-directory quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - masters [ port integer ] [ dscp integer ] { ( masters - | ipv4_address [ port integer ] | ipv6_address [ - port integer ] ) [ key string ]; ... }; - max-journal-size ( default | unlimited | sizeval ); - max-records integer; - max-refresh-time integer; - max-retry-time integer; - max-transfer-idle-in integer; - max-transfer-idle-out integer; - max-transfer-time-in integer; - max-transfer-time-out integer; - max-zone-ttl ( unlimited | duration ); - min-refresh-time integer; - min-retry-time integer; - multi-master boolean; - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-source ( ipv4_address | * ) [ port ( integer | * - ) ] [ dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer - | * ) ] [ dscp integer ]; - notify-to-soa boolean; - request-expire boolean; - request-ixfr boolean; - serial-update-method ( date | increment | unixtime ); - server-addresses { ( ipv4_address | ipv6_address ); ... }; - server-names { string; ... }; - sig-signing-nodes integer; - sig-signing-signatures integer; - sig-signing-type integer; - sig-validity-interval integer [ integer ]; - transfer-source ( ipv4_address | * ) [ port ( integer | - * ) ] [ dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( - integer | * ) ] [ dscp integer ]; - try-tcp-refresh boolean; - type ( primary | master | secondary | slave | mirror | - delegation-only | forward | hint | redirect | - static-stub | stub ); - update-check-ksk boolean; - update-policy ( local | { ( deny | grant ) string ( - 6to4-self | external | krb5-self | krb5-selfsub | - krb5-subdomain | ms-self | ms-selfsub | ms-subdomain | - name | self | selfsub | selfwild | subdomain | tcp-self - | wildcard | zonesub ) [ string ] rrtypelist; ... }; - use-alt-transfer-source boolean; - zero-no-soa-ttl boolean; - zone-statistics ( full | terse | none | boolean ); - }; - zone-statistics ( full | terse | none | boolean ); -}; - - - - ZONE - -zone string [ class ] { - allow-notify { address_match_element; ... }; - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update { address_match_element; ... }; - allow-update-forwarding { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( masters | - ipv4_address [ port integer ] | ipv6_address [ port - integer ] ) [ key string ]; ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | - * ) ] [ dscp integer ]; - auto-dnssec ( allow | maintain | off ); - check-dup-records ( fail | warn | ignore ); - check-integrity boolean; - check-mx ( fail | warn | ignore ); - check-mx-cname ( fail | warn | ignore ); - check-names ( fail | warn | ignore ); - check-sibling boolean; - check-spf ( warn | ignore ); - check-srv-cname ( fail | warn | ignore ); - check-wildcard boolean; - database string; - delegation-only boolean; - dialup ( notify | notify-passive | passive | refresh | boolean ); - dlz string; - dnskey-sig-validity integer; - dnssec-dnskey-kskonly boolean; - dnssec-loadkeys-interval integer; - dnssec-policy string; - dnssec-secure-to-insecure boolean; - dnssec-update-mode ( maintain | no-resign ); - file quoted_string; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address - | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - in-view string; - inline-signing boolean; - ixfr-from-differences boolean; - journal quoted_string; - key-directory quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - masters [ port integer ] [ dscp integer ] { ( masters | - ipv4_address [ port integer ] | ipv6_address [ port - integer ] ) [ key string ]; ... }; - max-journal-size ( default | unlimited | sizeval ); - max-records integer; - max-refresh-time integer; - max-retry-time integer; - max-transfer-idle-in integer; - max-transfer-idle-out integer; - max-transfer-time-in integer; - max-transfer-time-out integer; - max-zone-ttl ( unlimited | duration ); - min-refresh-time integer; - min-retry-time integer; - multi-master boolean; - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] - [ dscp integer ]; - notify-to-soa boolean; - request-expire boolean; - request-ixfr boolean; - serial-update-method ( date | increment | unixtime ); - server-addresses { ( ipv4_address | ipv6_address ); ... }; - server-names { string; ... }; - sig-signing-nodes integer; - sig-signing-signatures integer; - sig-signing-type integer; - sig-validity-interval integer [ integer ]; - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - try-tcp-refresh boolean; - type ( primary | master | secondary | slave | mirror | - delegation-only | forward | hint | redirect | static-stub | - stub ); - update-check-ksk boolean; - update-policy ( local | { ( deny | grant ) string ( 6to4-self | - external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self - | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild - | subdomain | tcp-self | wildcard | zonesub ) [ string ] - rrtypelist; ... }; - use-alt-transfer-source boolean; - zero-no-soa-ttl boolean; - zone-statistics ( full | terse | none | boolean ); -}; - - - - FILES - - /etc/named.conf - - - - SEE ALSO - - - ddns-confgen8 - , - - named8 - , - - named-checkconf8 - , - - rndc8 - , - - rndc-confgen8 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/named/named.conf.html b/bin/named/named.conf.html deleted file mode 100644 index b1eb15b3a2..0000000000 --- a/bin/named/named.conf.html +++ /dev/null @@ -1,1063 +0,0 @@ - - - - - -named.conf - - -
-
- - - - - -
-

Name

-

- named.conf - — configuration file for named -

-
- - - -
-

Synopsis

-

- named.conf -

-
- -
-

DESCRIPTION

- -

named.conf is the configuration file - for - named. Statements are enclosed - in braces and terminated with a semi-colon. Clauses in - the statements are also semi-colon terminated. The usual - comment styles are supported: -

-

- C style: /* */ -

-

- C++ style: // to end of line -

-

- Unix style: # to end of line -

-
- -
-

ACL

-


-acl string { address_match_element; ... };
-

-
- -
-

CONTROLS

-


-controls {
- inet ( ipv4_address | ipv6_address |
-     * ) [ port ( integer | * ) ] allow
-     { address_match_element; ... } [
-     keys { string; ... } ] [ read-only
-     boolean ];
- unix quoted_string perm integer
-     owner integer group integer [
-     keys { string; ... } ] [ read-only
-     boolean ];
-};
-

-
- -
-

DLZ

-


-dlz string {
- database string;
- search boolean;
-};
-

-
- -
-

DNSSEC-POLICY

-


-dnssec-policy string {
- dnskey-ttl duration;
- keys { ( csk | ksk | zsk ) ( key-directory ) lifetime ( duration | unlimited )
-     algorithm integer [ integer ]; ... };
- max-zone-ttl duration;
- parent-ds-ttl duration;
- parent-propagation-delay duration;
- parent-registration-delay duration;
- publish-safety duration;
- retire-safety duration;
- signatures-refresh duration;
- signatures-validity duration;
- signatures-validity-dnskey duration;
- zone-propagation-delay duration;
-};
-

-
- -
-

DYNDB

-


-dyndb string quoted_string {
-    unspecified-text };
-

-
- -
-

KEY

-


-key string {
- algorithm string;
- secret string;
-};
-

-
- -
-

LOGGING

-


-logging {
- category string { string; ... };
- channel string {
- buffered boolean;
- file quoted_string [ versions ( unlimited | integer ) ]
-     [ size size ] [ suffix ( increment | timestamp ) ];
- null;
- print-category boolean;
- print-severity boolean;
- print-time ( iso8601 | iso8601-utc | local | boolean );
- severity log_severity;
- stderr;
- syslog [ syslog_facility ];
- };
-};
-

-
- -
-

MANAGED-KEYS

-

Deprecated - see DNSSEC-KEYS.

-


-managed-keys { string ( static-key
-    | initial-key | static-ds |
-    initial-ds ) integer integer
-    integer quoted_string; ... }; deprecated
-

-
- -
-

MASTERS

-


-masters string [ port integer ] [ dscp
-    integer ] { ( masters | ipv4_address [
-    port integer ] | ipv6_address [ port
-    integer ] ) [ key string ]; ... };
-

-
- -
-

OPTIONS

-


-options {
- allow-new-zones boolean;
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-cache { address_match_element; ... };
- allow-query-cache-on { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-recursion { address_match_element; ... };
- allow-recursion-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- alt-transfer-source ( ipv4_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- answer-cookie boolean;
- attach-cache string;
- auth-nxdomain boolean; // default changed
- auto-dnssec ( allow | maintain | off );
- automatic-interface-scan boolean;
- avoid-v4-udp-ports { portrange; ... };
- avoid-v6-udp-ports { portrange; ... };
- bindkeys-file quoted_string;
- blackhole { address_match_element; ... };
- cache-file quoted_string;
- catalog-zones { zone string [ default-masters [ port integer ]
-     [ dscp integer ] { ( masters | ipv4_address [ port
-     integer ] | ipv6_address [ port integer ] ) [ key
-     string ]; ... } ] [ zone-directory quoted_string ] [
-     in-memory boolean ] [ min-update-interval duration ]; ... };
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( primary | master |
-     secondary | slave | response ) (
-     fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- clients-per-query integer;
- cookie-algorithm ( aes | siphash24 );
- cookie-secret string;
- coresize ( default | unlimited | sizeval );
- datasize ( default | unlimited | sizeval );
- deny-answer-addresses { address_match_element; ... } [
-     except-from { string; ... } ];
- deny-answer-aliases { string; ... } [ except-from { string; ...
-     } ];
- dialup ( notify | notify-passive | passive | refresh | boolean );
- directory quoted_string;
- disable-algorithms string { string;
-     ... };
- disable-ds-digests string { string;
-     ... };
- disable-empty-zone string;
- dns64 netprefix {
- break-dnssec boolean;
- clients { address_match_element; ... };
- exclude { address_match_element; ... };
- mapped { address_match_element; ... };
- recursive-only boolean;
- suffix ipv6_address;
- };
- dns64-contact string;
- dns64-server string;
- dnskey-sig-validity integer;
- dnsrps-enable boolean;
- dnsrps-options { unspecified-text };
- dnssec-accept-expired boolean;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-must-be-secure string boolean;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- dnssec-validation ( yes | no | auto );
- dnstap { ( all | auth | client | forwarder |
-     resolver | update ) [ ( query | response ) ];
-     ... };
- dnstap-identity ( quoted_string | none |
-     hostname );
- dnstap-output ( file | unix ) quoted_string [
-     size ( unlimited | size ) ] [ versions (
-     unlimited | integer ) ] [ suffix ( increment
-     | timestamp ) ];
- dnstap-version ( quoted_string | none );
- dscp integer;
- dual-stack-servers [ port integer ] { ( quoted_string [ port
-     integer ] [ dscp integer ] | ipv4_address [ port
-     integer ] [ dscp integer ] | ipv6_address [ port
-     integer ] [ dscp integer ] ); ... };
- dump-file quoted_string;
- edns-udp-size integer;
- empty-contact string;
- empty-server string;
- empty-zones-enable boolean;
- fetch-quota-params integer fixedpoint fixedpoint fixedpoint;
- fetches-per-server integer [ ( drop | fail ) ];
- fetches-per-zone integer [ ( drop | fail ) ];
- files ( default | unlimited | sizeval );
- flush-zones-on-shutdown boolean;
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { ( ipv4_address
-     | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
- fstrm-set-buffer-hint integer;
- fstrm-set-flush-timeout integer;
- fstrm-set-input-queue-size integer;
- fstrm-set-output-notify-threshold integer;
- fstrm-set-output-queue-model ( mpsc | spsc );
- fstrm-set-output-queue-size integer;
- fstrm-set-reopen-interval duration;
- geoip-directory ( quoted_string | none );
- glue-cache boolean;
- heartbeat-interval integer;
- hostname ( quoted_string | none );
- inline-signing boolean;
- interface-interval duration;
- ixfr-from-differences ( primary | master | secondary | slave |
-     boolean );
- keep-response-order { address_match_element; ... };
- key-directory quoted_string;
- lame-ttl duration;
- listen-on [ port integer ] [ dscp
-     integer ] {
-     address_match_element; ... };
- listen-on-v6 [ port integer ] [ dscp
-     integer ] {
-     address_match_element; ... };
- lmdb-mapsize sizeval;
- lock-file ( quoted_string | none );
- managed-keys-directory quoted_string;
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- match-mapped-addresses boolean;
- max-cache-size ( default | unlimited | sizeval | percentage );
- max-cache-ttl duration;
- max-clients-per-query integer;
- max-journal-size ( default | unlimited | sizeval );
- max-ncache-ttl duration;
- max-records integer;
- max-recursion-depth integer;
- max-recursion-queries integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-rsa-exponent-size integer;
- max-stale-ttl duration;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-udp-size integer;
- max-zone-ttl ( unlimited | duration );
- memstatistics boolean;
- memstatistics-file quoted_string;
- message-compression boolean;
- min-cache-ttl duration;
- min-ncache-ttl duration;
- min-refresh-time integer;
- min-retry-time integer;
- minimal-any boolean;
- minimal-responses ( no-auth | no-auth-recursive | boolean );
- multi-master boolean;
- new-zones-directory quoted_string;
- no-case-compress { address_match_element; ... };
- nocookie-udp-size integer;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-rate integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- notify-to-soa boolean;
- nta-lifetime duration;
- nta-recheck duration;
- nxdomain-redirect string;
- pid-file ( quoted_string | none );
- port integer;
- preferred-glue string;
- prefetch integer [ integer ];
- provide-ixfr boolean;
- qname-minimization ( strict | relaxed | disabled | off );
- query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- querylog boolean;
- random-device ( quoted_string | none );
- rate-limit {
- all-per-second integer;
- errors-per-second integer;
- exempt-clients { address_match_element; ... };
- ipv4-prefix-length integer;
- ipv6-prefix-length integer;
- log-only boolean;
- max-table-size integer;
- min-table-size integer;
- nodata-per-second integer;
- nxdomains-per-second integer;
- qps-scale integer;
- referrals-per-second integer;
- responses-per-second integer;
- slip integer;
- window integer;
- };
- recursing-file quoted_string;
- recursion boolean;
- recursive-clients integer;
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- require-server-cookie boolean;
- reserved-sockets integer;
- resolver-nonbackoff-tries integer;
- resolver-query-timeout integer;
- resolver-retry-interval integer;
- response-padding { address_match_element; ... } block-size
-     integer;
- response-policy { zone string [ add-soa boolean ] [ log
-     boolean ] [ max-policy-ttl duration ] [ min-update-interval
-     duration ] [ policy ( cname | disabled | drop | given | no-op
-     | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [
-     recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ]; ... } [ add-soa boolean ] [
-     break-dnssec boolean ] [ max-policy-ttl duration ] [
-     min-update-interval duration ] [ min-ns-dots integer ] [
-     nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ]
-     [ recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ] [ dnsrps-enable boolean ] [
-     dnsrps-options { unspecified-text } ];
- root-delegation-only [ exclude { string; ... } ];
- root-key-sentinel boolean;
- rrset-order { [ class string ] [ type string ] [ name
-     quoted_string ] string string; ... };
- secroots-file quoted_string;
- send-cookie boolean;
- serial-query-rate integer;
- serial-update-method ( date | increment | unixtime );
- server-id ( quoted_string | none | hostname );
- servfail-ttl duration;
- session-keyalg string;
- session-keyfile ( quoted_string | none );
- session-keyname string;
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- sortlist { address_match_element; ... };
- stacksize ( default | unlimited | sizeval );
- stale-answer-enable boolean;
- stale-answer-ttl duration;
- startup-notify-rate integer;
- statistics-file quoted_string;
- synth-from-dnssec boolean;
- tcp-advertised-timeout integer;
- tcp-clients integer;
- tcp-idle-timeout integer;
- tcp-initial-timeout integer;
- tcp-keepalive-timeout integer;
- tcp-listen-queue integer;
- tkey-dhkey quoted_string integer;
- tkey-domain quoted_string;
- tkey-gssapi-credential quoted_string;
- tkey-gssapi-keytab quoted_string;
- transfer-format ( many-answers | one-answer );
- transfer-message-size integer;
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- transfers-in integer;
- transfers-out integer;
- transfers-per-ns integer;
- trust-anchor-telemetry boolean; // experimental
- try-tcp-refresh boolean;
- update-check-ksk boolean;
- use-alt-transfer-source boolean;
- use-v4-udp-ports { portrange; ... };
- use-v6-udp-ports { portrange; ... };
- v6-bias integer;
- validate-except { string; ... };
- version ( quoted_string | none );
- zero-no-soa-ttl boolean;
- zero-no-soa-ttl-cache boolean;
- zone-statistics ( full | terse | none | boolean );
-};
-

-
- -
-

PLUGIN

-


-plugin ( query ) string [ { unspecified-text
-    } ];
-

-
- -
-

SERVER

-


-server netprefix {
- bogus boolean;
- edns boolean;
- edns-udp-size integer;
- edns-version integer;
- keys server_key;
- max-udp-size integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- padding integer;
- provide-ixfr boolean;
- query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- send-cookie boolean;
- tcp-keepalive boolean;
- tcp-only boolean;
- transfer-format ( many-answers | one-answer );
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- transfers integer;
-};
-

-
- -
-

STATISTICS-CHANNELS

-


-statistics-channels {
- inet ( ipv4_address | ipv6_address |
-     * ) [ port ( integer | * ) ] [
-     allow { address_match_element; ...
-     } ];
-};
-

-
- -
-

TRUST-ANCHORS

-


-trust-anchors { string ( static-key |
-    initial-key | static-ds | initial-ds )
-    integer integer integer
-    quoted_string; ... };
-

-
- -
-

TRUSTED-KEYS

-

Deprecated - see DNSSEC-KEYS.

-


-trusted-keys { string integer
-    integer integer
-    quoted_string; ... }; deprecated
-

-
- -
-

VIEW

-


-view string [ class ] {
- allow-new-zones boolean;
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-cache { address_match_element; ... };
- allow-query-cache-on { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-recursion { address_match_element; ... };
- allow-recursion-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- alt-transfer-source ( ipv4_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- attach-cache string;
- auth-nxdomain boolean; // default changed
- auto-dnssec ( allow | maintain | off );
- cache-file quoted_string;
- catalog-zones { zone string [ default-masters [ port integer ]
-     [ dscp integer ] { ( masters | ipv4_address [ port
-     integer ] | ipv6_address [ port integer ] ) [ key
-     string ]; ... } ] [ zone-directory quoted_string ] [
-     in-memory boolean ] [ min-update-interval duration ]; ... };
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( primary | master |
-     secondary | slave | response ) (
-     fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- clients-per-query integer;
- deny-answer-addresses { address_match_element; ... } [
-     except-from { string; ... } ];
- deny-answer-aliases { string; ... } [ except-from { string; ...
-     } ];
- dialup ( notify | notify-passive | passive | refresh | boolean );
- disable-algorithms string { string;
-     ... };
- disable-ds-digests string { string;
-     ... };
- disable-empty-zone string;
- dlz string {
- database string;
- search boolean;
- };
- dns64 netprefix {
- break-dnssec boolean;
- clients { address_match_element; ... };
- exclude { address_match_element; ... };
- mapped { address_match_element; ... };
- recursive-only boolean;
- suffix ipv6_address;
- };
- dns64-contact string;
- dns64-server string;
- dnskey-sig-validity integer;
- dnsrps-enable boolean;
- dnsrps-options { unspecified-text };
- dnssec-accept-expired boolean;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-must-be-secure string boolean;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- dnssec-validation ( yes | no | auto );
- dnstap { ( all | auth | client | forwarder |
-     resolver | update ) [ ( query | response ) ];
-     ... };
- dual-stack-servers [ port integer ] { ( quoted_string [ port
-     integer ] [ dscp integer ] | ipv4_address [ port
-     integer ] [ dscp integer ] | ipv6_address [ port
-     integer ] [ dscp integer ] ); ... };
- dyndb string quoted_string {
-     unspecified-text };
- edns-udp-size integer;
- empty-contact string;
- empty-server string;
- empty-zones-enable boolean;
- fetch-quota-params integer fixedpoint fixedpoint fixedpoint;
- fetches-per-server integer [ ( drop | fail ) ];
- fetches-per-zone integer [ ( drop | fail ) ];
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { ( ipv4_address
-     | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
- glue-cache boolean;
- inline-signing boolean;
- ixfr-from-differences ( primary | master | secondary | slave |
-     boolean );
- key string {
- algorithm string;
- secret string;
- };
- key-directory quoted_string;
- lame-ttl duration;
- lmdb-mapsize sizeval;
- managed-keys { string (
-     static-key | initial-key
-     | static-ds | initial-ds
-     ) integer integer
-     integer
-     quoted_string; ... }; deprecated
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- match-clients { address_match_element; ... };
- match-destinations { address_match_element; ... };
- match-recursive-only boolean;
- max-cache-size ( default | unlimited | sizeval | percentage );
- max-cache-ttl duration;
- max-clients-per-query integer;
- max-journal-size ( default | unlimited | sizeval );
- max-ncache-ttl duration;
- max-records integer;
- max-recursion-depth integer;
- max-recursion-queries integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-stale-ttl duration;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-udp-size integer;
- max-zone-ttl ( unlimited | duration );
- message-compression boolean;
- min-cache-ttl duration;
- min-ncache-ttl duration;
- min-refresh-time integer;
- min-retry-time integer;
- minimal-any boolean;
- minimal-responses ( no-auth | no-auth-recursive | boolean );
- multi-master boolean;
- new-zones-directory quoted_string;
- no-case-compress { address_match_element; ... };
- nocookie-udp-size integer;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- notify-to-soa boolean;
- nta-lifetime duration;
- nta-recheck duration;
- nxdomain-redirect string;
- plugin ( query ) string [ {
-     unspecified-text } ];
- preferred-glue string;
- prefetch integer [ integer ];
- provide-ixfr boolean;
- qname-minimization ( strict | relaxed | disabled | off );
- query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- rate-limit {
- all-per-second integer;
- errors-per-second integer;
- exempt-clients { address_match_element; ... };
- ipv4-prefix-length integer;
- ipv6-prefix-length integer;
- log-only boolean;
- max-table-size integer;
- min-table-size integer;
- nodata-per-second integer;
- nxdomains-per-second integer;
- qps-scale integer;
- referrals-per-second integer;
- responses-per-second integer;
- slip integer;
- window integer;
- };
- recursion boolean;
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- require-server-cookie boolean;
- resolver-nonbackoff-tries integer;
- resolver-query-timeout integer;
- resolver-retry-interval integer;
- response-padding { address_match_element; ... } block-size
-     integer;
- response-policy { zone string [ add-soa boolean ] [ log
-     boolean ] [ max-policy-ttl duration ] [ min-update-interval
-     duration ] [ policy ( cname | disabled | drop | given | no-op
-     | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [
-     recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ]; ... } [ add-soa boolean ] [
-     break-dnssec boolean ] [ max-policy-ttl duration ] [
-     min-update-interval duration ] [ min-ns-dots integer ] [
-     nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ]
-     [ recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ] [ dnsrps-enable boolean ] [
-     dnsrps-options { unspecified-text } ];
- root-delegation-only [ exclude { string; ... } ];
- root-key-sentinel boolean;
- rrset-order { [ class string ] [ type string ] [ name
-     quoted_string ] string string; ... };
- send-cookie boolean;
- serial-update-method ( date | increment | unixtime );
- server netprefix {
- bogus boolean;
- edns boolean;
- edns-udp-size integer;
- edns-version integer;
- keys server_key;
- max-udp-size integer;
- notify-source ( ipv4_address | * ) [ port ( integer | *
-     ) ] [ dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer
-     | * ) ] [ dscp integer ];
- padding integer;
- provide-ixfr boolean;
- query-source ( ( [ address ] ( ipv4_address | * ) [ port
-     ( integer | * ) ] ) | ( [ [ address ] (
-     ipv4_address | * ) ] port ( integer | * ) ) ) [
-     dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [
-     port ( integer | * ) ] ) | ( [ [ address ] (
-     ipv6_address | * ) ] port ( integer | * ) ) ) [
-     dscp integer ];
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- send-cookie boolean;
- tcp-keepalive boolean;
- tcp-only boolean;
- transfer-format ( many-answers | one-answer );
- transfer-source ( ipv4_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- transfers integer;
- };
- servfail-ttl duration;
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- sortlist { address_match_element; ... };
- stale-answer-enable boolean;
- stale-answer-ttl duration;
- synth-from-dnssec boolean;
- transfer-format ( many-answers | one-answer );
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- trust-anchor-telemetry boolean; // experimental
- trust-anchors { string ( static-key |
-     initial-key | static-ds | initial-ds
-     ) integer integer integer
-     quoted_string; ... };
- trusted-keys { string
-     integer integer
-     integer
-     quoted_string; ... }; deprecated
- try-tcp-refresh boolean;
- update-check-ksk boolean;
- use-alt-transfer-source boolean;
- v6-bias integer;
- validate-except { string; ... };
- zero-no-soa-ttl boolean;
- zero-no-soa-ttl-cache boolean;
- zone string [ class ] {
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { (
-     masters | ipv4_address [ port integer ] |
-     ipv6_address [ port integer ] ) [ key string ];
-     ... };
- alt-transfer-source ( ipv4_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- auto-dnssec ( allow | maintain | off );
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- database string;
- delegation-only boolean;
- dialup ( notify | notify-passive | passive | refresh |
-     boolean );
- dlz string;
- dnskey-sig-validity integer;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- file quoted_string;
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { (
-     ipv4_address | ipv6_address ) [ port integer ] [
-     dscp integer ]; ... };
- in-view string;
- inline-signing boolean;
- ixfr-from-differences boolean;
- journal quoted_string;
- key-directory quoted_string;
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- masters [ port integer ] [ dscp integer ] { ( masters
-     | ipv4_address [ port integer ] | ipv6_address [
-     port integer ] ) [ key string ]; ... };
- max-journal-size ( default | unlimited | sizeval );
- max-records integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-zone-ttl ( unlimited | duration );
- min-refresh-time integer;
- min-retry-time integer;
- multi-master boolean;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-source ( ipv4_address | * ) [ port ( integer | *
-     ) ] [ dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer
-     | * ) ] [ dscp integer ];
- notify-to-soa boolean;
- request-expire boolean;
- request-ixfr boolean;
- serial-update-method ( date | increment | unixtime );
- server-addresses { ( ipv4_address | ipv6_address ); ... };
- server-names { string; ... };
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- transfer-source ( ipv4_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- try-tcp-refresh boolean;
- type ( primary | master | secondary | slave | mirror |
-     delegation-only | forward | hint | redirect |
-     static-stub | stub );
- update-check-ksk boolean;
- update-policy ( local | { ( deny | grant ) string (
-     6to4-self | external | krb5-self | krb5-selfsub |
-     krb5-subdomain | ms-self | ms-selfsub | ms-subdomain |
-     name | self | selfsub | selfwild | subdomain | tcp-self
-     | wildcard | zonesub ) [ string ] rrtypelist; ... };
- use-alt-transfer-source boolean;
- zero-no-soa-ttl boolean;
- zone-statistics ( full | terse | none | boolean );
- };
- zone-statistics ( full | terse | none | boolean );
-};
-

-
- -
-

ZONE

-


-zone string [ class ] {
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- alt-transfer-source ( ipv4_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- auto-dnssec ( allow | maintain | off );
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- database string;
- delegation-only boolean;
- dialup ( notify | notify-passive | passive | refresh | boolean );
- dlz string;
- dnskey-sig-validity integer;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- file quoted_string;
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { ( ipv4_address
-     | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
- in-view string;
- inline-signing boolean;
- ixfr-from-differences boolean;
- journal quoted_string;
- key-directory quoted_string;
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- masters [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- max-journal-size ( default | unlimited | sizeval );
- max-records integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-zone-ttl ( unlimited | duration );
- min-refresh-time integer;
- min-retry-time integer;
- multi-master boolean;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- notify-to-soa boolean;
- request-expire boolean;
- request-ixfr boolean;
- serial-update-method ( date | increment | unixtime );
- server-addresses { ( ipv4_address | ipv6_address ); ... };
- server-names { string; ... };
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- try-tcp-refresh boolean;
- type ( primary | master | secondary | slave | mirror |
-     delegation-only | forward | hint | redirect | static-stub |
-     stub );
- update-check-ksk boolean;
- update-policy ( local | { ( deny | grant ) string ( 6to4-self |
-     external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self
-     | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild
-     | subdomain | tcp-self | wildcard | zonesub ) [ string ]
-     rrtypelist; ... };
- use-alt-transfer-source boolean;
- zero-no-soa-ttl boolean;
- zone-statistics ( full | terse | none | boolean );
-};
-

-
- -
-

FILES

- -

/etc/named.conf -

-
- -
-

SEE ALSO

- -

- ddns-confgen(8) - , - - named(8) - , - - named-checkconf(8) - , - - rndc(8) - , - - rndc-confgen(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/named/named.conf.rst b/bin/named/named.conf.rst new file mode 100644 index 0000000000..8af0972839 --- /dev/null +++ b/bin/named/named.conf.rst @@ -0,0 +1,1025 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. higlight: console + +named.conf - configuration file for **named** +--------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named.conf` + +Description +~~~~~~~~~~~ + +``named.conf`` is the configuration file for ``named``. Statements are +enclosed in braces and terminated with a semi-colon. Clauses in the +statements are also semi-colon terminated. The usual comment styles are +supported: + +C style: /\* \*/ + + C++ style: // to end of line + +Unix style: # to end of line + +ACL +^^^ + +:: + + acl string { address_match_element; ... }; + +CONTROLS +^^^^^^^^ + +:: + + controls { + inet ( ipv4_address | ipv6_address | + * ) [ port ( integer | * ) ] allow + { address_match_element; ... } [ + keys { string; ... } ] [ read-only + boolean ]; + unix quoted_string perm integer + owner integer group integer [ + keys { string; ... } ] [ read-only + boolean ]; + }; + +DLZ +^^^ + +:: + + dlz string { + database string; + search boolean; + }; + +DNSSEC-POLICY +^^^^^^^^^^^^^ + +:: + + dnssec-policy string { + dnskey-ttl duration; + keys { ( csk | ksk | zsk ) [ ( key-directory ) ] lifetime + duration_or_unlimited algorithm string [ integer ]; ... }; + max-zone-ttl duration; + parent-ds-ttl duration; + parent-propagation-delay duration; + parent-registration-delay duration; + publish-safety duration; + retire-safety duration; + signatures-refresh duration; + signatures-validity duration; + signatures-validity-dnskey duration; + zone-propagation-delay duration; + }; + +DYNDB +^^^^^ + +:: + + dyndb string quoted_string { + unspecified-text }; + +KEY +^^^ + +:: + + key string { + algorithm string; + secret string; + }; + +LOGGING +^^^^^^^ + +:: + + logging { + category string { string; ... }; + channel string { + buffered boolean; + file quoted_string [ versions ( unlimited | integer ) ] + [ size size ] [ suffix ( increment | timestamp ) ]; + null; + print-category boolean; + print-severity boolean; + print-time ( iso8601 | iso8601-utc | local | boolean ); + severity log_severity; + stderr; + syslog [ syslog_facility ]; + }; + }; + +MANAGED-KEYS +^^^^^^^^^^^^ + +See DNSSEC-KEYS. + +:: + + managed-keys { string ( static-key + | initial-key | static-ds | + initial-ds ) integer integer + integer quoted_string; ... };, deprecated + +MASTERS +^^^^^^^ + +:: + + masters string [ port integer ] [ dscp + integer ] { ( masters | ipv4_address [ + port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + +OPTIONS +^^^^^^^ + +:: + + options { + allow-new-zones boolean; + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-cache { address_match_element; ... }; + allow-query-cache-on { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-recursion { address_match_element; ... }; + allow-recursion-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + answer-cookie boolean; + attach-cache string; + auth-nxdomain boolean; // default changed + auto-dnssec ( allow | maintain | off ); + automatic-interface-scan boolean; + avoid-v4-udp-ports { portrange; ... }; + avoid-v6-udp-ports { portrange; ... }; + bindkeys-file quoted_string; + blackhole { address_match_element; ... }; + cache-file quoted_string; + catalog-zones { zone string [ default-masters [ port integer ] + [ dscp integer ] { ( masters | ipv4_address [ port + integer ] | ipv6_address [ port integer ] ) [ key + string ]; ... } ] [ zone-directory quoted_string ] [ + in-memory boolean ] [ min-update-interval duration ]; ... }; + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( primary | master | + secondary | slave | response ) ( + fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + clients-per-query integer; + cookie-algorithm ( aes | siphash24 ); + cookie-secret string; + coresize ( default | unlimited | sizeval ); + datasize ( default | unlimited | sizeval ); + deny-answer-addresses { address_match_element; ... } [ + except-from { string; ... } ]; + deny-answer-aliases { string; ... } [ except-from { string; ... + } ]; + dialup ( notify | notify-passive | passive | refresh | boolean ); + directory quoted_string; + disable-algorithms string { string; + ... }; + disable-ds-digests string { string; + ... }; + disable-empty-zone string; + dns64 netprefix { + break-dnssec boolean; + clients { address_match_element; ... }; + exclude { address_match_element; ... }; + mapped { address_match_element; ... }; + recursive-only boolean; + suffix ipv6_address; + }; + dns64-contact string; + dns64-server string; + dnskey-sig-validity integer; + dnsrps-enable boolean; + dnsrps-options { unspecified-text }; + dnssec-accept-expired boolean; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-must-be-secure string boolean; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + dnssec-validation ( yes | no | auto ); + dnstap { ( all | auth | client | forwarder | + resolver | update ) [ ( query | response ) ]; + ... }; + dnstap-identity ( quoted_string | none | + hostname ); + dnstap-output ( file | unix ) quoted_string [ + size ( unlimited | size ) ] [ versions ( + unlimited | integer ) ] [ suffix ( increment + | timestamp ) ]; + dnstap-version ( quoted_string | none ); + dscp integer; + dual-stack-servers [ port integer ] { ( quoted_string [ port + integer ] [ dscp integer ] | ipv4_address [ port + integer ] [ dscp integer ] | ipv6_address [ port + integer ] [ dscp integer ] ); ... }; + dump-file quoted_string; + edns-udp-size integer; + empty-contact string; + empty-server string; + empty-zones-enable boolean; + fetch-quota-params integer fixedpoint fixedpoint fixedpoint; + fetches-per-server integer [ ( drop | fail ) ]; + fetches-per-zone integer [ ( drop | fail ) ]; + files ( default | unlimited | sizeval ); + flush-zones-on-shutdown boolean; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + fstrm-set-buffer-hint integer; + fstrm-set-flush-timeout integer; + fstrm-set-input-queue-size integer; + fstrm-set-output-notify-threshold integer; + fstrm-set-output-queue-model ( mpsc | spsc ); + fstrm-set-output-queue-size integer; + fstrm-set-reopen-interval duration; + geoip-directory ( quoted_string | none ); + glue-cache boolean; + heartbeat-interval integer; + hostname ( quoted_string | none ); + inline-signing boolean; + interface-interval duration; + ixfr-from-differences ( primary | master | secondary | slave | + boolean ); + keep-response-order { address_match_element; ... }; + key-directory quoted_string; + lame-ttl duration; + listen-on [ port integer ] [ dscp + integer ] { + address_match_element; ... }; + listen-on-v6 [ port integer ] [ dscp + integer ] { + address_match_element; ... }; + lmdb-mapsize sizeval; + lock-file ( quoted_string | none ); + managed-keys-directory quoted_string; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + match-mapped-addresses boolean; + max-cache-size ( default | unlimited | sizeval | percentage ); + max-cache-ttl duration; + max-clients-per-query integer; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-ncache-ttl duration; + max-records integer; + max-recursion-depth integer; + max-recursion-queries integer; + max-refresh-time integer; + max-retry-time integer; + max-rsa-exponent-size integer; + max-stale-ttl duration; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-udp-size integer; + max-zone-ttl ( unlimited | duration ); + memstatistics boolean; + memstatistics-file quoted_string; + message-compression boolean; + min-cache-ttl duration; + min-ncache-ttl duration; + min-refresh-time integer; + min-retry-time integer; + minimal-any boolean; + minimal-responses ( no-auth | no-auth-recursive | boolean ); + multi-master boolean; + new-zones-directory quoted_string; + no-case-compress { address_match_element; ... }; + nocookie-udp-size integer; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-rate integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify-to-soa boolean; + nta-lifetime duration; + nta-recheck duration; + nxdomain-redirect string; + pid-file ( quoted_string | none ); + port integer; + preferred-glue string; + prefetch integer [ integer ]; + provide-ixfr boolean; + qname-minimization ( strict | relaxed | disabled | off ); + query-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + querylog boolean; + random-device ( quoted_string | none ); + rate-limit { + all-per-second integer; + errors-per-second integer; + exempt-clients { address_match_element; ... }; + ipv4-prefix-length integer; + ipv6-prefix-length integer; + log-only boolean; + max-table-size integer; + min-table-size integer; + nodata-per-second integer; + nxdomains-per-second integer; + qps-scale integer; + referrals-per-second integer; + responses-per-second integer; + slip integer; + window integer; + }; + recursing-file quoted_string; + recursion boolean; + recursive-clients integer; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + require-server-cookie boolean; + reserved-sockets integer; + resolver-nonbackoff-tries integer; + resolver-query-timeout integer; + resolver-retry-interval integer; + response-padding { address_match_element; ... } block-size + integer; + response-policy { zone string [ add-soa boolean ] [ log + boolean ] [ max-policy-ttl duration ] [ min-update-interval + duration ] [ policy ( cname | disabled | drop | given | no-op + | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [ + recursive-only boolean ] [ nsip-enable boolean ] [ + nsdname-enable boolean ]; ... } [ add-soa boolean ] [ + break-dnssec boolean ] [ max-policy-ttl duration ] [ + min-update-interval duration ] [ min-ns-dots integer ] [ + nsip-wait-recurse boolean ] [ nsdname-wait-recurse boolean + ] [ qname-wait-recurse boolean ] [ recursive-only boolean ] + [ nsip-enable boolean ] [ nsdname-enable boolean ] [ + dnsrps-enable boolean ] [ dnsrps-options { unspecified-text + } ]; + root-delegation-only [ exclude { string; ... } ]; + root-key-sentinel boolean; + rrset-order { [ class string ] [ type string ] [ name + quoted_string ] string string; ... }; + secroots-file quoted_string; + send-cookie boolean; + serial-query-rate integer; + serial-update-method ( date | increment | unixtime ); + server-id ( quoted_string | none | hostname ); + servfail-ttl duration; + session-keyalg string; + session-keyfile ( quoted_string | none ); + session-keyname string; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + sortlist { address_match_element; ... }; + stacksize ( default | unlimited | sizeval ); + stale-answer-enable boolean; + stale-answer-ttl duration; + startup-notify-rate integer; + statistics-file quoted_string; + synth-from-dnssec boolean; + tcp-advertised-timeout integer; + tcp-clients integer; + tcp-idle-timeout integer; + tcp-initial-timeout integer; + tcp-keepalive-timeout integer; + tcp-listen-queue integer; + tkey-dhkey quoted_string integer; + tkey-domain quoted_string; + tkey-gssapi-credential quoted_string; + tkey-gssapi-keytab quoted_string; + transfer-format ( many-answers | one-answer ); + transfer-message-size integer; + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + transfers-in integer; + transfers-out integer; + transfers-per-ns integer; + trust-anchor-telemetry boolean; // experimental + try-tcp-refresh boolean; + update-check-ksk boolean; + use-alt-transfer-source boolean; + use-v4-udp-ports { portrange; ... }; + use-v6-udp-ports { portrange; ... }; + v6-bias integer; + validate-except { string; ... }; + version ( quoted_string | none ); + zero-no-soa-ttl boolean; + zero-no-soa-ttl-cache boolean; + zone-statistics ( full | terse | none | boolean ); + }; + +PLUGIN +^^^^^^ + +:: + + plugin ( query ) string [ { unspecified-text + } ]; + +SERVER +^^^^^^ + +:: + + server netprefix { + bogus boolean; + edns boolean; + edns-udp-size integer; + edns-version integer; + keys server_key; + max-udp-size integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + padding integer; + provide-ixfr boolean; + query-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + send-cookie boolean; + tcp-keepalive boolean; + tcp-only boolean; + transfer-format ( many-answers | one-answer ); + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + transfers integer; + }; + +STATISTICS-CHANNELS +^^^^^^^^^^^^^^^^^^^ + +:: + + statistics-channels { + inet ( ipv4_address | ipv6_address | + * ) [ port ( integer | * ) ] [ + allow { address_match_element; ... + } ]; + }; + +TRUST-ANCHORS +^^^^^^^^^^^^^ + +:: + + trust-anchors { string ( static-key | + initial-key | static-ds | initial-ds ) + integer integer integer + quoted_string; ... }; + +TRUSTED-KEYS +^^^^^^^^^^^^ + +Deprecated - see DNSSEC-KEYS. + +:: + + trusted-keys { string integer + integer integer + quoted_string; ... };, deprecated + +VIEW +^^^^ + +:: + + view string [ class ] { + allow-new-zones boolean; + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-cache { address_match_element; ... }; + allow-query-cache-on { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-recursion { address_match_element; ... }; + allow-recursion-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + attach-cache string; + auth-nxdomain boolean; // default changed + auto-dnssec ( allow | maintain | off ); + cache-file quoted_string; + catalog-zones { zone string [ default-masters [ port integer ] + [ dscp integer ] { ( masters | ipv4_address [ port + integer ] | ipv6_address [ port integer ] ) [ key + string ]; ... } ] [ zone-directory quoted_string ] [ + in-memory boolean ] [ min-update-interval duration ]; ... }; + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( primary | master | + secondary | slave | response ) ( + fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + clients-per-query integer; + deny-answer-addresses { address_match_element; ... } [ + except-from { string; ... } ]; + deny-answer-aliases { string; ... } [ except-from { string; ... + } ]; + dialup ( notify | notify-passive | passive | refresh | boolean ); + disable-algorithms string { string; + ... }; + disable-ds-digests string { string; + ... }; + disable-empty-zone string; + dlz string { + database string; + search boolean; + }; + dns64 netprefix { + break-dnssec boolean; + clients { address_match_element; ... }; + exclude { address_match_element; ... }; + mapped { address_match_element; ... }; + recursive-only boolean; + suffix ipv6_address; + }; + dns64-contact string; + dns64-server string; + dnskey-sig-validity integer; + dnsrps-enable boolean; + dnsrps-options { unspecified-text }; + dnssec-accept-expired boolean; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-must-be-secure string boolean; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + dnssec-validation ( yes | no | auto ); + dnstap { ( all | auth | client | forwarder | + resolver | update ) [ ( query | response ) ]; + ... }; + dual-stack-servers [ port integer ] { ( quoted_string [ port + integer ] [ dscp integer ] | ipv4_address [ port + integer ] [ dscp integer ] | ipv6_address [ port + integer ] [ dscp integer ] ); ... }; + dyndb string quoted_string { + unspecified-text }; + edns-udp-size integer; + empty-contact string; + empty-server string; + empty-zones-enable boolean; + fetch-quota-params integer fixedpoint fixedpoint fixedpoint; + fetches-per-server integer [ ( drop | fail ) ]; + fetches-per-zone integer [ ( drop | fail ) ]; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + glue-cache boolean; + inline-signing boolean; + ixfr-from-differences ( primary | master | secondary | slave | + boolean ); + key string { + algorithm string; + secret string; + }; + key-directory quoted_string; + lame-ttl duration; + lmdb-mapsize sizeval; + managed-keys { string ( + static-key | initial-key + | static-ds | initial-ds + ) integer integer + integer + quoted_string; ... };, deprecated + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + match-clients { address_match_element; ... }; + match-destinations { address_match_element; ... }; + match-recursive-only boolean; + max-cache-size ( default | unlimited | sizeval | percentage ); + max-cache-ttl duration; + max-clients-per-query integer; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-ncache-ttl duration; + max-records integer; + max-recursion-depth integer; + max-recursion-queries integer; + max-refresh-time integer; + max-retry-time integer; + max-stale-ttl duration; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-udp-size integer; + max-zone-ttl ( unlimited | duration ); + message-compression boolean; + min-cache-ttl duration; + min-ncache-ttl duration; + min-refresh-time integer; + min-retry-time integer; + minimal-any boolean; + minimal-responses ( no-auth | no-auth-recursive | boolean ); + multi-master boolean; + new-zones-directory quoted_string; + no-case-compress { address_match_element; ... }; + nocookie-udp-size integer; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify-to-soa boolean; + nta-lifetime duration; + nta-recheck duration; + nxdomain-redirect string; + plugin ( query ) string [ { + unspecified-text } ]; + preferred-glue string; + prefetch integer [ integer ]; + provide-ixfr boolean; + qname-minimization ( strict | relaxed | disabled | off ); + query-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + rate-limit { + all-per-second integer; + errors-per-second integer; + exempt-clients { address_match_element; ... }; + ipv4-prefix-length integer; + ipv6-prefix-length integer; + log-only boolean; + max-table-size integer; + min-table-size integer; + nodata-per-second integer; + nxdomains-per-second integer; + qps-scale integer; + referrals-per-second integer; + responses-per-second integer; + slip integer; + window integer; + }; + recursion boolean; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + require-server-cookie boolean; + resolver-nonbackoff-tries integer; + resolver-query-timeout integer; + resolver-retry-interval integer; + response-padding { address_match_element; ... } block-size + integer; + response-policy { zone string [ add-soa boolean ] [ log + boolean ] [ max-policy-ttl duration ] [ min-update-interval + duration ] [ policy ( cname | disabled | drop | given | no-op + | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [ + recursive-only boolean ] [ nsip-enable boolean ] [ + nsdname-enable boolean ]; ... } [ add-soa boolean ] [ + break-dnssec boolean ] [ max-policy-ttl duration ] [ + min-update-interval duration ] [ min-ns-dots integer ] [ + nsip-wait-recurse boolean ] [ nsdname-wait-recurse boolean + ] [ qname-wait-recurse boolean ] [ recursive-only boolean ] + [ nsip-enable boolean ] [ nsdname-enable boolean ] [ + dnsrps-enable boolean ] [ dnsrps-options { unspecified-text + } ]; + root-delegation-only [ exclude { string; ... } ]; + root-key-sentinel boolean; + rrset-order { [ class string ] [ type string ] [ name + quoted_string ] string string; ... }; + send-cookie boolean; + serial-update-method ( date | increment | unixtime ); + server netprefix { + bogus boolean; + edns boolean; + edns-udp-size integer; + edns-version integer; + keys server_key; + max-udp-size integer; + notify-source ( ipv4_address | * ) [ port ( integer | * + ) ] [ dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer + | * ) ] [ dscp integer ]; + padding integer; + provide-ixfr boolean; + query-source ( ( [ address ] ( ipv4_address | * ) [ port + ( integer | * ) ] ) | ( [ [ address ] ( + ipv4_address | * ) ] port ( integer | * ) ) ) [ + dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ + port ( integer | * ) ] ) | ( [ [ address ] ( + ipv6_address | * ) ] port ( integer | * ) ) ) [ + dscp integer ]; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + send-cookie boolean; + tcp-keepalive boolean; + tcp-only boolean; + transfer-format ( many-answers | one-answer ); + transfer-source ( ipv4_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + transfers integer; + }; + servfail-ttl duration; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + sortlist { address_match_element; ... }; + stale-answer-enable boolean; + stale-answer-ttl duration; + synth-from-dnssec boolean; + transfer-format ( many-answers | one-answer ); + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + trust-anchor-telemetry boolean; // experimental + trust-anchors { string ( static-key | + initial-key | static-ds | initial-ds + ) integer integer integer + quoted_string; ... }; + trusted-keys { string + integer integer + integer + quoted_string; ... };, deprecated + try-tcp-refresh boolean; + update-check-ksk boolean; + use-alt-transfer-source boolean; + v6-bias integer; + validate-except { string; ... }; + zero-no-soa-ttl boolean; + zero-no-soa-ttl-cache boolean; + zone string [ class ] { + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( + masters | ipv4_address [ port integer ] | + ipv6_address [ port integer ] ) [ key string ]; + ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + auto-dnssec ( allow | maintain | off ); + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + database string; + delegation-only boolean; + dialup ( notify | notify-passive | passive | refresh | + boolean ); + dlz string; + dnskey-sig-validity integer; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + file quoted_string; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( + ipv4_address | ipv6_address ) [ port integer ] [ + dscp integer ]; ... }; + in-view string; + inline-signing boolean; + ixfr-from-differences boolean; + journal quoted_string; + key-directory quoted_string; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port integer ] [ dscp integer ] { ( masters + | ipv4_address [ port integer ] | ipv6_address [ + port integer ] ) [ key string ]; ... }; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-records integer; + max-refresh-time integer; + max-retry-time integer; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-zone-ttl ( unlimited | duration ); + min-refresh-time integer; + min-retry-time integer; + multi-master boolean; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-source ( ipv4_address | * ) [ port ( integer | * + ) ] [ dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer + | * ) ] [ dscp integer ]; + notify-to-soa boolean; + request-expire boolean; + request-ixfr boolean; + serial-update-method ( date | increment | unixtime ); + server-addresses { ( ipv4_address | ipv6_address ); ... }; + server-names { string; ... }; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + transfer-source ( ipv4_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + try-tcp-refresh boolean; + type ( primary | master | secondary | slave | mirror | + delegation-only | forward | hint | redirect | + static-stub | stub ); + update-check-ksk boolean; + update-policy ( local | { ( deny | grant ) string ( + 6to4-self | external | krb5-self | krb5-selfsub | + krb5-subdomain | ms-self | ms-selfsub | ms-subdomain | + name | self | selfsub | selfwild | subdomain | tcp-self + | wildcard | zonesub ) [ string ] rrtypelist; ... }; + use-alt-transfer-source boolean; + zero-no-soa-ttl boolean; + zone-statistics ( full | terse | none | boolean ); + }; + zone-statistics ( full | terse | none | boolean ); + }; + +ZONE +^^^^ + +:: + + zone string [ class ] { + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + auto-dnssec ( allow | maintain | off ); + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + database string; + delegation-only boolean; + dialup ( notify | notify-passive | passive | refresh | boolean ); + dlz string; + dnskey-sig-validity integer; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + file quoted_string; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + in-view string; + inline-signing boolean; + ixfr-from-differences boolean; + journal quoted_string; + key-directory quoted_string; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-records integer; + max-refresh-time integer; + max-retry-time integer; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-zone-ttl ( unlimited | duration ); + min-refresh-time integer; + min-retry-time integer; + multi-master boolean; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify-to-soa boolean; + request-expire boolean; + request-ixfr boolean; + serial-update-method ( date | increment | unixtime ); + server-addresses { ( ipv4_address | ipv6_address ); ... }; + server-names { string; ... }; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + try-tcp-refresh boolean; + type ( primary | master | secondary | slave | mirror | + delegation-only | forward | hint | redirect | static-stub | + stub ); + update-check-ksk boolean; + update-policy ( local | { ( deny | grant ) string ( 6to4-self | + external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self + | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild + | subdomain | tcp-self | wildcard | zonesub ) [ string ] + rrtypelist; ... }; + use-alt-transfer-source boolean; + zero-no-soa-ttl boolean; + zone-statistics ( full | terse | none | boolean ); + }; + +Files +~~~~~ + +``/etc/named.conf`` + +See Also +~~~~~~~~ + +:manpage:`ddns-confgen(8)`, :manpage:`named(8)`, :manpage:`named-checkconf(8)`, :manpage:`rndc(8)`, :manpage:`rndc-confgen(8)`, BIND 9 Administrator Reference Manual. + diff --git a/bin/named/named.docbook b/bin/named/named.docbook deleted file mode 100644 index 59d6e37f42..0000000000 --- a/bin/named/named.docbook +++ /dev/null @@ -1,550 +0,0 @@ - - - - - - 2014-02-19 - - - ISC - Internet Systems Consortium, Inc. - - - - named - 8 - BIND9 - - - - named - Internet domain name server - - - - - 2000 - 2001 - 2003 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2011 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - named - - - - - - - - - - - - - - - - - - - - - - - - - - - - DESCRIPTION - - named - is a Domain Name System (DNS) server, - part of the BIND 9 distribution from ISC. For more - information on the DNS, see RFCs 1033, 1034, and 1035. - - - When invoked without arguments, named - will - read the default configuration file - /etc/named.conf, read any initial - data, and listen for queries. - - - - OPTIONS - - - - - -4 - - - Use IPv4 only even if the host machine is capable of IPv6. - and are mutually - exclusive. - - - - - - -6 - - - Use IPv6 only even if the host machine is capable of IPv4. - and are mutually - exclusive. - - - - - - -c config-file - - - Use config-file as the - configuration file instead of the default, - /etc/named.conf. To - ensure that reloading the configuration file continues - to work after the server has changed its working - directory due to to a possible - option in the configuration - file, config-file should be - an absolute pathname. - - - - - - -d debug-level - - - Set the daemon's debug level to debug-level. - Debugging traces from named become - more verbose as the debug level increases. - - - - - - -D string - - - Specifies a string that is used to identify a instance of - named in a process listing. The contents - of string are - not examined. - - - - - - -E engine-name - - - When applicable, specifies the hardware to use for - cryptographic operations, such as a secure key store used - for signing. - - - When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". - - - - - - -f - - - Run the server in the foreground (i.e. do not daemonize). - - - - - - -g - - - Run the server in the foreground and force all logging - to stderr. - - - - - - -L logfile - - - Log to the file by default - instead of the system log. - - - - - - -M option - - - Sets the default memory context options. If set to - external, - this causes the internal memory manager to be bypassed - in favor of system-provided memory allocation functions. - If set to fill, - blocks of memory will be filled with tag values when allocated - or freed, to assist debugging of memory problems. - (nofill - disables this behavior, and is the default unless - named has been compiled with developer - options.) - - - - - - -m flag - - - Turn on memory usage debugging flags. Possible flags are - usage, - trace, - record, - size, and - mctx. - These correspond to the ISC_MEM_DEBUGXXXX flags described in - <isc/mem.h>. - - - - - - -n #cpus - - - Create #cpus worker threads - to take advantage of multiple CPUs. If not specified, - named will try to determine the - number of CPUs present and create one thread per CPU. - If it is unable to determine the number of CPUs, a - single worker thread will be created. - - - - - - -p port - - - Listen for queries on port port. If not - specified, the default is port 53. - - - - - - -s - - - Write memory usage statistics to stdout on exit. - - - - This option is mainly of interest to BIND 9 developers - and may be removed or changed in a future release. - - - - - - - -S #max-socks - - - Allow named to use up to - #max-socks sockets. - The default value is 21000 on systems built with default - configuration options, and 4096 on systems built with - "configure --with-tuning=small". - - - - This option should be unnecessary for the vast majority - of users. - The use of this option could even be harmful because the - specified value may exceed the limitation of the - underlying system API. - It is therefore set only when the default configuration - causes exhaustion of file descriptors and the - operational environment is known to support the - specified number of sockets. - Note also that the actual maximum number is normally a little - fewer than the specified value because - named reserves some file descriptors - for its internal use. - - - - - - - -t directory - - Chroot - to directory after - processing the command line arguments, but before - reading the configuration file. - - - - This option should be used in conjunction with the - option, as chrooting a process - running as root doesn't enhance security on most - systems; the way chroot(2) is - defined allows a process with root privileges to - escape a chroot jail. - - - - - - - -U #listeners - - - Use #listeners - worker threads to listen for incoming UDP packets on each - address. If not specified, named will - calculate a default value based on the number of detected - CPUs: 1 for 1 CPU, and the number of detected CPUs - minus one for machines with more than 1 CPU. This cannot - be increased to a value higher than the number of CPUs. - If has been set to a higher value than - the number of detected CPUs, then may - be increased as high as that value, but no higher. - On Windows, the number of UDP listeners is hardwired to 1 - and this option has no effect. - - - - - - -u user - - Setuid - to user after completing - privileged operations, such as creating sockets that - listen on privileged ports. - - - - On Linux, named uses the kernel's - capability mechanism to drop all root privileges - except the ability to bind(2) to - a - privileged port and set process resource limits. - Unfortunately, this means that the - option only works when named is - run - on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or - later, since previous kernels did not allow privileges - to be retained after setuid(2). - - - - - - - -v - - - Report the version number and exit. - - - - - - -V - - - Report the version number and build options, and exit. - - - - - - -X lock-file - - - Acquire a lock on the specified file at runtime; this - helps to prevent duplicate named instances - from running simultaneously. - Use of this option overrides the lock-file - option in named.conf. - If set to none, the lock file check - is disabled. - - - - - - -x cache-file - - - Load data from cache-file into the - cache of the default view. - - - - This option must not be used. It is only of interest - to BIND 9 developers and may be removed or changed in a - future release. - - - - - - - - - - SIGNALS - - - In routine operation, signals should not be used to control - the nameserver; rndc should be used - instead. - - - - - - SIGHUP - - - Force a reload of the server. - - - - - - SIGINT, SIGTERM - - - Shut down the server. - - - - - - - - The result of sending any other signals to the server is undefined. - - - - - CONFIGURATION - - - The named configuration file is too complex - to describe in detail here. A complete description is provided - in the - BIND 9 Administrator Reference Manual. - - - - named inherits the umask - (file creation mode mask) from the parent process. If files - created by named, such as journal files, - need to have custom permissions, the umask - should be set explicitly in the script used to start the - named process. - - - - - FILES - - - - - - /etc/named.conf - - - The default configuration file. - - - - - - /var/run/named/named.pid - - - The default process-id file. - - - - - - - - - SEE ALSO - - RFC 1033, - RFC 1034, - RFC 1035, - - named-checkconf - 8 - , - - named-checkzone - 8 - , - - rndc - 8 - , - - named.conf - 5 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/named/named.html b/bin/named/named.html deleted file mode 100644 index 95a9c49ff1..0000000000 --- a/bin/named/named.html +++ /dev/null @@ -1,458 +0,0 @@ - - - - - -named - - -
-
- - - - - -
-

Name

-

- named - — Internet domain name server -

-
- - - -
-

Synopsis

-

- named - [ - [-4] - | [-6] - ] - [-c config-file] - [-d debug-level] - [-D string] - [-E engine-name] - [-f] - [-g] - [-L logfile] - [-M option] - [-m flag] - [-n #cpus] - [-p port] - [-s] - [-S #max-socks] - [-t directory] - [-U #listeners] - [-u user] - [-v] - [-V] - [-X lock-file] - [-x cache-file] -

-
- -
-

DESCRIPTION

- -

named - is a Domain Name System (DNS) server, - part of the BIND 9 distribution from ISC. For more - information on the DNS, see RFCs 1033, 1034, and 1035. -

-

- When invoked without arguments, named - will - read the default configuration file - /etc/named.conf, read any initial - data, and listen for queries. -

-
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only even if the host machine is capable of IPv6. - -4 and -6 are mutually - exclusive. -

-
-
-6
-
-

- Use IPv6 only even if the host machine is capable of IPv4. - -4 and -6 are mutually - exclusive. -

-
-
-c config-file
-
-

- Use config-file as the - configuration file instead of the default, - /etc/named.conf. To - ensure that reloading the configuration file continues - to work after the server has changed its working - directory due to to a possible - directory option in the configuration - file, config-file should be - an absolute pathname. -

-
-
-d debug-level
-
-

- Set the daemon's debug level to debug-level. - Debugging traces from named become - more verbose as the debug level increases. -

-
-
-D string
-
-

- Specifies a string that is used to identify a instance of - named in a process listing. The contents - of string are - not examined. -

-
-
-E engine-name
-
-

- When applicable, specifies the hardware to use for - cryptographic operations, such as a secure key store used - for signing. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-f
-
-

- Run the server in the foreground (i.e. do not daemonize). -

-
-
-g
-
-

- Run the server in the foreground and force all logging - to stderr. -

-
-
-L logfile
-
-

- Log to the file logfile by default - instead of the system log. -

-
-
-M option
-
-

- Sets the default memory context options. If set to - external, - this causes the internal memory manager to be bypassed - in favor of system-provided memory allocation functions. - If set to fill, - blocks of memory will be filled with tag values when allocated - or freed, to assist debugging of memory problems. - (nofill - disables this behavior, and is the default unless - named has been compiled with developer - options.) -

-
-
-m flag
-
-

- Turn on memory usage debugging flags. Possible flags are - usage, - trace, - record, - size, and - mctx. - These correspond to the ISC_MEM_DEBUGXXXX flags described in - <isc/mem.h>. -

-
-
-n #cpus
-
-

- Create #cpus worker threads - to take advantage of multiple CPUs. If not specified, - named will try to determine the - number of CPUs present and create one thread per CPU. - If it is unable to determine the number of CPUs, a - single worker thread will be created. -

-
-
-p port
-
-

- Listen for queries on port port. If not - specified, the default is port 53. -

-
-
-s
-
-

- Write memory usage statistics to stdout on exit. -

-
-

Note

-

- This option is mainly of interest to BIND 9 developers - and may be removed or changed in a future release. -

-
-
-
-S #max-socks
-
-

- Allow named to use up to - #max-socks sockets. - The default value is 21000 on systems built with default - configuration options, and 4096 on systems built with - "configure --with-tuning=small". -

-
-

Warning

-

- This option should be unnecessary for the vast majority - of users. - The use of this option could even be harmful because the - specified value may exceed the limitation of the - underlying system API. - It is therefore set only when the default configuration - causes exhaustion of file descriptors and the - operational environment is known to support the - specified number of sockets. - Note also that the actual maximum number is normally a little - fewer than the specified value because - named reserves some file descriptors - for its internal use. -

-
-
-
-t directory
-
-

Chroot - to directory after - processing the command line arguments, but before - reading the configuration file. -

-
-

Warning

-

- This option should be used in conjunction with the - -u option, as chrooting a process - running as root doesn't enhance security on most - systems; the way chroot(2) is - defined allows a process with root privileges to - escape a chroot jail. -

-
-
-
-U #listeners
-
-

- Use #listeners - worker threads to listen for incoming UDP packets on each - address. If not specified, named will - calculate a default value based on the number of detected - CPUs: 1 for 1 CPU, and the number of detected CPUs - minus one for machines with more than 1 CPU. This cannot - be increased to a value higher than the number of CPUs. - If -n has been set to a higher value than - the number of detected CPUs, then -U may - be increased as high as that value, but no higher. - On Windows, the number of UDP listeners is hardwired to 1 - and this option has no effect. -

-
-
-u user
-
-

Setuid - to user after completing - privileged operations, such as creating sockets that - listen on privileged ports. -

-
-

Note

-

- On Linux, named uses the kernel's - capability mechanism to drop all root privileges - except the ability to bind(2) to - a - privileged port and set process resource limits. - Unfortunately, this means that the -u - option only works when named is - run - on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or - later, since previous kernels did not allow privileges - to be retained after setuid(2). -

-
-
-
-v
-
-

- Report the version number and exit. -

-
-
-V
-
-

- Report the version number and build options, and exit. -

-
-
-X lock-file
-
-

- Acquire a lock on the specified file at runtime; this - helps to prevent duplicate named instances - from running simultaneously. - Use of this option overrides the lock-file - option in named.conf. - If set to none, the lock file check - is disabled. -

-
-
-x cache-file
-
-

- Load data from cache-file into the - cache of the default view. -

-
-

Warning

-

- This option must not be used. It is only of interest - to BIND 9 developers and may be removed or changed in a - future release. -

-
-
-
- -
- -
-

SIGNALS

- -

- In routine operation, signals should not be used to control - the nameserver; rndc should be used - instead. -

- -
-
SIGHUP
-
-

- Force a reload of the server. -

-
-
SIGINT, SIGTERM
-
-

- Shut down the server. -

-
-
- -

- The result of sending any other signals to the server is undefined. -

- -
- -
-

CONFIGURATION

- -

- The named configuration file is too complex - to describe in detail here. A complete description is provided - in the - BIND 9 Administrator Reference Manual. -

- -

- named inherits the umask - (file creation mode mask) from the parent process. If files - created by named, such as journal files, - need to have custom permissions, the umask - should be set explicitly in the script used to start the - named process. -

- -
- -
-

FILES

- - -
-
/etc/named.conf
-
-

- The default configuration file. -

-
-
/var/run/named/named.pid
-
-

- The default process-id file. -

-
-
- -
- -
-

SEE ALSO

- -

RFC 1033, - RFC 1034, - RFC 1035, - - named-checkconf - (8) - , - - named-checkzone - (8) - , - - rndc - (8) - , - - named.conf - (5) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/named/named.rst b/bin/named/named.rst new file mode 100644 index 0000000000..3c54a67e5c --- /dev/null +++ b/bin/named/named.rst @@ -0,0 +1,234 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_named: + +named - Internet domain name server +----------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named` [ [**-4**] | [**-6**] ] [**-c** config-file] [**-d** debug-level] [**-D** string] [**-E** engine-name] [**-f**] [**-g**] [**-L** logfile] [**-M** option] [**-m** flag] [**-n** #cpus] [**-p** port] [**-s**] [**-S** #max-socks] [**-t** directory] [**-U** #listeners] [**-u** user] [**-v**] [**-V**] [**-X** lock-file] [**-x** cache-file] + +Description +~~~~~~~~~~~ + +``named`` is a Domain Name System (DNS) server, part of the BIND 9 +distribution from ISC. For more information on the DNS, see :rfc:`1033`, +:rfc:`1034`, and :rfc:`1035`. + +When invoked without arguments, ``named`` will read the default +configuration file ``/etc/named.conf``, read any initial data, and +listen for queries. + +Options +~~~~~~~ + +**-4** + Use IPv4 only even if the host machine is capable of IPv6. ``-4`` and + ``-6`` are mutually exclusive. + +**-6** + Use IPv6 only even if the host machine is capable of IPv4. ``-4`` and + ``-6`` are mutually exclusive. + +**-c** config-file + Use config-file as the configuration file instead of the default, + ``/etc/named.conf``. To ensure that reloading the configuration file + continues to work after the server has changed its working directory + due to to a possible ``directory`` option in the configuration file, + config-file should be an absolute pathname. + +**-d** debug-level + Set the daemon's debug level to debug-level. Debugging traces from + ``named`` become more verbose as the debug level increases. + +**-D** string + Specifies a string that is used to identify a instance of ``named`` + in a process listing. The contents of string are not examined. + +**-E** engine-name + When applicable, specifies the hardware to use for cryptographic + operations, such as a secure key store used for signing. + + When BIND is built with OpenSSL PKCS#11 support, this defaults to the + string "pkcs11", which identifies an OpenSSL engine that can drive a + cryptographic accelerator or hardware service module. When BIND is + built with native PKCS#11 cryptography (--enable-native-pkcs11), it + defaults to the path of the PKCS#11 provider library specified via + "--with-pkcs11". + +**-f** + Run the server in the foreground (i.e. do not daemonize). + +**-g** + Run the server in the foreground and force all logging to ``stderr``. + +**-L** logfile + Log to the file ``logfile`` by default instead of the system log. + +**-M** option + Sets the default memory context options. If set to external, this + causes the internal memory manager to be bypassed in favor of + system-provided memory allocation functions. If set to fill, blocks + of memory will be filled with tag values when allocated or freed, to + assist debugging of memory problems. (nofill disables this behavior, + and is the default unless ``named`` has been compiled with developer + options.) + +**-m** flag + Turn on memory usage debugging flags. Possible flags are usage, + trace, record, size, and mctx. These correspond to the + ISC_MEM_DEBUGXXXX flags described in ````. + +**-n** #cpus + Create #cpus worker threads to take advantage of multiple CPUs. If + not specified, ``named`` will try to determine the number of CPUs + present and create one thread per CPU. If it is unable to determine + the number of CPUs, a single worker thread will be created. + +**-p** port + Listen for queries on port port. If not specified, the default is + port 53. + +**-s** + Write memory usage statistics to ``stdout`` on exit. + +.. note:: + + This option is mainly of interest to BIND 9 developers and may be + removed or changed in a future release. + +**-S** #max-socks + Allow ``named`` to use up to #max-socks sockets. The default value is + 21000 on systems built with default configuration options, and 4096 + on systems built with "configure --with-tuning=small". + +.. warning:: + + This option should be unnecessary for the vast majority of users. + The use of this option could even be harmful because the specified + value may exceed the limitation of the underlying system API. It + is therefore set only when the default configuration causes + exhaustion of file descriptors and the operational environment is + known to support the specified number of sockets. Note also that + the actual maximum number is normally a little fewer than the + specified value because ``named`` reserves some file descriptors + for its internal use. + +**-t** directory + Chroot to directory after processing the command line arguments, but + before reading the configuration file. + +.. warning:: + + This option should be used in conjunction with the ``-u`` option, + as chrooting a process running as root doesn't enhance security on + most systems; the way ``chroot(2)`` is defined allows a process + with root privileges to escape a chroot jail. + +**-U** #listeners + Use #listeners worker threads to listen for incoming UDP packets on + each address. If not specified, ``named`` will calculate a default + value based on the number of detected CPUs: 1 for 1 CPU, and the + number of detected CPUs minus one for machines with more than 1 CPU. + This cannot be increased to a value higher than the number of CPUs. + If ``-n`` has been set to a higher value than the number of detected + CPUs, then ``-U`` may be increased as high as that value, but no + higher. On Windows, the number of UDP listeners is hardwired to 1 and + this option has no effect. + +**-u** user + Setuid to user after completing privileged operations, such as + creating sockets that listen on privileged ports. + +.. note:: + + On Linux, ``named`` uses the kernel's capability mechanism to drop + all root privileges except the ability to ``bind(2)`` to a + privileged port and set process resource limits. Unfortunately, + this means that the ``-u`` option only works when ``named`` is run + on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or later, since + previous kernels did not allow privileges to be retained after + ``setuid(2)``. + +**-v** + Report the version number and exit. + +**-V** + Report the version number and build options, and exit. + +**-X** lock-file + Acquire a lock on the specified file at runtime; this helps to + prevent duplicate ``named`` instances from running simultaneously. + Use of this option overrides the ``lock-file`` option in + ``named.conf``. If set to ``none``, the lock file check is disabled. + +**-x** cache-file + Load data from cache-file into the cache of the default view. + +.. warning:: + + This option must not be used. It is only of interest to BIND 9 + developers and may be removed or changed in a future release. + +Signals +~~~~~~~ + +In routine operation, signals should not be used to control the +nameserver; ``rndc`` should be used instead. + +SIGHUP + Force a reload of the server. + +SIGINT, SIGTERM + Shut down the server. + +The result of sending any other signals to the server is undefined. + +Configuration +~~~~~~~~~~~~~ + +The ``named`` configuration file is too complex to describe in detail +here. A complete description is provided in the BIND 9 Administrator +Reference Manual. + +``named`` inherits the ``umask`` (file creation mode mask) from the +parent process. If files created by ``named``, such as journal files, +need to have custom permissions, the ``umask`` should be set explicitly +in the script used to start the ``named`` process. + +Files +~~~~~ + +``/etc/named.conf`` + The default configuration file. + +``/var/run/named/named.pid`` + The default process-id file. + +See Also +~~~~~~~~ + +:rfc:`1033`, :rfc:`1034`, :rfc:`1035`, :manpage:`named-checkconf(8)`, :manpage:`named-checkzone(8)`, :manpage:`rndc(8), :manpage:`named.conf(5)`, BIND 9 Administrator Reference Manual. diff --git a/bin/nsupdate/nsupdate.1 b/bin/nsupdate/nsupdate.1 deleted file mode 100644 index 38b4efc1b6..0000000000 --- a/bin/nsupdate/nsupdate.1 +++ /dev/null @@ -1,523 +0,0 @@ -.\" Copyright (C) 2000-2012, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: nsupdate -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-04-18 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NSUPDATE" "1" "2014\-04\-18" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -nsupdate \- Dynamic DNS update utility -.SH "SYNOPSIS" -.HP \w'\fBnsupdate\fR\ 'u -\fBnsupdate\fR [\fB\-d\fR] [\fB\-D\fR] [\fB\-i\fR] [\fB\-L\ \fR\fB\fIlevel\fR\fR] [[\fB\-g\fR] | [\fB\-o\fR] | [\fB\-l\fR] | [\fB\-y\ \fR\fB\fI[hmac:]\fR\fIkeyname:secret\fR\fR] | [\fB\-k\ \fR\fB\fIkeyfile\fR\fR]] [\fB\-t\ \fR\fB\fItimeout\fR\fR] [\fB\-u\ \fR\fB\fIudptimeout\fR\fR] [\fB\-r\ \fR\fB\fIudpretries\fR\fR] [\fB\-v\fR] [\fB\-T\fR] [\fB\-P\fR] [\fB\-V\fR] [[\fB\-4\fR] | [\fB\-6\fR]] [filename] -.SH "DESCRIPTION" -.PP -\fBnsupdate\fR -is used to submit Dynamic DNS Update requests as defined in RFC 2136 to a name server\&. This allows resource records to be added or removed from a zone without manually editing the zone file\&. A single update request can contain requests to add or remove more than one resource record\&. -.PP -Zones that are under dynamic control via -\fBnsupdate\fR -or a DHCP server should not be edited by hand\&. Manual edits could conflict with dynamic updates and cause data to be lost\&. -.PP -The resource records that are dynamically added or removed with -\fBnsupdate\fR -have to be in the same zone\&. Requests are sent to the zone\*(Aqs master server\&. This is identified by the MNAME field of the zone\*(Aqs SOA record\&. -.PP -Transaction signatures can be used to authenticate the Dynamic DNS updates\&. These use the TSIG resource record type described in RFC 2845 or the SIG(0) record described in RFC 2535 and RFC 2931 or GSS\-TSIG as described in RFC 3645\&. -.PP -TSIG relies on a shared secret that should only be known to -\fBnsupdate\fR -and the name server\&. For instance, suitable -\fBkey\fR -and -\fBserver\fR -statements would be added to -/etc/named\&.conf -so that the name server can associate the appropriate secret key and algorithm with the IP address of the client application that will be using TSIG authentication\&. You can use -\fBddns\-confgen\fR -to generate suitable configuration fragments\&. -\fBnsupdate\fR -uses the -\fB\-y\fR -or -\fB\-k\fR -options to provide the TSIG shared secret\&. These options are mutually exclusive\&. -.PP -SIG(0) uses public key cryptography\&. To use a SIG(0) key, the public key must be stored in a KEY record in a zone served by the name server\&. -.PP -GSS\-TSIG uses Kerberos credentials\&. Standard GSS\-TSIG mode is switched on with the -\fB\-g\fR -flag\&. A non\-standards\-compliant variant of GSS\-TSIG used by Windows 2000 can be switched on with the -\fB\-o\fR -flag\&. -.SH "OPTIONS" -.PP -\-4 -.RS 4 -Use IPv4 only\&. -.RE -.PP -\-6 -.RS 4 -Use IPv6 only\&. -.RE -.PP -\-d -.RS 4 -Debug mode\&. This provides tracing information about the update requests that are made and the replies received from the name server\&. -.RE -.PP -\-D -.RS 4 -Extra debug mode\&. -.RE -.PP -\-i -.RS 4 -Force interactive mode, even when standard input is not a terminal\&. -.RE -.PP -\-k \fIkeyfile\fR -.RS 4 -The file containing the TSIG authentication key\&. Keyfiles may be in two formats: a single file containing a -named\&.conf\-format -\fBkey\fR -statement, which may be generated automatically by -\fBddns\-confgen\fR, or a pair of files whose names are of the format -K{name}\&.+157\&.+{random}\&.key -and -K{name}\&.+157\&.+{random}\&.private, which can be generated by -\fBdnssec\-keygen\fR\&. The -\fB\-k\fR -may also be used to specify a SIG(0) key used to authenticate Dynamic DNS update requests\&. In this case, the key specified is not an HMAC\-MD5 key\&. -.RE -.PP -\-l -.RS 4 -Local\-host only mode\&. This sets the server address to localhost (disabling the -\fBserver\fR -so that the server address cannot be overridden)\&. Connections to the local server will use a TSIG key found in -/var/run/named/session\&.key, which is automatically generated by -\fBnamed\fR -if any local master zone has set -\fBupdate\-policy\fR -to -\fBlocal\fR\&. The location of this key file can be overridden with the -\fB\-k\fR -option\&. -.RE -.PP -\-L \fIlevel\fR -.RS 4 -Set the logging debug level\&. If zero, logging is disabled\&. -.RE -.PP -\-p \fIport\fR -.RS 4 -Set the port to use for connections to a name server\&. The default is 53\&. -.RE -.PP -\-P -.RS 4 -Print the list of private BIND\-specific resource record types whose format is understood by -\fBnsupdate\fR\&. See also the -\fB\-T\fR -option\&. -.RE -.PP -\-r \fIudpretries\fR -.RS 4 -The number of UDP retries\&. The default is 3\&. If zero, only one update request will be made\&. -.RE -.PP -\-t \fItimeout\fR -.RS 4 -The maximum time an update request can take before it is aborted\&. The default is 300 seconds\&. Zero can be used to disable the timeout\&. -.RE -.PP -\-T -.RS 4 -Print the list of IANA standard resource record types whose format is understood by -\fBnsupdate\fR\&. -\fBnsupdate\fR -will exit after the lists are printed\&. The -\fB\-T\fR -option can be combined with the -\fB\-P\fR -option\&. -.sp -Other types can be entered using "TYPEXXXXX" where "XXXXX" is the decimal value of the type with no leading zeros\&. The rdata, if present, will be parsed using the UNKNOWN rdata format, ( )\&. -.RE -.PP -\-u \fIudptimeout\fR -.RS 4 -The UDP retry interval\&. The default is 3 seconds\&. If zero, the interval will be computed from the timeout interval and number of UDP retries\&. -.RE -.PP -\-v -.RS 4 -Use TCP even for small update requests\&. By default, -\fBnsupdate\fR -uses UDP to send update requests to the name server unless they are too large to fit in a UDP request in which case TCP will be used\&. TCP may be preferable when a batch of update requests is made\&. -.RE -.PP -\-V -.RS 4 -Print the version number and exit\&. -.RE -.PP -\-y \fI[hmac:]\fR\fIkeyname:secret\fR -.RS 4 -Literal TSIG authentication key\&. -\fIkeyname\fR -is the name of the key, and -\fIsecret\fR -is the base64 encoded shared secret\&. -\fIhmac\fR -is the name of the key algorithm; valid choices are -hmac\-md5, -hmac\-sha1, -hmac\-sha224, -hmac\-sha256, -hmac\-sha384, or -hmac\-sha512\&. If -\fIhmac\fR -is not specified, the default is -hmac\-md5 -or if MD5 was disabled -hmac\-sha256\&. -.sp -NOTE: Use of the -\fB\-y\fR -option is discouraged because the shared secret is supplied as a command line argument in clear text\&. This may be visible in the output from -\fBps\fR(1) -or in a history file maintained by the user\*(Aqs shell\&. -.RE -.SH "INPUT FORMAT" -.PP -\fBnsupdate\fR -reads input from -\fIfilename\fR -or standard input\&. Each command is supplied on exactly one line of input\&. Some commands are for administrative purposes\&. The others are either update instructions or prerequisite checks on the contents of the zone\&. These checks set conditions that some name or set of resource records (RRset) either exists or is absent from the zone\&. These conditions must be met if the entire update request is to succeed\&. Updates will be rejected if the tests for the prerequisite conditions fail\&. -.PP -Every update request consists of zero or more prerequisites and zero or more updates\&. This allows a suitably authenticated update request to proceed if some specified resource records are present or missing from the zone\&. A blank input line (or the -\fBsend\fR -command) causes the accumulated commands to be sent as one Dynamic DNS update request to the name server\&. -.PP -The command formats and their meaning are as follows: -.PP -\fBserver\fR {servername} [port] -.RS 4 -Sends all dynamic update requests to the name server -\fIservername\fR\&. When no server statement is provided, -\fBnsupdate\fR -will send updates to the master server of the correct zone\&. The MNAME field of that zone\*(Aqs SOA record will identify the master server for that zone\&. -\fIport\fR -is the port number on -\fIservername\fR -where the dynamic update requests get sent\&. If no port number is specified, the default DNS port number of 53 is used\&. -.RE -.PP -\fBlocal\fR {address} [port] -.RS 4 -Sends all dynamic update requests using the local -\fIaddress\fR\&. When no local statement is provided, -\fBnsupdate\fR -will send updates using an address and port chosen by the system\&. -\fIport\fR -can additionally be used to make requests come from a specific port\&. If no port number is specified, the system will assign one\&. -.RE -.PP -\fBzone\fR {zonename} -.RS 4 -Specifies that all updates are to be made to the zone -\fIzonename\fR\&. If no -\fIzone\fR -statement is provided, -\fBnsupdate\fR -will attempt determine the correct zone to update based on the rest of the input\&. -.RE -.PP -\fBclass\fR {classname} -.RS 4 -Specify the default class\&. If no -\fIclass\fR -is specified, the default class is -\fIIN\fR\&. -.RE -.PP -\fBttl\fR {seconds} -.RS 4 -Specify the default time to live for records to be added\&. The value -\fInone\fR -will clear the default ttl\&. -.RE -.PP -\fBkey\fR [hmac:] {keyname} {secret} -.RS 4 -Specifies that all updates are to be TSIG\-signed using the -\fIkeyname\fR\fIsecret\fR -pair\&. If -\fIhmac\fR -is specified, then it sets the signing algorithm in use; the default is -hmac\-md5 -or if MD5 was disabled -hmac\-sha256\&. The -\fBkey\fR -command overrides any key specified on the command line via -\fB\-y\fR -or -\fB\-k\fR\&. -.RE -.PP -\fBgsstsig\fR -.RS 4 -Use GSS\-TSIG to sign the updated\&. This is equivalent to specifying -\fB\-g\fR -on the command line\&. -.RE -.PP -\fBoldgsstsig\fR -.RS 4 -Use the Windows 2000 version of GSS\-TSIG to sign the updated\&. This is equivalent to specifying -\fB\-o\fR -on the command line\&. -.RE -.PP -\fBrealm\fR {[realm_name]} -.RS 4 -When using GSS\-TSIG use -\fIrealm_name\fR -rather than the default realm in -krb5\&.conf\&. If no realm is specified the saved realm is cleared\&. -.RE -.PP -\fBcheck\-names\fR {[yes_or_no]} -.RS 4 -Turn on or off check\-names processing on records to be added\&. Check\-names has no effect on prerequisites or records to be deleted\&. By default check\-names processing is on\&. If check\-names processing fails the record will not be added to the UPDATE message\&. -.RE -.PP -\fB[prereq]\fR\fB nxdomain\fR {domain\-name} -.RS 4 -Requires that no resource record of any type exists with name -\fIdomain\-name\fR\&. -.RE -.PP -\fB[prereq]\fR\fB yxdomain\fR {domain\-name} -.RS 4 -Requires that -\fIdomain\-name\fR -exists (has as at least one resource record, of any type)\&. -.RE -.PP -\fB[prereq]\fR\fB nxrrset\fR {domain\-name} [class] {type} -.RS 4 -Requires that no resource record exists of the specified -\fItype\fR, -\fIclass\fR -and -\fIdomain\-name\fR\&. If -\fIclass\fR -is omitted, IN (internet) is assumed\&. -.RE -.PP -\fB[prereq]\fR\fB yxrrset\fR {domain\-name} [class] {type} -.RS 4 -This requires that a resource record of the specified -\fItype\fR, -\fIclass\fR -and -\fIdomain\-name\fR -must exist\&. If -\fIclass\fR -is omitted, IN (internet) is assumed\&. -.RE -.PP -\fB[prereq]\fR\fB yxrrset\fR {domain\-name} [class] {type} {data...} -.RS 4 -The -\fIdata\fR -from each set of prerequisites of this form sharing a common -\fItype\fR, -\fIclass\fR, and -\fIdomain\-name\fR -are combined to form a set of RRs\&. This set of RRs must exactly match the set of RRs existing in the zone at the given -\fItype\fR, -\fIclass\fR, and -\fIdomain\-name\fR\&. The -\fIdata\fR -are written in the standard text representation of the resource record\*(Aqs RDATA\&. -.RE -.PP -\fB[update]\fR\fB del\fR\fB[ete]\fR {domain\-name} [ttl] [class] [type\ [data...]] -.RS 4 -Deletes any resource records named -\fIdomain\-name\fR\&. If -\fItype\fR -and -\fIdata\fR -is provided, only matching resource records will be removed\&. The internet class is assumed if -\fIclass\fR -is not supplied\&. The -\fIttl\fR -is ignored, and is only allowed for compatibility\&. -.RE -.PP -\fB[update]\fR\fB add\fR {domain\-name} {ttl} [class] {type} {data...} -.RS 4 -Adds a new resource record with the specified -\fIttl\fR, -\fIclass\fR -and -\fIdata\fR\&. -.RE -.PP -\fBshow\fR -.RS 4 -Displays the current message, containing all of the prerequisites and updates specified since the last send\&. -.RE -.PP -\fBsend\fR -.RS 4 -Sends the current message\&. This is equivalent to entering a blank line\&. -.RE -.PP -\fBanswer\fR -.RS 4 -Displays the answer\&. -.RE -.PP -\fBdebug\fR -.RS 4 -Turn on debugging\&. -.RE -.PP -\fBversion\fR -.RS 4 -Print version number\&. -.RE -.PP -\fBhelp\fR -.RS 4 -Print a list of commands\&. -.RE -.PP -Lines beginning with a semicolon are comments and are ignored\&. -.SH "EXAMPLES" -.PP -The examples below show how -\fBnsupdate\fR -could be used to insert and delete resource records from the -\fBexample\&.com\fR -zone\&. Notice that the input in each example contains a trailing blank line so that a group of commands are sent as one dynamic update request to the master name server for -\fBexample\&.com\fR\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -# nsupdate -> update delete oldhost\&.example\&.com A -> update add newhost\&.example\&.com 86400 A 172\&.16\&.1\&.1 -> send -.fi -.if n \{\ -.RE -.\} -.PP -Any A records for -\fBoldhost\&.example\&.com\fR -are deleted\&. And an A record for -\fBnewhost\&.example\&.com\fR -with IP address 172\&.16\&.1\&.1 is added\&. The newly\-added record has a 1 day TTL (86400 seconds)\&. -.sp -.if n \{\ -.RS 4 -.\} -.nf -# nsupdate -> prereq nxdomain nickname\&.example\&.com -> update add nickname\&.example\&.com 86400 CNAME somehost\&.example\&.com -> send -.fi -.if n \{\ -.RE -.\} -.PP -The prerequisite condition gets the name server to check that there are no resource records of any type for -\fBnickname\&.example\&.com\fR\&. If there are, the update request fails\&. If this name does not exist, a CNAME for it is added\&. This ensures that when the CNAME is added, it cannot conflict with the long\-standing rule in RFC 1034 that a name must not exist as any other record type if it exists as a CNAME\&. (The rule has been updated for DNSSEC in RFC 2535 to allow CNAMEs to have RRSIG, DNSKEY and NSEC records\&.) -.SH "FILES" -.PP -\fB/etc/resolv\&.conf\fR -.RS 4 -used to identify default name server -.RE -.PP -\fB/var/run/named/session\&.key\fR -.RS 4 -sets the default TSIG key for use in local\-only mode -.RE -.PP -\fBK{name}\&.+157\&.+{random}\&.key\fR -.RS 4 -base\-64 encoding of HMAC\-MD5 key created by -\fBdnssec-keygen\fR(8)\&. -.RE -.PP -\fBK{name}\&.+157\&.+{random}\&.private\fR -.RS 4 -base\-64 encoding of HMAC\-MD5 key created by -\fBdnssec-keygen\fR(8)\&. -.RE -.SH "SEE ALSO" -.PP -RFC 2136, -RFC 3007, -RFC 2104, -RFC 2845, -RFC 1034, -RFC 2535, -RFC 2931, -\fBnamed\fR(8), -\fBddns-confgen\fR(8), -\fBdnssec-keygen\fR(8)\&. -.SH "BUGS" -.PP -The TSIG key is redundantly stored in two separate files\&. This is a consequence of nsupdate using the DST library for its cryptographic operations, and may change in future releases\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000-2012, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/nsupdate/nsupdate.docbook b/bin/nsupdate/nsupdate.docbook deleted file mode 100644 index 59b06457b4..0000000000 --- a/bin/nsupdate/nsupdate.docbook +++ /dev/null @@ -1,932 +0,0 @@ - - - - - - 2014-04-18 - - - ISC - Internet Systems Consortium, Inc. - - - - nsupdate - 1 - BIND9 - - - nsupdate - Dynamic DNS update utility - - - - - 2000 - 2001 - 2002 - 2003 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - nsupdate - - - - - - - - - - - - - - - - - - - - - - - filename - - - - DESCRIPTION - - nsupdate - is used to submit Dynamic DNS Update requests as defined in RFC 2136 - to a name server. - This allows resource records to be added or removed from a zone - without manually editing the zone file. - A single update request can contain requests to add or remove more than - one - resource record. - - - Zones that are under dynamic control via - nsupdate - or a DHCP server should not be edited by hand. - Manual edits could - conflict with dynamic updates and cause data to be lost. - - - The resource records that are dynamically added or removed with - nsupdate - have to be in the same zone. - Requests are sent to the zone's master server. - This is identified by the MNAME field of the zone's SOA record. - - - Transaction signatures can be used to authenticate the Dynamic - DNS updates. These use the TSIG resource record type described - in RFC 2845 or the SIG(0) record described in RFC 2535 and - RFC 2931 or GSS-TSIG as described in RFC 3645. - - - TSIG relies on - a shared secret that should only be known to - nsupdate and the name server. - For instance, suitable key and - server statements would be added to - /etc/named.conf so that the name server - can associate the appropriate secret key and algorithm with - the IP address of the client application that will be using - TSIG authentication. You can use ddns-confgen - to generate suitable configuration fragments. - nsupdate - uses the or options - to provide the TSIG shared secret. These options are mutually exclusive. - - - SIG(0) uses public key cryptography. - To use a SIG(0) key, the public key must be stored in a KEY - record in a zone served by the name server. - - - GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode - is switched on with the flag. A - non-standards-compliant variant of GSS-TSIG used by Windows - 2000 can be switched on with the flag. - - - - OPTIONS - - - - - -4 - - - Use IPv4 only. - - - - - - -6 - - - Use IPv6 only. - - - - - - -d - - - Debug mode. This provides tracing information about the - update requests that are made and the replies received - from the name server. - - - - - - -D - - - Extra debug mode. - - - - - - -i - - - Force interactive mode, even when standard input is not a terminal. - - - - - - -k keyfile - - - The file containing the TSIG authentication key. - Keyfiles may be in two formats: a single file containing - a named.conf-format key - statement, which may be generated automatically by - ddns-confgen, or a pair of files whose names are - of the format K{name}.+157.+{random}.key and - K{name}.+157.+{random}.private, which can be - generated by dnssec-keygen. - The may also be used to specify a SIG(0) key used - to authenticate Dynamic DNS update requests. In this case, the key - specified is not an HMAC-MD5 key. - - - - - - -l - - - Local-host only mode. This sets the server address to - localhost (disabling the server so that the server - address cannot be overridden). Connections to the local server will - use a TSIG key found in /var/run/named/session.key, - which is automatically generated by named if any - local master zone has set update-policy to - local. The location of this key file can be - overridden with the option. - - - - - - -L level - - - Set the logging debug level. If zero, logging is disabled. - - - - - - -p port - - - Set the port to use for connections to a name server. The - default is 53. - - - - - - -P - - - Print the list of private BIND-specific resource record - types whose format is understood - by nsupdate. See also - the option. - - - - - - -r udpretries - - - The number of UDP retries. The default is 3. If zero, only - one update request will be made. - - - - - - -t timeout - - - The maximum time an update request can take before it is - aborted. The default is 300 seconds. Zero can be used to - disable the timeout. - - - - - - -T - - - Print the list of IANA standard resource record types - whose format is understood by nsupdate. - nsupdate will exit after the lists are - printed. The option can be combined - with the option. - - - Other types can be entered using "TYPEXXXXX" where "XXXXX" is the - decimal value of the type with no leading zeros. The rdata, - if present, will be parsed using the UNKNOWN rdata format, - (<backslash> <hash> <space> <length> - <space> <hexstring>). - - - - - - -u udptimeout - - - The UDP retry interval. The default is 3 seconds. If zero, - the interval will be computed from the timeout interval and - number of UDP retries. - - - - - - -v - - - Use TCP even for small update requests. - By default, nsupdate - uses UDP to send update requests to the name server unless they are too - large to fit in a UDP request in which case TCP will be used. - TCP may be preferable when a batch of update requests is made. - - - - - - -V - - - Print the version number and exit. - - - - - - -y hmac:keyname:secret - - - Literal TSIG authentication key. - keyname is the name of the key, and - secret is the base64 encoded shared secret. - hmac is the name of the key algorithm; - valid choices are hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384, or - hmac-sha512. If hmac - is not specified, the default is hmac-md5 - or if MD5 was disabled hmac-sha256. - - - NOTE: Use of the option is discouraged because the - shared secret is supplied as a command line argument in clear text. - This may be visible in the output from - - ps1 - - or in a history file maintained by the user's shell. - - - - - - - - INPUT FORMAT - - nsupdate - reads input from - filename - or standard input. - Each command is supplied on exactly one line of input. - Some commands are for administrative purposes. - The others are either update instructions or prerequisite checks on the - contents of the zone. - These checks set conditions that some name or set of - resource records (RRset) either exists or is absent from the zone. - These conditions must be met if the entire update request is to succeed. - Updates will be rejected if the tests for the prerequisite conditions - fail. - - - Every update request consists of zero or more prerequisites - and zero or more updates. - This allows a suitably authenticated update request to proceed if some - specified resource records are present or missing from the zone. - A blank input line (or the send command) - causes the - accumulated commands to be sent as one Dynamic DNS update request to the - name server. - - - The command formats and their meaning are as follows: - - - - - server - servername - port - - - - Sends all dynamic update requests to the name server - servername. - When no server statement is provided, - nsupdate - will send updates to the master server of the correct zone. - The MNAME field of that zone's SOA record will identify the - master - server for that zone. - port - is the port number on - servername - where the dynamic update requests get sent. - If no port number is specified, the default DNS port number of - 53 is - used. - - - - - - - local - address - port - - - - Sends all dynamic update requests using the local - address. - - When no local statement is provided, - nsupdate - will send updates using an address and port chosen by the - system. - port - can additionally be used to make requests come from a specific - port. - If no port number is specified, the system will assign one. - - - - - - - zone - zonename - - - - Specifies that all updates are to be made to the zone - zonename. - If no - zone - statement is provided, - nsupdate - will attempt determine the correct zone to update based on the - rest of the input. - - - - - - - class - classname - - - - Specify the default class. - If no class is specified, the - default class is - IN. - - - - - - - ttl - seconds - - - - Specify the default time to live for records to be added. - The value none will clear the default - ttl. - - - - - - - key - hmac:keyname - secret - - - - Specifies that all updates are to be TSIG-signed using the - keyname secret pair. - If hmac is specified, then it sets the - signing algorithm in use; the default is - hmac-md5 or if MD5 was disabled - hmac-sha256. The key - command overrides any key specified on the command line via - or . - - - - - - - gsstsig - - - - Use GSS-TSIG to sign the updated. This is equivalent to - specifying on the command line. - - - - - - - oldgsstsig - - - - Use the Windows 2000 version of GSS-TSIG to sign the updated. - This is equivalent to specifying on the - command line. - - - - - - - realm - realm_name - - - - When using GSS-TSIG use realm_name rather - than the default realm in krb5.conf. If no - realm is specified the saved realm is cleared. - - - - - - - check-names - yes_or_no - - - - Turn on or off check-names processing on records to - be added. Check-names has no effect on prerequisites - or records to be deleted. By default check-names - processing is on. If check-names processing fails - the record will not be added to the UPDATE message. - - - - - - - prereq nxdomain - domain-name - - - - Requires that no resource record of any type exists with name - domain-name. - - - - - - - - prereq yxdomain - domain-name - - - - Requires that - domain-name - exists (has as at least one resource record, of any type). - - - - - - - prereq nxrrset - domain-name - class - type - - - - Requires that no resource record exists of the specified - type, - class - and - domain-name. - If - class - is omitted, IN (internet) is assumed. - - - - - - - - prereq yxrrset - domain-name - class - type - - - - This requires that a resource record of the specified - type, - class - and - domain-name - must exist. - If - class - is omitted, IN (internet) is assumed. - - - - - - - prereq yxrrset - domain-name - class - type - data - - - - The - data - from each set of prerequisites of this form - sharing a common - type, - class, - and - domain-name - are combined to form a set of RRs. This set of RRs must - exactly match the set of RRs existing in the zone at the - given - type, - class, - and - domain-name. - The - data - are written in the standard text representation of the resource - record's - RDATA. - - - - - - - update delete - domain-name - ttl - class - type data - - - - Deletes any resource records named - domain-name. - If - type - and - data - is provided, only matching resource records will be removed. - The internet class is assumed if - class - is not supplied. The - ttl - is ignored, and is only allowed for compatibility. - - - - - - - update add - domain-name - ttl - class - type - data - - - - Adds a new resource record with the specified - ttl, - class - and - data. - - - - - - - show - - - - Displays the current message, containing all of the - prerequisites and - updates specified since the last send. - - - - - - - send - - - - Sends the current message. This is equivalent to entering a - blank line. - - - - - - - answer - - - - Displays the answer. - - - - - - - debug - - - - Turn on debugging. - - - - - - - version - - - - Print version number. - - - - - - - help - - - - Print a list of commands. - - - - - - - - - Lines beginning with a semicolon are comments and are ignored. - - - - - EXAMPLES - - - The examples below show how - nsupdate - could be used to insert and delete resource records from the - example.com - zone. - Notice that the input in each example contains a trailing blank line so - that - a group of commands are sent as one dynamic update request to the - master name server for - example.com. - - -# nsupdate -> update delete oldhost.example.com A -> update add newhost.example.com 86400 A 172.16.1.1 -> send - - - - Any A records for - oldhost.example.com - are deleted. - And an A record for - newhost.example.com - with IP address 172.16.1.1 is added. - The newly-added record has a 1 day TTL (86400 seconds). - -# nsupdate -> prereq nxdomain nickname.example.com -> update add nickname.example.com 86400 CNAME somehost.example.com -> send - - - - The prerequisite condition gets the name server to check that there - are no resource records of any type for - nickname.example.com. - - If there are, the update request fails. - If this name does not exist, a CNAME for it is added. - This ensures that when the CNAME is added, it cannot conflict with the - long-standing rule in RFC 1034 that a name must not exist as any other - record type if it exists as a CNAME. - (The rule has been updated for DNSSEC in RFC 2535 to allow CNAMEs to have - RRSIG, DNSKEY and NSEC records.) - - - - FILES - - - - - /etc/resolv.conf - - - used to identify default name server - - - - - - /var/run/named/session.key - - - sets the default TSIG key for use in local-only mode - - - - - - K{name}.+157.+{random}.key - - - base-64 encoding of HMAC-MD5 key created by - - dnssec-keygen8 - . - - - - - - K{name}.+157.+{random}.private - - - base-64 encoding of HMAC-MD5 key created by - - dnssec-keygen8 - . - - - - - - - - SEE ALSO - - - RFC 2136, - RFC 3007, - RFC 2104, - RFC 2845, - RFC 1034, - RFC 2535, - RFC 2931, - - named8 - , - - ddns-confgen8 - , - - dnssec-keygen8 - . - - - - BUGS - - - The TSIG key is redundantly stored in two separate files. - This is a consequence of nsupdate using the DST library - for its cryptographic operations, and may change in future - releases. - - - - diff --git a/bin/nsupdate/nsupdate.html b/bin/nsupdate/nsupdate.html deleted file mode 100644 index 5593a23cfc..0000000000 --- a/bin/nsupdate/nsupdate.html +++ /dev/null @@ -1,785 +0,0 @@ - - - - - -nsupdate - - -
-
- - - - -
-

Name

-

- nsupdate - — Dynamic DNS update utility -

-
- - - -
-

Synopsis

-

- nsupdate - [-d] - [-D] - [-i] - [-L level] - [ - [-g] - | [-o] - | [-l] - | [-y [hmac:]keyname:secret] - | [-k keyfile] - ] - [-t timeout] - [-u udptimeout] - [-r udpretries] - [-v] - [-T] - [-P] - [-V] - [ - [-4] - | [-6] - ] - [filename] -

-
- -
-

DESCRIPTION

- -

nsupdate - is used to submit Dynamic DNS Update requests as defined in RFC 2136 - to a name server. - This allows resource records to be added or removed from a zone - without manually editing the zone file. - A single update request can contain requests to add or remove more than - one - resource record. -

-

- Zones that are under dynamic control via - nsupdate - or a DHCP server should not be edited by hand. - Manual edits could - conflict with dynamic updates and cause data to be lost. -

-

- The resource records that are dynamically added or removed with - nsupdate - have to be in the same zone. - Requests are sent to the zone's master server. - This is identified by the MNAME field of the zone's SOA record. -

-

- Transaction signatures can be used to authenticate the Dynamic - DNS updates. These use the TSIG resource record type described - in RFC 2845 or the SIG(0) record described in RFC 2535 and - RFC 2931 or GSS-TSIG as described in RFC 3645. -

-

- TSIG relies on - a shared secret that should only be known to - nsupdate and the name server. - For instance, suitable key and - server statements would be added to - /etc/named.conf so that the name server - can associate the appropriate secret key and algorithm with - the IP address of the client application that will be using - TSIG authentication. You can use ddns-confgen - to generate suitable configuration fragments. - nsupdate - uses the -y or -k options - to provide the TSIG shared secret. These options are mutually exclusive. -

-

- SIG(0) uses public key cryptography. - To use a SIG(0) key, the public key must be stored in a KEY - record in a zone served by the name server. -

-

- GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode - is switched on with the -g flag. A - non-standards-compliant variant of GSS-TSIG used by Windows - 2000 can be switched on with the -o flag. -

-
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only. -

-
-
-6
-
-

- Use IPv6 only. -

-
-
-d
-
-

- Debug mode. This provides tracing information about the - update requests that are made and the replies received - from the name server. -

-
-
-D
-
-

- Extra debug mode. -

-
-
-i
-
-

- Force interactive mode, even when standard input is not a terminal. -

-
-
-k keyfile
-
-

- The file containing the TSIG authentication key. - Keyfiles may be in two formats: a single file containing - a named.conf-format key - statement, which may be generated automatically by - ddns-confgen, or a pair of files whose names are - of the format K{name}.+157.+{random}.key and - K{name}.+157.+{random}.private, which can be - generated by dnssec-keygen. - The -k may also be used to specify a SIG(0) key used - to authenticate Dynamic DNS update requests. In this case, the key - specified is not an HMAC-MD5 key. -

-
-
-l
-
-

- Local-host only mode. This sets the server address to - localhost (disabling the server so that the server - address cannot be overridden). Connections to the local server will - use a TSIG key found in /var/run/named/session.key, - which is automatically generated by named if any - local master zone has set update-policy to - local. The location of this key file can be - overridden with the -k option. -

-
-
-L level
-
-

- Set the logging debug level. If zero, logging is disabled. -

-
-
-p port
-
-

- Set the port to use for connections to a name server. The - default is 53. -

-
-
-P
-
-

- Print the list of private BIND-specific resource record - types whose format is understood - by nsupdate. See also - the -T option. -

-
-
-r udpretries
-
-

- The number of UDP retries. The default is 3. If zero, only - one update request will be made. -

-
-
-t timeout
-
-

- The maximum time an update request can take before it is - aborted. The default is 300 seconds. Zero can be used to - disable the timeout. -

-
-
-T
-
-

- Print the list of IANA standard resource record types - whose format is understood by nsupdate. - nsupdate will exit after the lists are - printed. The -T option can be combined - with the -P option. -

-

- Other types can be entered using "TYPEXXXXX" where "XXXXX" is the - decimal value of the type with no leading zeros. The rdata, - if present, will be parsed using the UNKNOWN rdata format, - (<backslash> <hash> <space> <length> - <space> <hexstring>). -

-
-
-u udptimeout
-
-

- The UDP retry interval. The default is 3 seconds. If zero, - the interval will be computed from the timeout interval and - number of UDP retries. -

-
-
-v
-
-

- Use TCP even for small update requests. - By default, nsupdate - uses UDP to send update requests to the name server unless they are too - large to fit in a UDP request in which case TCP will be used. - TCP may be preferable when a batch of update requests is made. -

-
-
-V
-
-

- Print the version number and exit. -

-
-
-y [hmac:]keyname:secret
-
-

- Literal TSIG authentication key. - keyname is the name of the key, and - secret is the base64 encoded shared secret. - hmac is the name of the key algorithm; - valid choices are hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384, or - hmac-sha512. If hmac - is not specified, the default is hmac-md5 - or if MD5 was disabled hmac-sha256. -

-

- NOTE: Use of the -y option is discouraged because the - shared secret is supplied as a command line argument in clear text. - This may be visible in the output from - - ps(1) - - or in a history file maintained by the user's shell. -

-
-
-
- -
-

INPUT FORMAT

- -

nsupdate - reads input from - filename - or standard input. - Each command is supplied on exactly one line of input. - Some commands are for administrative purposes. - The others are either update instructions or prerequisite checks on the - contents of the zone. - These checks set conditions that some name or set of - resource records (RRset) either exists or is absent from the zone. - These conditions must be met if the entire update request is to succeed. - Updates will be rejected if the tests for the prerequisite conditions - fail. -

-

- Every update request consists of zero or more prerequisites - and zero or more updates. - This allows a suitably authenticated update request to proceed if some - specified resource records are present or missing from the zone. - A blank input line (or the send command) - causes the - accumulated commands to be sent as one Dynamic DNS update request to the - name server. -

-

- The command formats and their meaning are as follows: -

-
-
- server - {servername} - [port] -
-
-

- Sends all dynamic update requests to the name server - servername. - When no server statement is provided, - nsupdate - will send updates to the master server of the correct zone. - The MNAME field of that zone's SOA record will identify the - master - server for that zone. - port - is the port number on - servername - where the dynamic update requests get sent. - If no port number is specified, the default DNS port number of - 53 is - used. -

-
-
- local - {address} - [port] -
-
-

- Sends all dynamic update requests using the local - address. - - When no local statement is provided, - nsupdate - will send updates using an address and port chosen by the - system. - port - can additionally be used to make requests come from a specific - port. - If no port number is specified, the system will assign one. -

-
-
- zone - {zonename} -
-
-

- Specifies that all updates are to be made to the zone - zonename. - If no - zone - statement is provided, - nsupdate - will attempt determine the correct zone to update based on the - rest of the input. -

-
-
- class - {classname} -
-
-

- Specify the default class. - If no class is specified, the - default class is - IN. -

-
-
- ttl - {seconds} -
-
-

- Specify the default time to live for records to be added. - The value none will clear the default - ttl. -

-
-
- key - [hmac:] {keyname} - {secret} -
-
-

- Specifies that all updates are to be TSIG-signed using the - keyname secret pair. - If hmac is specified, then it sets the - signing algorithm in use; the default is - hmac-md5 or if MD5 was disabled - hmac-sha256. The key - command overrides any key specified on the command line via - -y or -k. -

-
-
- gsstsig -
-
-

- Use GSS-TSIG to sign the updated. This is equivalent to - specifying -g on the command line. -

-
-
- oldgsstsig -
-
-

- Use the Windows 2000 version of GSS-TSIG to sign the updated. - This is equivalent to specifying -o on the - command line. -

-
-
- realm - {[realm_name]} -
-
-

- When using GSS-TSIG use realm_name rather - than the default realm in krb5.conf. If no - realm is specified the saved realm is cleared. -

-
-
- check-names - {[yes_or_no]} -
-
-

- Turn on or off check-names processing on records to - be added. Check-names has no effect on prerequisites - or records to be deleted. By default check-names - processing is on. If check-names processing fails - the record will not be added to the UPDATE message. -

-
-
- [prereq] nxdomain - {domain-name} -
-
-

- Requires that no resource record of any type exists with name - domain-name. -

-
-
- [prereq] yxdomain - {domain-name} -
-
-

- Requires that - domain-name - exists (has as at least one resource record, of any type). -

-
-
- [prereq] nxrrset - {domain-name} - [class] - {type} -
-
-

- Requires that no resource record exists of the specified - type, - class - and - domain-name. - If - class - is omitted, IN (internet) is assumed. -

-
-
- [prereq] yxrrset - {domain-name} - [class] - {type} -
-
-

- This requires that a resource record of the specified - type, - class - and - domain-name - must exist. - If - class - is omitted, IN (internet) is assumed. -

-
-
- [prereq] yxrrset - {domain-name} - [class] - {type} - {data...} -
-
-

- The - data - from each set of prerequisites of this form - sharing a common - type, - class, - and - domain-name - are combined to form a set of RRs. This set of RRs must - exactly match the set of RRs existing in the zone at the - given - type, - class, - and - domain-name. - The - data - are written in the standard text representation of the resource - record's - RDATA. -

-
-
- [update] del[ete] - {domain-name} - [ttl] - [class] - [type [data...]] -
-
-

- Deletes any resource records named - domain-name. - If - type - and - data - is provided, only matching resource records will be removed. - The internet class is assumed if - class - is not supplied. The - ttl - is ignored, and is only allowed for compatibility. -

-
-
- [update] add - {domain-name} - {ttl} - [class] - {type} - {data...} -
-
-

- Adds a new resource record with the specified - ttl, - class - and - data. -

-
-
- show -
-
-

- Displays the current message, containing all of the - prerequisites and - updates specified since the last send. -

-
-
- send -
-
-

- Sends the current message. This is equivalent to entering a - blank line. -

-
-
- answer -
-
-

- Displays the answer. -

-
-
- debug -
-
-

- Turn on debugging. -

-
-
- version -
-
-

- Print version number. -

-
-
- help -
-
-

- Print a list of commands. -

-
-
-

-

- -

- Lines beginning with a semicolon are comments and are ignored. -

- -
- -
-

EXAMPLES

- -

- The examples below show how - nsupdate - could be used to insert and delete resource records from the - example.com - zone. - Notice that the input in each example contains a trailing blank line so - that - a group of commands are sent as one dynamic update request to the - master name server for - example.com. - -

-
-# nsupdate
-> update delete oldhost.example.com A
-> update add newhost.example.com 86400 A 172.16.1.1
-> send
-
-

-

-

- Any A records for - oldhost.example.com - are deleted. - And an A record for - newhost.example.com - with IP address 172.16.1.1 is added. - The newly-added record has a 1 day TTL (86400 seconds). -

-
-# nsupdate
-> prereq nxdomain nickname.example.com
-> update add nickname.example.com 86400 CNAME somehost.example.com
-> send
-
-

-

-

- The prerequisite condition gets the name server to check that there - are no resource records of any type for - nickname.example.com. - - If there are, the update request fails. - If this name does not exist, a CNAME for it is added. - This ensures that when the CNAME is added, it cannot conflict with the - long-standing rule in RFC 1034 that a name must not exist as any other - record type if it exists as a CNAME. - (The rule has been updated for DNSSEC in RFC 2535 to allow CNAMEs to have - RRSIG, DNSKEY and NSEC records.) -

-
- -
-

FILES

- - -
-
/etc/resolv.conf
-
-

- used to identify default name server -

-
-
/var/run/named/session.key
-
-

- sets the default TSIG key for use in local-only mode -

-
-
K{name}.+157.+{random}.key
-
-

- base-64 encoding of HMAC-MD5 key created by - - dnssec-keygen(8) - . -

-
-
K{name}.+157.+{random}.private
-
-

- base-64 encoding of HMAC-MD5 key created by - - dnssec-keygen(8) - . -

-
-
-
- -
-

SEE ALSO

- -

- RFC 2136, - RFC 3007, - RFC 2104, - RFC 2845, - RFC 1034, - RFC 2535, - RFC 2931, - - named(8) - , - - ddns-confgen(8) - , - - dnssec-keygen(8) - . -

-
- -
-

BUGS

- -

- The TSIG key is redundantly stored in two separate files. - This is a consequence of nsupdate using the DST library - for its cryptographic operations, and may change in future - releases. -

-
- -
- diff --git a/bin/nsupdate/nsupdate.rst b/bin/nsupdate/nsupdate.rst new file mode 100644 index 0000000000..04450dbb7e --- /dev/null +++ b/bin/nsupdate/nsupdate.rst @@ -0,0 +1,365 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_nsupdate: + +nsupdate - dynamic DNS update utility +------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`nsupdate` [**-d**] [**-D**] [**-i**] [**-L** level] [ [**-g**] | [**-o**] | [**-l**] | [**-y** [hmac:]keyname:secret] | [**-k** keyfile] ] [**-t** timeout] [**-u** udptimeout] [**-r** udpretries] [**-v**] [**-T**] [**-P**] [**-V**] [ [**-4**] | [**-6**] ] [filename] + +Description +~~~~~~~~~~~ + +``nsupdate`` is used to submit Dynamic DNS Update requests as defined in +:rfc:`2136` to a name server. This allows resource records to be added or +removed from a zone without manually editing the zone file. A single +update request can contain requests to add or remove more than one +resource record. + +Zones that are under dynamic control via ``nsupdate`` or a DHCP server +should not be edited by hand. Manual edits could conflict with dynamic +updates and cause data to be lost. + +The resource records that are dynamically added or removed with +``nsupdate`` have to be in the same zone. Requests are sent to the +zone's master server. This is identified by the MNAME field of the +zone's SOA record. + +Transaction signatures can be used to authenticate the Dynamic DNS +updates. These use the TSIG resource record type described in :rfc:`2845` +or the SIG(0) record described in :rfc:`2535` and :rfc:`2931` or GSS-TSIG as +described in :rfc:`3645`. + +TSIG relies on a shared secret that should only be known to ``nsupdate`` +and the name server. For instance, suitable ``key`` and ``server`` +statements would be added to ``/etc/named.conf`` so that the name server +can associate the appropriate secret key and algorithm with the IP +address of the client application that will be using TSIG +authentication. You can use ``ddns-confgen`` to generate suitable +configuration fragments. ``nsupdate`` uses the ``-y`` or ``-k`` options +to provide the TSIG shared secret. These options are mutually exclusive. + +SIG(0) uses public key cryptography. To use a SIG(0) key, the public key +must be stored in a KEY record in a zone served by the name server. + +GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode is switched +on with the ``-g`` flag. A non-standards-compliant variant of GSS-TSIG +used by Windows 2000 can be switched on with the ``-o`` flag. + +Options +~~~~~~~ + +**-4** + Use IPv4 only. + +**-6** + Use IPv6 only. + +**-d** + Debug mode. This provides tracing information about the update + requests that are made and the replies received from the name server. + +**-D** + Extra debug mode. + +**-i** + Force interactive mode, even when standard input is not a terminal. + +**-k** keyfile + The file containing the TSIG authentication key. Keyfiles may be in + two formats: a single file containing a ``named.conf``-format ``key`` + statement, which may be generated automatically by ``ddns-confgen``, + or a pair of files whose names are of the format + ``K{name}.+157.+{random}.key`` and + ``K{name}.+157.+{random}.private``, which can be generated by + ``dnssec-keygen``. The ``-k`` may also be used to specify a SIG(0) + key used to authenticate Dynamic DNS update requests. In this case, + the key specified is not an HMAC-MD5 key. + +**-l** + Local-host only mode. This sets the server address to localhost + (disabling the ``server`` so that the server address cannot be + overridden). Connections to the local server will use a TSIG key + found in ``/var/run/named/session.key``, which is automatically + generated by ``named`` if any local master zone has set + ``update-policy`` to ``local``. The location of this key file can be + overridden with the ``-k`` option. + +**-L** level + Set the logging debug level. If zero, logging is disabled. + +**-p** port + Set the port to use for connections to a name server. The default is + 53. + +**-P** + Print the list of private BIND-specific resource record types whose + format is understood by ``nsupdate``. See also the ``-T`` option. + +**-r** udpretries + The number of UDP retries. The default is 3. If zero, only one update + request will be made. + +**-t** timeout + The maximum time an update request can take before it is aborted. The + default is 300 seconds. Zero can be used to disable the timeout. + +**-T** + Print the list of IANA standard resource record types whose format is + understood by ``nsupdate``. ``nsupdate`` will exit after the lists + are printed. The ``-T`` option can be combined with the ``-P`` + option. + + Other types can be entered using "TYPEXXXXX" where "XXXXX" is the + decimal value of the type with no leading zeros. The rdata, if + present, will be parsed using the UNKNOWN rdata format, ( + ). + +**-u** udptimeout + The UDP retry interval. The default is 3 seconds. If zero, the + interval will be computed from the timeout interval and number of UDP + retries. + +**-v** + Use TCP even for small update requests. By default, ``nsupdate`` uses + UDP to send update requests to the name server unless they are too + large to fit in a UDP request in which case TCP will be used. TCP may + be preferable when a batch of update requests is made. + +**-V** + Print the version number and exit. + +**-y** [hmac:]keyname:secret + Literal TSIG authentication key. ``keyname`` is the name of the key, + and ``secret`` is the base64 encoded shared secret. ``hmac`` is the + name of the key algorithm; valid choices are ``hmac-md5``, + ``hmac-sha1``, ``hmac-sha224``, ``hmac-sha256``, ``hmac-sha384``, or + ``hmac-sha512``. If ``hmac`` is not specified, the default is + ``hmac-md5`` or if MD5 was disabled ``hmac-sha256``. + + NOTE: Use of the ``-y`` option is discouraged because the shared + secret is supplied as a command line argument in clear text. This may + be visible in the output from ps1 or in a history file maintained by + the user's shell. + +Input Format +~~~~~~~~~~~~ + +``nsupdate`` reads input from ``filename`` or standard input. Each +command is supplied on exactly one line of input. Some commands are for +administrative purposes. The others are either update instructions or +prerequisite checks on the contents of the zone. These checks set +conditions that some name or set of resource records (RRset) either +exists or is absent from the zone. These conditions must be met if the +entire update request is to succeed. Updates will be rejected if the +tests for the prerequisite conditions fail. + +Every update request consists of zero or more prerequisites and zero or +more updates. This allows a suitably authenticated update request to +proceed if some specified resource records are present or missing from +the zone. A blank input line (or the ``send`` command) causes the +accumulated commands to be sent as one Dynamic DNS update request to the +name server. + +The command formats and their meaning are as follows: + +``server`` servername port + Sends all dynamic update requests to the name server ``servername``. + When no server statement is provided, ``nsupdate`` will send updates + to the master server of the correct zone. The MNAME field of that + zone's SOA record will identify the master server for that zone. + ``port`` is the port number on ``servername`` where the dynamic + update requests get sent. If no port number is specified, the default + DNS port number of 53 is used. + +``local`` address port + Sends all dynamic update requests using the local ``address``. When + no local statement is provided, ``nsupdate`` will send updates using + an address and port chosen by the system. ``port`` can additionally + be used to make requests come from a specific port. If no port number + is specified, the system will assign one. + +``zone`` zonename + Specifies that all updates are to be made to the zone ``zonename``. + If no ``zone`` statement is provided, ``nsupdate`` will attempt + determine the correct zone to update based on the rest of the input. + +``class`` classname + Specify the default class. If no ``class`` is specified, the default + class is ``IN``. + +``ttl`` seconds + Specify the default time to live for records to be added. The value + ``none`` will clear the default ttl. + +``key`` hmac:keyname secret + Specifies that all updates are to be TSIG-signed using the + ``keyname`` ``secret`` pair. If ``hmac`` is specified, then it sets + the signing algorithm in use; the default is ``hmac-md5`` or if MD5 + was disabled ``hmac-sha256``. The ``key`` command overrides any key + specified on the command line via ``-y`` or ``-k``. + +``gsstsig`` + Use GSS-TSIG to sign the updated. This is equivalent to specifying + ``-g`` on the command line. + +``oldgsstsig`` + Use the Windows 2000 version of GSS-TSIG to sign the updated. This is + equivalent to specifying ``-o`` on the command line. + +``realm`` [realm_name] + When using GSS-TSIG use ``realm_name`` rather than the default realm + in ``krb5.conf``. If no realm is specified the saved realm is + cleared. + +``check-names`` [yes_or_no] + Turn on or off check-names processing on records to be added. + Check-names has no effect on prerequisites or records to be deleted. + By default check-names processing is on. If check-names processing + fails the record will not be added to the UPDATE message. + +``prereq nxdomain`` domain-name + Requires that no resource record of any type exists with name + ``domain-name``. + +``prereq yxdomain`` domain-name + Requires that ``domain-name`` exists (has as at least one resource + record, of any type). + +``prereq nxrrset`` domain-name class type + Requires that no resource record exists of the specified ``type``, + ``class`` and ``domain-name``. If ``class`` is omitted, IN (internet) + is assumed. + +``prereq yxrrset`` domain-name class type + This requires that a resource record of the specified ``type``, + ``class`` and ``domain-name`` must exist. If ``class`` is omitted, IN + (internet) is assumed. + +``prereq yxrrset`` domain-name class type data + The ``data`` from each set of prerequisites of this form sharing a + common ``type``, ``class``, and ``domain-name`` are combined to form + a set of RRs. This set of RRs must exactly match the set of RRs + existing in the zone at the given ``type``, ``class``, and + ``domain-name``. The ``data`` are written in the standard text + representation of the resource record's RDATA. + +``update delete`` domain-name ttl class type data + Deletes any resource records named ``domain-name``. If ``type`` and + ``data`` is provided, only matching resource records will be removed. + The internet class is assumed if ``class`` is not supplied. The + ``ttl`` is ignored, and is only allowed for compatibility. + +``update add`` domain-name ttl class type data + Adds a new resource record with the specified ``ttl``, ``class`` and + ``data``. + +``show`` + Displays the current message, containing all of the prerequisites and + updates specified since the last send. + +``send`` + Sends the current message. This is equivalent to entering a blank + line. + +``answer`` + Displays the answer. + +``debug`` + Turn on debugging. + +``version`` + Print version number. + +``help`` + Print a list of commands. + +Lines beginning with a semicolon are comments and are ignored. + +Examples +~~~~~~~~ + +The examples below show how ``nsupdate`` could be used to insert and +delete resource records from the ``example.com`` zone. Notice that the +input in each example contains a trailing blank line so that a group of +commands are sent as one dynamic update request to the master name +server for ``example.com``. + +:: + + # nsupdate + > update delete oldhost.example.com A + > update add newhost.example.com 86400 A 172.16.1.1 + > send + +Any A records for ``oldhost.example.com`` are deleted. And an A record +for ``newhost.example.com`` with IP address 172.16.1.1 is added. The +newly-added record has a 1 day TTL (86400 seconds). + +:: + + # nsupdate + > prereq nxdomain nickname.example.com + > update add nickname.example.com 86400 CNAME somehost.example.com + > send + +The prerequisite condition gets the name server to check that there are +no resource records of any type for ``nickname.example.com``. If there +are, the update request fails. If this name does not exist, a CNAME for +it is added. This ensures that when the CNAME is added, it cannot +conflict with the long-standing rule in :rfc:`1034` that a name must not +exist as any other record type if it exists as a CNAME. (The rule has +been updated for DNSSEC in :rfc:`2535` to allow CNAMEs to have RRSIG, +DNSKEY and NSEC records.) + +Files +~~~~~ + +``/etc/resolv.conf`` + used to identify default name server + +``/var/run/named/session.key`` + sets the default TSIG key for use in local-only mode + +``K{name}.+157.+{random}.key`` + base-64 encoding of HMAC-MD5 key created by dnssec-keygen8. + +``K{name}.+157.+{random}.private`` + base-64 encoding of HMAC-MD5 key created by dnssec-keygen8. + +See Also +~~~~~~~~ + +:rfc:`2136`, :rfc:`3007`, :rfc:`2104`, :rfc:`2845`, :rfc:`1034`, :rfc:`2535`, :rfc:`2931`, +:manpage:`named(8)`, :manpage:`ddns-confgen(8)`, :manpage:`dnssec-keygen(8)`. + +Bugs +~~~~ + +The TSIG key is redundantly stored in two separate files. This is a +consequence of nsupdate using the DST library for its cryptographic +operations, and may change in future releases. diff --git a/bin/pkcs11/pkcs11-destroy.8 b/bin/pkcs11/pkcs11-destroy.8 deleted file mode 100644 index 8c0775fc0d..0000000000 --- a/bin/pkcs11/pkcs11-destroy.8 +++ /dev/null @@ -1,97 +0,0 @@ -.\" Copyright (C) 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: pkcs11-destroy -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-01-15 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "PKCS11\-DESTROY" "8" "2014\-01\-15" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -pkcs11-destroy \- destroy PKCS#11 objects -.SH "SYNOPSIS" -.HP \w'\fBpkcs11\-destroy\fR\ 'u -\fBpkcs11\-destroy\fR [\fB\-m\ \fR\fB\fImodule\fR\fR] [\fB\-s\ \fR\fB\fIslot\fR\fR] {\-i\ \fIID\fR | \-l\ \fIlabel\fR} [\fB\-p\ \fR\fB\fIPIN\fR\fR] [\fB\-w\ \fR\fB\fIseconds\fR\fR] -.SH "DESCRIPTION" -.PP -\fBpkcs11\-destroy\fR -destroys keys stored in a PKCS#11 device, identified by their -\fBID\fR -or -\fBlabel\fR\&. -.PP -Matching keys are displayed before being destroyed\&. By default, there is a five second delay to allow the user to interrupt the process before the destruction takes place\&. -.SH "ARGUMENTS" -.PP -\-m \fImodule\fR -.RS 4 -Specify the PKCS#11 provider module\&. This must be the full path to a shared library object implementing the PKCS#11 API for the device\&. -.RE -.PP -\-s \fIslot\fR -.RS 4 -Open the session with the given PKCS#11 slot\&. The default is slot 0\&. -.RE -.PP -\-i \fIID\fR -.RS 4 -Destroy keys with the given object ID\&. -.RE -.PP -\-l \fIlabel\fR -.RS 4 -Destroy keys with the given label\&. -.RE -.PP -\-p \fIPIN\fR -.RS 4 -Specify the PIN for the device\&. If no PIN is provided on the command line, -\fBpkcs11\-destroy\fR -will prompt for it\&. -.RE -.PP -\-w \fIseconds\fR -.RS 4 -Specify how long to pause before carrying out key destruction\&. The default is five seconds\&. If set to -0, destruction will be immediate\&. -.RE -.SH "SEE ALSO" -.PP -\fBpkcs11-keygen\fR(8), -\fBpkcs11-list\fR(8), -\fBpkcs11-tokens\fR(8) -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/pkcs11/pkcs11-destroy.docbook b/bin/pkcs11/pkcs11-destroy.docbook deleted file mode 100644 index 3858f765e5..0000000000 --- a/bin/pkcs11/pkcs11-destroy.docbook +++ /dev/null @@ -1,154 +0,0 @@ - - - - - - 2014-01-15 - - - ISC - Internet Systems Consortium, Inc. - - - - pkcs11-destroy - 8 - BIND9 - - - - pkcs11-destroy - destroy PKCS#11 objects - - - - - 2009 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - pkcs11-destroy - - - - -i ID - -l label - - - - - - - DESCRIPTION - - - pkcs11-destroy destroys keys stored in a - PKCS#11 device, identified by their or - . - - - Matching keys are displayed before being destroyed. By default, - there is a five second delay to allow the user to interrupt the - process before the destruction takes place. - - - - ARGUMENTS - - - - -m module - - - Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. - - - - - - -s slot - - - Open the session with the given PKCS#11 slot. The default is - slot 0. - - - - - - -i ID - - - Destroy keys with the given object ID. - - - - - - -l label - - - Destroy keys with the given label. - - - - - - -p PIN - - - Specify the PIN for the device. If no PIN is provided on the - command line, pkcs11-destroy will prompt for it. - - - - - - -w seconds - - - Specify how long to pause before carrying out key destruction. - The default is five seconds. If set to 0, - destruction will be immediate. - - - - - - - SEE ALSO - - - - pkcs11-keygen8 - , - - pkcs11-list8 - , - - pkcs11-tokens8 - - - - - diff --git a/bin/pkcs11/pkcs11-destroy.html b/bin/pkcs11/pkcs11-destroy.html deleted file mode 100644 index 5190a8558c..0000000000 --- a/bin/pkcs11/pkcs11-destroy.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - -pkcs11-destroy - - -
-
- - - - - -
-

Name

-

- pkcs11-destroy - — destroy PKCS#11 objects -

-
- - - -
-

Synopsis

-

- pkcs11-destroy - [-m module] - [-s slot] - { - -i ID - | -l label - } - [-p PIN] - [-w seconds] -

-
- -
-

DESCRIPTION

- -

- pkcs11-destroy destroys keys stored in a - PKCS#11 device, identified by their ID or - label. -

-

- Matching keys are displayed before being destroyed. By default, - there is a five second delay to allow the user to interrupt the - process before the destruction takes place. -

-
- -
-

ARGUMENTS

- -
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-s slot
-
-

- Open the session with the given PKCS#11 slot. The default is - slot 0. -

-
-
-i ID
-
-

- Destroy keys with the given object ID. -

-
-
-l label
-
-

- Destroy keys with the given label. -

-
-
-p PIN
-
-

- Specify the PIN for the device. If no PIN is provided on the - command line, pkcs11-destroy will prompt for it. -

-
-
-w seconds
-
-

- Specify how long to pause before carrying out key destruction. - The default is five seconds. If set to 0, - destruction will be immediate. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-keygen(8) - , - - pkcs11-list(8) - , - - pkcs11-tokens(8) - -

-
- -
- diff --git a/bin/pkcs11/pkcs11-destroy.rst b/bin/pkcs11/pkcs11-destroy.rst new file mode 100644 index 0000000000..5654c986d6 --- /dev/null +++ b/bin/pkcs11/pkcs11-destroy.rst @@ -0,0 +1,71 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_pkcs11-destroy: + +pkcs11-destroy - destroy PKCS#11 objects + +Synopsis +~~~~~~~~ + +:program:`pkcs11-destroy` [**-m** module] [**-s** slot] [**-i** ID] [**-l** label] [**-p** PIN] [**-w** seconds] + +Description +~~~~~~~~~~~ + +``pkcs11-destroy`` destroys keys stored in a PKCS#11 device, identified +by their ``ID`` or ``label``. + +Matching keys are displayed before being destroyed. By default, there is +a five second delay to allow the user to interrupt the process before +the destruction takes place. + +Arguments +~~~~~~~~~ + +**-m** module + Specify the PKCS#11 provider module. This must be the full path to a + shared library object implementing the PKCS#11 API for the device. + +**-s** slot + Open the session with the given PKCS#11 slot. The default is slot 0. + +**-i** ID + Destroy keys with the given object ID. + +**-l** label + Destroy keys with the given label. + +**-p** PIN + Specify the PIN for the device. If no PIN is provided on the command + line, ``pkcs11-destroy`` will prompt for it. + +**-w** seconds + Specify how long to pause before carrying out key destruction. The + default is five seconds. If set to ``0``, destruction will be + immediate. + +See Also +~~~~~~~~ + +:manpage:`pkcs11-keygen(8)`, :manpage:`pkcs11-list(8)`, :manpage:`pkcs11-tokens(8)` diff --git a/bin/pkcs11/pkcs11-keygen.8 b/bin/pkcs11/pkcs11-keygen.8 deleted file mode 100644 index c606a5d4c2..0000000000 --- a/bin/pkcs11/pkcs11-keygen.8 +++ /dev/null @@ -1,120 +0,0 @@ -.\" Copyright (C) 2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: pkcs11-keygen -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-01-15 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "PKCS11\-KEYGEN" "8" "2014\-01\-15" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -pkcs11-keygen \- generate keys on a PKCS#11 device -.SH "SYNOPSIS" -.HP \w'\fBpkcs11\-keygen\fR\ 'u -\fBpkcs11\-keygen\fR {\-a\ \fIalgorithm\fR} [\fB\-b\ \fR\fB\fIkeysize\fR\fR] [\fB\-e\fR] [\fB\-i\ \fR\fB\fIid\fR\fR] [\fB\-m\ \fR\fB\fImodule\fR\fR] [\fB\-P\fR] [\fB\-p\ \fR\fB\fIPIN\fR\fR] [\fB\-q\fR] [\fB\-S\fR] [\fB\-s\ \fR\fB\fIslot\fR\fR] {label} -.SH "DESCRIPTION" -.PP -\fBpkcs11\-keygen\fR -causes a PKCS#11 device to generate a new key pair with the given -\fBlabel\fR -(which must be unique) and with -\fBkeysize\fR -bits of prime\&. -.SH "ARGUMENTS" -.PP -\-a \fIalgorithm\fR -.RS 4 -Specify the key algorithm class: Supported classes are RSA, DSA, DH, ECC and ECX\&. In addition to these strings, the -\fBalgorithm\fR -can be specified as a DNSSEC signing algorithm that will be used with this key; for example, NSEC3RSASHA1 maps to RSA, ECDSAP256SHA256 maps to ECC, and ED25519 to ECX\&. The default class is "RSA"\&. -.RE -.PP -\-b \fIkeysize\fR -.RS 4 -Create the key pair with -\fBkeysize\fR -bits of prime\&. For ECC keys, the only valid values are 256 and 384, and the default is 256\&. For ECX kyes, the only valid values are 256 and 456, and the default is 256\&. -.RE -.PP -\-e -.RS 4 -For RSA keys only, use a large exponent\&. -.RE -.PP -\-i \fIid\fR -.RS 4 -Create key objects with id\&. The id is either an unsigned short 2 byte or an unsigned long 4 byte number\&. -.RE -.PP -\-m \fImodule\fR -.RS 4 -Specify the PKCS#11 provider module\&. This must be the full path to a shared library object implementing the PKCS#11 API for the device\&. -.RE -.PP -\-P -.RS 4 -Set the new private key to be non\-sensitive and extractable\&. The allows the private key data to be read from the PKCS#11 device\&. The default is for private keys to be sensitive and non\-extractable\&. -.RE -.PP -\-p \fIPIN\fR -.RS 4 -Specify the PIN for the device\&. If no PIN is provided on the command line, -\fBpkcs11\-keygen\fR -will prompt for it\&. -.RE -.PP -\-q -.RS 4 -Quiet mode: suppress unnecessary output\&. -.RE -.PP -\-S -.RS 4 -For Diffie\-Hellman (DH) keys only, use a special prime of 768, 1024 or 1536 bit size and base (aka generator) 2\&. If not specified, bit size will default to 1024\&. -.RE -.PP -\-s \fIslot\fR -.RS 4 -Open the session with the given PKCS#11 slot\&. The default is slot 0\&. -.RE -.SH "SEE ALSO" -.PP -\fBpkcs11-destroy\fR(8), -\fBpkcs11-list\fR(8), -\fBpkcs11-tokens\fR(8), -\fBdnssec-keyfromlabel\fR(8) -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/pkcs11/pkcs11-keygen.docbook b/bin/pkcs11/pkcs11-keygen.docbook deleted file mode 100644 index d1bbf3a78b..0000000000 --- a/bin/pkcs11/pkcs11-keygen.docbook +++ /dev/null @@ -1,206 +0,0 @@ - - - - - - 2014-01-15 - - - ISC - Internet Systems Consortium, Inc. - - - - pkcs11-keygen - 8 - BIND9 - - - - pkcs11-keygen - generate keys on a PKCS#11 device - - - - - 2009 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - pkcs11-keygen - -a algorithm - - - - - - - - - - label - - - - DESCRIPTION - - - pkcs11-keygen causes a PKCS#11 device to generate - a new key pair with the given (which must be - unique) and with bits of prime. - - - - ARGUMENTS - - - - -a algorithm - - - Specify the key algorithm class: Supported classes are RSA, - DSA, DH, ECC and ECX. In addition to these strings, the - can be specified as a DNSSEC - signing algorithm that will be used with this key; for - example, NSEC3RSASHA1 maps to RSA, ECDSAP256SHA256 maps - to ECC, and ED25519 to ECX. The default class is "RSA". - - - - - - -b keysize - - - Create the key pair with bits of - prime. For ECC keys, the only valid values are 256 and 384, - and the default is 256. For ECX kyes, the only valid values - are 256 and 456, and the default is 256. - - - - - - -e - - - For RSA keys only, use a large exponent. - - - - - - -i id - - - Create key objects with id. The id is either - an unsigned short 2 byte or an unsigned long 4 byte number. - - - - - - -m module - - - Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. - - - - - - -P - - - Set the new private key to be non-sensitive and extractable. - The allows the private key data to be read from the PKCS#11 - device. The default is for private keys to be sensitive and - non-extractable. - - - - - - -p PIN - - - Specify the PIN for the device. If no PIN is provided on - the command line, pkcs11-keygen will - prompt for it. - - - - - - -q - - - Quiet mode: suppress unnecessary output. - - - - - - -S - - - For Diffie-Hellman (DH) keys only, use a special prime of - 768, 1024 or 1536 bit size and base (aka generator) 2. - If not specified, bit size will default to 1024. - - - - - - -s slot - - - Open the session with the given PKCS#11 slot. The default is - slot 0. - - - - - - - - SEE ALSO - - - - pkcs11-destroy8 - , - - pkcs11-list8 - , - - pkcs11-tokens8 - , - - dnssec-keyfromlabel8 - - - - - diff --git a/bin/pkcs11/pkcs11-keygen.html b/bin/pkcs11/pkcs11-keygen.html deleted file mode 100644 index 9375efbec1..0000000000 --- a/bin/pkcs11/pkcs11-keygen.html +++ /dev/null @@ -1,166 +0,0 @@ - - - - - -pkcs11-keygen - - -
-
- - - - - -
-

Name

-

- pkcs11-keygen - — generate keys on a PKCS#11 device -

-
- - - -
-

Synopsis

-

- pkcs11-keygen - {-a algorithm} - [-b keysize] - [-e] - [-i id] - [-m module] - [-P] - [-p PIN] - [-q] - [-S] - [-s slot] - {label} -

-
- -
-

DESCRIPTION

- -

- pkcs11-keygen causes a PKCS#11 device to generate - a new key pair with the given label (which must be - unique) and with keysize bits of prime. -

-
- -
-

ARGUMENTS

- -
-
-a algorithm
-
-

- Specify the key algorithm class: Supported classes are RSA, - DSA, DH, ECC and ECX. In addition to these strings, the - algorithm can be specified as a DNSSEC - signing algorithm that will be used with this key; for - example, NSEC3RSASHA1 maps to RSA, ECDSAP256SHA256 maps - to ECC, and ED25519 to ECX. The default class is "RSA". -

-
-
-b keysize
-
-

- Create the key pair with keysize bits of - prime. For ECC keys, the only valid values are 256 and 384, - and the default is 256. For ECX kyes, the only valid values - are 256 and 456, and the default is 256. -

-
-
-e
-
-

- For RSA keys only, use a large exponent. -

-
-
-i id
-
-

- Create key objects with id. The id is either - an unsigned short 2 byte or an unsigned long 4 byte number. -

-
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-P
-
-

- Set the new private key to be non-sensitive and extractable. - The allows the private key data to be read from the PKCS#11 - device. The default is for private keys to be sensitive and - non-extractable. -

-
-
-p PIN
-
-

- Specify the PIN for the device. If no PIN is provided on - the command line, pkcs11-keygen will - prompt for it. -

-
-
-q
-
-

- Quiet mode: suppress unnecessary output. -

-
-
-S
-
-

- For Diffie-Hellman (DH) keys only, use a special prime of - 768, 1024 or 1536 bit size and base (aka generator) 2. - If not specified, bit size will default to 1024. -

-
-
-s slot
-
-

- Open the session with the given PKCS#11 slot. The default is - slot 0. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-destroy(8) - , - - pkcs11-list(8) - , - - pkcs11-tokens(8) - , - - dnssec-keyfromlabel(8) - -

-
- -
- diff --git a/bin/pkcs11/pkcs11-keygen.rst b/bin/pkcs11/pkcs11-keygen.rst new file mode 100644 index 0000000000..3e5e8c29ba --- /dev/null +++ b/bin/pkcs11/pkcs11-keygen.rst @@ -0,0 +1,90 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_pkcs11-keygen: + +pkcs11-keygen - generate keys on a PKCS#11 device +------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`pkcs11-keygen` [**-a** algorithm] [**-b** keysize] [**-e**] [**-i** id] [**-m** module] [**-P**] [**-p** PIN] [**-q**] [**-S**] [**-s** slot] label + +Description +~~~~~~~~~~~ + +``pkcs11-keygen`` causes a PKCS#11 device to generate a new key pair +with the given ``label`` (which must be unique) and with ``keysize`` +bits of prime. + +Arguments +~~~~~~~~~ + +**-a** algorithm + Specify the key algorithm class: Supported classes are RSA, DSA, DH, + ECC and ECX. In addition to these strings, the ``algorithm`` can be + specified as a DNSSEC signing algorithm that will be used with this + key; for example, NSEC3RSASHA1 maps to RSA, ECDSAP256SHA256 maps to + ECC, and ED25519 to ECX. The default class is "RSA". + +**-b** keysize + Create the key pair with ``keysize`` bits of prime. For ECC keys, the + only valid values are 256 and 384, and the default is 256. For ECX + keys, the only valid values are 256 and 456, and the default is 256. + +**-e** + For RSA keys only, use a large exponent. + +**-i** id + Create key objects with id. The id is either an unsigned short 2 byte + or an unsigned long 4 byte number. + +**-m** module + Specify the PKCS#11 provider module. This must be the full path to a + shared library object implementing the PKCS#11 API for the device. + +**-P** + Set the new private key to be non-sensitive and extractable. The + allows the private key data to be read from the PKCS#11 device. The + default is for private keys to be sensitive and non-extractable. + +**-p** PIN + Specify the PIN for the device. If no PIN is provided on the command + line, ``pkcs11-keygen`` will prompt for it. + +**-q** + Quiet mode: suppress unnecessary output. + +**-S** + For Diffie-Hellman (DH) keys only, use a special prime of 768, 1024 + or 1536 bit size and base (aka generator) 2. If not specified, bit + size will default to 1024. + +**-s** slot + Open the session with the given PKCS#11 slot. The default is slot 0. + +See Also +~~~~~~~~ + +:manpage:`pkcs11-destroy(8)`, :manpage:`pkcs11-list(8)`, :manpage:`pkcs11-tokens(8)`, :manpage:`dnssec-keyfromlabel(8)` diff --git a/bin/pkcs11/pkcs11-list.8 b/bin/pkcs11/pkcs11-list.8 deleted file mode 100644 index 9d9a58e213..0000000000 --- a/bin/pkcs11/pkcs11-list.8 +++ /dev/null @@ -1,98 +0,0 @@ -.\" Copyright (C) 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: pkcs11-list -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2009-10-05 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "PKCS11\-LIST" "8" "2009\-10\-05" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -pkcs11-list \- list PKCS#11 objects -.SH "SYNOPSIS" -.HP \w'\fBpkcs11\-list\fR\ 'u -\fBpkcs11\-list\fR [\fB\-P\fR] [\fB\-m\ \fR\fB\fImodule\fR\fR] [\fB\-s\ \fR\fB\fIslot\fR\fR] [\-i\ \fIID\fR] [\-l\ \fIlabel\fR] [\fB\-p\ \fR\fB\fIPIN\fR\fR] -.SH "DESCRIPTION" -.PP -\fBpkcs11\-list\fR -lists the PKCS#11 objects with -\fBID\fR -or -\fBlabel\fR -or by default all objects\&. The object class, label, and ID are displayed for all keys\&. For private or secret keys, the extractability attribute is also displayed, as either -true, -false, or -never\&. -.SH "ARGUMENTS" -.PP -\-P -.RS 4 -List only the public objects\&. (Note that on some PKCS#11 devices, all objects are private\&.) -.RE -.PP -\-m \fImodule\fR -.RS 4 -Specify the PKCS#11 provider module\&. This must be the full path to a shared library object implementing the PKCS#11 API for the device\&. -.RE -.PP -\-s \fIslot\fR -.RS 4 -Open the session with the given PKCS#11 slot\&. The default is slot 0\&. -.RE -.PP -\-i \fIID\fR -.RS 4 -List only key objects with the given object ID\&. -.RE -.PP -\-l \fIlabel\fR -.RS 4 -List only key objects with the given label\&. -.RE -.PP -\-p \fIPIN\fR -.RS 4 -Specify the PIN for the device\&. If no PIN is provided on the command line, -\fBpkcs11\-list\fR -will prompt for it\&. -.RE -.SH "SEE ALSO" -.PP -\fBpkcs11-destroy\fR(8), -\fBpkcs11-keygen\fR(8), -\fBpkcs11-tokens\fR(8) -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/pkcs11/pkcs11-list.docbook b/bin/pkcs11/pkcs11-list.docbook deleted file mode 100644 index 85dc531b79..0000000000 --- a/bin/pkcs11/pkcs11-list.docbook +++ /dev/null @@ -1,150 +0,0 @@ - - - - - - 2009-10-05 - - - ISC - Internet Systems Consortium, Inc. - - - - pkcs11-list - 8 - BIND9 - - - - pkcs11-list - list PKCS#11 objects - - - - - 2009 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - pkcs11-list - - - - -i ID - -l label - - - - - DESCRIPTION - - - pkcs11-list - lists the PKCS#11 objects with or - or by default all objects. - The object class, label, and ID are displayed for all - keys. For private or secret keys, the extractability - attribute is also displayed, as either true, - false, or never. - - - - ARGUMENTS - - - - -P - - - List only the public objects. (Note that on some PKCS#11 - devices, all objects are private.) - - - - - - -m module - - - Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. - - - - - - -s slot - - - Open the session with the given PKCS#11 slot. The default is - slot 0. - - - - - - -i ID - - - List only key objects with the given object ID. - - - - - - -l label - - - List only key objects with the given label. - - - - - - -p PIN - - - Specify the PIN for the device. If no PIN is provided on the - command line, pkcs11-list will prompt for it. - - - - - - - SEE ALSO - - - - pkcs11-destroy8 - , - - pkcs11-keygen8 - , - - pkcs11-tokens8 - - - - - diff --git a/bin/pkcs11/pkcs11-list.html b/bin/pkcs11/pkcs11-list.html deleted file mode 100644 index c16a12737f..0000000000 --- a/bin/pkcs11/pkcs11-list.html +++ /dev/null @@ -1,124 +0,0 @@ - - - - - -pkcs11-list - - -
-
- - - - - -
-

Name

-

- pkcs11-list - — list PKCS#11 objects -

-
- - - -
-

Synopsis

-

- pkcs11-list - [-P] - [-m module] - [-s slot] - [-i ID] - [-l label] - [-p PIN] -

-
- -
-

DESCRIPTION

- -

- pkcs11-list - lists the PKCS#11 objects with ID or - label or by default all objects. - The object class, label, and ID are displayed for all - keys. For private or secret keys, the extractability - attribute is also displayed, as either true, - false, or never. -

-
- -
-

ARGUMENTS

- -
-
-P
-
-

- List only the public objects. (Note that on some PKCS#11 - devices, all objects are private.) -

-
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-s slot
-
-

- Open the session with the given PKCS#11 slot. The default is - slot 0. -

-
-
-i ID
-
-

- List only key objects with the given object ID. -

-
-
-l label
-
-

- List only key objects with the given label. -

-
-
-p PIN
-
-

- Specify the PIN for the device. If no PIN is provided on the - command line, pkcs11-list will prompt for it. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-destroy(8) - , - - pkcs11-keygen(8) - , - - pkcs11-tokens(8) - -

-
- -
- diff --git a/bin/pkcs11/pkcs11-list.rst b/bin/pkcs11/pkcs11-list.rst new file mode 100644 index 0000000000..1a8d6ad715 --- /dev/null +++ b/bin/pkcs11/pkcs11-list.rst @@ -0,0 +1,66 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_pkcs11-list: + +pkcs11-list - list PKCS#11 objects +---------------------------------- + +:program:`pkcs11-list` [**-P**] [**-m** module] [**-s** slot] [**-i** ID **] [-l** label] [**-p** PIN] + +Description +~~~~~~~~~~~ + +``pkcs11-list`` lists the PKCS#11 objects with ``ID`` or ``label`` or by +default all objects. The object class, label, and ID are displayed for +all keys. For private or secret keys, the extractability attribute is +also displayed, as either ``true``, ``false``, or ``never``. + +Arguments +~~~~~~~~~ + +**-P** + List only the public objects. (Note that on some PKCS#11 devices, all + objects are private.) + +**-m** module + Specify the PKCS#11 provider module. This must be the full path to a + shared library object implementing the PKCS#11 API for the device. + +**-s** slot + Open the session with the given PKCS#11 slot. The default is slot 0. + +**-i** ID + List only key objects with the given object ID. + +**-l** label + List only key objects with the given label. + +**-p** PIN + Specify the PIN for the device. If no PIN is provided on the command + line, ``pkcs11-list`` will prompt for it. + +See Also +~~~~~~~~ + +:manpage:`pkcs11-destroy(8)`, :manpage:`pkcs11-keygen(8)`, :manpage:`pkcs11-tokens(8)` diff --git a/bin/pkcs11/pkcs11-tokens.8 b/bin/pkcs11/pkcs11-tokens.8 deleted file mode 100644 index b8e92aafcc..0000000000 --- a/bin/pkcs11/pkcs11-tokens.8 +++ /dev/null @@ -1,69 +0,0 @@ -.\" Copyright (C) 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: pkcs11-tokens -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-01-15 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "PKCS11\-TOKENS" "8" "2014\-01\-15" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -pkcs11-tokens \- list PKCS#11 available tokens -.SH "SYNOPSIS" -.HP \w'\fBpkcs11\-tokens\fR\ 'u -\fBpkcs11\-tokens\fR [\fB\-m\ \fR\fB\fImodule\fR\fR] [\fB\-v\fR] -.SH "DESCRIPTION" -.PP -\fBpkcs11\-tokens\fR -lists the PKCS#11 available tokens with defaults from the slot/token scan performed at application initialization\&. -.SH "ARGUMENTS" -.PP -\-m \fImodule\fR -.RS 4 -Specify the PKCS#11 provider module\&. This must be the full path to a shared library object implementing the PKCS#11 API for the device\&. -.RE -.PP -\-v -.RS 4 -Make the PKCS#11 libisc initialization verbose\&. -.RE -.SH "SEE ALSO" -.PP -\fBpkcs11-destroy\fR(8), -\fBpkcs11-keygen\fR(8), -\fBpkcs11-list\fR(8) -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/pkcs11/pkcs11-tokens.docbook b/bin/pkcs11/pkcs11-tokens.docbook deleted file mode 100644 index 890506e56b..0000000000 --- a/bin/pkcs11/pkcs11-tokens.docbook +++ /dev/null @@ -1,102 +0,0 @@ - - - - - - 2014-01-15 - - - ISC - Internet Systems Consortium, Inc. - - - - pkcs11-tokens - 8 - BIND9 - - - - pkcs11-tokens - list PKCS#11 available tokens - - - - - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - pkcs11-tokens - - - - - - DESCRIPTION - - - pkcs11-tokens - lists the PKCS#11 available tokens with defaults from the slot/token - scan performed at application initialization. - - - - ARGUMENTS - - - - -m module - - - Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. - - - - - - -v - - - Make the PKCS#11 libisc initialization verbose. - - - - - - - SEE ALSO - - - - pkcs11-destroy8 - , - - pkcs11-keygen8 - , - - pkcs11-list8 - - - - - diff --git a/bin/pkcs11/pkcs11-tokens.html b/bin/pkcs11/pkcs11-tokens.html deleted file mode 100644 index e7979f663b..0000000000 --- a/bin/pkcs11/pkcs11-tokens.html +++ /dev/null @@ -1,89 +0,0 @@ - - - - - -pkcs11-tokens - - -
-
- - - - - -
-

Name

-

- pkcs11-tokens - — list PKCS#11 available tokens -

-
- - - -
-

Synopsis

-

- pkcs11-tokens - [-m module] - [-v] -

-
- -
-

DESCRIPTION

- -

- pkcs11-tokens - lists the PKCS#11 available tokens with defaults from the slot/token - scan performed at application initialization. -

-
- -
-

ARGUMENTS

- -
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-v
-
-

- Make the PKCS#11 libisc initialization verbose. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-destroy(8) - , - - pkcs11-keygen(8) - , - - pkcs11-list(8) - -

-
- -
- diff --git a/bin/pkcs11/pkcs11-tokens.rst b/bin/pkcs11/pkcs11-tokens.rst new file mode 100644 index 0000000000..057f14954a --- /dev/null +++ b/bin/pkcs11/pkcs11-tokens.rst @@ -0,0 +1,53 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_pkcs11-tokens: + +pkcs11-tokens - list PKCS#11 available tokens +--------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`pkcs11-tokens` [**-m** module] [**-v**] + +Description +~~~~~~~~~~~ + +``pkcs11-tokens`` lists the PKCS#11 available tokens with defaults from +the slot/token scan performed at application initialization. + +Arguments +~~~~~~~~~ + +**-m** module + Specify the PKCS#11 provider module. This must be the full path to a + shared library object implementing the PKCS#11 API for the device. + +**-v** + Make the PKCS#11 libisc initialization verbose. + +See Also +~~~~~~~~ + +:manpage:`pkcs11-destroy(8)`, :manpage:`pkcs11-keygen(8)`, :manpage:`pkcs11-list(8)` diff --git a/bin/plugins/filter-aaaa.8 b/bin/plugins/filter-aaaa.8 deleted file mode 100644 index 663ac5275b..0000000000 --- a/bin/plugins/filter-aaaa.8 +++ /dev/null @@ -1,116 +0,0 @@ -.\" Copyright (C) 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: filter-aaaa.so -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2018-08-13 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "FILTER\-AAAA\&.SO" "8" "2018\-08\-13" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -filter-aaaa.so \- filter AAAA in DNS responses when A is present -.SH "SYNOPSIS" -.HP \w'\fBplugin\ query\ "filter\-aaaa\&.so"\fR\ 'u -\fBplugin query "filter\-aaaa\&.so"\fR [\fI{\ parameters\ }\fR]; -.SH "DESCRIPTION" -.PP -\fBfilter\-aaaa\&.so\fR -is a query plugin module for -\fBnamed\fR, enabling -\fBnamed\fR -to omit some IPv6 addresses when responding to clients\&. -.PP -Until BIND 9\&.12, this feature was implemented natively in -\fBnamed\fR -and enabled with the -\fBfilter\-aaaa\fR -ACL and the -\fBfilter\-aaaa\-on\-v4\fR -and -\fBfilter\-aaaa\-on\-v6\fR -options\&. These options are now deprecated in -named\&.conf, but can be passed as parameters to the -\fBfilter\-aaaa\&.so\fR -plugin, for example: -.sp -.if n \{\ -.RS 4 -.\} -.nf -plugin query "/usr/local/lib/filter\-aaaa\&.so" { - filter\-aaaa\-on\-v4 yes; - filter\-aaaa\-on\-v6 yes; - filter\-aaaa { 192\&.0\&.2\&.1; 2001:db8:2::1; }; -}; -.fi -.if n \{\ -.RE -.\} -.PP -This module is intended to aid transition from IPv4 to IPv6 by withholding IPv6 addresses from DNS clients which are not connected to the IPv6 Internet, when the name being looked up has an IPv4 address available\&. Use of this module is not recommended unless absolutely necessary\&. -.PP -Note: This mechanism can erroneously cause other servers not to give AAAA records to their clients\&. If a recursing server with both IPv6 and IPv4 network connections queries an authoritative server using this mechanism via IPv4, it will be denied AAAA records even if its client is using IPv6\&. -.SH "OPTIONS" -.PP -\fBfilter\-aaaa\fR -.RS 4 -Specifies a list of client addresses for which AAAA filtering is to be applied\&. The default is -\fBany\fR\&. -.RE -.PP -\fBfilter\-aaaa\-on\-v4\fR -.RS 4 -If set to -\fByes\fR, the DNS client is at an IPv4 address, in -\fBfilter\-aaaa\fR, and if the response does not include DNSSEC signatures, then all AAAA records are deleted from the response\&. This filtering applies to all responses and not only authoritative responses\&. -.sp -If set to -\fBbreak\-dnssec\fR, then AAAA records are deleted even when DNSSEC is enabled\&. As suggested by the name, this causes the response to fail to verify, because the DNSSEC protocol is designed to detect deletions\&. -.sp -This mechanism can erroneously cause other servers not to give AAAA records to their clients\&. A recursing server with both IPv6 and IPv4 network connections that queries an authoritative server using this mechanism via IPv4 will be denied AAAA records even if its client is using IPv6\&. -.RE -.PP -\fBfilter\-aaaa\-on\-v6\fR -.RS 4 -Identical to -\fBfilter\-aaaa\-on\-v4\fR, except it filters AAAA responses to queries from IPv6 clients instead of IPv4 clients\&. To filter all responses, set both options to -\fByes\fR\&. -.RE -.SH "SEE ALSO" -.PP -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/plugins/filter-aaaa.docbook b/bin/plugins/filter-aaaa.docbook deleted file mode 100644 index 46a4412441..0000000000 --- a/bin/plugins/filter-aaaa.docbook +++ /dev/null @@ -1,148 +0,0 @@ - - - - - - 2018-08-13 - - - ISC - Internet Systems Consortium, Inc. - - - filter-aaaa.so - 8 - BIND9 - - - - filter-aaaa.so - filter AAAA in DNS responses when A is present - - - - - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - plugin query "filter-aaaa.so" - { parameters }; - - - - DESCRIPTION - - filter-aaaa.so is a query plugin module for - named, enabling named - to omit some IPv6 addresses when responding to clients. - - - Until BIND 9.12, this feature was implemented natively in - named and enabled with the - filter-aaaa ACL and the - filter-aaaa-on-v4 and - filter-aaaa-on-v6 options. These options are - now deprecated in named.conf, but can be - passed as parameters to the filter-aaaa.so - plugin, for example: - - -plugin query "/usr/local/lib/filter-aaaa.so" { - filter-aaaa-on-v4 yes; - filter-aaaa-on-v6 yes; - filter-aaaa { 192.0.2.1; 2001:db8:2::1; }; -}; - - - This module is intended to aid transition from IPv4 to IPv6 by - withholding IPv6 addresses from DNS clients which are not connected - to the IPv6 Internet, when the name being looked up has an IPv4 - address available. Use of this module is not recommended unless - absolutely necessary. - - - Note: This mechanism can erroneously cause other servers not to - give AAAA records to their clients. If a recursing server with - both IPv6 and IPv4 network connections queries an authoritative - server using this mechanism via IPv4, it will be denied AAAA - records even if its client is using IPv6. - - - - OPTIONS - - - filter-aaaa - - - Specifies a list of client addresses for which AAAA - filtering is to be applied. The default is - any. - - - - - - filter-aaaa-on-v4 - - - If set to yes, the DNS client is - at an IPv4 address, in filter-aaaa, - and if the response does not include DNSSEC signatures, - then all AAAA records are deleted from the response. - This filtering applies to all responses and not only - authoritative responses. - - - If set to break-dnssec, - then AAAA records are deleted even when DNSSEC is - enabled. As suggested by the name, this causes the - response to fail to verify, because the DNSSEC protocol is - designed to detect deletions. - - - This mechanism can erroneously cause other servers not to - give AAAA records to their clients. A recursing server with - both IPv6 and IPv4 network connections that queries an - authoritative server using this mechanism via IPv4 will be - denied AAAA records even if its client is using IPv6. - - - - - - filter-aaaa-on-v6 - - - Identical to filter-aaaa-on-v4, - except it filters AAAA responses to queries from IPv6 - clients instead of IPv4 clients. To filter all - responses, set both options to yes. - - - - - - - SEE ALSO - - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/plugins/filter-aaaa.html b/bin/plugins/filter-aaaa.html deleted file mode 100644 index 0aa53c64ba..0000000000 --- a/bin/plugins/filter-aaaa.html +++ /dev/null @@ -1,135 +0,0 @@ - - - - - -filter-aaaa.so - - -
-
- - - - -
-

Name

-

- filter-aaaa.so - — filter AAAA in DNS responses when A is present -

-
- - - -
-

Synopsis

-

- plugin query "filter-aaaa.so" - [{ parameters }]; -

-
- -
-

DESCRIPTION

-

- filter-aaaa.so is a query plugin module for - named, enabling named - to omit some IPv6 addresses when responding to clients. -

-

- Until BIND 9.12, this feature was implemented natively in - named and enabled with the - filter-aaaa ACL and the - filter-aaaa-on-v4 and - filter-aaaa-on-v6 options. These options are - now deprecated in named.conf, but can be - passed as parameters to the filter-aaaa.so - plugin, for example: -

-
-plugin query "/usr/local/lib/filter-aaaa.so" {
-        filter-aaaa-on-v4 yes;
-        filter-aaaa-on-v6 yes;
-        filter-aaaa { 192.0.2.1; 2001:db8:2::1; };
-};
-
-

- This module is intended to aid transition from IPv4 to IPv6 by - withholding IPv6 addresses from DNS clients which are not connected - to the IPv6 Internet, when the name being looked up has an IPv4 - address available. Use of this module is not recommended unless - absolutely necessary. -

-

- Note: This mechanism can erroneously cause other servers not to - give AAAA records to their clients. If a recursing server with - both IPv6 and IPv4 network connections queries an authoritative - server using this mechanism via IPv4, it will be denied AAAA - records even if its client is using IPv6. -

-
- -
-

OPTIONS

-
-
filter-aaaa
-
-

- Specifies a list of client addresses for which AAAA - filtering is to be applied. The default is - any. -

-
-
filter-aaaa-on-v4
-
-

- If set to yes, the DNS client is - at an IPv4 address, in filter-aaaa, - and if the response does not include DNSSEC signatures, - then all AAAA records are deleted from the response. - This filtering applies to all responses and not only - authoritative responses. -

-

- If set to break-dnssec, - then AAAA records are deleted even when DNSSEC is - enabled. As suggested by the name, this causes the - response to fail to verify, because the DNSSEC protocol is - designed to detect deletions. -

-

- This mechanism can erroneously cause other servers not to - give AAAA records to their clients. A recursing server with - both IPv6 and IPv4 network connections that queries an - authoritative server using this mechanism via IPv4 will be - denied AAAA records even if its client is using IPv6. -

-
-
filter-aaaa-on-v6
-
-

- Identical to filter-aaaa-on-v4, - except it filters AAAA responses to queries from IPv6 - clients instead of IPv4 clients. To filter all - responses, set both options to yes. -

-
-
-
- -
-

SEE ALSO

-

- BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/plugins/filter-aaaa.rst b/bin/plugins/filter-aaaa.rst new file mode 100644 index 0000000000..498870a50b --- /dev/null +++ b/bin/plugins/filter-aaaa.rst @@ -0,0 +1,99 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_filter-aaaa: + +filter-aaaa.so - filter AAAA in DNS responses when A is present +--------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`plugin query` "filter-aaaa.so" [{ parameters }]; + +Description +~~~~~~~~~~~ + +``filter-aaaa.so`` is a query plugin module for ``named``, enabling +``named`` to omit some IPv6 addresses when responding to clients. + +Until BIND 9.12, this feature was implemented natively in ``named`` and +enabled with the ``filter-aaaa`` ACL and the ``filter-aaaa-on-v4`` and +``filter-aaaa-on-v6`` options. These options are now deprecated in +``named.conf``, but can be passed as parameters to the +``filter-aaaa.so`` plugin, for example: + +:: + + plugin query "/usr/local/lib/filter-aaaa.so" { + filter-aaaa-on-v4 yes; + filter-aaaa-on-v6 yes; + filter-aaaa { 192.0.2.1; 2001:db8:2::1; }; + }; + +This module is intended to aid transition from IPv4 to IPv6 by +withholding IPv6 addresses from DNS clients which are not connected to +the IPv6 Internet, when the name being looked up has an IPv4 address +available. Use of this module is not recommended unless absolutely +necessary. + +Note: This mechanism can erroneously cause other servers not to give +AAAA records to their clients. If a recursing server with both IPv6 and +IPv4 network connections queries an authoritative server using this +mechanism via IPv4, it will be denied AAAA records even if its client is +using IPv6. + +Options +~~~~~~~ + +``filter-aaaa`` + Specifies a list of client addresses for which AAAA filtering is to + be applied. The default is ``any``. + +``filter-aaaa-on-v4`` + If set to ``yes``, the DNS client is at an IPv4 address, in + ``filter-aaaa``, and if the response does not include DNSSEC + signatures, then all AAAA records are deleted from the response. This + filtering applies to all responses and not only authoritative + responses. + + If set to ``break-dnssec``, then AAAA records are deleted even when + DNSSEC is enabled. As suggested by the name, this causes the response + to fail to verify, because the DNSSEC protocol is designed to detect + deletions. + + This mechanism can erroneously cause other servers not to give AAAA + records to their clients. A recursing server with both IPv6 and IPv4 + network connections that queries an authoritative server using this + mechanism via IPv4 will be denied AAAA records even if its client is + using IPv6. + +``filter-aaaa-on-v6`` + Identical to ``filter-aaaa-on-v4``, except it filters AAAA responses + to queries from IPv6 clients instead of IPv4 clients. To filter all + responses, set both options to ``yes``. + +See Also +~~~~~~~~ + +BIND 9 Administrator Reference Manual. diff --git a/bin/rndc/rndc.8 b/bin/rndc/rndc.8 deleted file mode 100644 index 63bebd15b3..0000000000 --- a/bin/rndc/rndc.8 +++ /dev/null @@ -1,749 +0,0 @@ -.\" Copyright (C) 2000, 2001, 2004, 2005, 2007, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: rndc -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2014-08-15 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "RNDC" "8" "2014\-08\-15" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -rndc \- name server control utility -.SH "SYNOPSIS" -.HP \w'\fBrndc\fR\ 'u -\fBrndc\fR [\fB\-b\ \fR\fB\fIsource\-address\fR\fR] [\fB\-c\ \fR\fB\fIconfig\-file\fR\fR] [\fB\-k\ \fR\fB\fIkey\-file\fR\fR] [\fB\-s\ \fR\fB\fIserver\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-q\fR] [\fB\-r\fR] [\fB\-V\fR] [\fB\-y\ \fR\fB\fIkey_id\fR\fR] [[\fB\-4\fR] | [\fB\-6\fR]] {command} -.SH "DESCRIPTION" -.PP -\fBrndc\fR -controls the operation of a name server\&. It supersedes the -\fBndc\fR -utility that was provided in old BIND releases\&. If -\fBrndc\fR -is invoked with no command line options or arguments, it prints a short summary of the supported commands and the available options and their arguments\&. -.PP -\fBrndc\fR -communicates with the name server over a TCP connection, sending commands authenticated with digital signatures\&. In the current versions of -\fBrndc\fR -and -\fBnamed\fR, the only supported authentication algorithms are HMAC\-MD5 (for compatibility), HMAC\-SHA1, HMAC\-SHA224, HMAC\-SHA256 (default), HMAC\-SHA384 and HMAC\-SHA512\&. They use a shared secret on each end of the connection\&. This provides TSIG\-style authentication for the command request and the name server\*(Aqs response\&. All commands sent over the channel must be signed by a key_id known to the server\&. -.PP -\fBrndc\fR -reads a configuration file to determine how to contact the name server and decide what algorithm and key it should use\&. -.SH "OPTIONS" -.PP -\-4 -.RS 4 -Use IPv4 only\&. -.RE -.PP -\-6 -.RS 4 -Use IPv6 only\&. -.RE -.PP -\-b \fIsource\-address\fR -.RS 4 -Use -\fIsource\-address\fR -as the source address for the connection to the server\&. Multiple instances are permitted to allow setting of both the IPv4 and IPv6 source addresses\&. -.RE -.PP -\-c \fIconfig\-file\fR -.RS 4 -Use -\fIconfig\-file\fR -as the configuration file instead of the default, -/etc/rndc\&.conf\&. -.RE -.PP -\-k \fIkey\-file\fR -.RS 4 -Use -\fIkey\-file\fR -as the key file instead of the default, -/etc/rndc\&.key\&. The key in -/etc/rndc\&.key -will be used to authenticate commands sent to the server if the -\fIconfig\-file\fR -does not exist\&. -.RE -.PP -\-s \fIserver\fR -.RS 4 -\fIserver\fR -is the name or address of the server which matches a server statement in the configuration file for -\fBrndc\fR\&. If no server is supplied on the command line, the host named by the default\-server clause in the options statement of the -\fBrndc\fR -configuration file will be used\&. -.RE -.PP -\-p \fIport\fR -.RS 4 -Send commands to TCP port -\fIport\fR -instead of BIND 9\*(Aqs default control channel port, 953\&. -.RE -.PP -\-q -.RS 4 -Quiet mode: Message text returned by the server will not be printed except when there is an error\&. -.RE -.PP -\-r -.RS 4 -Instructs -\fBrndc\fR -to print the result code returned by -\fBnamed\fR -after executing the requested command (e\&.g\&., ISC_R_SUCCESS, ISC_R_FAILURE, etc)\&. -.RE -.PP -\-V -.RS 4 -Enable verbose logging\&. -.RE -.PP -\-y \fIkey_id\fR -.RS 4 -Use the key -\fIkey_id\fR -from the configuration file\&. -\fIkey_id\fR -must be known by -\fBnamed\fR -with the same algorithm and secret string in order for control message validation to succeed\&. If no -\fIkey_id\fR -is specified, -\fBrndc\fR -will first look for a key clause in the server statement of the server being used, or if no server statement is present for that host, then the default\-key clause of the options statement\&. Note that the configuration file contains shared secrets which are used to send authenticated control commands to name servers\&. It should therefore not have general read or write access\&. -.RE -.SH "COMMANDS" -.PP -A list of commands supported by -\fBrndc\fR -can be seen by running -\fBrndc\fR -without arguments\&. -.PP -Currently supported commands are: -.PP -\fBaddzone \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR\fB \fR\fB\fIconfiguration\fR\fR\fB \fR -.RS 4 -Add a zone while the server is running\&. This command requires the -\fBallow\-new\-zones\fR -option to be set to -\fByes\fR\&. The -\fIconfiguration\fR -string specified on the command line is the zone configuration text that would ordinarily be placed in -named\&.conf\&. -.sp -The configuration is saved in a file called -\fIviewname\fR\&.nzf -(or, if -\fBnamed\fR -is compiled with liblmdb, an LMDB database file called -\fIviewname\fR\&.nzd)\&. -\fIviewname\fR -is the name of the view, unless the view name contains characters that are incompatible with use as a file name, in which case a cryptographic hash of the view name is used instead\&. When -\fBnamed\fR -is restarted, the file will be loaded into the view configuration, so that zones that were added can persist after a restart\&. -.sp -This sample -\fBaddzone\fR -command would add the zone -example\&.com -to the default view: -.sp -$\fBrndc addzone example\&.com \*(Aq{ type master; file "example\&.com\&.db"; };\*(Aq\fR -.sp -(Note the brackets and semi\-colon around the zone configuration text\&.) -.sp -See also -\fBrndc delzone\fR -and -\fBrndc modzone\fR\&. -.RE -.PP -\fBdelzone \fR\fB[\-clean]\fR\fB \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR\fB \fR -.RS 4 -Delete a zone while the server is running\&. -.sp -If the -\fB\-clean\fR -argument is specified, the zone\*(Aqs master file (and journal file, if any) will be deleted along with the zone\&. Without the -\fB\-clean\fR -option, zone files must be cleaned up by hand\&. (If the zone is of type "slave" or "stub", the files needing to be cleaned up will be reported in the output of the -\fBrndc delzone\fR -command\&.) -.sp -If the zone was originally added via -\fBrndc addzone\fR, then it will be removed permanently\&. However, if it was originally configured in -named\&.conf, then that original configuration is still in place; when the server is restarted or reconfigured, the zone will come back\&. To remove it permanently, it must also be removed from -named\&.conf -.sp -See also -\fBrndc addzone\fR -and -\fBrndc modzone\fR\&. -.RE -.PP -\fBdnstap ( \-reopen | \-roll \fR\fB[\fInumber\fR]\fR\fB )\fR -.RS 4 -Close and re\-open DNSTAP output files\&. -\fBrndc dnstap \-reopen\fR -allows the output file to be renamed externally, so that -\fBnamed\fR -can truncate and re\-open it\&. -\fBrndc dnstap \-roll\fR -causes the output file to be rolled automatically, similar to log files; the most recent output file has "\&.0" appended to its name; the previous most recent output file is moved to "\&.1", and so on\&. If -\fInumber\fR -is specified, then the number of backup log files is limited to that number\&. -.RE -.PP -\fBdumpdb \fR\fB[\-all|\-cache|\-zones|\-adb|\-bad|\-fail]\fR\fB \fR\fB[\fIview \&.\&.\&.\fR]\fR -.RS 4 -Dump the server\*(Aqs caches (default) and/or zones to the dump file for the specified views\&. If no view is specified, all views are dumped\&. (See the -\fBdump\-file\fR -option in the BIND 9 Administrator Reference Manual\&.) -.RE -.PP -\fBflush\fR -.RS 4 -Flushes the server\*(Aqs cache\&. -.RE -.PP -\fBflushname\fR \fIname\fR [\fIview\fR] -.RS 4 -Flushes the given name from the view\*(Aqs DNS cache and, if applicable, from the view\*(Aqs nameserver address database, bad server cache and SERVFAIL cache\&. -.RE -.PP -\fBflushtree\fR \fIname\fR [\fIview\fR] -.RS 4 -Flushes the given name, and all of its subdomains, from the view\*(Aqs DNS cache, address database, bad server cache, and SERVFAIL cache\&. -.RE -.PP -\fBfreeze \fR\fB[\fIzone\fR [\fIclass\fR [\fIview\fR]]]\fR -.RS 4 -Suspend updates to a dynamic zone\&. If no zone is specified, then all zones are suspended\&. This allows manual edits to be made to a zone normally updated by dynamic update\&. It also causes changes in the journal file to be synced into the master file\&. All dynamic update attempts will be refused while the zone is frozen\&. -.sp -See also -\fBrndc thaw\fR\&. -.RE -.PP -\fBhalt \fR\fB[\-p]\fR -.RS 4 -Stop the server immediately\&. Recent changes made through dynamic update or IXFR are not saved to the master files, but will be rolled forward from the journal files when the server is restarted\&. If -\fB\-p\fR -is specified -\fBnamed\fR\*(Aqs process id is returned\&. This allows an external process to determine when -\fBnamed\fR -had completed halting\&. -.sp -See also -\fBrndc stop\fR\&. -.RE -.PP -\fBloadkeys \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Fetch all DNSSEC keys for the given zone from the key directory\&. If they are within their publication period, merge them into the zone\*(Aqs DNSKEY RRset\&. Unlike -\fBrndc sign\fR, however, the zone is not immediately re\-signed by the new keys, but is allowed to incrementally re\-sign over time\&. -.sp -This command requires that the zone is configured with a -\fBdnssec\-policy\fR, or that the -\fBauto\-dnssec\fR -zone option be set to -maintain, and also requires the zone to be configured to allow dynamic DNS\&. (See "Dynamic Update Policies" in the Administrator Reference Manual for more details\&.) -.RE -.PP -\fBmanaged\-keys \fR\fB\fI(status | refresh | sync | destroy)\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Inspect and control the "managed keys" database which handles RFC 5011 DNSSEC trust anchor maintenance\&. If a view is specified, these commands are applied to that view; otherwise they are applied to all views\&. -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -When run with the -status -keyword, prints the current status of the managed keys database\&. -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -When run with the -refresh -keyword, forces an immediate refresh query to be sent for all the managed keys, updating the managed keys database if any new keys are found, without waiting the normal refresh interval\&. -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -When run with the -sync -keyword, forces an immediate dump of the managed keys database to disk (in the file -managed\-keys\&.bind -or (\fIviewname\fR\&.mkeys)\&. This synchronizes the database with its journal file, so that the database\*(Aqs current contents can be inspected visually\&. -.RE -.sp -.RS 4 -.ie n \{\ -\h'-04'\(bu\h'+03'\c -.\} -.el \{\ -.sp -1 -.IP \(bu 2.3 -.\} -When run with the -destroy -keyword, the managed keys database is shut down and deleted, and all key maintenance is terminated\&. This command should be used only with extreme caution\&. -.sp -Existing keys that are already trusted are not deleted from memory; DNSSEC validation can continue after this command is used\&. However, key maintenance operations will cease until -\fBnamed\fR -is restarted or reconfigured, and all existing key maintenance state will be deleted\&. -.sp -Running -\fBrndc reconfig\fR -or restarting -\fBnamed\fR -immediately after this command will cause key maintenance to be reinitialized from scratch, just as if the server were being started for the first time\&. This is primarily intended for testing, but it may also be used, for example, to jumpstart the acquisition of new keys in the event of a trust anchor rollover, or as a brute\-force repair for key maintenance problems\&. -.RE -.RE -.PP -\fBmodzone \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR\fB \fR\fB\fIconfiguration\fR\fR\fB \fR -.RS 4 -Modify the configuration of a zone while the server is running\&. This command requires the -\fBallow\-new\-zones\fR -option to be set to -\fByes\fR\&. As with -\fBaddzone\fR, the -\fIconfiguration\fR -string specified on the command line is the zone configuration text that would ordinarily be placed in -named\&.conf\&. -.sp -If the zone was originally added via -\fBrndc addzone\fR, the configuration changes will be recorded permanently and will still be in effect after the server is restarted or reconfigured\&. However, if it was originally configured in -named\&.conf, then that original configuration is still in place; when the server is restarted or reconfigured, the zone will revert to its original configuration\&. To make the changes permanent, it must also be modified in -named\&.conf -.sp -See also -\fBrndc addzone\fR -and -\fBrndc delzone\fR\&. -.RE -.PP -\fBnotify \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Resend NOTIFY messages for the zone\&. -.RE -.PP -\fBnotrace\fR -.RS 4 -Sets the server\*(Aqs debugging level to 0\&. -.sp -See also -\fBrndc trace\fR\&. -.RE -.PP -\fBnta \fR\fB[( \-class \fIclass\fR | \-dump | \-force | \-remove | \-lifetime \fIduration\fR)]\fR\fB \fR\fB\fIdomain\fR\fR\fB \fR\fB[\fIview\fR]\fR\fB \fR -.RS 4 -Sets a DNSSEC negative trust anchor (NTA) for -\fBdomain\fR, with a lifetime of -\fBduration\fR\&. The default lifetime is configured in -named\&.conf -via the -\fBnta\-lifetime\fR -option, and defaults to one hour\&. The lifetime cannot exceed one week\&. -.sp -A negative trust anchor selectively disables DNSSEC validation for zones that are known to be failing because of misconfiguration rather than an attack\&. When data to be validated is at or below an active NTA (and above any other configured trust anchors), -\fBnamed\fR -will abort the DNSSEC validation process and treat the data as insecure rather than bogus\&. This continues until the NTA\*(Aqs lifetime is elapsed\&. -.sp -NTAs persist across restarts of the -\fBnamed\fR -server\&. The NTAs for a view are saved in a file called -\fIname\fR\&.nta, where -\fIname\fR -is the name of the view, or if it contains characters that are incompatible with use as a file name, a cryptographic hash generated from the name of the view\&. -.sp -An existing NTA can be removed by using the -\fB\-remove\fR -option\&. -.sp -An NTA\*(Aqs lifetime can be specified with the -\fB\-lifetime\fR -option\&. TTL\-style suffixes can be used to specify the lifetime in seconds, minutes, or hours\&. If the specified NTA already exists, its lifetime will be updated to the new value\&. Setting -\fBlifetime\fR -to zero is equivalent to -\fB\-remove\fR\&. -.sp -If the -\fB\-dump\fR -is used, any other arguments are ignored, and a list of existing NTAs is printed (note that this may include NTAs that are expired but have not yet been cleaned up)\&. -.sp -Normally, -\fBnamed\fR -will periodically test to see whether data below an NTA can now be validated (see the -\fBnta\-recheck\fR -option in the Administrator Reference Manual for details)\&. If data can be validated, then the NTA is regarded as no longer necessary, and will be allowed to expire early\&. The -\fB\-force\fR -overrides this behavior and forces an NTA to persist for its entire lifetime, regardless of whether data could be validated if the NTA were not present\&. -.sp -The view class can be specified with -\fB\-class\fR\&. The default is class -\fBIN\fR, which is the only class for which DNSSEC is currently supported\&. -.sp -All of these options can be shortened, i\&.e\&., to -\fB\-l\fR, -\fB\-r\fR, -\fB\-d\fR, -\fB\-f\fR, and -\fB\-c\fR\&. -.sp -Unrecognized options are treated as errors\&. To reference a domain or view name that begins with a hyphen, use a double\-hyphen on the command line to indicate the end of options\&. -.RE -.PP -\fBquerylog\fR [ on | off ] -.RS 4 -Enable or disable query logging\&. (For backward compatibility, this command can also be used without an argument to toggle query logging on and off\&.) -.sp -Query logging can also be enabled by explicitly directing the -\fBqueries\fR\fBcategory\fR -to a -\fBchannel\fR -in the -\fBlogging\fR -section of -named\&.conf -or by specifying -\fBquerylog yes;\fR -in the -\fBoptions\fR -section of -named\&.conf\&. -.RE -.PP -\fBreconfig\fR -.RS 4 -Reload the configuration file and load new zones, but do not reload existing zone files even if they have changed\&. This is faster than a full -\fBreload\fR -when there is a large number of zones because it avoids the need to examine the modification times of the zones files\&. -.RE -.PP -\fBrecursing\fR -.RS 4 -Dump the list of queries -\fBnamed\fR -is currently recursing on, and the list of domains to which iterative queries are currently being sent\&. (The second list includes the number of fetches currently active for the given domain, and how many have been passed or dropped because of the -\fBfetches\-per\-zone\fR -option\&.) -.RE -.PP -\fBrefresh \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Schedule zone maintenance for the given zone\&. -.RE -.PP -\fBreload\fR -.RS 4 -Reload configuration file and zones\&. -.RE -.PP -\fBreload \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Reload the given zone\&. -.RE -.PP -\fBretransfer \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Retransfer the given slave zone from the master server\&. -.sp -If the zone is configured to use -\fBinline\-signing\fR, the signed version of the zone is discarded; after the retransfer of the unsigned version is complete, the signed version will be regenerated with all new signatures\&. -.RE -.PP -\fBscan\fR -.RS 4 -Scan the list of available network interfaces for changes, without performing a full -\fBreconfig\fR -or waiting for the -\fBinterface\-interval\fR -timer\&. -.RE -.PP -\fBsecroots \fR\fB[\-]\fR\fB \fR\fB[\fIview \&.\&.\&.\fR]\fR -.RS 4 -Dump the security roots (i\&.e\&., trust anchors configured via -\fBtrust\-anchors\fR -statements, or the managed\-keys or trusted\-keys statements (both deprecated), or via -\fBdnssec\-validation auto\fR) and negative trust anchors for the specified views\&. If no view is specified, all views are dumped\&. Security roots will indicate whether they are configured as trusted keys, managed keys, or initializing managed keys (managed keys that have not yet been updated by a successful key refresh query)\&. -.sp -If the first argument is "\-", then the output is returned via the -\fBrndc\fR -response channel and printed to the standard output\&. Otherwise, it is written to the secroots dump file, which defaults to -named\&.secroots, but can be overridden via the -\fBsecroots\-file\fR -option in -named\&.conf\&. -.sp -See also -\fBrndc managed\-keys\fR\&. -.RE -.PP -\fBserve\-stale ( on | off | reset | status ) \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Enable, disable, reset, or report the current status of the serving of stale answers as configured in -named\&.conf\&. -.sp -If serving of stale answers is disabled by -\fBrndc\-serve\-stale off\fR, then it will remain disabled even if -\fBnamed\fR -is reloaded or reconfigured\&. -\fBrndc serve\-stale reset\fR -restores the setting as configured in -named\&.conf\&. -.sp -\fBrndc serve\-stale status\fR -will report whether serving of stale answers is currently enabled, disabled by the configuration, or disabled by -\fBrndc\fR\&. It will also report the values of -\fBstale\-answer\-ttl\fR -and -\fBmax\-stale\-ttl\fR\&. -.RE -.PP -\fBshowzone \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR\fB \fR -.RS 4 -Print the configuration of a running zone\&. -.sp -See also -\fBrndc zonestatus\fR\&. -.RE -.PP -\fBsign \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Fetch all DNSSEC keys for the given zone from the key directory (see the -\fBkey\-directory\fR -option in the BIND 9 Administrator Reference Manual)\&. If they are within their publication period, merge them into the zone\*(Aqs DNSKEY RRset\&. If the DNSKEY RRset is changed, then the zone is automatically re\-signed with the new key set\&. -.sp -This command requires that the zone is configured with a -\fBdnssec\-policy\fR, or that the -\fBauto\-dnssec\fR -zone option be set to -allow -or -maintain, and also requires the zone to be configured to allow dynamic DNS\&. (See "Dynamic Update Policies" in the Administrator Reference Manual for more details\&.) -.sp -See also -\fBrndc loadkeys\fR\&. -.RE -.PP -\fBsigning \fR\fB[( \-list | \-clear \fIkeyid/algorithm\fR | \-clear all | \-nsec3param ( \fIparameters\fR | none ) | \-serial \fIvalue\fR ) ]\fR\fB \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR\fB \fR -.RS 4 -List, edit, or remove the DNSSEC signing state records for the specified zone\&. The status of ongoing DNSSEC operations (such as signing or generating NSEC3 chains) is stored in the zone in the form of DNS resource records of type -\fBsig\-signing\-type\fR\&. -\fBrndc signing \-list\fR -converts these records into a human\-readable form, indicating which keys are currently signing or have finished signing the zone, and which NSEC3 chains are being created or removed\&. -.sp -\fBrndc signing \-clear\fR -can remove a single key (specified in the same format that -\fBrndc signing \-list\fR -uses to display it), or all keys\&. In either case, only completed keys are removed; any record indicating that a key has not yet finished signing the zone will be retained\&. -.sp -\fBrndc signing \-nsec3param\fR -sets the NSEC3 parameters for a zone\&. This is the only supported mechanism for using NSEC3 with -\fBinline\-signing\fR -zones\&. Parameters are specified in the same format as an NSEC3PARAM resource record: hash algorithm, flags, iterations, and salt, in that order\&. -.sp -Currently, the only defined value for hash algorithm is -1, representing SHA\-1\&. The -\fBflags\fR -may be set to -0 -or -1, depending on whether you wish to set the opt\-out bit in the NSEC3 chain\&. -\fBiterations\fR -defines the number of additional times to apply the algorithm when generating an NSEC3 hash\&. The -\fBsalt\fR -is a string of data expressed in hexadecimal, a hyphen (`\-\*(Aq) if no salt is to be used, or the keyword -auto, which causes -\fBnamed\fR -to generate a random 64\-bit salt\&. -.sp -So, for example, to create an NSEC3 chain using the SHA\-1 hash algorithm, no opt\-out flag, 10 iterations, and a salt value of "FFFF", use: -\fBrndc signing \-nsec3param 1 0 10 FFFF \fR\fB\fIzone\fR\fR\&. To set the opt\-out flag, 15 iterations, and no salt, use: -\fBrndc signing \-nsec3param 1 1 15 \- \fR\fB\fIzone\fR\fR\&. -.sp -\fBrndc signing \-nsec3param none\fR -removes an existing NSEC3 chain and replaces it with NSEC\&. -.sp -\fBrndc signing \-serial value\fR -sets the serial number of the zone to value\&. If the value would cause the serial number to go backwards it will be rejected\&. The primary use is to set the serial on inline signed zones\&. -.RE -.PP -\fBstats\fR -.RS 4 -Write server statistics to the statistics file\&. (See the -\fBstatistics\-file\fR -option in the BIND 9 Administrator Reference Manual\&.) -.RE -.PP -\fBstatus\fR -.RS 4 -Display status of the server\&. Note that the number of zones includes the internal -\fBbind/CH\fR -zone and the default -\fB\&./IN\fR -hint zone if there is not an explicit root zone configured\&. -.RE -.PP -\fBstop \fR\fB[\-p]\fR -.RS 4 -Stop the server, making sure any recent changes made through dynamic update or IXFR are first saved to the master files of the updated zones\&. If -\fB\-p\fR -is specified -\fBnamed\fR\*(Aqs process id is returned\&. This allows an external process to determine when -\fBnamed\fR -had completed stopping\&. -.sp -See also -\fBrndc halt\fR\&. -.RE -.PP -\fBsync \fR\fB[\-clean]\fR\fB \fR\fB[\fIzone\fR [\fIclass\fR [\fIview\fR]]]\fR -.RS 4 -Sync changes in the journal file for a dynamic zone to the master file\&. If the "\-clean" option is specified, the journal file is also removed\&. If no zone is specified, then all zones are synced\&. -.RE -.PP -\fBtcp\-timeouts \fR\fB[\fIinitial\fR \fIidle\fR \fIkeepalive\fR \fIadvertised\fR]\fR -.RS 4 -When called without arguments, display the current values of the -\fBtcp\-initial\-timeout\fR, -\fBtcp\-idle\-timeout\fR, -\fBtcp\-keepalive\-timeout\fR -and -\fBtcp\-advertised\-timeout\fR -options\&. When called with arguments, update these values\&. This allows an administrator to make rapid adjustments when under a denial of service attack\&. See the descriptions of these options in the BIND 9 Administrator Reference Manual for details of their use\&. -.RE -.PP -\fBthaw \fR\fB[\fIzone\fR [\fIclass\fR [\fIview\fR]]]\fR -.RS 4 -Enable updates to a frozen dynamic zone\&. If no zone is specified, then all frozen zones are enabled\&. This causes the server to reload the zone from disk, and re\-enables dynamic updates after the load has completed\&. After a zone is thawed, dynamic updates will no longer be refused\&. If the zone has changed and the -\fBixfr\-from\-differences\fR -option is in use, then the journal file will be updated to reflect changes in the zone\&. Otherwise, if the zone has changed, any existing journal file will be removed\&. -.sp -See also -\fBrndc freeze\fR\&. -.RE -.PP -\fBtrace\fR -.RS 4 -Increment the servers debugging level by one\&. -.RE -.PP -\fBtrace \fR\fB\fIlevel\fR\fR -.RS 4 -Sets the server\*(Aqs debugging level to an explicit value\&. -.sp -See also -\fBrndc notrace\fR\&. -.RE -.PP -\fBtsig\-delete\fR \fIkeyname\fR [\fIview\fR] -.RS 4 -Delete a given TKEY\-negotiated key from the server\&. (This does not apply to statically configured TSIG keys\&.) -.RE -.PP -\fBtsig\-list\fR -.RS 4 -List the names of all TSIG keys currently configured for use by -\fBnamed\fR -in each view\&. The list includes both statically configured keys and dynamic TKEY\-negotiated keys\&. -.RE -.PP -\fBvalidation ( on | off | status ) \fR\fB[\fIview \&.\&.\&.\fR]\fR\fB \fR -.RS 4 -Enable, disable, or check the current status of DNSSEC validation\&. By default, validation is enabled\&. The cache is flushed when validation is turned on or off to avoid using data that might differ between states\&. -.RE -.PP -\fBzonestatus \fR\fB\fIzone\fR\fR\fB \fR\fB[\fIclass\fR [\fIview\fR]]\fR -.RS 4 -Displays the current status of the given zone, including the master file name and any include files from which it was loaded, when it was most recently loaded, the current serial number, the number of nodes, whether the zone supports dynamic updates, whether the zone is DNSSEC signed, whether it uses automatic DNSSEC key management or inline signing, and the scheduled refresh or expiry times for the zone\&. -.sp -See also -\fBrndc showzone\fR\&. -.RE -.PP -\fBrndc\fR -commands that specify zone names, such as -\fBreload\fR, -\fBretransfer\fR -or -\fBzonestatus\fR, can be ambiguous when applied to zones of type -\fBredirect\fR\&. Redirect zones are always called "\&.", and can be confused with zones of type -\fBhint\fR -or with slaved copies of the root zone\&. To specify a redirect zone, use the special zone name -\fB\-redirect\fR, without a trailing period\&. (With a trailing period, this would specify a zone called "\-redirect"\&.) -.SH "LIMITATIONS" -.PP -There is currently no way to provide the shared secret for a -\fBkey_id\fR -without using the configuration file\&. -.PP -Several error messages could be clearer\&. -.SH "SEE ALSO" -.PP -\fBrndc.conf\fR(5), -\fBrndc-confgen\fR(8), -\fBnamed\fR(8), -\fBnamed.conf\fR(5), -\fBndc\fR(8), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000, 2001, 2004, 2005, 2007, 2013-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/rndc/rndc.conf.5 b/bin/rndc/rndc.conf.5 deleted file mode 100644 index c60473e862..0000000000 --- a/bin/rndc/rndc.conf.5 +++ /dev/null @@ -1,234 +0,0 @@ -.\" Copyright (C) 2000, 2001, 2004, 2005, 2007, 2013-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: rndc.conf -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2013-03-14 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "RNDC\&.CONF" "5" "2013\-03\-14" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -rndc.conf \- rndc configuration file -.SH "SYNOPSIS" -.HP \w'\fBrndc\&.conf\fR\ 'u -\fBrndc\&.conf\fR -.SH "DESCRIPTION" -.PP -rndc\&.conf -is the configuration file for -\fBrndc\fR, the BIND 9 name server control utility\&. This file has a similar structure and syntax to -named\&.conf\&. Statements are enclosed in braces and terminated with a semi\-colon\&. Clauses in the statements are also semi\-colon terminated\&. The usual comment styles are supported: -.PP -C style: /* */ -.PP -C++ style: // to end of line -.PP -Unix style: # to end of line -.PP -rndc\&.conf -is much simpler than -named\&.conf\&. The file uses three statements: an options statement, a server statement and a key statement\&. -.PP -The -\fBoptions\fR -statement contains five clauses\&. The -\fBdefault\-server\fR -clause is followed by the name or address of a name server\&. This host will be used when no name server is given as an argument to -\fBrndc\fR\&. The -\fBdefault\-key\fR -clause is followed by the name of a key which is identified by a -\fBkey\fR -statement\&. If no -\fBkeyid\fR -is provided on the rndc command line, and no -\fBkey\fR -clause is found in a matching -\fBserver\fR -statement, this default key will be used to authenticate the server\*(Aqs commands and responses\&. The -\fBdefault\-port\fR -clause is followed by the port to connect to on the remote name server\&. If no -\fBport\fR -option is provided on the rndc command line, and no -\fBport\fR -clause is found in a matching -\fBserver\fR -statement, this default port will be used to connect\&. The -\fBdefault\-source\-address\fR -and -\fBdefault\-source\-address\-v6\fR -clauses which can be used to set the IPv4 and IPv6 source addresses respectively\&. -.PP -After the -\fBserver\fR -keyword, the server statement includes a string which is the hostname or address for a name server\&. The statement has three possible clauses: -\fBkey\fR, -\fBport\fR -and -\fBaddresses\fR\&. The key name must match the name of a key statement in the file\&. The port number specifies the port to connect to\&. If an -\fBaddresses\fR -clause is supplied these addresses will be used instead of the server name\&. Each address can take an optional port\&. If an -\fBsource\-address\fR -or -\fBsource\-address\-v6\fR -of supplied then these will be used to specify the IPv4 and IPv6 source addresses respectively\&. -.PP -The -\fBkey\fR -statement begins with an identifying string, the name of the key\&. The statement has two clauses\&. -\fBalgorithm\fR -identifies the authentication algorithm for -\fBrndc\fR -to use; currently only HMAC\-MD5 (for compatibility), HMAC\-SHA1, HMAC\-SHA224, HMAC\-SHA256 (default), HMAC\-SHA384 and HMAC\-SHA512 are supported\&. This is followed by a secret clause which contains the base\-64 encoding of the algorithm\*(Aqs authentication key\&. The base\-64 string is enclosed in double quotes\&. -.PP -There are two common ways to generate the base\-64 string for the secret\&. The BIND 9 program -\fBrndc\-confgen\fR -can be used to generate a random key, or the -\fBmmencode\fR -program, also known as -\fBmimencode\fR, can be used to generate a base\-64 string from known input\&. -\fBmmencode\fR -does not ship with BIND 9 but is available on many systems\&. See the EXAMPLE section for sample command lines for each\&. -.SH "EXAMPLE" -.PP -.if n \{\ -.RS 4 -.\} -.nf - options { - default\-server localhost; - default\-key samplekey; - }; -.fi -.if n \{\ -.RE -.\} -.PP -.if n \{\ -.RS 4 -.\} -.nf - server localhost { - key samplekey; - }; -.fi -.if n \{\ -.RE -.\} -.PP -.if n \{\ -.RS 4 -.\} -.nf - server testserver { - key testkey; - addresses { localhost port 5353; }; - }; -.fi -.if n \{\ -.RE -.\} -.PP -.if n \{\ -.RS 4 -.\} -.nf - key samplekey { - algorithm hmac\-sha256; - secret "6FMfj43Osz4lyb24OIe2iGEz9lf1llJO+lz"; - }; -.fi -.if n \{\ -.RE -.\} -.PP -.if n \{\ -.RS 4 -.\} -.nf - key testkey { - algorithm hmac\-sha256; - secret "R3HI8P6BKw9ZwXwN3VZKuQ=="; - }; -.fi -.if n \{\ -.RE -.\} -.PP -In the above example, -\fBrndc\fR -will by default use the server at localhost (127\&.0\&.0\&.1) and the key called samplekey\&. Commands to the localhost server will use the samplekey key, which must also be defined in the server\*(Aqs configuration file with the same name and secret\&. The key statement indicates that samplekey uses the HMAC\-SHA256 algorithm and its secret clause contains the base\-64 encoding of the HMAC\-SHA256 secret enclosed in double quotes\&. -.PP -If -\fBrndc \-s testserver\fR -is used then -\fBrndc\fR -will connect to server on localhost port 5353 using the key testkey\&. -.PP -To generate a random secret with -\fBrndc\-confgen\fR: -.PP -\fBrndc\-confgen\fR -.PP -A complete -rndc\&.conf -file, including the randomly generated key, will be written to the standard output\&. Commented\-out -\fBkey\fR -and -\fBcontrols\fR -statements for -named\&.conf -are also printed\&. -.PP -To generate a base\-64 secret with -\fBmmencode\fR: -.PP -\fBecho "known plaintext for a secret" | mmencode\fR -.SH "NAME SERVER CONFIGURATION" -.PP -The name server must be configured to accept rndc connections and to recognize the key specified in the -rndc\&.conf -file, using the controls statement in -named\&.conf\&. See the sections on the -\fBcontrols\fR -statement in the BIND 9 Administrator Reference Manual for details\&. -.SH "SEE ALSO" -.PP -\fBrndc\fR(8), -\fBrndc-confgen\fR(8), -\fBmmencode\fR(1), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2000, 2001, 2004, 2005, 2007, 2013-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/rndc/rndc.conf.docbook b/bin/rndc/rndc.conf.docbook deleted file mode 100644 index 91ec9ba77f..0000000000 --- a/bin/rndc/rndc.conf.docbook +++ /dev/null @@ -1,242 +0,0 @@ - - - - - - 2013-03-14 - - - ISC - Internet Systems Consortium, Inc. - - - - rndc.conf - 5 - BIND9 - - - - rndc.conf - rndc configuration file - - - - - 2000 - 2001 - 2004 - 2005 - 2007 - 2013 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - rndc.conf - - - - DESCRIPTION - - rndc.conf is the configuration file - for rndc, the BIND 9 name server control - utility. This file has a similar structure and syntax to - named.conf. Statements are enclosed - in braces and terminated with a semi-colon. Clauses in - the statements are also semi-colon terminated. The usual - comment styles are supported: - - - C style: /* */ - - - C++ style: // to end of line - - - Unix style: # to end of line - - rndc.conf is much simpler than - named.conf. The file uses three - statements: an options statement, a server statement - and a key statement. - - - The statement contains five clauses. - The clause is followed by the - name or address of a name server. This host will be used when - no name server is given as an argument to - rndc. The - clause is followed by the name of a key which is identified by - a statement. If no - is provided on the rndc command line, - and no clause is found in a matching - statement, this default key will be - used to authenticate the server's commands and responses. The - clause is followed by the port - to connect to on the remote name server. If no - option is provided on the rndc command - line, and no clause is found in a - matching statement, this default port - will be used to connect. - The and - clauses which - can be used to set the IPv4 and IPv6 source addresses - respectively. - - - After the keyword, the server - statement includes a string which is the hostname or address - for a name server. The statement has three possible clauses: - , and - . The key name must match the - name of a key statement in the file. The port number - specifies the port to connect to. If an - clause is supplied these addresses will be used instead of - the server name. Each address can take an optional port. - If an or - of supplied then these will be used to specify the IPv4 and IPv6 - source addresses respectively. - - - The statement begins with an identifying - string, the name of the key. The statement has two clauses. - identifies the authentication algorithm - for rndc to use; currently only HMAC-MD5 - (for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 - (default), HMAC-SHA384 and HMAC-SHA512 are - supported. This is followed by a secret clause which contains - the base-64 encoding of the algorithm's authentication key. The - base-64 string is enclosed in double quotes. - - - There are two common ways to generate the base-64 string for the - secret. The BIND 9 program rndc-confgen - can - be used to generate a random key, or the - mmencode program, also known as - mimencode, can be used to generate a - base-64 - string from known input. mmencode does - not - ship with BIND 9 but is available on many systems. See the - EXAMPLE section for sample command lines for each. - - - - EXAMPLE - - - - options { - default-server localhost; - default-key samplekey; - }; - - - - server localhost { - key samplekey; - }; - - - - server testserver { - key testkey; - addresses { localhost port 5353; }; - }; - - - - key samplekey { - algorithm hmac-sha256; - secret "6FMfj43Osz4lyb24OIe2iGEz9lf1llJO+lz"; - }; - - - - key testkey { - algorithm hmac-sha256; - secret "R3HI8P6BKw9ZwXwN3VZKuQ=="; - }; - - - - - In the above example, rndc will by - default use - the server at localhost (127.0.0.1) and the key called samplekey. - Commands to the localhost server will use the samplekey key, which - must also be defined in the server's configuration file with the - same name and secret. The key statement indicates that samplekey - uses the HMAC-SHA256 algorithm and its secret clause contains the - base-64 encoding of the HMAC-SHA256 secret enclosed in double quotes. - - - If rndc -s testserver is used then rndc will - connect to server on localhost port 5353 using the key testkey. - - - To generate a random secret with rndc-confgen: - - rndc-confgen - - - A complete rndc.conf file, including - the - randomly generated key, will be written to the standard - output. Commented-out and - statements for - named.conf are also printed. - - - To generate a base-64 secret with mmencode: - - echo "known plaintext for a secret" | mmencode - - - - NAME SERVER CONFIGURATION - - - The name server must be configured to accept rndc connections and - to recognize the key specified in the rndc.conf - file, using the controls statement in named.conf. - See the sections on the statement in the - BIND 9 Administrator Reference Manual for details. - - - - SEE ALSO - - - rndc8 - , - - rndc-confgen8 - , - - mmencode1 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/rndc/rndc.conf.html b/bin/rndc/rndc.conf.html deleted file mode 100644 index 7dee2d685b..0000000000 --- a/bin/rndc/rndc.conf.html +++ /dev/null @@ -1,234 +0,0 @@ - - - - - -rndc.conf - - -
-
- - - - - -
-

Name

-

- rndc.conf - — rndc configuration file -

-
- - - -
-

Synopsis

-

- rndc.conf -

-
- -
-

DESCRIPTION

- -

rndc.conf is the configuration file - for rndc, the BIND 9 name server control - utility. This file has a similar structure and syntax to - named.conf. Statements are enclosed - in braces and terminated with a semi-colon. Clauses in - the statements are also semi-colon terminated. The usual - comment styles are supported: -

-

- C style: /* */ -

-

- C++ style: // to end of line -

-

- Unix style: # to end of line -

-

rndc.conf is much simpler than - named.conf. The file uses three - statements: an options statement, a server statement - and a key statement. -

-

- The options statement contains five clauses. - The default-server clause is followed by the - name or address of a name server. This host will be used when - no name server is given as an argument to - rndc. The default-key - clause is followed by the name of a key which is identified by - a key statement. If no - keyid is provided on the rndc command line, - and no key clause is found in a matching - server statement, this default key will be - used to authenticate the server's commands and responses. The - default-port clause is followed by the port - to connect to on the remote name server. If no - port option is provided on the rndc command - line, and no port clause is found in a - matching server statement, this default port - will be used to connect. - The default-source-address and - default-source-address-v6 clauses which - can be used to set the IPv4 and IPv6 source addresses - respectively. -

-

- After the server keyword, the server - statement includes a string which is the hostname or address - for a name server. The statement has three possible clauses: - key, port and - addresses. The key name must match the - name of a key statement in the file. The port number - specifies the port to connect to. If an addresses - clause is supplied these addresses will be used instead of - the server name. Each address can take an optional port. - If an source-address or source-address-v6 - of supplied then these will be used to specify the IPv4 and IPv6 - source addresses respectively. -

-

- The key statement begins with an identifying - string, the name of the key. The statement has two clauses. - algorithm identifies the authentication algorithm - for rndc to use; currently only HMAC-MD5 - (for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 - (default), HMAC-SHA384 and HMAC-SHA512 are - supported. This is followed by a secret clause which contains - the base-64 encoding of the algorithm's authentication key. The - base-64 string is enclosed in double quotes. -

-

- There are two common ways to generate the base-64 string for the - secret. The BIND 9 program rndc-confgen - can - be used to generate a random key, or the - mmencode program, also known as - mimencode, can be used to generate a - base-64 - string from known input. mmencode does - not - ship with BIND 9 but is available on many systems. See the - EXAMPLE section for sample command lines for each. -

-
- -
-

EXAMPLE

- - -
-      options {
-        default-server  localhost;
-        default-key     samplekey;
-      };
-
-

-

-
-      server localhost {
-        key             samplekey;
-      };
-
-

-

-
-      server testserver {
-        key		testkey;
-        addresses	{ localhost port 5353; };
-      };
-
-

-

-
-      key samplekey {
-        algorithm       hmac-sha256;
-        secret          "6FMfj43Osz4lyb24OIe2iGEz9lf1llJO+lz";
-      };
-
-

-

-
-      key testkey {
-        algorithm	hmac-sha256;
-        secret		"R3HI8P6BKw9ZwXwN3VZKuQ==";
-      };
-    
-

-

- -

- In the above example, rndc will by - default use - the server at localhost (127.0.0.1) and the key called samplekey. - Commands to the localhost server will use the samplekey key, which - must also be defined in the server's configuration file with the - same name and secret. The key statement indicates that samplekey - uses the HMAC-SHA256 algorithm and its secret clause contains the - base-64 encoding of the HMAC-SHA256 secret enclosed in double quotes. -

-

- If rndc -s testserver is used then rndc will - connect to server on localhost port 5353 using the key testkey. -

-

- To generate a random secret with rndc-confgen: -

-

rndc-confgen -

-

- A complete rndc.conf file, including - the - randomly generated key, will be written to the standard - output. Commented-out key and - controls statements for - named.conf are also printed. -

-

- To generate a base-64 secret with mmencode: -

-

echo "known plaintext for a secret" | mmencode -

-
- -
-

NAME SERVER CONFIGURATION

- -

- The name server must be configured to accept rndc connections and - to recognize the key specified in the rndc.conf - file, using the controls statement in named.conf. - See the sections on the controls statement in the - BIND 9 Administrator Reference Manual for details. -

-
- -
-

SEE ALSO

- -

- rndc(8) - , - - rndc-confgen(8) - , - - mmencode(1) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/rndc/rndc.conf.rst b/bin/rndc/rndc.conf.rst new file mode 100644 index 0000000000..8cbdcd025b --- /dev/null +++ b/bin/rndc/rndc.conf.rst @@ -0,0 +1,165 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_rndc.conf: + +rndc.conf - rndc configuration file + +Synopsis +~~~~~~~~ + +:program:`rndc.conf` + +Description +~~~~~~~~~~~ + +``rndc.conf`` is the configuration file for ``rndc``, the BIND 9 name +server control utility. This file has a similar structure and syntax to +``named.conf``. Statements are enclosed in braces and terminated with a +semi-colon. Clauses in the statements are also semi-colon terminated. +The usual comment styles are supported: + +C style: /\* \*/ + +C++ style: // to end of line + +Unix style: # to end of line + +``rndc.conf`` is much simpler than ``named.conf``. The file uses three +statements: an options statement, a server statement and a key +statement. + +The ``options`` statement contains five clauses. The ``default-server`` +clause is followed by the name or address of a name server. This host +will be used when no name server is given as an argument to ``rndc``. +The ``default-key`` clause is followed by the name of a key which is +identified by a ``key`` statement. If no ``keyid`` is provided on the +rndc command line, and no ``key`` clause is found in a matching +``server`` statement, this default key will be used to authenticate the +server's commands and responses. The ``default-port`` clause is followed +by the port to connect to on the remote name server. If no ``port`` +option is provided on the rndc command line, and no ``port`` clause is +found in a matching ``server`` statement, this default port will be used +to connect. The ``default-source-address`` and +``default-source-address-v6`` clauses which can be used to set the IPv4 +and IPv6 source addresses respectively. + +After the ``server`` keyword, the server statement includes a string +which is the hostname or address for a name server. The statement has +three possible clauses: ``key``, ``port`` and ``addresses``. The key +name must match the name of a key statement in the file. The port number +specifies the port to connect to. If an ``addresses`` clause is supplied +these addresses will be used instead of the server name. Each address +can take an optional port. If an ``source-address`` or +``source-address-v6`` of supplied then these will be used to specify the +IPv4 and IPv6 source addresses respectively. + +The ``key`` statement begins with an identifying string, the name of the +key. The statement has two clauses. ``algorithm`` identifies the +authentication algorithm for ``rndc`` to use; currently only HMAC-MD5 +(for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 (default), +HMAC-SHA384 and HMAC-SHA512 are supported. This is followed by a secret +clause which contains the base-64 encoding of the algorithm's +authentication key. The base-64 string is enclosed in double quotes. + +There are two common ways to generate the base-64 string for the secret. +The BIND 9 program ``rndc-confgen`` can be used to generate a random +key, or the ``mmencode`` program, also known as ``mimencode``, can be +used to generate a base-64 string from known input. ``mmencode`` does +not ship with BIND 9 but is available on many systems. See the EXAMPLE +section for sample command lines for each. + +Example +~~~~~~~ + +:: + + options { + default-server localhost; + default-key samplekey; + }; + +:: + + server localhost { + key samplekey; + }; + +:: + + server testserver { + key testkey; + addresses { localhost port 5353; }; + }; + +:: + + key samplekey { + algorithm hmac-sha256; + secret "6FMfj43Osz4lyb24OIe2iGEz9lf1llJO+lz"; + }; + +:: + + key testkey { + algorithm hmac-sha256; + secret "R3HI8P6BKw9ZwXwN3VZKuQ=="; + }; + + +In the above example, ``rndc`` will by default use the server at +localhost (127.0.0.1) and the key called samplekey. Commands to the +localhost server will use the samplekey key, which must also be defined +in the server's configuration file with the same name and secret. The +key statement indicates that samplekey uses the HMAC-SHA256 algorithm +and its secret clause contains the base-64 encoding of the HMAC-SHA256 +secret enclosed in double quotes. + +If ``rndc -s testserver`` is used then ``rndc`` will connect to server +on localhost port 5353 using the key testkey. + +To generate a random secret with ``rndc-confgen``: + +``rndc-confgen`` + +A complete ``rndc.conf`` file, including the randomly generated key, +will be written to the standard output. Commented-out ``key`` and +``controls`` statements for ``named.conf`` are also printed. + +To generate a base-64 secret with ``mmencode``: + +``echo "known plaintext for a secret" | mmencode`` + +Name Server Configuration +~~~~~~~~~~~~~~~~~~~~~~~~~ + +The name server must be configured to accept rndc connections and to +recognize the key specified in the ``rndc.conf`` file, using the +controls statement in ``named.conf``. See the sections on the +``controls`` statement in the BIND 9 Administrator Reference Manual for +details. + +See Also +~~~~~~~~ + +:manpage:`rndc(8)`, :manpage:`rndc-confgen(8)`, :manpage:`mmencode(1)`, BIND 9 Administrator Reference Manual. diff --git a/bin/rndc/rndc.docbook b/bin/rndc/rndc.docbook deleted file mode 100644 index d7b22b6f95..0000000000 --- a/bin/rndc/rndc.docbook +++ /dev/null @@ -1,1158 +0,0 @@ - - - - - - 2014-08-15 - - - ISC - Internet Systems Consortium, Inc. - - - - rndc - 8 - BIND9 - - - - rndc - name server control utility - - - - - 2000 - 2001 - 2004 - 2005 - 2007 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - rndc - - - - - - - - - - - - - - command - - - - DESCRIPTION - - rndc - controls the operation of a name - server. It supersedes the ndc utility - that was provided in old BIND releases. If - rndc is invoked with no command line - options or arguments, it prints a short summary of the - supported commands and the available options and their - arguments. - - rndc - communicates with the name server over a TCP connection, sending - commands authenticated with digital signatures. In the current - versions of - rndc and named, - the only supported authentication algorithms are HMAC-MD5 - (for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 - (default), HMAC-SHA384 and HMAC-SHA512. - They use a shared secret on each end of the connection. - This provides TSIG-style authentication for the command - request and the name server's response. All commands sent - over the channel must be signed by a key_id known to the - server. - - rndc - reads a configuration file to - determine how to contact the name server and decide what - algorithm and key it should use. - - - - OPTIONS - - - - - -4 - - - Use IPv4 only. - - - - - - -6 - - - Use IPv6 only. - - - - - - -b source-address - - - Use source-address - as the source address for the connection to the server. - Multiple instances are permitted to allow setting of both - the IPv4 and IPv6 source addresses. - - - - - - -c config-file - - - Use config-file - as the configuration file instead of the default, - /etc/rndc.conf. - - - - - - -k key-file - - - Use key-file - as the key file instead of the default, - /etc/rndc.key. The key in - /etc/rndc.key will be used to - authenticate - commands sent to the server if the config-file - does not exist. - - - - - - -s server - - server is - the name or address of the server which matches a - server statement in the configuration file for - rndc. If no server is supplied on the - command line, the host named by the default-server clause - in the options statement of the rndc - configuration file will be used. - - - - - - -p port - - - Send commands to TCP port - port - instead - of BIND 9's default control channel port, 953. - - - - - - -q - - - Quiet mode: Message text returned by the server - will not be printed except when there is an error. - - - - - - -r - - - Instructs rndc to print the result code - returned by named after executing the - requested command (e.g., ISC_R_SUCCESS, ISC_R_FAILURE, etc). - - - - - - -V - - - Enable verbose logging. - - - - - - -y key_id - - - Use the key key_id - from the configuration file. - key_id - must be - known by named with the same algorithm and secret string - in order for control message validation to succeed. - If no key_id - is specified, rndc will first look - for a key clause in the server statement of the server - being used, or if no server statement is present for that - host, then the default-key clause of the options statement. - Note that the configuration file contains shared secrets - which are used to send authenticated control commands - to name servers. It should therefore not have general read - or write access. - - - - - - - - COMMANDS - - - A list of commands supported by rndc can - be seen by running rndc without arguments. - - - Currently supported commands are: - - - - - - addzone zone class view configuration - - - Add a zone while the server is running. This - command requires the - allow-new-zones option to be set - to yes. The - configuration string - specified on the command line is the zone - configuration text that would ordinarily be - placed in named.conf. - - - The configuration is saved in a file called - viewname.nzf - (or, if named is compiled with - liblmdb, an LMDB database file called - viewname.nzd). - viewname is the - name of the view, unless the view name contains characters - that are incompatible with use as a file name, in which case - a cryptographic hash of the view name is used instead. - When named is - restarted, the file will be loaded into the view - configuration, so that zones that were added - can persist after a restart. - - - This sample addzone command - would add the zone example.com - to the default view: - - -$ rndc addzone example.com '{ type master; file "example.com.db"; };' - - - (Note the brackets and semi-colon around the zone - configuration text.) - - - See also rndc delzone and rndc modzone. - - - - - - delzone -clean zone class view - - - Delete a zone while the server is running. - - - If the argument is specified, - the zone's master file (and journal file, if any) - will be deleted along with the zone. Without the - option, zone files must - be cleaned up by hand. (If the zone is of - type "slave" or "stub", the files needing to - be cleaned up will be reported in the output - of the rndc delzone command.) - - - If the zone was originally added via - rndc addzone, then it will be - removed permanently. However, if it was originally - configured in named.conf, then - that original configuration is still in place; when - the server is restarted or reconfigured, the zone will - come back. To remove it permanently, it must also be - removed from named.conf - - - See also rndc addzone and rndc modzone. - - - - - - dnstap ( -reopen | -roll number ) - - - Close and re-open DNSTAP output files. - rndc dnstap -reopen allows the output - file to be renamed externally, so - that named can truncate and re-open it. - rndc dnstap -roll causes the output file - to be rolled automatically, similar to log files; the most - recent output file has ".0" appended to its name; the - previous most recent output file is moved to ".1", and so on. - If number is specified, then the - number of backup log files is limited to that number. - - - - - - dumpdb -all|-cache|-zones|-adb|-bad|-fail view ... - - - Dump the server's caches (default) and/or zones to - the dump file for the specified views. If no view - is specified, all views are dumped. - (See the dump-file option in - the BIND 9 Administrator Reference Manual.) - - - - - - flush - - - Flushes the server's cache. - - - - - - flushname name view - - - Flushes the given name from the view's DNS cache - and, if applicable, from the view's nameserver address - database, bad server cache and SERVFAIL cache. - - - - - - flushtree name view - - - Flushes the given name, and all of its subdomains, - from the view's DNS cache, address database, - bad server cache, and SERVFAIL cache. - - - - - - freeze zone class view - - - Suspend updates to a dynamic zone. If no zone is - specified, then all zones are suspended. This allows - manual edits to be made to a zone normally updated by - dynamic update. It also causes changes in the - journal file to be synced into the master file. - All dynamic update attempts will be refused while - the zone is frozen. - - - See also rndc thaw. - - - - - - halt -p - - - Stop the server immediately. Recent changes - made through dynamic update or IXFR are not saved to - the master files, but will be rolled forward from the - journal files when the server is restarted. - If is specified named's process id is returned. - This allows an external process to determine when named - had completed halting. - - - See also rndc stop. - - - - - - loadkeys zone class view - - - Fetch all DNSSEC keys for the given zone - from the key directory. If they are within - their publication period, merge them into the - zone's DNSKEY RRset. Unlike rndc - sign, however, the zone is not - immediately re-signed by the new keys, but is - allowed to incrementally re-sign over time. - - - This command requires that the zone is configured with a - dnssec-policy, or that the - auto-dnssec zone option - be set to maintain, - and also requires the zone to be configured to - allow dynamic DNS. - (See "Dynamic Update Policies" in the Administrator - Reference Manual for more details.) - - - - - - managed-keys (status | refresh | sync | destroy) class view - - - Inspect and control the "managed keys" database which - handles RFC 5011 DNSSEC trust anchor maintenance. If a view - is specified, these commands are applied to that view; - otherwise they are applied to all views. - - - - - When run with the status keyword, prints - the current status of the managed keys database. - - - - - When run with the refresh keyword, - forces an immediate refresh query to be sent for all - the managed keys, updating the managed keys database - if any new keys are found, without waiting the normal - refresh interval. - - - - - When run with the sync keyword, forces an - immediate dump of the managed keys database to disk - (in the file managed-keys.bind or - (viewname.mkeys). - This synchronizes the database with its journal file, so - that the database's current contents can be inspected - visually. - - - - - When run with the destroy keyword, the - managed keys database is shut down and deleted, and all key - maintenance is terminated. This command should be used only - with extreme caution. - - - Existing keys that are already trusted are not deleted - from memory; DNSSEC validation can continue after this - command is used. However, key maintenance operations will - cease until named is restarted or - reconfigured, and all existing key maintenance state - will be deleted. - - - Running rndc reconfig or restarting - named immediately after this command - will cause key maintenance to be reinitialized from scratch, - just as if the server were being started for the first time. - This is primarily intended for testing, but it may also be - used, for example, to jumpstart the acquisition of new keys - in the event of a trust anchor rollover, or as a - brute-force repair for key maintenance problems. - - - - - - - - modzone zone class view configuration - - - Modify the configuration of a zone while the server - is running. This command requires the - allow-new-zones option to be - set to yes. As with - addzone, the - configuration string - specified on the command line is the zone - configuration text that would ordinarily be - placed in named.conf. - - - If the zone was originally added via - rndc addzone, the configuration - changes will be recorded permanently and will still be - in effect after the server is restarted or reconfigured. - However, if it was originally configured in - named.conf, then that original - configuration is still in place; when the server is - restarted or reconfigured, the zone will revert to - its original configuration. To make the changes - permanent, it must also be modified in - named.conf - - - See also rndc addzone and rndc delzone. - - - - - - notify zone class view - - - Resend NOTIFY messages for the zone. - - - - - - notrace - - - Sets the server's debugging level to 0. - - - See also rndc trace. - - - - - - nta - ( -class class | -dump | -force | -remove | -lifetime duration) - domain - view - - - - Sets a DNSSEC negative trust anchor (NTA) - for , with a lifetime of - . The default lifetime is - configured in named.conf via the - option, and defaults to - one hour. The lifetime cannot exceed one week. - - - A negative trust anchor selectively disables - DNSSEC validation for zones that are known to be - failing because of misconfiguration rather than - an attack. When data to be validated is - at or below an active NTA (and above any other - configured trust anchors), named will - abort the DNSSEC validation process and treat the data as - insecure rather than bogus. This continues until the - NTA's lifetime is elapsed. - - - NTAs persist across restarts of the named server. - The NTAs for a view are saved in a file called - name.nta, - where name is the - name of the view, or if it contains characters - that are incompatible with use as a file name, a - cryptographic hash generated from the name - of the view. - - - An existing NTA can be removed by using the - option. - - - An NTA's lifetime can be specified with the - option. TTL-style - suffixes can be used to specify the lifetime in - seconds, minutes, or hours. If the specified NTA - already exists, its lifetime will be updated to the - new value. Setting to zero - is equivalent to . - - - If the is used, any other arguments - are ignored, and a list of existing NTAs is printed - (note that this may include NTAs that are expired but - have not yet been cleaned up). - - - Normally, named will periodically - test to see whether data below an NTA can now be - validated (see the option - in the Administrator Reference Manual for details). - If data can be validated, then the NTA is regarded as - no longer necessary, and will be allowed to expire - early. The overrides this - behavior and forces an NTA to persist for its entire - lifetime, regardless of whether data could be - validated if the NTA were not present. - - - The view class can be specified with . - The default is class IN, which is - the only class for which DNSSEC is currently supported. - - - All of these options can be shortened, i.e., to - , , , - , and . - - - Unrecognized options are treated as errors. To reference - a domain or view name that begins with a hyphen, - use a double-hyphen on the command line to indicate the - end of options. - - - - - - querylog on | off - - - Enable or disable query logging. (For backward - compatibility, this command can also be used without - an argument to toggle query logging on and off.) - - - Query logging can also be enabled - by explicitly directing the queries - category to a - channel in the - logging section of - named.conf or by specifying - querylog yes; in the - options section of - named.conf. - - - - - - reconfig - - - Reload the configuration file and load new zones, - but do not reload existing zone files even if they - have changed. - This is faster than a full reload when there - is a large number of zones because it avoids the need - to examine the - modification times of the zones files. - - - - - - recursing - - - Dump the list of queries named is currently - recursing on, and the list of domains to which iterative - queries are currently being sent. (The second list includes - the number of fetches currently active for the given domain, - and how many have been passed or dropped because of the - option.) - - - - - - refresh zone class view - - - Schedule zone maintenance for the given zone. - - - - - - reload - - - Reload configuration file and zones. - - - - - - reload zone class view - - - Reload the given zone. - - - - - - retransfer zone class view - - - Retransfer the given slave zone from the master server. - - - If the zone is configured to use - inline-signing, the signed - version of the zone is discarded; after the - retransfer of the unsigned version is complete, the - signed version will be regenerated with all new - signatures. - - - - - - scan - - - Scan the list of available network interfaces - for changes, without performing a full - reconfig or waiting for the - interface-interval timer. - - - - - - secroots - view ... - - - Dump the security roots (i.e., trust anchors - configured via trust-anchors statements, or the - managed-keys or trusted-keys statements (both deprecated), or - via dnssec-validation auto) and negative trust - anchors for the specified views. If no view is specified, all - views are dumped. Security roots will indicate whether - they are configured as trusted keys, managed keys, or - initializing managed keys (managed keys that have not yet - been updated by a successful key refresh query). - - - If the first argument is "-", then the output is - returned via the rndc response channel - and printed to the standard output. - Otherwise, it is written to the secroots dump file, which - defaults to named.secroots, but can be - overridden via the option in - named.conf. - - - See also rndc managed-keys. - - - - - - serve-stale ( on | off | reset | status ) class view - - - Enable, disable, reset, or report the current status - of the serving of stale answers as configured in - named.conf. - - - If serving of stale answers is disabled by - rndc-serve-stale off, then it - will remain disabled even if named - is reloaded or reconfigured. - rndc serve-stale reset restores - the setting as configured in named.conf. - - - rndc serve-stale status will report - whether serving of stale answers is currently enabled, - disabled by the configuration, or disabled by - rndc. It will also report the - values of stale-answer-ttl and - max-stale-ttl. - - - - - - showzone zone class view - - - Print the configuration of a running zone. - - - See also rndc zonestatus. - - - - - - sign zone class view - - - Fetch all DNSSEC keys for the given zone - from the key directory (see the - key-directory option in - the BIND 9 Administrator Reference Manual). If they are within - their publication period, merge them into the - zone's DNSKEY RRset. If the DNSKEY RRset - is changed, then the zone is automatically - re-signed with the new key set. - - - This command requires that the zone is configured with a - dnssec-policy, or that the - auto-dnssec zone option be set - to allow or - maintain, - and also requires the zone to be configured to - allow dynamic DNS. - (See "Dynamic Update Policies" in the Administrator - Reference Manual for more details.) - - - See also rndc loadkeys. - - - - - - signing ( -list | -clear keyid/algorithm | -clear all | -nsec3param ( parameters | none ) | -serial value ) zone class view - - - List, edit, or remove the DNSSEC signing state records - for the specified zone. The status of ongoing DNSSEC - operations (such as signing or generating - NSEC3 chains) is stored in the zone in the form - of DNS resource records of type - sig-signing-type. - rndc signing -list converts - these records into a human-readable form, - indicating which keys are currently signing - or have finished signing the zone, and which NSEC3 - chains are being created or removed. - - - rndc signing -clear can remove - a single key (specified in the same format that - rndc signing -list uses to - display it), or all keys. In either case, only - completed keys are removed; any record indicating - that a key has not yet finished signing the zone - will be retained. - - - rndc signing -nsec3param sets - the NSEC3 parameters for a zone. This is the - only supported mechanism for using NSEC3 with - inline-signing zones. - Parameters are specified in the same format as - an NSEC3PARAM resource record: hash algorithm, - flags, iterations, and salt, in that order. - - - Currently, the only defined value for hash algorithm - is 1, representing SHA-1. - The may be set to - 0 or 1, - depending on whether you wish to set the opt-out - bit in the NSEC3 chain. - defines the number of additional times to apply - the algorithm when generating an NSEC3 hash. The - is a string of data expressed - in hexadecimal, a hyphen (`-') if no salt is - to be used, or the keyword auto, - which causes named to generate a - random 64-bit salt. - - - So, for example, to create an NSEC3 chain using - the SHA-1 hash algorithm, no opt-out flag, - 10 iterations, and a salt value of "FFFF", use: - rndc signing -nsec3param 1 0 10 FFFF zone. - To set the opt-out flag, 15 iterations, and no - salt, use: - rndc signing -nsec3param 1 1 15 - zone. - - - rndc signing -nsec3param none - removes an existing NSEC3 chain and replaces it - with NSEC. - - - rndc signing -serial value sets - the serial number of the zone to value. If the value - would cause the serial number to go backwards it will - be rejected. The primary use is to set the serial on - inline signed zones. - - - - - - stats - - - Write server statistics to the statistics file. - (See the statistics-file option in - the BIND 9 Administrator Reference Manual.) - - - - - - status - - - Display status of the server. - Note that the number of zones includes the internal bind/CH zone - and the default ./IN - hint zone if there is not an - explicit root zone configured. - - - - - - stop -p - - - Stop the server, making sure any recent changes - made through dynamic update or IXFR are first saved to - the master files of the updated zones. - If is specified named's process id is returned. - This allows an external process to determine when named - had completed stopping. - - See also rndc halt. - - - - - sync -clean zone class view - - - Sync changes in the journal file for a dynamic zone - to the master file. If the "-clean" option is - specified, the journal file is also removed. If - no zone is specified, then all zones are synced. - - - - - - tcp-timeouts initial idle keepalive advertised - - - When called without arguments, display the current - values of the tcp-initial-timeout, - tcp-idle-timeout, - tcp-keepalive-timeout and - tcp-advertised-timeout options. - When called with arguments, update these values. This - allows an administrator to make rapid adjustments when - under a denial of service attack. See the descriptions of - these options in the BIND 9 Administrator Reference Manual - for details of their use. - - - - - - thaw zone class view - - - Enable updates to a frozen dynamic zone. If no - zone is specified, then all frozen zones are - enabled. This causes the server to reload the zone - from disk, and re-enables dynamic updates after the - load has completed. After a zone is thawed, - dynamic updates will no longer be refused. If - the zone has changed and the - ixfr-from-differences option is - in use, then the journal file will be updated to - reflect changes in the zone. Otherwise, if the - zone has changed, any existing journal file will be - removed. - - See also rndc freeze. - - - - - trace - - - Increment the servers debugging level by one. - - - - - - trace level - - - Sets the server's debugging level to an explicit - value. - - - See also rndc notrace. - - - - - - tsig-delete keyname view - - - Delete a given TKEY-negotiated key from the server. - (This does not apply to statically configured TSIG - keys.) - - - - - - tsig-list - - - List the names of all TSIG keys currently configured - for use by named in each view. The - list includes both statically configured keys and dynamic - TKEY-negotiated keys. - - - - - - validation ( on | off | status ) view ... - - - Enable, disable, or check the current status of - DNSSEC validation. By default, validation is enabled. - The cache is flushed when validation is turned on or off - to avoid using data that might differ between states. - - - - - - zonestatus zone class view - - - Displays the current status of the given zone, - including the master file name and any include - files from which it was loaded, when it was most - recently loaded, the current serial number, the - number of nodes, whether the zone supports - dynamic updates, whether the zone is DNSSEC - signed, whether it uses automatic DNSSEC key - management or inline signing, and the scheduled - refresh or expiry times for the zone. - - - See also rndc showzone. - - - - - - - - rndc commands that specify zone names, - such as reload, retransfer - or zonestatus, can be ambiguous when applied - to zones of type . Redirect zones are - always called ".", and can be confused with zones of type - or with slaved copies of the root zone. - To specify a redirect zone, use the special zone name - -redirect, without a trailing period. - (With a trailing period, this would specify a zone called - "-redirect".) - - - - LIMITATIONS - - - There is currently no way to provide the shared secret for a - without using the configuration file. - - - Several error messages could be clearer. - - - - SEE ALSO - - - rndc.conf5 - , - - rndc-confgen8 - , - - named8 - , - - named.conf5 - , - - ndc8 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/rndc/rndc.html b/bin/rndc/rndc.html deleted file mode 100644 index 7a80ff9ca9..0000000000 --- a/bin/rndc/rndc.html +++ /dev/null @@ -1,991 +0,0 @@ - - - - - -rndc - - -
-
- - - - - -
-

Name

-

- rndc - — name server control utility -

-
- - - -
-

Synopsis

-

- rndc - [-b source-address] - [-c config-file] - [-k key-file] - [-s server] - [-p port] - [-q] - [-r] - [-V] - [-y key_id] - [ - [-4] - | [-6] - ] - {command} -

-
- -
-

DESCRIPTION

- -

rndc - controls the operation of a name - server. It supersedes the ndc utility - that was provided in old BIND releases. If - rndc is invoked with no command line - options or arguments, it prints a short summary of the - supported commands and the available options and their - arguments. -

-

rndc - communicates with the name server over a TCP connection, sending - commands authenticated with digital signatures. In the current - versions of - rndc and named, - the only supported authentication algorithms are HMAC-MD5 - (for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 - (default), HMAC-SHA384 and HMAC-SHA512. - They use a shared secret on each end of the connection. - This provides TSIG-style authentication for the command - request and the name server's response. All commands sent - over the channel must be signed by a key_id known to the - server. -

-

rndc - reads a configuration file to - determine how to contact the name server and decide what - algorithm and key it should use. -

-
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only. -

-
-
-6
-
-

- Use IPv6 only. -

-
-
-b source-address
-
-

- Use source-address - as the source address for the connection to the server. - Multiple instances are permitted to allow setting of both - the IPv4 and IPv6 source addresses. -

-
-
-c config-file
-
-

- Use config-file - as the configuration file instead of the default, - /etc/rndc.conf. -

-
-
-k key-file
-
-

- Use key-file - as the key file instead of the default, - /etc/rndc.key. The key in - /etc/rndc.key will be used to - authenticate - commands sent to the server if the config-file - does not exist. -

-
-
-s server
-
-

server is - the name or address of the server which matches a - server statement in the configuration file for - rndc. If no server is supplied on the - command line, the host named by the default-server clause - in the options statement of the rndc - configuration file will be used. -

-
-
-p port
-
-

- Send commands to TCP port - port - instead - of BIND 9's default control channel port, 953. -

-
-
-q
-
-

- Quiet mode: Message text returned by the server - will not be printed except when there is an error. -

-
-
-r
-
-

- Instructs rndc to print the result code - returned by named after executing the - requested command (e.g., ISC_R_SUCCESS, ISC_R_FAILURE, etc). -

-
-
-V
-
-

- Enable verbose logging. -

-
-
-y key_id
-
-

- Use the key key_id - from the configuration file. - key_id - must be - known by named with the same algorithm and secret string - in order for control message validation to succeed. - If no key_id - is specified, rndc will first look - for a key clause in the server statement of the server - being used, or if no server statement is present for that - host, then the default-key clause of the options statement. - Note that the configuration file contains shared secrets - which are used to send authenticated control commands - to name servers. It should therefore not have general read - or write access. -

-
-
-
- -
-

COMMANDS

- -

- A list of commands supported by rndc can - be seen by running rndc without arguments. -

-

- Currently supported commands are: -

- -
-
addzone zone [class [view]] configuration
-
-

- Add a zone while the server is running. This - command requires the - allow-new-zones option to be set - to yes. The - configuration string - specified on the command line is the zone - configuration text that would ordinarily be - placed in named.conf. -

-

- The configuration is saved in a file called - viewname.nzf - (or, if named is compiled with - liblmdb, an LMDB database file called - viewname.nzd). - viewname is the - name of the view, unless the view name contains characters - that are incompatible with use as a file name, in which case - a cryptographic hash of the view name is used instead. - When named is - restarted, the file will be loaded into the view - configuration, so that zones that were added - can persist after a restart. -

-

- This sample addzone command - would add the zone example.com - to the default view: -

-

-$ rndc addzone example.com '{ type master; file "example.com.db"; };' -

-

- (Note the brackets and semi-colon around the zone - configuration text.) -

-

- See also rndc delzone and rndc modzone. -

-
-
delzone [-clean] zone [class [view]]
-
-

- Delete a zone while the server is running. -

-

- If the -clean argument is specified, - the zone's master file (and journal file, if any) - will be deleted along with the zone. Without the - -clean option, zone files must - be cleaned up by hand. (If the zone is of - type "slave" or "stub", the files needing to - be cleaned up will be reported in the output - of the rndc delzone command.) -

-

- If the zone was originally added via - rndc addzone, then it will be - removed permanently. However, if it was originally - configured in named.conf, then - that original configuration is still in place; when - the server is restarted or reconfigured, the zone will - come back. To remove it permanently, it must also be - removed from named.conf -

-

- See also rndc addzone and rndc modzone. -

-
-
dnstap ( -reopen | -roll [number] )
-
-

- Close and re-open DNSTAP output files. - rndc dnstap -reopen allows the output - file to be renamed externally, so - that named can truncate and re-open it. - rndc dnstap -roll causes the output file - to be rolled automatically, similar to log files; the most - recent output file has ".0" appended to its name; the - previous most recent output file is moved to ".1", and so on. - If number is specified, then the - number of backup log files is limited to that number. -

-
-
dumpdb [-all|-cache|-zones|-adb|-bad|-fail] [view ...]
-
-

- Dump the server's caches (default) and/or zones to - the dump file for the specified views. If no view - is specified, all views are dumped. - (See the dump-file option in - the BIND 9 Administrator Reference Manual.) -

-
-
flush
-
-

- Flushes the server's cache. -

-
-
flushname name [view]
-
-

- Flushes the given name from the view's DNS cache - and, if applicable, from the view's nameserver address - database, bad server cache and SERVFAIL cache. -

-
-
flushtree name [view]
-
-

- Flushes the given name, and all of its subdomains, - from the view's DNS cache, address database, - bad server cache, and SERVFAIL cache. -

-
-
freeze [zone [class [view]]]
-
-

- Suspend updates to a dynamic zone. If no zone is - specified, then all zones are suspended. This allows - manual edits to be made to a zone normally updated by - dynamic update. It also causes changes in the - journal file to be synced into the master file. - All dynamic update attempts will be refused while - the zone is frozen. -

-

- See also rndc thaw. -

-
-
halt [-p]
-
-

- Stop the server immediately. Recent changes - made through dynamic update or IXFR are not saved to - the master files, but will be rolled forward from the - journal files when the server is restarted. - If -p is specified named's process id is returned. - This allows an external process to determine when named - had completed halting. -

-

- See also rndc stop. -

-
-
loadkeys zone [class [view]]
-
-

- Fetch all DNSSEC keys for the given zone - from the key directory. If they are within - their publication period, merge them into the - zone's DNSKEY RRset. Unlike rndc - sign, however, the zone is not - immediately re-signed by the new keys, but is - allowed to incrementally re-sign over time. -

-

- This command requires that the zone is configured with a - dnssec-policy, or that the - auto-dnssec zone option - be set to maintain, - and also requires the zone to be configured to - allow dynamic DNS. - (See "Dynamic Update Policies" in the Administrator - Reference Manual for more details.) -

-
-
managed-keys (status | refresh | sync | destroy) [class [view]]
-
-

- Inspect and control the "managed keys" database which - handles RFC 5011 DNSSEC trust anchor maintenance. If a view - is specified, these commands are applied to that view; - otherwise they are applied to all views. -

-
    -
  • -

    - When run with the status keyword, prints - the current status of the managed keys database. -

    -
  • -
  • -

    - When run with the refresh keyword, - forces an immediate refresh query to be sent for all - the managed keys, updating the managed keys database - if any new keys are found, without waiting the normal - refresh interval. -

    -
  • -
  • -

    - When run with the sync keyword, forces an - immediate dump of the managed keys database to disk - (in the file managed-keys.bind or - (viewname.mkeys). - This synchronizes the database with its journal file, so - that the database's current contents can be inspected - visually. -

    -
  • -
  • -

    - When run with the destroy keyword, the - managed keys database is shut down and deleted, and all key - maintenance is terminated. This command should be used only - with extreme caution. -

    -

    - Existing keys that are already trusted are not deleted - from memory; DNSSEC validation can continue after this - command is used. However, key maintenance operations will - cease until named is restarted or - reconfigured, and all existing key maintenance state - will be deleted. -

    -

    - Running rndc reconfig or restarting - named immediately after this command - will cause key maintenance to be reinitialized from scratch, - just as if the server were being started for the first time. - This is primarily intended for testing, but it may also be - used, for example, to jumpstart the acquisition of new keys - in the event of a trust anchor rollover, or as a - brute-force repair for key maintenance problems. -

    -
  • -
-
-
modzone zone [class [view]] configuration
-
-

- Modify the configuration of a zone while the server - is running. This command requires the - allow-new-zones option to be - set to yes. As with - addzone, the - configuration string - specified on the command line is the zone - configuration text that would ordinarily be - placed in named.conf. -

-

- If the zone was originally added via - rndc addzone, the configuration - changes will be recorded permanently and will still be - in effect after the server is restarted or reconfigured. - However, if it was originally configured in - named.conf, then that original - configuration is still in place; when the server is - restarted or reconfigured, the zone will revert to - its original configuration. To make the changes - permanent, it must also be modified in - named.conf -

-

- See also rndc addzone and rndc delzone. -

-
-
notify zone [class [view]]
-
-

- Resend NOTIFY messages for the zone. -

-
-
notrace
-
-

- Sets the server's debugging level to 0. -

-

- See also rndc trace. -

-
-
nta - [( -class class | -dump | -force | -remove | -lifetime duration)] - domain - [view] -
-
-

- Sets a DNSSEC negative trust anchor (NTA) - for domain, with a lifetime of - duration. The default lifetime is - configured in named.conf via the - nta-lifetime option, and defaults to - one hour. The lifetime cannot exceed one week. -

-

- A negative trust anchor selectively disables - DNSSEC validation for zones that are known to be - failing because of misconfiguration rather than - an attack. When data to be validated is - at or below an active NTA (and above any other - configured trust anchors), named will - abort the DNSSEC validation process and treat the data as - insecure rather than bogus. This continues until the - NTA's lifetime is elapsed. -

-

- NTAs persist across restarts of the named server. - The NTAs for a view are saved in a file called - name.nta, - where name is the - name of the view, or if it contains characters - that are incompatible with use as a file name, a - cryptographic hash generated from the name - of the view. -

-

- An existing NTA can be removed by using the - -remove option. -

-

- An NTA's lifetime can be specified with the - -lifetime option. TTL-style - suffixes can be used to specify the lifetime in - seconds, minutes, or hours. If the specified NTA - already exists, its lifetime will be updated to the - new value. Setting lifetime to zero - is equivalent to -remove. -

-

- If the -dump is used, any other arguments - are ignored, and a list of existing NTAs is printed - (note that this may include NTAs that are expired but - have not yet been cleaned up). -

-

- Normally, named will periodically - test to see whether data below an NTA can now be - validated (see the nta-recheck option - in the Administrator Reference Manual for details). - If data can be validated, then the NTA is regarded as - no longer necessary, and will be allowed to expire - early. The -force overrides this - behavior and forces an NTA to persist for its entire - lifetime, regardless of whether data could be - validated if the NTA were not present. -

-

- The view class can be specified with -class. - The default is class IN, which is - the only class for which DNSSEC is currently supported. -

-

- All of these options can be shortened, i.e., to - -l, -r, -d, - -f, and -c. -

-

- Unrecognized options are treated as errors. To reference - a domain or view name that begins with a hyphen, - use a double-hyphen on the command line to indicate the - end of options. -

-
-
querylog [ on | off ]
-
-

- Enable or disable query logging. (For backward - compatibility, this command can also be used without - an argument to toggle query logging on and off.) -

-

- Query logging can also be enabled - by explicitly directing the queries - category to a - channel in the - logging section of - named.conf or by specifying - querylog yes; in the - options section of - named.conf. -

-
-
reconfig
-
-

- Reload the configuration file and load new zones, - but do not reload existing zone files even if they - have changed. - This is faster than a full reload when there - is a large number of zones because it avoids the need - to examine the - modification times of the zones files. -

-
-
recursing
-
-

- Dump the list of queries named is currently - recursing on, and the list of domains to which iterative - queries are currently being sent. (The second list includes - the number of fetches currently active for the given domain, - and how many have been passed or dropped because of the - fetches-per-zone option.) -

-
-
refresh zone [class [view]]
-
-

- Schedule zone maintenance for the given zone. -

-
-
reload
-
-

- Reload configuration file and zones. -

-
-
reload zone [class [view]]
-
-

- Reload the given zone. -

-
-
retransfer zone [class [view]]
-
-

- Retransfer the given slave zone from the master server. -

-

- If the zone is configured to use - inline-signing, the signed - version of the zone is discarded; after the - retransfer of the unsigned version is complete, the - signed version will be regenerated with all new - signatures. -

-
-
scan
-
-

- Scan the list of available network interfaces - for changes, without performing a full - reconfig or waiting for the - interface-interval timer. -

-
-
secroots [-] [view ...]
-
-

- Dump the security roots (i.e., trust anchors - configured via trust-anchors statements, or the - managed-keys or trusted-keys statements (both deprecated), or - via dnssec-validation auto) and negative trust - anchors for the specified views. If no view is specified, all - views are dumped. Security roots will indicate whether - they are configured as trusted keys, managed keys, or - initializing managed keys (managed keys that have not yet - been updated by a successful key refresh query). -

-

- If the first argument is "-", then the output is - returned via the rndc response channel - and printed to the standard output. - Otherwise, it is written to the secroots dump file, which - defaults to named.secroots, but can be - overridden via the secroots-file option in - named.conf. -

-

- See also rndc managed-keys. -

-
-
serve-stale ( on | off | reset | status ) [class [view]]
-
-

- Enable, disable, reset, or report the current status - of the serving of stale answers as configured in - named.conf. -

-

- If serving of stale answers is disabled by - rndc-serve-stale off, then it - will remain disabled even if named - is reloaded or reconfigured. - rndc serve-stale reset restores - the setting as configured in named.conf. -

-

- rndc serve-stale status will report - whether serving of stale answers is currently enabled, - disabled by the configuration, or disabled by - rndc. It will also report the - values of stale-answer-ttl and - max-stale-ttl. -

-
-
showzone zone [class [view]]
-
-

- Print the configuration of a running zone. -

-

- See also rndc zonestatus. -

-
-
sign zone [class [view]]
-
-

- Fetch all DNSSEC keys for the given zone - from the key directory (see the - key-directory option in - the BIND 9 Administrator Reference Manual). If they are within - their publication period, merge them into the - zone's DNSKEY RRset. If the DNSKEY RRset - is changed, then the zone is automatically - re-signed with the new key set. -

-

- This command requires that the zone is configured with a - dnssec-policy, or that the - auto-dnssec zone option be set - to allow or - maintain, - and also requires the zone to be configured to - allow dynamic DNS. - (See "Dynamic Update Policies" in the Administrator - Reference Manual for more details.) -

-

- See also rndc loadkeys. -

-
-
signing [( -list | -clear keyid/algorithm | -clear all | -nsec3param ( parameters | none ) | -serial value ) ] zone [class [view]]
-
-

- List, edit, or remove the DNSSEC signing state records - for the specified zone. The status of ongoing DNSSEC - operations (such as signing or generating - NSEC3 chains) is stored in the zone in the form - of DNS resource records of type - sig-signing-type. - rndc signing -list converts - these records into a human-readable form, - indicating which keys are currently signing - or have finished signing the zone, and which NSEC3 - chains are being created or removed. -

-

- rndc signing -clear can remove - a single key (specified in the same format that - rndc signing -list uses to - display it), or all keys. In either case, only - completed keys are removed; any record indicating - that a key has not yet finished signing the zone - will be retained. -

-

- rndc signing -nsec3param sets - the NSEC3 parameters for a zone. This is the - only supported mechanism for using NSEC3 with - inline-signing zones. - Parameters are specified in the same format as - an NSEC3PARAM resource record: hash algorithm, - flags, iterations, and salt, in that order. -

-

- Currently, the only defined value for hash algorithm - is 1, representing SHA-1. - The flags may be set to - 0 or 1, - depending on whether you wish to set the opt-out - bit in the NSEC3 chain. iterations - defines the number of additional times to apply - the algorithm when generating an NSEC3 hash. The - salt is a string of data expressed - in hexadecimal, a hyphen (`-') if no salt is - to be used, or the keyword auto, - which causes named to generate a - random 64-bit salt. -

-

- So, for example, to create an NSEC3 chain using - the SHA-1 hash algorithm, no opt-out flag, - 10 iterations, and a salt value of "FFFF", use: - rndc signing -nsec3param 1 0 10 FFFF zone. - To set the opt-out flag, 15 iterations, and no - salt, use: - rndc signing -nsec3param 1 1 15 - zone. -

-

- rndc signing -nsec3param none - removes an existing NSEC3 chain and replaces it - with NSEC. -

-

- rndc signing -serial value sets - the serial number of the zone to value. If the value - would cause the serial number to go backwards it will - be rejected. The primary use is to set the serial on - inline signed zones. -

-
-
stats
-
-

- Write server statistics to the statistics file. - (See the statistics-file option in - the BIND 9 Administrator Reference Manual.) -

-
-
status
-
-

- Display status of the server. - Note that the number of zones includes the internal bind/CH zone - and the default ./IN - hint zone if there is not an - explicit root zone configured. -

-
-
stop [-p]
-
-

- Stop the server, making sure any recent changes - made through dynamic update or IXFR are first saved to - the master files of the updated zones. - If -p is specified named's process id is returned. - This allows an external process to determine when named - had completed stopping. -

-

See also rndc halt.

-
-
sync [-clean] [zone [class [view]]]
-
-

- Sync changes in the journal file for a dynamic zone - to the master file. If the "-clean" option is - specified, the journal file is also removed. If - no zone is specified, then all zones are synced. -

-
-
tcp-timeouts [initial idle keepalive advertised]
-
-

- When called without arguments, display the current - values of the tcp-initial-timeout, - tcp-idle-timeout, - tcp-keepalive-timeout and - tcp-advertised-timeout options. - When called with arguments, update these values. This - allows an administrator to make rapid adjustments when - under a denial of service attack. See the descriptions of - these options in the BIND 9 Administrator Reference Manual - for details of their use. -

-
-
thaw [zone [class [view]]]
-
-

- Enable updates to a frozen dynamic zone. If no - zone is specified, then all frozen zones are - enabled. This causes the server to reload the zone - from disk, and re-enables dynamic updates after the - load has completed. After a zone is thawed, - dynamic updates will no longer be refused. If - the zone has changed and the - ixfr-from-differences option is - in use, then the journal file will be updated to - reflect changes in the zone. Otherwise, if the - zone has changed, any existing journal file will be - removed. -

-

See also rndc freeze.

-
-
trace
-
-

- Increment the servers debugging level by one. -

-
-
trace level
-
-

- Sets the server's debugging level to an explicit - value. -

-

- See also rndc notrace. -

-
-
tsig-delete keyname [view]
-
-

- Delete a given TKEY-negotiated key from the server. - (This does not apply to statically configured TSIG - keys.) -

-
-
tsig-list
-
-

- List the names of all TSIG keys currently configured - for use by named in each view. The - list includes both statically configured keys and dynamic - TKEY-negotiated keys. -

-
-
validation ( on | off | status ) [view ...]
-
-

- Enable, disable, or check the current status of - DNSSEC validation. By default, validation is enabled. - The cache is flushed when validation is turned on or off - to avoid using data that might differ between states. -

-
-
zonestatus zone [class [view]]
-
-

- Displays the current status of the given zone, - including the master file name and any include - files from which it was loaded, when it was most - recently loaded, the current serial number, the - number of nodes, whether the zone supports - dynamic updates, whether the zone is DNSSEC - signed, whether it uses automatic DNSSEC key - management or inline signing, and the scheduled - refresh or expiry times for the zone. -

-

- See also rndc showzone. -

-
-
- -

- rndc commands that specify zone names, - such as reload, retransfer - or zonestatus, can be ambiguous when applied - to zones of type redirect. Redirect zones are - always called ".", and can be confused with zones of type - hint or with slaved copies of the root zone. - To specify a redirect zone, use the special zone name - -redirect, without a trailing period. - (With a trailing period, this would specify a zone called - "-redirect".) -

-
- -
-

LIMITATIONS

- -

- There is currently no way to provide the shared secret for a - key_id without using the configuration file. -

-

- Several error messages could be clearer. -

-
- -
-

SEE ALSO

- -

- rndc.conf(5) - , - - rndc-confgen(8) - , - - named(8) - , - - named.conf(5) - , - - ndc(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/rndc/rndc.rst b/bin/rndc/rndc.rst new file mode 100644 index 0000000000..ab4d806865 --- /dev/null +++ b/bin/rndc/rndc.rst @@ -0,0 +1,579 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_rndc: + +rndc - name server control utility +---------------------------------- + +Synopsis +~~~~~~~~ + +:program:`rndc` [**-b** source-address] [**-c** config-file] [**-k** key-file] [**-s** server] [**-p** port] [**-q**] [**-r**] [**-V**] [**-y** key_id] [[**-4**] | [**-6**]] {command} + +Description +~~~~~~~~~~~ + +``rndc`` controls the operation of a name server. It supersedes the +``ndc`` utility that was provided in old BIND releases. If ``rndc`` is +invoked with no command line options or arguments, it prints a short +summary of the supported commands and the available options and their +arguments. + +``rndc`` communicates with the name server over a TCP connection, +sending commands authenticated with digital signatures. In the current +versions of ``rndc`` and ``named``, the only supported authentication +algorithms are HMAC-MD5 (for compatibility), HMAC-SHA1, HMAC-SHA224, +HMAC-SHA256 (default), HMAC-SHA384 and HMAC-SHA512. They use a shared +secret on each end of the connection. This provides TSIG-style +authentication for the command request and the name server's response. +All commands sent over the channel must be signed by a key_id known to +the server. + +``rndc`` reads a configuration file to determine how to contact the name +server and decide what algorithm and key it should use. + +Options +~~~~~~~ + +**-4** + Use IPv4 only. + +**-6** + Use IPv6 only. + +**-b** source-address + Use source-address as the source address for the connection to the + server. Multiple instances are permitted to allow setting of both the + IPv4 and IPv6 source addresses. + +**-c** config-file + Use config-file as the configuration file instead of the default, + ``/etc/rndc.conf``. + +**-k** key-file + Use key-file as the key file instead of the default, + ``/etc/rndc.key``. The key in ``/etc/rndc.key`` will be used to + authenticate commands sent to the server if the config-file does not + exist. + +**-s** server + server is the name or address of the server which matches a server + statement in the configuration file for ``rndc``. If no server is + supplied on the command line, the host named by the default-server + clause in the options statement of the ``rndc`` configuration file + will be used. + +**-p** port + Send commands to TCP port port instead of BIND 9's default control + channel port, 953. + +**-q** + Quiet mode: Message text returned by the server will not be printed + except when there is an error. + +**-r** + Instructs ``rndc`` to print the result code returned by ``named`` + after executing the requested command (e.g., ISC_R_SUCCESS, + ISC_R_FAILURE, etc). + +**-V** + Enable verbose logging. + +**-y** key_id + Use the key key_id from the configuration file. key_id must be known + by ``named`` with the same algorithm and secret string in order for + control message validation to succeed. If no key_id is specified, + ``rndc`` will first look for a key clause in the server statement of + the server being used, or if no server statement is present for that + host, then the default-key clause of the options statement. Note that + the configuration file contains shared secrets which are used to send + authenticated control commands to name servers. It should therefore + not have general read or write access. + +Commands +~~~~~~~~ + +A list of commands supported by ``rndc`` can be seen by running ``rndc`` +without arguments. + +Currently supported commands are: + +``addzone`` *zone* [*class* [*view*]] *configuration* + Add a zone while the server is running. This command requires the + ``allow-new-zones`` option to be set to ``yes``. The configuration + string specified on the command line is the zone configuration text + that would ordinarily be placed in :manpage:`named.conf(5)`. + + The configuration is saved in a file called ``viewname.nzf`` (or, if + :manpage:`named(8)` is compiled with liblmdb, an LMDB database file called + ``viewname.nzd``). viewname is the name of the view, unless the view + name contains characters that are incompatible with use as a file + name, in which case a cryptographic hash of the view name is used + instead. When :manpage:`named(8)` is restarted, the file will be loaded into + the view configuration, so that zones that were added can persist + after a restart. + + This sample ``addzone`` command would add the zone ``example.com`` to + the default view: + + ``$``\ ``rndc addzone example.com '{ type master; file "example.com.db"; };'`` + + (Note the brackets and semi-colon around the zone configuration + text.) + + See also ``rndc delzone`` and ``rndc modzone``. + +``delzone`` [**-clean**] *zone* [*class* [*view*]] + Delete a zone while the server is running. + + If the ``-clean`` argument is specified, the zone's master file (and + journal file, if any) will be deleted along with the zone. Without + the ``-clean`` option, zone files must be cleaned up by hand. (If the + zone is of type "slave" or "stub", the files needing to be cleaned up + will be reported in the output of the ``rndc delzone`` command.) + + If the zone was originally added via ``rndc addzone``, then it will + be removed permanently. However, if it was originally configured in + ``named.conf``, then that original configuration is still in place; + when the server is restarted or reconfigured, the zone will come + back. To remove it permanently, it must also be removed from + ``named.conf`` + + See also ``rndc addzone`` and ``rndc modzone``. + +``dnstap`` ( **-reopen** | **-roll** [*number*] ) + Close and re-open DNSTAP output files. ``rndc dnstap -reopen`` allows + the output file to be renamed externally, so that :manpage:`named(8)` can + truncate and re-open it. ``rndc dnstap -roll`` causes the output file + to be rolled automatically, similar to log files; the most recent + output file has ".0" appended to its name; the previous most recent + output file is moved to ".1", and so on. If number is specified, then + the number of backup log files is limited to that number. + +``dumpdb`` [**-all** | **-cache** | **-zones** | **-adb** | **-bad** | **-fail**] [*view ...*] + Dump the server's caches (default) and/or zones to the dump file for + the specified views. If no view is specified, all views are dumped. + (See the ``dump-file`` option in the BIND 9 Administrator Reference + Manual.) + +``flush`` + Flushes the server's cache. + +``flushname`` *name* [*view*] + Flushes the given name from the view's DNS cache and, if applicable, + from the view's nameserver address database, bad server cache and + SERVFAIL cache. + +``flushtree`` *name* [*view*] + Flushes the given name, and all of its subdomains, from the view's + DNS cache, address database, bad server cache, and SERVFAIL cache. + +``freeze`` [*zone* [*class* [*view*]]] + Suspend updates to a dynamic zone. If no zone is specified, then all + zones are suspended. This allows manual edits to be made to a zone + normally updated by dynamic update. It also causes changes in the + journal file to be synced into the master file. All dynamic update + attempts will be refused while the zone is frozen. + + See also ``rndc thaw``. + +``halt`` [**-p**] + Stop the server immediately. Recent changes made through dynamic + update or IXFR are not saved to the master files, but will be rolled + forward from the journal files when the server is restarted. If + ``-p`` is specified :manpage:`named(8)`'s process id is returned. This allows + an external process to determine when :manpage:`named(8)` had completed + halting. + + See also ``rndc stop``. + +``loadkeys`` [*zone* [*class* [*view*]]] + Fetch all DNSSEC keys for the given zone from the key directory. If + they are within their publication period, merge them into the + zone's DNSKEY RRset. Unlike ``rndc sign``, however, the zone is not + immediately re-signed by the new keys, but is allowed to + incrementally re-sign over time. + + This command requires that zone is configured with a ``dnssec-policy``, or + the ``auto-dnssec`` zone option be set to ``maintain``, and also requires the + zone to be configured to allow dynamic DNS. (See "Dynamic Update Policies" in + the Administrator Reference Manual for more details.) + +``managed-keys`` (*status* | *refresh* | *sync* | *destroy*) [*class* [*view*]] + Inspect and control the "managed-keys" database which handles + :rfc:`5011` DNSSEC trust anchor maintenance. If a view is specified, these + commands are applied to that view; otherwise they are applied to all + views. + + - When run with the ``status`` keyword, prints the current status of + the managed-keys database. + + - When run with the ``refresh`` keyword, forces an immediate refresh + query to be sent for all the managed keys, updating the + managed-keys database if any new keys are found, without waiting + the normal refresh interval. + + - When run with the ``sync`` keyword, forces an immediate dump of + the managed-keys database to disk (in the file + ``managed-keys.bind`` or (``viewname.mkeys``). This synchronizes + the database with its journal file, so that the database's current + contents can be inspected visually. + + - When run with the ``destroy`` keyword, the managed-keys database + is shut down and deleted, and all key maintenance is terminated. + This command should be used only with extreme caution. + + Existing keys that are already trusted are not deleted from + memory; DNSSEC validation can continue after this command is used. + However, key maintenance operations will cease until :manpage:`named(8)` is + restarted or reconfigured, and all existing key maintenance state + will be deleted. + + Running ``rndc reconfig`` or restarting :manpage:`named(8)` immediately + after this command will cause key maintenance to be reinitialized + from scratch, just as if the server were being started for the + first time. This is primarily intended for testing, but it may + also be used, for example, to jumpstart the acquisition of new + keys in the event of a trust anchor rollover, or as a brute-force + repair for key maintenance problems. + +``modzone`` *zone* [*class* [*view*]] *configuration* + Modify the configuration of a zone while the server is running. This + command requires the ``allow-new-zones`` option to be set to ``yes``. + As with ``addzone``, the configuration string specified on the + command line is the zone configuration text that would ordinarily be + placed in ``named.conf``. + + If the zone was originally added via ``rndc addzone``, the + configuration changes will be recorded permanently and will still be + in effect after the server is restarted or reconfigured. However, if + it was originally configured in ``named.conf``, then that original + configuration is still in place; when the server is restarted or + reconfigured, the zone will revert to its original configuration. To + make the changes permanent, it must also be modified in + ``named.conf`` + + See also ``rndc addzone`` and ``rndc delzone``. + +``notify`` *zone* [*class* [*view*]] + Resend NOTIFY messages for the zone. + +``notrace`` + Sets the server's debugging level to 0. + + See also ``rndc trace``. + +``nta`` [( **-class** *class* | **-dump** | **-force** | **-remove** | **-lifetime** *duration*)] *domain* [*view*] + Sets a DNSSEC negative trust anchor (NTA) for ``domain``, with a + lifetime of ``duration``. The default lifetime is configured in + ``named.conf`` via the ``nta-lifetime`` option, and defaults to one + hour. The lifetime cannot exceed one week. + + A negative trust anchor selectively disables DNSSEC validation for + zones that are known to be failing because of misconfiguration rather + than an attack. When data to be validated is at or below an active + NTA (and above any other configured trust anchors), :manpage:`named(8)` will + abort the DNSSEC validation process and treat the data as insecure + rather than bogus. This continues until the NTA's lifetime is + elapsed. + + NTAs persist across restarts of the :manpage:`named(8)` server. The NTAs for a + view are saved in a file called ``name.nta``, where name is the name + of the view, or if it contains characters that are incompatible with + use as a file name, a cryptographic hash generated from the name of + the view. + + An existing NTA can be removed by using the ``-remove`` option. + + An NTA's lifetime can be specified with the ``-lifetime`` option. + TTL-style suffixes can be used to specify the lifetime in seconds, + minutes, or hours. If the specified NTA already exists, its lifetime + will be updated to the new value. Setting ``lifetime`` to zero is + equivalent to ``-remove``. + + If the ``-dump`` is used, any other arguments are ignored, and a list + of existing NTAs is printed (note that this may include NTAs that are + expired but have not yet been cleaned up). + + Normally, :manpage:`named(8)` will periodically test to see whether data below + an NTA can now be validated (see the ``nta-recheck`` option in the + Administrator Reference Manual for details). If data can be + validated, then the NTA is regarded as no longer necessary, and will + be allowed to expire early. The ``-force`` overrides this behavior + and forces an NTA to persist for its entire lifetime, regardless of + whether data could be validated if the NTA were not present. + + The view class can be specified with ``-class``. The default is class + ``IN``, which is the only class for which DNSSEC is currently + supported. + + All of these options can be shortened, i.e., to ``-l``, ``-r``, + ``-d``, ``-f``, and ``-c``. + + Unrecognized options are treated as errors. To reference a domain or + view name that begins with a hyphen, use a double-hyphen on the + command line to indicate the end of options. + +``querylog`` [(*on* | *off*)] + Enable or disable query logging. (For backward compatibility, this + command can also be used without an argument to toggle query logging + on and off.) + + Query logging can also be enabled by explicitly directing the + ``queries`` ``category`` to a ``channel`` in the ``logging`` section + of ``named.conf`` or by specifying ``querylog yes;`` in the + ``options`` section of ``named.conf``. + +``reconfig`` + Reload the configuration file and load new zones, but do not reload + existing zone files even if they have changed. This is faster than a + full ``reload`` when there is a large number of zones because it + avoids the need to examine the modification times of the zones files. + +``recursing`` + Dump the list of queries :manpage:`named(8)` is currently recursing on, and the + list of domains to which iterative queries are currently being sent. + (The second list includes the number of fetches currently active for + the given domain, and how many have been passed or dropped because of + the ``fetches-per-zone`` option.) + +``refresh`` *zone* [*class* [*view*]] + Schedule zone maintenance for the given zone. + +``reload`` + Reload configuration file and zones. + +``reload`` *zone* [*class* [*view*]] + Reload the given zone. + +``retransfer`` *zone* [*class* [*view*]] + Retransfer the given slave zone from the master server. + + If the zone is configured to use ``inline-signing``, the signed + version of the zone is discarded; after the retransfer of the + unsigned version is complete, the signed version will be regenerated + with all new signatures. + +``scan`` + Scan the list of available network interfaces for changes, without + performing a full ``reconfig`` or waiting for the + ``interface-interval`` timer. + +``secroots`` [**-**] [*view* ...] + Dump the security roots (i.e., trust anchors configured via + ``trust-anchors``, or the ``managed-keys`` or ``trusted-keys`` statements + (both deprecated), or ``dnssec-validation auto``) and negative trust anchors + for the specified views. If no view is specified, all views are + dumped. Security roots will indicate whether they are configured as trusted + keys, managed keys, or initializing managed keys (managed keys that have not + yet been updated by a successful key refresh query). + + If the first argument is "-", then the output is returned via the + ``rndc`` response channel and printed to the standard output. + Otherwise, it is written to the secroots dump file, which defaults to + ``named.secroots``, but can be overridden via the ``secroots-file`` + option in ``named.conf``. + + See also ``rndc managed-keys``. + +``serve-stale`` (**on** | **off** | **reset** | **status**) [*class* [*view*]] + Enable, disable, reset, or report the current status of the serving + of stale answers as configured in ``named.conf``. + + If serving of stale answers is disabled by ``rndc-serve-stale off``, + then it will remain disabled even if :manpage:`named(8)` is reloaded or + reconfigured. ``rndc serve-stale reset`` restores the setting as + configured in ``named.conf``. + + ``rndc serve-stale status`` will report whether serving of stale + answers is currently enabled, disabled by the configuration, or + disabled by ``rndc``. It will also report the values of + ``stale-answer-ttl`` and ``max-stale-ttl``. + +``showzone`` *zone* [*class* [*view*]] + Print the configuration of a running zone. + + See also ``rndc zonestatus``. + +``sign`` *zone* [*class* [*view*]] + Fetch all DNSSEC keys for the given zone from the key directory (see + the ``key-directory`` option in the BIND 9 Administrator Reference + Manual). If they are within their publication period, merge them into + the zone's DNSKEY RRset. If the DNSKEY RRset is changed, then the + zone is automatically re-signed with the new key set. + + This command requires that the zone is configure with a ``dnssec-policy``, or + that the ``auto-dnssec`` zone option be set to ``allow`` or ``maintain``, + and also requires the zone to be configured to allow dynamic DNS. (See + "Dynamic Update Policies" in the Administrator Reference Manual for more + details.) + + See also ``rndc loadkeys``. + +``signing`` [(**-list** | **-clear** *keyid/algorithm* | **-clear** *all* | **-nsec3param** ( *parameters* | none ) | **-serial** *value* ) *zone* [*class* [*view*]] + List, edit, or remove the DNSSEC signing state records for the + specified zone. The status of ongoing DNSSEC operations (such as + signing or generating NSEC3 chains) is stored in the zone in the form + of DNS resource records of type ``sig-signing-type``. + ``rndc signing -list`` converts these records into a human-readable + form, indicating which keys are currently signing or have finished + signing the zone, and which NSEC3 chains are being created or + removed. + + ``rndc signing -clear`` can remove a single key (specified in the + same format that ``rndc signing -list`` uses to display it), or all + keys. In either case, only completed keys are removed; any record + indicating that a key has not yet finished signing the zone will be + retained. + + ``rndc signing -nsec3param`` sets the NSEC3 parameters for a zone. + This is the only supported mechanism for using NSEC3 with + ``inline-signing`` zones. Parameters are specified in the same format + as an NSEC3PARAM resource record: hash algorithm, flags, iterations, + and salt, in that order. + + Currently, the only defined value for hash algorithm is ``1``, + representing SHA-1. The ``flags`` may be set to ``0`` or ``1``, + depending on whether you wish to set the opt-out bit in the NSEC3 + chain. ``iterations`` defines the number of additional times to apply + the algorithm when generating an NSEC3 hash. The ``salt`` is a string + of data expressed in hexadecimal, a hyphen (`-') if no salt is to be + used, or the keyword ``auto``, which causes :manpage:`named(8)` to generate a + random 64-bit salt. + + So, for example, to create an NSEC3 chain using the SHA-1 hash + algorithm, no opt-out flag, 10 iterations, and a salt value of + "FFFF", use: ``rndc signing -nsec3param 1 0 10 FFFF zone``. To set + the opt-out flag, 15 iterations, and no salt, use: + ``rndc signing -nsec3param 1 1 15 - zone``. + + ``rndc signing -nsec3param none`` removes an existing NSEC3 chain and + replaces it with NSEC. + + ``rndc signing -serial value`` sets the serial number of the zone to + value. If the value would cause the serial number to go backwards it + will be rejected. The primary use is to set the serial on inline + signed zones. + +``stats`` + Write server statistics to the statistics file. (See the + ``statistics-file`` option in the BIND 9 Administrator Reference + Manual.) + +``status`` + Display status of the server. Note that the number of zones includes + the internal ``bind/CH`` zone and the default ``./IN`` hint zone if + there is not an explicit root zone configured. + +``stop`` **-p** + Stop the server, making sure any recent changes made through dynamic + update or IXFR are first saved to the master files of the updated + zones. If ``-p`` is specified :manpage:`named(8)`'s process id is returned. + This allows an external process to determine when :manpage:`named(8)` had + completed stopping. + + See also ``rndc halt``. + +``sync`` **-clean** [*zone* [*class* [*view*]]] + Sync changes in the journal file for a dynamic zone to the master + file. If the "-clean" option is specified, the journal file is also + removed. If no zone is specified, then all zones are synced. + +``tcp-timeouts`` [*initial* *idle* *keepalive* *advertised*] + When called without arguments, display the current values of the + ``tcp-initial-timeout``, ``tcp-idle-timeout``, + ``tcp-keepalive-timeout`` and ``tcp-advertised-timeout`` options. + When called with arguments, update these values. This allows an + administrator to make rapid adjustments when under a denial of + service attack. See the descriptions of these options in the BIND 9 + Administrator Reference Manual for details of their use. + +``thaw`` [*zone* [*class* [*view*]]] + Enable updates to a frozen dynamic zone. If no zone is specified, + then all frozen zones are enabled. This causes the server to reload + the zone from disk, and re-enables dynamic updates after the load has + completed. After a zone is thawed, dynamic updates will no longer be + refused. If the zone has changed and the ``ixfr-from-differences`` + option is in use, then the journal file will be updated to reflect + changes in the zone. Otherwise, if the zone has changed, any existing + journal file will be removed. + + See also ``rndc freeze``. + +``trace`` + Increment the servers debugging level by one. + +``trace`` *level* + Sets the server's debugging level to an explicit value. + + See also ``rndc notrace``. + +``tsig-delete`` *keyname* [*view*] + Delete a given TKEY-negotiated key from the server. (This does not + apply to statically configured TSIG keys.) + +``tsig-list`` + List the names of all TSIG keys currently configured for use by + :manpage:`named(8)` in each view. The list both statically configured keys and + dynamic TKEY-negotiated keys. + +``validation`` (**on** | **off** | **status**) [*view* ...]`` + Enable, disable, or check the current status of DNSSEC validation. By + default, validation is enabled. + + The cache is flushed when validation is turned on or off to avoid using data + that might differ between states. + +``zonestatus`` *zone* [*class* [*view*]] + Displays the current status of the given zone, including the master + file name and any include files from which it was loaded, when it was + most recently loaded, the current serial number, the number of nodes, + whether the zone supports dynamic updates, whether the zone is DNSSEC + signed, whether it uses automatic DNSSEC key management or inline + signing, and the scheduled refresh or expiry times for the zone. + + See also ``rndc showzone``. + +``rndc`` commands that specify zone names, such as ``reload``, +``retransfer`` or ``zonestatus``, can be ambiguous when applied to zones +of type ``redirect``. Redirect zones are always called ".", and can be +confused with zones of type ``hint`` or with slaved copies of the root +zone. To specify a redirect zone, use the special zone name +``-redirect``, without a trailing period. (With a trailing period, this +would specify a zone called "-redirect".) + +Limitations +~~~~~~~~~~~ + +There is currently no way to provide the shared secret for a ``key_id`` +without using the configuration file. + +Several error messages could be clearer. + +See Also +~~~~~~~~ + +:manpage:`rndc.conf(5)`, :manpage:`rndc-confgen(8)`, +:manpage:`named(8)`, :manpage:`named.conf(5)`, :manpage:`ndc(8)`, BIND 9 Administrator +Reference Manual. diff --git a/bin/tools/arpaname.1 b/bin/tools/arpaname.1 deleted file mode 100644 index 96425f0f7d..0000000000 --- a/bin/tools/arpaname.1 +++ /dev/null @@ -1,56 +0,0 @@ -.\" Copyright (C) 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: arpaname -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2009-03-03 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "ARPANAME" "1" "2009\-03\-03" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -arpaname \- translate IP addresses to the corresponding ARPA names -.SH "SYNOPSIS" -.HP \w'\fBarpaname\fR\ 'u -\fBarpaname\fR {\fIipaddress\ \fR...} -.SH "DESCRIPTION" -.PP -\fBarpaname\fR -translates IP addresses (IPv4 and IPv6) to the corresponding IN\-ADDR\&.ARPA or IP6\&.ARPA names\&. -.SH "SEE ALSO" -.PP -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2014-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/tools/arpaname.docbook b/bin/tools/arpaname.docbook deleted file mode 100644 index cdef494fa6..0000000000 --- a/bin/tools/arpaname.docbook +++ /dev/null @@ -1,67 +0,0 @@ - - - - - - 2009-03-03 - - - ISC - Internet Systems Consortium, Inc. - - - arpaname - 1 - BIND9 - - - - arpaname - translate IP addresses to the corresponding ARPA names - - - - - 2009 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - arpaname - ipaddress - - - - DESCRIPTION - - - arpaname translates IP addresses (IPv4 and - IPv6) to the corresponding IN-ADDR.ARPA or IP6.ARPA names. - - - - SEE ALSO - - - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/tools/arpaname.html b/bin/tools/arpaname.html deleted file mode 100644 index 769a31f45c..0000000000 --- a/bin/tools/arpaname.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - -arpaname - - -
-
- - - - -
-

Name

-

- arpaname - — translate IP addresses to the corresponding ARPA names -

-
- - - -
-

Synopsis

-

- arpaname - {ipaddress ...} -

-
- -
-

DESCRIPTION

- -

- arpaname translates IP addresses (IPv4 and - IPv6) to the corresponding IN-ADDR.ARPA or IP6.ARPA names. -

-
- -
-

SEE ALSO

- -

- BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/tools/arpaname.rst b/bin/tools/arpaname.rst new file mode 100644 index 0000000000..9a925b3721 --- /dev/null +++ b/bin/tools/arpaname.rst @@ -0,0 +1,43 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_arpaname: + +arpaname - translate IP addresses to the corresponding ARPA names +----------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`arpaname` {*ipaddress* ...} + +Description +~~~~~~~~~~~ + +``arpaname`` translates IP addresses (IPv4 and IPv6) to the +corresponding IN-ADDR.ARPA or IP6.ARPA names. + +See Also +~~~~~~~~ + +BIND 9 Administrator Reference Manual. diff --git a/bin/tools/dnstap-read.1 b/bin/tools/dnstap-read.1 deleted file mode 100644 index e003b4e2c9..0000000000 --- a/bin/tools/dnstap-read.1 +++ /dev/null @@ -1,95 +0,0 @@ -.\" Copyright (C) 2015-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: dnstap-read -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2015-09-13 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "DNSTAP\-READ" "1" "2015\-09\-13" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -dnstap-read \- print dnstap data in human\-readable form -.SH "SYNOPSIS" -.HP \w'\fBdnstap\-read\fR\ 'u -\fBdnstap\-read\fR [\fB\-m\fR] [\fB\-p\fR] [\fB\-x\fR] [\fB\-y\fR] {\fIfile\fR} -.SH "DESCRIPTION" -.PP -\fBdnstap\-read\fR -reads -\fBdnstap\fR -data from a specified file and prints it in a human\-readable format\&. By default, -\fBdnstap\fR -data is printed in a short summary format, but if the -\fB\-y\fR -option is specified, then a longer and more detailed YAML format is used instead\&. -.SH "OPTIONS" -.PP -\-m -.RS 4 -Trace memory allocations; used for debugging memory leaks\&. -.RE -.PP -\-p -.RS 4 -After printing the -\fBdnstap\fR -data, print the text form of the DNS message that was encapsulated in the -\fBdnstap\fR -frame\&. -.RE -.PP -\-x -.RS 4 -After printing the -\fBdnstap\fR -data, print a hex dump of the wire form of the DNS message that was encapsulated in the -\fBdnstap\fR -frame\&. -.RE -.PP -\-y -.RS 4 -Print -\fBdnstap\fR -data in a detailed YAML format\&. -.RE -.SH "SEE ALSO" -.PP -\fBnamed\fR(8), -\fBrndc\fR(8), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2015-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/tools/dnstap-read.docbook b/bin/tools/dnstap-read.docbook deleted file mode 100644 index dbdd10c2f8..0000000000 --- a/bin/tools/dnstap-read.docbook +++ /dev/null @@ -1,129 +0,0 @@ - - - - - - 2015-09-13 - - - ISC - Internet Systems Consortium, Inc. - - - - dnstap-read - 1 - BIND9 - - - - dnstap-read - print dnstap data in human-readable form - - - - - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - dnstap-read - - - - - file - - - - DESCRIPTION - - - dnstap-read - reads dnstap data from a specified file - and prints it in a human-readable format. By default, - dnstap data is printed in a short summary - format, but if the option is specified, - then a longer and more detailed YAML format is used instead. - - - - OPTIONS - - - - - -m - - - Trace memory allocations; used for debugging memory leaks. - - - - - - -p - - - After printing the dnstap data, print - the text form of the DNS message that was encapsulated in the - dnstap frame. - - - - - - -x - - - After printing the dnstap data, print - a hex dump of the wire form of the DNS message that was - encapsulated in the dnstap frame. - - - - - - -y - - - Print dnstap data in a detailed YAML - format. - - - - - - - - SEE ALSO - - - - named8 - , - - rndc8 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/tools/dnstap-read.html b/bin/tools/dnstap-read.html deleted file mode 100644 index 8d3f2e564a..0000000000 --- a/bin/tools/dnstap-read.html +++ /dev/null @@ -1,109 +0,0 @@ - - - - - -dnstap-read - - -
-
- - - - - -
-

Name

-

- dnstap-read - — print dnstap data in human-readable form -

-
- - - -
-

Synopsis

-

- dnstap-read - [-m] - [-p] - [-x] - [-y] - {file} -

-
- -
-

DESCRIPTION

- -

- dnstap-read - reads dnstap data from a specified file - and prints it in a human-readable format. By default, - dnstap data is printed in a short summary - format, but if the -y option is specified, - then a longer and more detailed YAML format is used instead. -

-
- -
-

OPTIONS

- - -
-
-m
-
-

- Trace memory allocations; used for debugging memory leaks. -

-
-
-p
-
-

- After printing the dnstap data, print - the text form of the DNS message that was encapsulated in the - dnstap frame. -

-
-
-x
-
-

- After printing the dnstap data, print - a hex dump of the wire form of the DNS message that was - encapsulated in the dnstap frame. -

-
-
-y
-
-

- Print dnstap data in a detailed YAML - format. -

-
-
-
- -
-

SEE ALSO

- -

- - named(8) - , - - rndc(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/tools/dnstap-read.rst b/bin/tools/dnstap-read.rst new file mode 100644 index 0000000000..a846c6761f --- /dev/null +++ b/bin/tools/dnstap-read.rst @@ -0,0 +1,62 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_dnstap-read: + +dnstap-read - print dnstap data in human-readable form +------------------------------------------------------ + +Synopsis +~~~~~~~~ + +:program:`dnstap-read` [**-m**] [**-p**] [**-x**] [**-y**] {file} + +Description +~~~~~~~~~~~ + +``dnstap-read`` reads ``dnstap`` data from a specified file and prints +it in a human-readable format. By default, ``dnstap`` data is printed in +a short summary format, but if the ``-y`` option is specified, then a +longer and more detailed YAML format is used instead. + +Options +~~~~~~~ + +**-m** + Trace memory allocations; used for debugging memory leaks. + +**-p** + After printing the ``dnstap`` data, print the text form of the DNS + message that was encapsulated in the ``dnstap`` frame. + +**-x** + After printing the ``dnstap`` data, print a hex dump of the wire form + of the DNS message that was encapsulated in the ``dnstap`` frame. + +**-y** + Print ``dnstap`` data in a detailed YAML format. + +See Also +~~~~~~~~ + +:manpage:`named(8)`, :manpage:`rndc(8)`, BIND 9 Administrator Reference Manual. diff --git a/bin/tools/mdig.1 b/bin/tools/mdig.1 deleted file mode 100644 index dcd1c5075b..0000000000 --- a/bin/tools/mdig.1 +++ /dev/null @@ -1,407 +0,0 @@ -.\" Copyright (C) 2015-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: mdig -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2015-01-05 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "MDIG" "1" "2015\-01\-05" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -mdig \- DNS pipelined lookup utility -.SH "SYNOPSIS" -.HP \w'\fBmdig\fR\ 'u -\fBmdig\fR {@server} [\fB\-f\ \fR\fB\fIfilename\fR\fR] [\fB\-h\fR] [\fB\-v\fR] [[\fB\-4\fR] | [\fB\-6\fR]] [\fB\-m\fR] [\fB\-b\ \fR\fB\fIaddress\fR\fR] [\fB\-p\ \fR\fB\fIport#\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-i\fR] [\fB\-x\ \fR\fB\fIaddr\fR\fR] [plusopt...] -.HP \w'\fBmdig\fR\ 'u -\fBmdig\fR {\-h} -.HP \w'\fBmdig\fR\ 'u -\fBmdig\fR [@server] {global\-opt...} {{local\-opt...}\ {query}...} -.SH "DESCRIPTION" -.PP -\fBmdig\fR -is a multiple/pipelined query version of -\fBdig\fR: instead of waiting for a response after sending each query, it begins by sending all queries\&. Responses are displayed in the order in which they are received, not in the order the corresponding queries were sent\&. -.PP -\fBmdig\fR -options are a subset of the -\fBdig\fR -options, and are divided into "anywhere options" which can occur anywhere, "global options" which must occur before the query name (or they are ignored with a warning), and "local options" which apply to the next query on the command line\&. -.PP -The -{@server} -option is a mandatory global option\&. It is the name or IP address of the name server to query\&. (Unlike -\fBdig\fR, this value is not retrieved from -/etc/resolv\&.conf\&.) It can be an IPv4 address in dotted\-decimal notation, an IPv6 address in colon\-delimited notation, or a hostname\&. When the supplied -\fIserver\fR -argument is a hostname, -\fBmdig\fR -resolves that name before querying the name server\&. -.PP -\fBmdig\fR -provides a number of query options which affect the way in which lookups are made and the results displayed\&. Some of these set or reset flag bits in the query header, some determine which sections of the answer get printed, and others determine the timeout and retry strategies\&. -.PP -Each query option is identified by a keyword preceded by a plus sign (+)\&. Some keywords set or reset an option\&. These may be preceded by the string -no -to negate the meaning of that keyword\&. Other keywords assign values to options like the timeout interval\&. They have the form -\fB+keyword=value\fR\&. -.SH "ANYWHERE OPTIONS" -.PP -The -\fB\-f\fR -option makes -\fBmdig\fR -operate in batch mode by reading a list of lookup requests to process from the file -\fIfilename\fR\&. The file contains a number of queries, one per line\&. Each entry in the file should be organized in the same way they would be presented as queries to -\fBmdig\fR -using the command\-line interface\&. -.PP -The -\fB\-h\fR -causes -\fBmdig\fR -to print the detailed help with the full list of options and exit\&. -.PP -The -\fB\-v\fR -causes -\fBmdig\fR -to print the version number and exit\&. -.SH "GLOBAL OPTIONS" -.PP -The -\fB\-4\fR -option forces -\fBmdig\fR -to only use IPv4 query transport\&. -.PP -The -\fB\-6\fR -option forces -\fBmdig\fR -to only use IPv6 query transport\&. -.PP -The -\fB\-b\fR -option sets the source IP address of the query to -\fIaddress\fR\&. This must be a valid address on one of the host\*(Aqs network interfaces or "0\&.0\&.0\&.0" or "::"\&. An optional port may be specified by appending "#" -.PP -The -\fB\-m\fR -option enables memory usage debugging\&. -.PP -The -\fB\-p\fR -option is used when a non\-standard port number is to be queried\&. -\fIport#\fR -is the port number that -\fBmdig\fR -will send its queries instead of the standard DNS port number 53\&. This option would be used to test a name server that has been configured to listen for queries on a non\-standard port number\&. -.PP -The global query options are: -.PP -\fB+[no]additional\fR -.RS 4 -Display [do not display] the additional section of a reply\&. The default is to display it\&. -.RE -.PP -\fB+[no]all\fR -.RS 4 -Set or clear all display flags\&. -.RE -.PP -\fB+[no]answer\fR -.RS 4 -Display [do not display] the answer section of a reply\&. The default is to display it\&. -.RE -.PP -\fB+[no]authority\fR -.RS 4 -Display [do not display] the authority section of a reply\&. The default is to display it\&. -.RE -.PP -\fB+[no]besteffort\fR -.RS 4 -Attempt to display the contents of messages which are malformed\&. The default is to not display malformed answers\&. -.RE -.PP -\fB+[no]cl\fR -.RS 4 -Display [do not display] the CLASS when printing the record\&. -.RE -.PP -\fB+[no]comments\fR -.RS 4 -Toggle the display of comment lines in the output\&. The default is to print comments\&. -.RE -.PP -\fB+[no]continue\fR -.RS 4 -Continue on errors (e\&.g\&. timeouts)\&. -.RE -.PP -\fB+[no]crypto\fR -.RS 4 -Toggle the display of cryptographic fields in DNSSEC records\&. The contents of these field are unnecessary to debug most DNSSEC validation failures and removing them makes it easier to see the common failures\&. The default is to display the fields\&. When omitted they are replaced by the string "[omitted]" or in the DNSKEY case the key id is displayed as the replacement, e\&.g\&. "[ key id = value ]"\&. -.RE -.PP -\fB+dscp[=value]\fR -.RS 4 -Set the DSCP code point to be used when sending the query\&. Valid DSCP code points are in the range [0\&.\&.63]\&. By default no code point is explicitly set\&. -.RE -.PP -\fB+[no]multiline\fR -.RS 4 -Print records like the SOA records in a verbose multi\-line format with human\-readable comments\&. The default is to print each record on a single line, to facilitate machine parsing of the -\fBmdig\fR -output\&. -.RE -.PP -\fB+[no]question\fR -.RS 4 -Print [do not print] the question section of a query when an answer is returned\&. The default is to print the question section as a comment\&. -.RE -.PP -\fB+[no]rrcomments\fR -.RS 4 -Toggle the display of per\-record comments in the output (for example, human\-readable key information about DNSKEY records)\&. The default is not to print record comments unless multiline mode is active\&. -.RE -.PP -\fB+[no]short\fR -.RS 4 -Provide a terse answer\&. The default is to print the answer in a verbose form\&. -.RE -.PP -\fB+split=W\fR -.RS 4 -Split long hex\- or base64\-formatted fields in resource records into chunks of -\fIW\fR -characters (where -\fIW\fR -is rounded up to the nearest multiple of 4)\&. -\fI+nosplit\fR -or -\fI+split=0\fR -causes fields not to be split at all\&. The default is 56 characters, or 44 characters when multiline mode is active\&. -.RE -.PP -\fB+[no]tcp\fR -.RS 4 -Use [do not use] TCP when querying name servers\&. The default behavior is to use UDP\&. -.RE -.PP -\fB+[no]ttlid\fR -.RS 4 -Display [do not display] the TTL when printing the record\&. -.RE -.PP -\fB+[no]ttlunits\fR -.RS 4 -Display [do not display] the TTL in friendly human\-readable time units of "s", "m", "h", "d", and "w", representing seconds, minutes, hours, days and weeks\&. Implies +ttlid\&. -.RE -.PP -\fB+[no]vc\fR -.RS 4 -Use [do not use] TCP when querying name servers\&. This alternate syntax to -\fI+[no]tcp\fR -is provided for backwards compatibility\&. The "vc" stands for "virtual circuit"\&. -.RE -.PP -\fB+[no]yaml\fR -.RS 4 -Print the responses in a detailed YAML format\&. -.RE -.SH "LOCAL OPTIONS" -.PP -The -\fB\-c\fR -option sets the query class to -\fIclass\fR\&. It can be any valid query class which is supported in BIND 9\&. The default query class is "IN"\&. -.PP -The -\fB\-t\fR -option sets the query type to -\fItype\fR\&. It can be any valid query type which is supported in BIND 9\&. The default query type is "A", unless the -\fB\-x\fR -option is supplied to indicate a reverse lookup with the "PTR" query type\&. -.PP -Reverse lookups \(em mapping addresses to names \(em are simplified by the -\fB\-x\fR -option\&. -\fIaddr\fR -is an IPv4 address in dotted\-decimal notation, or a colon\-delimited IPv6 address\&. -\fBmdig\fR -automatically performs a lookup for a query name like -11\&.12\&.13\&.10\&.in\-addr\&.arpa -and sets the query type and class to PTR and IN respectively\&. By default, IPv6 addresses are looked up using nibble format under the IP6\&.ARPA domain\&. -.PP -The local query options are: -.PP -\fB+[no]aaflag\fR -.RS 4 -A synonym for -\fI+[no]aaonly\fR\&. -.RE -.PP -\fB+[no]aaonly\fR -.RS 4 -Sets the "aa" flag in the query\&. -.RE -.PP -\fB+[no]adflag\fR -.RS 4 -Set [do not set] the AD (authentic data) bit in the query\&. This requests the server to return whether all of the answer and authority sections have all been validated as secure according to the security policy of the server\&. AD=1 indicates that all records have been validated as secure and the answer is not from a OPT\-OUT range\&. AD=0 indicate that some part of the answer was insecure or not validated\&. This bit is set by default\&. -.RE -.PP -\fB+bufsize=B\fR -.RS 4 -Set the UDP message buffer size advertised using EDNS0 to -\fIB\fR -bytes\&. The maximum and minimum sizes of this buffer are 65535 and 0 respectively\&. Values outside this range are rounded up or down appropriately\&. Values other than zero will cause a EDNS query to be sent\&. -.RE -.PP -\fB+[no]cdflag\fR -.RS 4 -Set [do not set] the CD (checking disabled) bit in the query\&. This requests the server to not perform DNSSEC validation of responses\&. -.RE -.PP -\fB+[no]cookie\fR\fB[=####]\fR -.RS 4 -Send a COOKIE EDNS option, with optional value\&. Replaying a COOKIE from a previous response will allow the server to identify a previous client\&. The default is -\fB+nocookie\fR\&. -.RE -.PP -\fB+[no]dnssec\fR -.RS 4 -Requests DNSSEC records be sent by setting the DNSSEC OK bit (DO) in the OPT record in the additional section of the query\&. -.RE -.PP -\fB+[no]edns[=#]\fR -.RS 4 -Specify the EDNS version to query with\&. Valid values are 0 to 255\&. Setting the EDNS version will cause a EDNS query to be sent\&. -\fB+noedns\fR -clears the remembered EDNS version\&. EDNS is set to 0 by default\&. -.RE -.PP -\fB+[no]ednsflags[=#]\fR -.RS 4 -Set the must\-be\-zero EDNS flags bits (Z bits) to the specified value\&. Decimal, hex and octal encodings are accepted\&. Setting a named flag (e\&.g\&. DO) will silently be ignored\&. By default, no Z bits are set\&. -.RE -.PP -\fB+[no]ednsopt[=code[:value]]\fR -.RS 4 -Specify EDNS option with code point -\fBcode\fR -and optionally payload of -\fBvalue\fR -as a hexadecimal string\&. -\fB+noednsopt\fR -clears the EDNS options to be sent\&. -.RE -.PP -\fB+[no]expire\fR -.RS 4 -Send an EDNS Expire option\&. -.RE -.PP -\fB+[no]nsid\fR -.RS 4 -Include an EDNS name server ID request when sending a query\&. -.RE -.PP -\fB+[no]recurse\fR -.RS 4 -Toggle the setting of the RD (recursion desired) bit in the query\&. This bit is set by default, which means -\fBmdig\fR -normally sends recursive queries\&. -.RE -.PP -\fB+retry=T\fR -.RS 4 -Sets the number of times to retry UDP queries to server to -\fIT\fR -instead of the default, 2\&. Unlike -\fI+tries\fR, this does not include the initial query\&. -.RE -.PP -\fB+[no]subnet=addr[/prefix\-length]\fR -.RS 4 -Send (don\*(Aqt send) an EDNS Client Subnet option with the specified IP address or network prefix\&. -.sp -\fBmdig +subnet=0\&.0\&.0\&.0/0\fR, or simply -\fBmdig +subnet=0\fR -for short, sends an EDNS client\-subnet option with an empty address and a source prefix\-length of zero, which signals a resolver that the client\*(Aqs address information must -\fInot\fR -be used when resolving this query\&. -.RE -.PP -\fB+timeout=T\fR -.RS 4 -Sets the timeout for a query to -\fIT\fR -seconds\&. The default timeout is 5 seconds for UDP transport and 10 for TCP\&. An attempt to set -\fIT\fR -to less than 1 will result in a query timeout of 1 second being applied\&. -.RE -.PP -\fB+tries=T\fR -.RS 4 -Sets the number of times to try UDP queries to server to -\fIT\fR -instead of the default, 3\&. If -\fIT\fR -is less than or equal to zero, the number of tries is silently rounded up to 1\&. -.RE -.PP -\fB+udptimeout=T\fR -.RS 4 -Sets the timeout between UDP query retries\&. -.RE -.PP -\fB+[no]unknownformat\fR -.RS 4 -Print all RDATA in unknown RR type presentation format (RFC 3597)\&. The default is to print RDATA for known types in the type\*(Aqs presentation format\&. -.RE -.PP -\fB+[no]zflag\fR -.RS 4 -Set [do not set] the last unassigned DNS header flag in a DNS query\&. This flag is off by default\&. -.RE -.SH "SEE ALSO" -.PP -\fBdig\fR(1), -RFC1035\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2015-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/tools/mdig.docbook b/bin/tools/mdig.docbook deleted file mode 100644 index bc4e8ff50c..0000000000 --- a/bin/tools/mdig.docbook +++ /dev/null @@ -1,702 +0,0 @@ -]> - - - - - - 2015-01-05 - - - ISC - Internet Systems Consortium, Inc. - - - mdig - 1 - BIND9 - - - mdig - DNS pipelined lookup utility - - - - - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - mdig - @server - - - - - - - - - - - - - - - plusopt - - - - mdig - -h - - - - mdig - @server - global-opt - - local-opt - query - - - - - DESCRIPTION - - mdig - is a multiple/pipelined query version of dig: - instead of waiting for a response after sending each query, - it begins by sending all queries. Responses are displayed in - the order in which they are received, not in the order the - corresponding queries were sent. - - - - mdig options are a subset of the - dig options, and are divided into "anywhere - options" which can occur anywhere, "global options" which must - occur before the query name (or they are ignored with a warning), - and "local options" which apply to the next query on the command - line. - - - - The @server option is a mandatory global - option. It is the name or IP address of the name server to query. - (Unlike dig, this value is not retrieved from - /etc/resolv.conf.) It can be an IPv4 address - in dotted-decimal notation, an IPv6 address in colon-delimited - notation, or a hostname. When the supplied - server argument is a hostname, - mdig resolves that name before querying - the name server. - - - mdig - provides a number of query options which affect - the way in which lookups are made and the results displayed. Some of - these set or reset flag bits in the query header, some determine which - sections of the answer get printed, and others determine the timeout - and retry strategies. - - - - Each query option is identified by a keyword preceded by a plus - sign (+). Some keywords set or reset an - option. These may be preceded by the string no - to negate the meaning of that keyword. Other keywords assign - values to options like the timeout interval. They have the - form . - - - - ANYWHERE OPTIONS - - - - The option makes mdig - operate in batch mode by reading a list of lookup requests to - process from the file filename. The file - contains a number of queries, one per line. Each entry in the - file should be organized in the same way they would be presented - as queries to mdig using the command-line interface. - - - - The causes mdig to - print the detailed help with the full list of options and exit. - - - - The causes mdig to - print the version number and exit. - - - - GLOBAL OPTIONS - - - - The option forces mdig to - only use IPv4 query transport. - - - - The option forces mdig to - only use IPv6 query transport. - - - - The option sets the source IP address of the - query to address. This must be a valid - address on one of the host's network interfaces or "0.0.0.0" or - "::". An optional port may be specified by appending - "#<port>" - - - - The option enables memory usage debugging. - - - - The option is used when a non-standard port - number is to be queried. - port# is the port number - that mdig will send its queries instead of - the standard DNS port number 53. This option would be used to - test a name server that has been configured to listen for - queries on a non-standard port number. - - - - The global query options are: - - - - - - - Display [do not display] the additional section of a - reply. The default is to display it. - - - - - - - - - Set or clear all display flags. - - - - - - - - - Display [do not display] the answer section of a - reply. The default is to display it. - - - - - - - - - Display [do not display] the authority section of a - reply. The default is to display it. - - - - - - - - - Attempt to display the contents of messages which are - malformed. The default is to not display malformed - answers. - - - - - - - - - Display [do not display] the CLASS when printing the - record. - - - - - - - - - Toggle the display of comment lines in the output. - The default is to print comments. - - - - - - - - - Continue on errors (e.g. timeouts). - - - - - - - - - Toggle the display of cryptographic fields in DNSSEC - records. The contents of these field are unnecessary - to debug most DNSSEC validation failures and removing - them makes it easier to see the common failures. The - default is to display the fields. When omitted they - are replaced by the string "[omitted]" or in the - DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". - - - - - - - - Set the DSCP code point to be used when sending the - query. Valid DSCP code points are in the range - [0..63]. By default no code point is explicitly set. - - - - - - - - - Print records like the SOA records in a verbose - multi-line format with human-readable comments. The - default is to print each record on a single line, to - facilitate machine parsing of the mdig - output. - - - - - - - - - Print [do not print] the question section of a query - when an answer is returned. The default is to print - the question section as a comment. - - - - - - - - - Toggle the display of per-record comments in the - output (for example, human-readable key information - about DNSKEY records). The default is not to print - record comments unless multiline mode is active. - - - - - - - - - Provide a terse answer. The default is to print the - answer in a verbose form. - - - - - - - - - Split long hex- or base64-formatted fields in resource - records into chunks of W - characters (where W is rounded - up to the nearest multiple of 4). - +nosplit or - +split=0 causes fields not to - be split at all. The default is 56 characters, or - 44 characters when multiline mode is active. - - - - - - - - - Use [do not use] TCP when querying name servers. The - default behavior is to use UDP. - - - - - - - - - Display [do not display] the TTL when printing the - record. - - - - - - - - - Display [do not display] the TTL in friendly human-readable - time units of "s", "m", "h", "d", and "w", representing - seconds, minutes, hours, days and weeks. Implies +ttlid. - - - - - - - - - Use [do not use] TCP when querying name servers. This - alternate syntax to +[no]tcp - is provided for backwards compatibility. The "vc" - stands for "virtual circuit". - - - - - - - - - Print the responses in a detailed YAML format. - - - - - - - - - - LOCAL OPTIONS - - - - The option sets the query class to - class. It can be any valid query class - which is supported in BIND 9. The default query class is "IN". - - - - The option sets the query type to - type. It can be any valid query type - which is supported in BIND 9. The default query type is "A", - unless the option is supplied to indicate - a reverse lookup with the "PTR" query type. - - - - Reverse lookups — mapping addresses to names — are - simplified by the option. - addr is an IPv4 - address in dotted-decimal notation, or a colon-delimited IPv6 address. - mdig automatically performs a lookup for a - query name like 11.12.13.10.in-addr.arpa and - sets the query type and class to PTR and IN respectively. - By default, IPv6 addresses are looked up using nibble format - under the IP6.ARPA domain. - - - - The local query options are: - - - - - - - A synonym for +[no]aaonly. - - - - - - - - - Sets the "aa" flag in the query. - - - - - - - - - Set [do not set] the AD (authentic data) bit in the - query. This requests the server to return whether - all of the answer and authority sections have all - been validated as secure according to the security - policy of the server. AD=1 indicates that all records - have been validated as secure and the answer is not - from a OPT-OUT range. AD=0 indicate that some part - of the answer was insecure or not validated. This - bit is set by default. - - - - - - - - - Set the UDP message buffer size advertised using EDNS0 - to B bytes. The maximum and - minimum sizes of this buffer are 65535 and 0 respectively. - Values outside this range are rounded up or down - appropriately. Values other than zero will cause a - EDNS query to be sent. - - - - - - - - - Set [do not set] the CD (checking disabled) bit in - the query. This requests the server to not perform - DNSSEC validation of responses. - - - - - - - - - Send a COOKIE EDNS option, with optional value. - Replaying a COOKIE from a previous response will allow - the server to identify a previous client. The default - is . - - - - - - - - - Requests DNSSEC records be sent by setting the DNSSEC - OK bit (DO) in the OPT record in the additional section - of the query. - - - - - - - - - Specify the EDNS version to query with. Valid values - are 0 to 255. Setting the EDNS version will cause - a EDNS query to be sent. - clears the remembered EDNS version. EDNS is set to - 0 by default. - - - - - - - - - Set the must-be-zero EDNS flags bits (Z bits) to the - specified value. Decimal, hex and octal encodings are - accepted. Setting a named flag (e.g. DO) will silently be - ignored. By default, no Z bits are set. - - - - - - - - - Specify EDNS option with code point - and optionally payload of as a - hexadecimal string. - clears the EDNS options to be sent. - - - - - - - - - Send an EDNS Expire option. - - - - - - - - - Include an EDNS name server ID request when sending - a query. - - - - - - - - - Toggle the setting of the RD (recursion desired) bit - in the query. This bit is set by default, which means - mdig normally sends recursive - queries. - - - - - - - - - Sets the number of times to retry UDP queries to - server to T instead of the - default, 2. Unlike +tries, - this does not include the initial query. - - - - - - - - - Send (don't send) an EDNS Client Subnet option with the - specified IP address or network prefix. - - - mdig +subnet=0.0.0.0/0, or simply - mdig +subnet=0 for short, sends an EDNS - client-subnet option with an empty address and a source - prefix-length of zero, which signals a resolver that - the client's address information must - not be used when resolving - this query. - - - - - - - - - Sets the timeout for a query to - T seconds. The default - timeout is 5 seconds for UDP transport and 10 for TCP. - An attempt to set T to less - than 1 will result - in a query timeout of 1 second being applied. - - - - - - - - - Sets the number of times to try UDP queries to server - to T instead of the default, - 3. If T is less than or equal - to zero, the number of tries is silently rounded up - to 1. - - - - - - - - - Sets the timeout between UDP query retries. - - - - - - - - - Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. - - - - - - - - - Set [do not set] the last unassigned DNS header flag in a - DNS query. This flag is off by default. - - - - - - - - - - SEE ALSO - - - dig1 - , - RFC1035. - - - diff --git a/bin/tools/mdig.html b/bin/tools/mdig.html deleted file mode 100644 index ded0635fcf..0000000000 --- a/bin/tools/mdig.html +++ /dev/null @@ -1,577 +0,0 @@ - - - - - -mdig - - -
-
- - - -
-

Name

-

- mdig - — DNS pipelined lookup utility -

-
- - - -
-

Synopsis

-

- mdig - {@server} - [-f filename] - [-h] - [-v] - [ - [-4] - | [-6] - ] - [-m] - [-b address] - [-p port#] - [-c class] - [-t type] - [-i] - [-x addr] - [plusopt...] -

- -

- mdig - {-h} -

- -

- mdig - [@server] - {global-opt...} - { - {local-opt...} - {query} - ...} -

-
- -
-

DESCRIPTION

- -

mdig - is a multiple/pipelined query version of dig: - instead of waiting for a response after sending each query, - it begins by sending all queries. Responses are displayed in - the order in which they are received, not in the order the - corresponding queries were sent. -

- -

- mdig options are a subset of the - dig options, and are divided into "anywhere - options" which can occur anywhere, "global options" which must - occur before the query name (or they are ignored with a warning), - and "local options" which apply to the next query on the command - line. -

- -

- The {@server} option is a mandatory global - option. It is the name or IP address of the name server to query. - (Unlike dig, this value is not retrieved from - /etc/resolv.conf.) It can be an IPv4 address - in dotted-decimal notation, an IPv6 address in colon-delimited - notation, or a hostname. When the supplied - server argument is a hostname, - mdig resolves that name before querying - the name server. -

- -

mdig - provides a number of query options which affect - the way in which lookups are made and the results displayed. Some of - these set or reset flag bits in the query header, some determine which - sections of the answer get printed, and others determine the timeout - and retry strategies. -

- -

- Each query option is identified by a keyword preceded by a plus - sign (+). Some keywords set or reset an - option. These may be preceded by the string no - to negate the meaning of that keyword. Other keywords assign - values to options like the timeout interval. They have the - form +keyword=value. -

-
- -
-

ANYWHERE OPTIONS

- - -

- The -f option makes mdig - operate in batch mode by reading a list of lookup requests to - process from the file filename. The file - contains a number of queries, one per line. Each entry in the - file should be organized in the same way they would be presented - as queries to mdig using the command-line interface. -

- -

- The -h causes mdig to - print the detailed help with the full list of options and exit. -

- -

- The -v causes mdig to - print the version number and exit. -

-
- -
-

GLOBAL OPTIONS

- - -

- The -4 option forces mdig to - only use IPv4 query transport. -

- -

- The -6 option forces mdig to - only use IPv6 query transport. -

- -

- The -b option sets the source IP address of the - query to address. This must be a valid - address on one of the host's network interfaces or "0.0.0.0" or - "::". An optional port may be specified by appending - "#<port>" -

- -

- The -m option enables memory usage debugging. -

- -

- The -p option is used when a non-standard port - number is to be queried. - port# is the port number - that mdig will send its queries instead of - the standard DNS port number 53. This option would be used to - test a name server that has been configured to listen for - queries on a non-standard port number. -

- -

- The global query options are: -

-
-
+[no]additional
-
-

- Display [do not display] the additional section of a - reply. The default is to display it. -

-
-
+[no]all
-
-

- Set or clear all display flags. -

-
-
+[no]answer
-
-

- Display [do not display] the answer section of a - reply. The default is to display it. -

-
-
+[no]authority
-
-

- Display [do not display] the authority section of a - reply. The default is to display it. -

-
-
+[no]besteffort
-
-

- Attempt to display the contents of messages which are - malformed. The default is to not display malformed - answers. -

-
-
+[no]cl
-
-

- Display [do not display] the CLASS when printing the - record. -

-
-
+[no]comments
-
-

- Toggle the display of comment lines in the output. - The default is to print comments. -

-
-
+[no]continue
-
-

- Continue on errors (e.g. timeouts). -

-
-
+[no]crypto
-
-

- Toggle the display of cryptographic fields in DNSSEC - records. The contents of these field are unnecessary - to debug most DNSSEC validation failures and removing - them makes it easier to see the common failures. The - default is to display the fields. When omitted they - are replaced by the string "[omitted]" or in the - DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". -

-
-
+dscp[=value]
-
-

- Set the DSCP code point to be used when sending the - query. Valid DSCP code points are in the range - [0..63]. By default no code point is explicitly set. -

-
-
+[no]multiline
-
-

- Print records like the SOA records in a verbose - multi-line format with human-readable comments. The - default is to print each record on a single line, to - facilitate machine parsing of the mdig - output. -

-
-
+[no]question
-
-

- Print [do not print] the question section of a query - when an answer is returned. The default is to print - the question section as a comment. -

-
-
+[no]rrcomments
-
-

- Toggle the display of per-record comments in the - output (for example, human-readable key information - about DNSKEY records). The default is not to print - record comments unless multiline mode is active. -

-
-
+[no]short
-
-

- Provide a terse answer. The default is to print the - answer in a verbose form. -

-
-
+split=W
-
-

- Split long hex- or base64-formatted fields in resource - records into chunks of W - characters (where W is rounded - up to the nearest multiple of 4). - +nosplit or - +split=0 causes fields not to - be split at all. The default is 56 characters, or - 44 characters when multiline mode is active. -

-
-
+[no]tcp
-
-

- Use [do not use] TCP when querying name servers. The - default behavior is to use UDP. -

-
-
+[no]ttlid
-
-

- Display [do not display] the TTL when printing the - record. -

-
-
+[no]ttlunits
-
-

- Display [do not display] the TTL in friendly human-readable - time units of "s", "m", "h", "d", and "w", representing - seconds, minutes, hours, days and weeks. Implies +ttlid. -

-
-
+[no]vc
-
-

- Use [do not use] TCP when querying name servers. This - alternate syntax to +[no]tcp - is provided for backwards compatibility. The "vc" - stands for "virtual circuit". -

-
-
+[no]yaml
-
-

- Print the responses in a detailed YAML format. -

-
-
-

- -

-
- -
-

LOCAL OPTIONS

- - -

- The -c option sets the query class to - class. It can be any valid query class - which is supported in BIND 9. The default query class is "IN". -

- -

- The -t option sets the query type to - type. It can be any valid query type - which is supported in BIND 9. The default query type is "A", - unless the -x option is supplied to indicate - a reverse lookup with the "PTR" query type. -

- -

- Reverse lookups — mapping addresses to names — are - simplified by the -x option. - addr is an IPv4 - address in dotted-decimal notation, or a colon-delimited IPv6 address. - mdig automatically performs a lookup for a - query name like 11.12.13.10.in-addr.arpa and - sets the query type and class to PTR and IN respectively. - By default, IPv6 addresses are looked up using nibble format - under the IP6.ARPA domain. -

- -

- The local query options are: -

-
-
+[no]aaflag
-
-

- A synonym for +[no]aaonly. -

-
-
+[no]aaonly
-
-

- Sets the "aa" flag in the query. -

-
-
+[no]adflag
-
-

- Set [do not set] the AD (authentic data) bit in the - query. This requests the server to return whether - all of the answer and authority sections have all - been validated as secure according to the security - policy of the server. AD=1 indicates that all records - have been validated as secure and the answer is not - from a OPT-OUT range. AD=0 indicate that some part - of the answer was insecure or not validated. This - bit is set by default. -

-
-
+bufsize=B
-
-

- Set the UDP message buffer size advertised using EDNS0 - to B bytes. The maximum and - minimum sizes of this buffer are 65535 and 0 respectively. - Values outside this range are rounded up or down - appropriately. Values other than zero will cause a - EDNS query to be sent. -

-
-
+[no]cdflag
-
-

- Set [do not set] the CD (checking disabled) bit in - the query. This requests the server to not perform - DNSSEC validation of responses. -

-
-
+[no]cookie[=####]
-
-

- Send a COOKIE EDNS option, with optional value. - Replaying a COOKIE from a previous response will allow - the server to identify a previous client. The default - is +nocookie. -

-
-
+[no]dnssec
-
-

- Requests DNSSEC records be sent by setting the DNSSEC - OK bit (DO) in the OPT record in the additional section - of the query. -

-
-
+[no]edns[=#]
-
-

- Specify the EDNS version to query with. Valid values - are 0 to 255. Setting the EDNS version will cause - a EDNS query to be sent. +noedns - clears the remembered EDNS version. EDNS is set to - 0 by default. -

-
-
+[no]ednsflags[=#]
-
-

- Set the must-be-zero EDNS flags bits (Z bits) to the - specified value. Decimal, hex and octal encodings are - accepted. Setting a named flag (e.g. DO) will silently be - ignored. By default, no Z bits are set. -

-
-
+[no]ednsopt[=code[:value]]
-
-

- Specify EDNS option with code point code - and optionally payload of value as a - hexadecimal string. +noednsopt - clears the EDNS options to be sent. -

-
-
+[no]expire
-
-

- Send an EDNS Expire option. -

-
-
+[no]nsid
-
-

- Include an EDNS name server ID request when sending - a query. -

-
-
+[no]recurse
-
-

- Toggle the setting of the RD (recursion desired) bit - in the query. This bit is set by default, which means - mdig normally sends recursive - queries. -

-
-
+retry=T
-
-

- Sets the number of times to retry UDP queries to - server to T instead of the - default, 2. Unlike +tries, - this does not include the initial query. -

-
-
+[no]subnet=addr[/prefix-length]
-
-

- Send (don't send) an EDNS Client Subnet option with the - specified IP address or network prefix. -

-

- mdig +subnet=0.0.0.0/0, or simply - mdig +subnet=0 for short, sends an EDNS - client-subnet option with an empty address and a source - prefix-length of zero, which signals a resolver that - the client's address information must - not be used when resolving - this query. -

-
-
+timeout=T
-
-

- Sets the timeout for a query to - T seconds. The default - timeout is 5 seconds for UDP transport and 10 for TCP. - An attempt to set T to less - than 1 will result - in a query timeout of 1 second being applied. -

-
-
+tries=T
-
-

- Sets the number of times to try UDP queries to server - to T instead of the default, - 3. If T is less than or equal - to zero, the number of tries is silently rounded up - to 1. -

-
-
+udptimeout=T
-
-

- Sets the timeout between UDP query retries. -

-
-
+[no]unknownformat
-
-

- Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. -

-
-
+[no]zflag
-
-

- Set [do not set] the last unassigned DNS header flag in a - DNS query. This flag is off by default. -

-
-
-

- -

-
- -
-

SEE ALSO

- -

- dig(1) - , - RFC1035. -

-
-
- diff --git a/bin/tools/mdig.rst b/bin/tools/mdig.rst new file mode 100644 index 0000000000..247232ed83 --- /dev/null +++ b/bin/tools/mdig.rst @@ -0,0 +1,318 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_mdig: + +mdig - DNS pipelined lookup utility +----------------------------------- + +Synopsis +~~~~~~~~ + +:program:`mdig` {@server} [**-f** filename] [**-h**] [**-v**] [ [**-4**] | [**-6**] ] [**-m**] [**-b** address] [**-p** port#] [**-c** class] [**-t** type] [**-i**] [**-x** addr] [plusopt...] + +:program:`mdig` {**-h**} + +:program:`mdig` [@server] {global-opt...} { {local-opt...} {query} ...} + +Description +~~~~~~~~~~~ + +``mdig`` is a multiple/pipelined query version of ``dig``: instead of +waiting for a response after sending each query, it begins by sending +all queries. Responses are displayed in the order in which they are +received, not in the order the corresponding queries were sent. + +``mdig`` options are a subset of the ``dig`` options, and are divided +into "anywhere options" which can occur anywhere, "global options" which +must occur before the query name (or they are ignored with a warning), +and "local options" which apply to the next query on the command line. + +The @server option is a mandatory global option. It is the name or IP +address of the name server to query. (Unlike ``dig``, this value is not +retrieved from ``/etc/resolv.conf``.) It can be an IPv4 address in +dotted-decimal notation, an IPv6 address in colon-delimited notation, or +a hostname. When the supplied ``server`` argument is a hostname, +``mdig`` resolves that name before querying the name server. + +``mdig`` provides a number of query options which affect the way in +which lookups are made and the results displayed. Some of these set or +reset flag bits in the query header, some determine which sections of +the answer get printed, and others determine the timeout and retry +strategies. + +Each query option is identified by a keyword preceded by a plus sign +(``+``). Some keywords set or reset an option. These may be preceded by +the string ``no`` to negate the meaning of that keyword. Other keywords +assign values to options like the timeout interval. They have the form +``+keyword=value``. + +Anywhere Options +~~~~~~~~~~~~~~~~ + +The ``-f`` option makes ``mdig`` operate in batch mode by reading a list +of lookup requests to process from the file ``filename``. The file +contains a number of queries, one per line. Each entry in the file +should be organized in the same way they would be presented as queries +to ``mdig`` using the command-line interface. + +The ``-h`` causes ``mdig`` to print the detailed help with the full list +of options and exit. + +The ``-v`` causes ``mdig`` to print the version number and exit. + +Global Options +~~~~~~~~~~~~~~ + +The ``-4`` option forces ``mdig`` to only use IPv4 query transport. + +The ``-6`` option forces ``mdig`` to only use IPv6 query transport. + +The ``-b`` option sets the source IP address of the query to +``address``. This must be a valid address on one of the host's network +interfaces or "0.0.0.0" or "::". An optional port may be specified by +appending "#" + +The ``-m`` option enables memory usage debugging. + +The ``-p`` option is used when a non-standard port number is to be +queried. ``port#`` is the port number that ``mdig`` will send its +queries instead of the standard DNS port number 53. This option would be +used to test a name server that has been configured to listen for +queries on a non-standard port number. + +The global query options are: + +``+[no]additional`` + Display [do not display] the additional section of a reply. The + default is to display it. + +``+[no]all`` + Set or clear all display flags. + +``+[no]answer`` + Display [do not display] the answer section of a reply. The default + is to display it. + +``+[no]authority`` + Display [do not display] the authority section of a reply. The + default is to display it. + +``+[no]besteffort`` + Attempt to display the contents of messages which are malformed. The + default is to not display malformed answers. + +``+[no]cl`` + Display [do not display] the CLASS when printing the record. + +``+[no]comments`` + Toggle the display of comment lines in the output. The default is to + print comments. + +``+[no]continue`` + Continue on errors (e.g. timeouts). + +``+[no]crypto`` + Toggle the display of cryptographic fields in DNSSEC records. The + contents of these field are unnecessary to debug most DNSSEC + validation failures and removing them makes it easier to see the + common failures. The default is to display the fields. When omitted + they are replaced by the string "[omitted]" or in the DNSKEY case the + key id is displayed as the replacement, e.g. "[ key id = value ]". + +``+dscp[=value]`` + Set the DSCP code point to be used when sending the query. Valid DSCP + code points are in the range [0..63]. By default no code point is + explicitly set. + +``+[no]multiline`` + Print records like the SOA records in a verbose multi-line format + with human-readable comments. The default is to print each record on + a single line, to facilitate machine parsing of the ``mdig`` output. + +``+[no]question`` + Print [do not print] the question section of a query when an answer + is returned. The default is to print the question section as a + comment. + +``+[no]rrcomments`` + Toggle the display of per-record comments in the output (for example, + human-readable key information about DNSKEY records). The default is + not to print record comments unless multiline mode is active. + +``+[no]short`` + Provide a terse answer. The default is to print the answer in a + verbose form. + +``+split=W`` + Split long hex- or base64-formatted fields in resource records into + chunks of ``W`` characters (where ``W`` is rounded up to the nearest + multiple of 4). ``+nosplit`` or ``+split=0`` causes fields not to be + split at all. The default is 56 characters, or 44 characters when + multiline mode is active. + +``+[no]tcp`` + Use [do not use] TCP when querying name servers. The default behavior + is to use UDP. + +``+[no]ttlid`` + Display [do not display] the TTL when printing the record. + +``+[no]ttlunits`` + Display [do not display] the TTL in friendly human-readable time + units of "s", "m", "h", "d", and "w", representing seconds, minutes, + hours, days and weeks. Implies +ttlid. + +``+[no]vc`` + Use [do not use] TCP when querying name servers. This alternate + syntax to ``+[no]tcp`` is provided for backwards compatibility. The + "vc" stands for "virtual circuit". + +Local Options +~~~~~~~~~~~~~ + +The ``-c`` option sets the query class to ``class``. It can be any valid +query class which is supported in BIND 9. The default query class is +"IN". + +The ``-t`` option sets the query type to ``type``. It can be any valid +query type which is supported in BIND 9. The default query type is "A", +unless the ``-x`` option is supplied to indicate a reverse lookup with +the "PTR" query type. + +Reverse lookups MDASH mapping addresses to names MDASH are simplified by +the ``-x`` option. ``addr`` is an IPv4 address in dotted-decimal +notation, or a colon-delimited IPv6 address. ``mdig`` automatically +performs a lookup for a query name like ``11.12.13.10.in-addr.arpa`` and +sets the query type and class to PTR and IN respectively. By default, +IPv6 addresses are looked up using nibble format under the IP6.ARPA +domain. + +The local query options are: + +``+[no]aaflag`` + A synonym for ``+[no]aaonly``. + +``+[no]aaonly`` + Sets the "aa" flag in the query. + +``+[no]adflag`` + Set [do not set] the AD (authentic data) bit in the query. This + requests the server to return whether all of the answer and authority + sections have all been validated as secure according to the security + policy of the server. AD=1 indicates that all records have been + validated as secure and the answer is not from a OPT-OUT range. AD=0 + indicate that some part of the answer was insecure or not validated. + This bit is set by default. + +``+bufsize=B`` + Set the UDP message buffer size advertised using EDNS0 to ``B`` + bytes. The maximum and minimum sizes of this buffer are 65535 and 0 + respectively. Values outside this range are rounded up or down + appropriately. Values other than zero will cause a EDNS query to be + sent. + +``+[no]cdflag`` + Set [do not set] the CD (checking disabled) bit in the query. This + requests the server to not perform DNSSEC validation of responses. + +``+[no]cookie=####`` + Send a COOKIE EDNS option, with optional value. Replaying a COOKIE + from a previous response will allow the server to identify a previous + client. The default is ``+nocookie``. + +``+[no]dnssec`` + Requests DNSSEC records be sent by setting the DNSSEC OK bit (DO) in + the OPT record in the additional section of the query. + +``+[no]edns[=#]`` + Specify the EDNS version to query with. Valid values are 0 to 255. + Setting the EDNS version will cause a EDNS query to be sent. + ``+noedns`` clears the remembered EDNS version. EDNS is set to 0 by + default. + +``+[no]ednsflags[=#]`` + Set the must-be-zero EDNS flags bits (Z bits) to the specified value. + Decimal, hex and octal encodings are accepted. Setting a named flag + (e.g. DO) will silently be ignored. By default, no Z bits are set. + +``+[no]ednsopt[=code[:value]]`` + Specify EDNS option with code point ``code`` and optionally payload + of ``value`` as a hexadecimal string. ``+noednsopt`` clears the EDNS + options to be sent. + +``+[no]expire`` + Send an EDNS Expire option. + +``+[no]nsid`` + Include an EDNS name server ID request when sending a query. + +``+[no]recurse`` + Toggle the setting of the RD (recursion desired) bit in the query. + This bit is set by default, which means ``mdig`` normally sends + recursive queries. + +``+retry=T`` + Sets the number of times to retry UDP queries to server to ``T`` + instead of the default, 2. Unlike ``+tries``, this does not include + the initial query. + +``+[no]subnet=addr[/prefix-length]`` + Send (don't send) an EDNS Client Subnet option with the specified IP + address or network prefix. + + ``mdig +subnet=0.0.0.0/0``, or simply ``mdig +subnet=0`` for short, + sends an EDNS client-subnet option with an empty address and a source + prefix-length of zero, which signals a resolver that the client's + address information must *not* be used when resolving this query. + +``+timeout=T`` + Sets the timeout for a query to ``T`` seconds. The default timeout is + 5 seconds for UDP transport and 10 for TCP. An attempt to set ``T`` + to less than 1 will result in a query timeout of 1 second being + applied. + +``+tries=T`` + Sets the number of times to try UDP queries to server to ``T`` + instead of the default, 3. If ``T`` is less than or equal to zero, + the number of tries is silently rounded up to 1. + +``+udptimeout=T`` + Sets the timeout between UDP query retries. + +``+[no]unknownformat`` + Print all RDATA in unknown RR type presentation format (:rfc:`3597`). + The default is to print RDATA for known types in the type's + presentation format. + +``+[no]yaml`` + Print the responses in a detailed YAML format. + +``+[no]zflag`` + Set [do not set] the last unassigned DNS header flag in a DNS query. + This flag is off by default. + +See Also +~~~~~~~~ + +:manpage:`dig(1)`, :rfc:`1035`. diff --git a/bin/tools/named-journalprint.8 b/bin/tools/named-journalprint.8 deleted file mode 100644 index a53132d1f3..0000000000 --- a/bin/tools/named-journalprint.8 +++ /dev/null @@ -1,68 +0,0 @@ -.\" Copyright (C) 2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: named-journalprint -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2009-12-04 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NAMED\-JOURNALPRINT" "8" "2009\-12\-04" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -named-journalprint \- print zone journal in human\-readable form -.SH "SYNOPSIS" -.HP \w'\fBnamed\-journalprint\fR\ 'u -\fBnamed\-journalprint\fR {\fIjournal\fR} -.SH "DESCRIPTION" -.PP -\fBnamed\-journalprint\fR -prints the contents of a zone journal file in a human\-readable form\&. -.PP -Journal files are automatically created by -\fBnamed\fR -when changes are made to dynamic zones (e\&.g\&., by -\fBnsupdate\fR)\&. They record each addition or deletion of a resource record, in binary format, allowing the changes to be re\-applied to the zone when the server is restarted after a shutdown or crash\&. By default, the name of the journal file is formed by appending the extension -\&.jnl -to the name of the corresponding zone file\&. -.PP -\fBnamed\-journalprint\fR -converts the contents of a given journal file into a human\-readable text format\&. Each line begins with "add" or "del", to indicate whether the record was added or deleted, and continues with the resource record in master\-file format\&. -.SH "SEE ALSO" -.PP -\fBnamed\fR(8), -\fBnsupdate\fR(1), -BIND 9 Administrator Reference Manual\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/tools/named-journalprint.docbook b/bin/tools/named-journalprint.docbook deleted file mode 100644 index 89c70b57f5..0000000000 --- a/bin/tools/named-journalprint.docbook +++ /dev/null @@ -1,94 +0,0 @@ - - - - - - 2009-12-04 - - - ISC - Internet Systems Consortium, Inc. - - - - named-journalprint - 8 - BIND9 - - - - named-journalprint - print zone journal in human-readable form - - - - - 2009 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - named-journalprint - journal - - - - DESCRIPTION - - - named-journalprint - prints the contents of a zone journal file in a human-readable - form. - - - Journal files are automatically created by named - when changes are made to dynamic zones (e.g., by - nsupdate). They record each addition - or deletion of a resource record, in binary format, allowing the - changes to be re-applied to the zone when the server is - restarted after a shutdown or crash. By default, the name of - the journal file is formed by appending the extension - .jnl to the name of the corresponding - zone file. - - - named-journalprint converts the contents of a given - journal file into a human-readable text format. Each line begins - with "add" or "del", to indicate whether the record was added or - deleted, and continues with the resource record in master-file - format. - - - - SEE ALSO - - - - named8 - , - - nsupdate1 - , - BIND 9 Administrator Reference Manual. - - - - diff --git a/bin/tools/named-journalprint.html b/bin/tools/named-journalprint.html deleted file mode 100644 index 843b64071f..0000000000 --- a/bin/tools/named-journalprint.html +++ /dev/null @@ -1,83 +0,0 @@ - - - - - -named-journalprint - - -
-
- - - - - -
-

Name

-

- named-journalprint - — print zone journal in human-readable form -

-
- - - -
-

Synopsis

-

- named-journalprint - {journal} -

-
- -
-

DESCRIPTION

- -

- named-journalprint - prints the contents of a zone journal file in a human-readable - form. -

-

- Journal files are automatically created by named - when changes are made to dynamic zones (e.g., by - nsupdate). They record each addition - or deletion of a resource record, in binary format, allowing the - changes to be re-applied to the zone when the server is - restarted after a shutdown or crash. By default, the name of - the journal file is formed by appending the extension - .jnl to the name of the corresponding - zone file. -

-

- named-journalprint converts the contents of a given - journal file into a human-readable text format. Each line begins - with "add" or "del", to indicate whether the record was added or - deleted, and continues with the resource record in master-file - format. -

-
- -
-

SEE ALSO

- -

- - named(8) - , - - nsupdate(1) - , - BIND 9 Administrator Reference Manual. -

-
- -
- diff --git a/bin/tools/named-journalprint.rst b/bin/tools/named-journalprint.rst new file mode 100644 index 0000000000..93d58f6495 --- /dev/null +++ b/bin/tools/named-journalprint.rst @@ -0,0 +1,56 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_named-journalprint: + +named-journalprint - print zone journal in human-readable form +-------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named-journalprint` {journal} + +Description +~~~~~~~~~~~ + +``named-journalprint`` prints the contents of a zone journal file in a +human-readable form. + +Journal files are automatically created by ``named`` when changes are +made to dynamic zones (e.g., by ``nsupdate``). They record each addition +or deletion of a resource record, in binary format, allowing the changes +to be re-applied to the zone when the server is restarted after a +shutdown or crash. By default, the name of the journal file is formed by +appending the extension ``.jnl`` to the name of the corresponding zone +file. + +``named-journalprint`` converts the contents of a given journal file +into a human-readable text format. Each line begins with "add" or "del", +to indicate whether the record was added or deleted, and continues with +the resource record in master-file format. + +See Also +~~~~~~~~ + +:manpage:`named(8)`, :manpage:`nsupdate(1)`, BIND 9 Administrator Reference Manual. diff --git a/bin/tools/named-nzd2nzf.8 b/bin/tools/named-nzd2nzf.8 deleted file mode 100644 index ae80172037..0000000000 --- a/bin/tools/named-nzd2nzf.8 +++ /dev/null @@ -1,67 +0,0 @@ -.\" Copyright (C) 2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: named-nzd2nzf -.\" Author: [see the "AUTHOR" section] -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: May 5, 2016 -.\" Manual: BIND9 -.\" Source: BIND9 -.\" Language: English -.\" -.TH "NAMED\-NZD2NZF" "8" "May 5, 2016" "BIND9" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -named-nzd2nzf \- Convert an NZD database to NZF text format -.SH "SYNOPSIS" -.HP \w'\fBnamed\-nzd2nzf\fR\ 'u -\fBnamed\-nzd2nzf\fR {filename} -.SH "DESCRIPTION" -.PP -\fBnamed\-nzd2nzf\fR -converts an NZD database to NZF format and prints it to standard output\&. This can be used to review the configuration of zones that were added to -\fBnamed\fR -via -\fBrndc addzone\fR\&. It can also be used to restore the old file format when rolling back from a newer version of BIND to an older version\&. -.SH "ARGUMENTS" -.PP -filename -.RS 4 -The name of the -\&.nzd -file whose contents should be printed\&. -.RE -.SH "SEE ALSO" -.PP -BIND 9 Administrator Reference Manual -.SH "AUTHOR" -.PP -Internet Systems Consortium -.SH "COPYRIGHT" -.br -Copyright \(co 2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/tools/named-nzd2nzf.docbook b/bin/tools/named-nzd2nzf.docbook deleted file mode 100644 index 6c60be8fb0..0000000000 --- a/bin/tools/named-nzd2nzf.docbook +++ /dev/null @@ -1,95 +0,0 @@ -]> - - - - - May 5, 2016 - - - - named-nzd2nzf - 8 - BIND9 - - - - named-nzd2nzf - - Convert an NZD database to NZF text format - - - - - - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - named-nzd2nzf - filename - - - - - DESCRIPTION - - named-nzd2nzf converts an NZD database to NZF - format and prints it to standard output. This can be used to - review the configuration of zones that were added to - named via rndc addzone. - It can also be used to restore the old file format - when rolling back from a newer version - of BIND to an older version. - - - - - ARGUMENTS - - - filename - - - The name of the .nzd file whose contents - should be printed. - - - - - - - - SEE ALSO - - BIND 9 Administrator Reference Manual - - - - - AUTHOR - Internet Systems Consortium - - - - diff --git a/bin/tools/named-nzd2nzf.html b/bin/tools/named-nzd2nzf.html deleted file mode 100644 index 132bd40e09..0000000000 --- a/bin/tools/named-nzd2nzf.html +++ /dev/null @@ -1,85 +0,0 @@ - - - - - -named-nzd2nzf - - -
-
- - - - -
-

Name

-

- named-nzd2nzf - — - Convert an NZD database to NZF text format - -

-
- - - -
-

Synopsis

-

- named-nzd2nzf - {filename} -

-
- -
-

DESCRIPTION

- -

- named-nzd2nzf converts an NZD database to NZF - format and prints it to standard output. This can be used to - review the configuration of zones that were added to - named via rndc addzone. - It can also be used to restore the old file format - when rolling back from a newer version - of BIND to an older version. -

-
- -
-

ARGUMENTS

- -
-
filename
-
-

- The name of the .nzd file whose contents - should be printed. -

-
-
-
- -
-

SEE ALSO

- -

- BIND 9 Administrator Reference Manual -

-
- -
-

AUTHOR

- -

Internet Systems Consortium -

-
- -
- diff --git a/bin/tools/named-nzd2nzf.rst b/bin/tools/named-nzd2nzf.rst new file mode 100644 index 0000000000..3cd7494711 --- /dev/null +++ b/bin/tools/named-nzd2nzf.rst @@ -0,0 +1,52 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_named-nzd2nzf: + +named-nzd2nzf - convert an NZD database to NZF text format +---------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named-nzd2nzf` {filename} + +Description +~~~~~~~~~~~ + +``named-nzd2nzf`` converts an NZD database to NZF format and prints it +to standard output. This can be used to review the configuration of +zones that were added to ``named`` via ``rndc addzone``. It can also be +used to restore the old file format when rolling back from a newer +version of BIND to an older version. + +Arguments +~~~~~~~~~ + +filename + The name of the ``.nzd`` file whose contents should be printed. + +See Also +~~~~~~~~ + +BIND 9 Administrator Reference Manual. diff --git a/bin/tools/named-rrchecker.1 b/bin/tools/named-rrchecker.1 deleted file mode 100644 index 0054b171fc..0000000000 --- a/bin/tools/named-rrchecker.1 +++ /dev/null @@ -1,81 +0,0 @@ -.\" Copyright (C) 2013-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: named-rrchecker -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2013-11-12 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NAMED\-RRCHECKER" "1" "2013\-11\-12" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -named-rrchecker \- syntax checker for individual DNS resource records -.SH "SYNOPSIS" -.HP \w'\fBnamed\-rrchecker\fR\ 'u -\fBnamed\-rrchecker\fR [\fB\-h\fR] [\fB\-o\ \fR\fB\fIorigin\fR\fR] [\fB\-p\fR] [\fB\-u\fR] [\fB\-C\fR] [\fB\-T\fR] [\fB\-P\fR] -.SH "DESCRIPTION" -.PP -\fBnamed\-rrchecker\fR -read a individual DNS resource record from standard input and checks if it is syntactically correct\&. -.PP -The -\fB\-h\fR -prints out the help menu\&. -.PP -The -\fB\-o \fR\fB\fIorigin\fR\fR -option specifies a origin to be used when interpreting the record\&. -.PP -The -\fB\-p\fR -prints out the resulting record in canonical form\&. If there is no canonical form defined then the record will be printed in unknown record format\&. -.PP -The -\fB\-u\fR -prints out the resulting record in unknown record form\&. -.PP -The -\fB\-C\fR, -\fB\-T\fR -and -\fB\-P\fR -print out the known class, standard type and private type mnemonics respectively\&. -.SH "SEE ALSO" -.PP -RFC 1034, -RFC 1035, -\fBnamed\fR(8) -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2013-2016, 2018-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/tools/named-rrchecker.docbook b/bin/tools/named-rrchecker.docbook deleted file mode 100644 index 7293cf261a..0000000000 --- a/bin/tools/named-rrchecker.docbook +++ /dev/null @@ -1,97 +0,0 @@ - - - - - - 2013-11-12 - - - ISC - Internet Systems Consortium, Inc. - - - named-rrchecker - 1 - BIND9 - - - named-rrchecker - syntax checker for individual DNS resource records - - - - - 2013 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - named-rrchecker - - - - - - - - - - - DESCRIPTION - - named-rrchecker - read a individual DNS resource record from standard input and checks if it - is syntactically correct. - - - The prints out the help menu. - - - The - option specifies a origin to be used when interpreting the record. - - - The prints out the resulting record in canonical - form. If there is no canonical form defined then the record will be - printed in unknown record format. - - - The prints out the resulting record in unknown record - form. - - - The , and - print out the known class, standard type and private type mnemonics - respectively. - - - - SEE ALSO - - - RFC 1034, - RFC 1035, - - named8 - - - - - diff --git a/bin/tools/named-rrchecker.html b/bin/tools/named-rrchecker.html deleted file mode 100644 index 64cb5f66ae..0000000000 --- a/bin/tools/named-rrchecker.html +++ /dev/null @@ -1,87 +0,0 @@ - - - - - -named-rrchecker - - -
-
- - - -
-

Name

-

- named-rrchecker - — syntax checker for individual DNS resource records -

-
- - - -
-

Synopsis

-

- named-rrchecker - [-h] - [-o origin] - [-p] - [-u] - [-C] - [-T] - [-P] -

-
- -
-

DESCRIPTION

- -

named-rrchecker - read a individual DNS resource record from standard input and checks if it - is syntactically correct. -

-

- The -h prints out the help menu. -

-

- The -o origin - option specifies a origin to be used when interpreting the record. -

-

- The -p prints out the resulting record in canonical - form. If there is no canonical form defined then the record will be - printed in unknown record format. -

-

- The -u prints out the resulting record in unknown record - form. -

-

- The -C, -T and -P - print out the known class, standard type and private type mnemonics - respectively. -

-
- -
-

SEE ALSO

- -

- RFC 1034, - RFC 1035, - - named(8) - -

-
- -
- diff --git a/bin/tools/named-rrchecker.rst b/bin/tools/named-rrchecker.rst new file mode 100644 index 0000000000..c2826e1096 --- /dev/null +++ b/bin/tools/named-rrchecker.rst @@ -0,0 +1,57 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_named-rrchecker: + +named-rrchecker - syntax checker for individual DNS resource records +-------------------------------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named-rrchecker` [**-h**] [**-o** origin] [**-p**] [**-u**] [**-C**] [**-T**] [**-P**] + +Description +~~~~~~~~~~~ + +``named-rrchecker`` read a individual DNS resource record from standard +input and checks if it is syntactically correct. + +The ``-h`` prints out the help menu. + +The ``-o origin`` option specifies a origin to be used when interpreting +the record. + +The ``-p`` prints out the resulting record in canonical form. If there +is no canonical form defined then the record will be printed in unknown +record format. + +The ``-u`` prints out the resulting record in unknown record form. + +The ``-C``, ``-T`` and ``-P`` print out the known class, standard type +and private type mnemonics respectively. + +See Also +~~~~~~~~ + +:rfc:`1034`, :rfc:`1035`, :manpage:`named(8)`. diff --git a/bin/tools/nsec3hash.8 b/bin/tools/nsec3hash.8 deleted file mode 100644 index 9e5bc0fb69..0000000000 --- a/bin/tools/nsec3hash.8 +++ /dev/null @@ -1,88 +0,0 @@ -.\" Copyright (C) 2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.\" -.\" This Source Code Form is subject to the terms of the Mozilla Public -.\" License, v. 2.0. If a copy of the MPL was not distributed with this -.\" file, You can obtain one at http://mozilla.org/MPL/2.0/. -.\" -.hy 0 -.ad l -'\" t -.\" Title: nsec3hash -.\" Author: -.\" Generator: DocBook XSL Stylesheets v1.78.1 -.\" Date: 2009-03-02 -.\" Manual: BIND9 -.\" Source: ISC -.\" Language: English -.\" -.TH "NSEC3HASH" "8" "2009\-03\-02" "ISC" "BIND9" -.\" ----------------------------------------------------------------- -.\" * Define some portability stuff -.\" ----------------------------------------------------------------- -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.\" http://bugs.debian.org/507673 -.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html -.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -.ie \n(.g .ds Aq \(aq -.el .ds Aq ' -.\" ----------------------------------------------------------------- -.\" * set default formatting -.\" ----------------------------------------------------------------- -.\" disable hyphenation -.nh -.\" disable justification (adjust text to left margin only) -.ad l -.\" ----------------------------------------------------------------- -.\" * MAIN CONTENT STARTS HERE * -.\" ----------------------------------------------------------------- -.SH "NAME" -nsec3hash \- generate NSEC3 hash -.SH "SYNOPSIS" -.HP \w'\fBnsec3hash\fR\ 'u -\fBnsec3hash\fR {\fIsalt\fR} {\fIalgorithm\fR} {\fIiterations\fR} {\fIdomain\fR} -.HP \w'\fBnsec3hash\ \-r\fR\ 'u -\fBnsec3hash \-r\fR {\fIalgorithm\fR} {\fIflags\fR} {\fIiterations\fR} {\fIsalt\fR} {\fIdomain\fR} -.SH "DESCRIPTION" -.PP -\fBnsec3hash\fR -generates an NSEC3 hash based on a set of NSEC3 parameters\&. This can be used to check the validity of NSEC3 records in a signed zone\&. -.PP -If this command is invoked as -\fBnsec3hash \-r\fR, it takes arguments in an order matching the first four fields of an NSEC3 record, followed by the domain name: algorithm, flags, iterations, salt, domain\&. This makes it convenient to copy and paste a portion of an NSEC3 or NSEC3PARAM record into a command line to confirm the correctness of an NSEC3 hash\&. -.SH "ARGUMENTS" -.PP -salt -.RS 4 -The salt provided to the hash algorithm\&. -.RE -.PP -algorithm -.RS 4 -A number indicating the hash algorithm\&. Currently the only supported hash algorithm for NSEC3 is SHA\-1, which is indicated by the number 1; consequently "1" is the only useful value for this argument\&. -.RE -.PP -flags -.RS 4 -Provided for compatibility with NSEC3 record presentation format, but ignored since the flags do not affect the hash\&. -.RE -.PP -iterations -.RS 4 -The number of additional times the hash should be performed\&. -.RE -.PP -domain -.RS 4 -The domain name to be hashed\&. -.RE -.SH "SEE ALSO" -.PP -BIND 9 Administrator Reference Manual, -RFC 5155\&. -.SH "AUTHOR" -.PP -\fBInternet Systems Consortium, Inc\&.\fR -.SH "COPYRIGHT" -.br -Copyright \(co 2009, 2014-2020 Internet Systems Consortium, Inc. ("ISC") -.br diff --git a/bin/tools/nsec3hash.docbook b/bin/tools/nsec3hash.docbook deleted file mode 100644 index d9e929f192..0000000000 --- a/bin/tools/nsec3hash.docbook +++ /dev/null @@ -1,146 +0,0 @@ - - - - - - 2009-03-02 - - - ISC - Internet Systems Consortium, Inc. - - - - nsec3hash - 8 - BIND9 - - - - nsec3hash - generate NSEC3 hash - - - - - 2009 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - nsec3hash - salt - algorithm - iterations - domain - - - nsec3hash -r - algorithm - flags - iterations - salt - domain - - - - DESCRIPTION - - - nsec3hash generates an NSEC3 hash based on - a set of NSEC3 parameters. This can be used to check the validity - of NSEC3 records in a signed zone. - - - - If this command is invoked as nsec3hash -r, - it takes arguments in an order matching the first four fields - of an NSEC3 record, followed by the domain name: algorithm, flags, - iterations, salt, domain. This makes it convenient to copy and - paste a portion of an NSEC3 or NSEC3PARAM record into a command - line to confirm the correctness of an NSEC3 hash. - - - - - ARGUMENTS - - - - salt - - - The salt provided to the hash algorithm. - - - - - - algorithm - - - A number indicating the hash algorithm. Currently the - only supported hash algorithm for NSEC3 is SHA-1, which is - indicated by the number 1; consequently "1" is the only - useful value for this argument. - - - - - - flags - - - Provided for compatibility with NSEC3 record presentation - format, but ignored since the flags do not affect the hash. - - - - - - iterations - - - The number of additional times the hash should be performed. - - - - - - domain - - - The domain name to be hashed. - - - - - - - SEE ALSO - - - BIND 9 Administrator Reference Manual, - RFC 5155. - - - - diff --git a/bin/tools/nsec3hash.html b/bin/tools/nsec3hash.html deleted file mode 100644 index 039be9e83a..0000000000 --- a/bin/tools/nsec3hash.html +++ /dev/null @@ -1,122 +0,0 @@ - - - - - -nsec3hash - - -
-
- - - - - -
-

Name

-

- nsec3hash - — generate NSEC3 hash -

-
- - - -
-

Synopsis

-

- nsec3hash - {salt} - {algorithm} - {iterations} - {domain} -

-

- nsec3hash -r - {algorithm} - {flags} - {iterations} - {salt} - {domain} -

-
- -
-

DESCRIPTION

- -

- nsec3hash generates an NSEC3 hash based on - a set of NSEC3 parameters. This can be used to check the validity - of NSEC3 records in a signed zone. -

- -

- If this command is invoked as nsec3hash -r, - it takes arguments in an order matching the first four fields - of an NSEC3 record, followed by the domain name: algorithm, flags, - iterations, salt, domain. This makes it convenient to copy and - paste a portion of an NSEC3 or NSEC3PARAM record into a command - line to confirm the correctness of an NSEC3 hash. -

- -
- -
-

ARGUMENTS

- -
-
salt
-
-

- The salt provided to the hash algorithm. -

-
-
algorithm
-
-

- A number indicating the hash algorithm. Currently the - only supported hash algorithm for NSEC3 is SHA-1, which is - indicated by the number 1; consequently "1" is the only - useful value for this argument. -

-
-
flags
-
-

- Provided for compatibility with NSEC3 record presentation - format, but ignored since the flags do not affect the hash. -

-
-
iterations
-
-

- The number of additional times the hash should be performed. -

-
-
domain
-
-

- The domain name to be hashed. -

-
-
-
- -
-

SEE ALSO

- -

- BIND 9 Administrator Reference Manual, - RFC 5155. -

-
- -
- diff --git a/bin/tools/nsec3hash.rst b/bin/tools/nsec3hash.rst new file mode 100644 index 0000000000..796ad99f72 --- /dev/null +++ b/bin/tools/nsec3hash.rst @@ -0,0 +1,73 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + +.. highlight: console + +.. _man_nsec3hash: + +nsec3hash - generate NSEC3 hash +------------------------------- + +Synopsis +~~~~~~~~ + +:program:`nsec3hash` {salt} {algorithm} {iterations} {domain} + +:program:`nsec3hash` **-r** {algorithm} {flags} {iterations} {salt} {domain} + +Description +~~~~~~~~~~~ + +``nsec3hash`` generates an NSEC3 hash based on a set of NSEC3 +parameters. This can be used to check the validity of NSEC3 records in a +signed zone. + +If this command is invoked as ``nsec3hash -r``, it takes arguments in an +order matching the first four fields of an NSEC3 record, followed by the +domain name: algorithm, flags, iterations, salt, domain. This makes it +convenient to copy and paste a portion of an NSEC3 or NSEC3PARAM record +into a command line to confirm the correctness of an NSEC3 hash. + +Arguments +~~~~~~~~~ + +``salt`` + The salt provided to the hash algorithm. + +``algorithm`` + A number indicating the hash algorithm. Currently the only supported + hash algorithm for NSEC3 is SHA-1, which is indicated by the number + 1; consequently "1" is the only useful value for this argument. + +``flags`` + Provided for compatibility with NSEC3 record presentation format, but + ignored since the flags do not affect the hash. + +``iterations`` + The number of additional times the hash should be performed. + +``domain`` + The domain name to be hashed. + +See Also +~~~~~~~~ + +BIND 9 Administrator Reference Manual, :rfc:`5155`. diff --git a/configure.ac b/configure.ac index 1041d273e5..fc66a21c53 100644 --- a/configure.ac +++ b/configure.ac @@ -58,7 +58,7 @@ AC_DEFINE([PACKAGE_BUILDER], ["make"], [make or Visual Studio]) AC_CONFIG_SRCDIR([bin/named/main.c]) AM_INIT_AUTOMAKE([foreign subdir-objects dist-xz -Wall -Werror]) AM_SILENT_RULES([yes]) -AM_EXTRA_RECURSIVE_TARGETS([test unit]) +AM_EXTRA_RECURSIVE_TARGETS([test unit doc]) AC_CONFIG_HEADERS([config.h]) AC_CONFIG_MACRO_DIR([m4]) @@ -116,6 +116,7 @@ AS_IF([test -z "$LIBTOOL"], AC_PROG_INSTALL AC_PROG_LN_S AX_POSIX_SHELL +AC_PROG_MKDIR_P # Initialize libtool LT_INIT([dlopen]) @@ -1267,6 +1268,37 @@ AS_IF([test "$enable_dnstap" != "no"], AC_SUBST([DNSTAP_CFLAGS]) AC_SUBST([DNSTAP_LIBS]) AM_CONDITIONAL([HAVE_DNSTAP], [test "$enable_dnstap" != "no"]) +# +# The following sections deal with tools used for formatting +# the documentation. They are all optional, unless you are +# a developer editing the documentation source. +# + +# +# Look for sphinx-build +# +AC_ARG_VAR([SPHINX_BUILD], [path to sphinx-build binary used to build the documentation]) +AC_PATH_PROG([SPHINX_BUILD], [sphinx-build], [:]) +AM_CONDITIONAL([HAVE_SPHINX_BUILD], [test "$SPHINX_BUILD" != ":"]) + +AC_PATH_PROG([XELATEX], [xelatex], [:]) +AC_PATH_PROG([LATEXMK], [latexmk], [:]) +AM_CONDITIONAL([HAVE_XELATEX], [test "$XELATEX" != ":" && test "$LATEXMK" != ":"]) + +# +# Pull release date from CHANGES file last modification date +# for reproducible builds +# +release_date=`date -r CHANGES +%Y-%m-%d` +AC_SUBST([RELEASE_DATE], $release_date) + +# +# Look for Doxygen +# +AC_PATH_PROGS([DOXYGEN], [doxygen]) + +AC_CONFIG_FILES([doc/doxygen/doxygen-input-filter], + [chmod +x doc/doxygen/doxygen-input-filter]) # # Look for curl @@ -1584,6 +1616,13 @@ AC_CONFIG_FILES([lib/Makefile lib/bind9/Makefile lib/samples/Makefile]) +# Documentation + +AC_CONFIG_FILES([doc/Makefile + doc/arm/Makefile + doc/man/Makefile + doc/misc/Makefile]) + # Generated headers AC_CONFIG_FILES([lib/isc/include/isc/platform.h]) diff --git a/doc/Makefile.am b/doc/Makefile.am new file mode 100644 index 0000000000..2811d5a65b --- /dev/null +++ b/doc/Makefile.am @@ -0,0 +1,9 @@ +SUBDIRS = . + +if HAVE_PERL +SUBDIRS += misc +endif + +if HAVE_SPHINX_BUILD +SUBDIRS += man arm +endif HAVE_SPHINX_BUILD diff --git a/doc/arm/.gitignore b/doc/arm/.gitignore index 05964d527b..ba65b13af5 100644 --- a/doc/arm/.gitignore +++ b/doc/arm/.gitignore @@ -1,3 +1 @@ -noteversion.xml -pkgversion.xml -releaseinfo.xml +/_build/ diff --git a/doc/arm/Bv9ARM-book.xml b/doc/arm/Bv9ARM-book.xml deleted file mode 100644 index 8af38b586c..0000000000 --- a/doc/arm/Bv9ARM-book.xml +++ /dev/null @@ -1,18587 +0,0 @@ - - - - - - BIND 9 Administrator Reference Manual - - - 2000 - 2001 - 2002 - 2003 - 2004 - 2005 - 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - Internet Systems Consortium, Inc. ("ISC") - - - - - - Introduction - - - The Internet Domain Name System (DNS) - consists of the syntax - to specify the names of entities in the Internet in a hierarchical - manner, the rules used for delegating authority over names, and the - system implementation that actually maps names to Internet - addresses. DNS data is maintained in a - group of distributed - hierarchical databases. - - -
Scope of Document - - - The Berkeley Internet Name Domain - (BIND) implements a - domain name server for a number of operating systems. This - document provides basic information about the installation and - care of the Internet Systems Consortium (ISC) - BIND version 9 software package for - system administrators. - - -
- -
Organization of This Document - - - In this document, Chapter 1 introduces - the basic DNS and BIND concepts. Chapter 2 - describes resource requirements for running BIND in various - environments. Information in Chapter 3 is - task-oriented in its presentation and is - organized functionally, to aid in the process of installing the - BIND 9 software. The task-oriented - section is followed by - Chapter 4, which contains more advanced - concepts that the system administrator may need for implementing - certain options. The contents of Chapter 5 are - organized as in a reference manual to aid in the ongoing - maintenance of the software. Chapter 6 addresses - security considerations, and - Chapter 7 contains troubleshooting help. The - main body of the document is followed by several - appendices which contain useful reference - information, such as a bibliography and - historic information related to BIND - and the Domain Name - System. - -
-
Conventions Used in This Document - - - In this document, we use the following general typographic - conventions: - - - - - - - - - - - To describe: - - - - - We use the style: - - - - - - - a pathname, filename, URL, hostname, - mailing list name, or new term or concept - - - - - Fixed width - - - - - - - literal user - input - - - - - Fixed Width Bold - - - - - - - program output - - - - - Fixed Width - - - - - - - - - The following conventions are used in descriptions of the - BIND configuration file: - - - - - - - - To describe: - - - - - We use the style: - - - - - - - keywords - - - - - Fixed Width - - - - - - - variables - - - - - Fixed Width - - - - - - - Optional input - - - - - Text is enclosed in square brackets - - - - - - - -
-
The Domain Name System (<acronym>DNS</acronym>) - - - The purpose of this document is to explain the installation - and upkeep of the BIND (Berkeley Internet - Name Domain) software package, and we - begin by reviewing the fundamentals of the Domain Name System - (DNS) as they relate to BIND. - - -
DNS Fundamentals - - - The Domain Name System (DNS) is a hierarchical, distributed - database. It stores information for mapping Internet host names to - IP - addresses and vice versa, mail routing information, and other data - used by Internet applications. - - - - Clients look up information in the DNS by calling a - resolver library, which sends queries to one or - more name servers and interprets the responses. - The BIND 9 software distribution - contains a name server, named, and a set - of associated tools. - - -
-
Domains and Domain Names - - - The data stored in the DNS is identified by domain names that are organized as a tree according to - organizational or administrative boundaries. Each node of the tree, - called a domain, is given a label. The domain - name of the - node is the concatenation of all the labels on the path from the - node to the root node. This is represented - in written form as a string of labels listed from right to left and - separated by dots. A label need only be unique within its parent - domain. - - - - For example, a domain name for a host at the - company Example, Inc. could be - ourhost.example.com, - where com is the - top level domain to which - ourhost.example.com belongs, - example is - a subdomain of com, and - ourhost is the - name of the host. - - - - For administrative purposes, the name space is partitioned into - areas called zones, each starting at a node and - extending down to the leaf nodes or to nodes where other zones - start. - The data for each zone is stored in a name server, which answers queries about the zone using the - DNS protocol. - - - - The data associated with each domain name is stored in the - form of resource records (RRs). - Some of the supported resource record types are described in - . - - - - For more detailed information about the design of the DNS and - the DNS protocol, please refer to the standards documents listed in - . - -
- -
Zones - - - To properly operate a name server, it is important to understand - the difference between a zone - and a domain. - - - - As stated previously, a zone is a point of delegation in - the DNS tree. A zone consists of - those contiguous parts of the domain - tree for which a name server has complete information and over which - it has authority. It contains all domain names from a certain point - downward in the domain tree except those which are delegated to - other zones. A delegation point is marked by one or more - NS records in the - parent zone, which should be matched by equivalent NS records at - the root of the delegated zone. - - - - For instance, consider the example.com - domain which includes names - such as host.aaa.example.com and - host.bbb.example.com even though - the example.com zone includes - only delegations for the aaa.example.com and - bbb.example.com zones. A zone can - map - exactly to a single domain, but could also include only part of a - domain, the rest of which could be delegated to other - name servers. Every name in the DNS - tree is a - domain, even if it is - terminal, that is, has no - subdomains. Every subdomain is a domain and - every domain except the root is also a subdomain. The terminology is - not intuitive and we suggest that you read RFCs 1033, 1034 and 1035 - to - gain a complete understanding of this difficult and subtle - topic. - - - - Though BIND is called a "domain name - server", - it deals primarily in terms of zones. The master and slave - declarations in the named.conf file - specify - zones, not domains. When you ask some other site if it is willing to - be a slave server for your domain, you are - actually asking for slave service for some collection of zones. - -
- -
Authoritative Name Servers - - - Each zone is served by at least - one authoritative name server, - which contains the complete data for the zone. - To make the DNS tolerant of server and network failures, - most zones have two or more authoritative servers, on - different networks. - - - - Responses from authoritative servers have the "authoritative - answer" (AA) bit set in the response packets. This makes them - easy to identify when debugging DNS configurations using tools like - dig (). - - -
The Primary Master - - - The authoritative server where the master copy of the zone - data is maintained is called the - primary master server, or simply the - primary. Typically it loads the zone - contents from some local file edited by humans or perhaps - generated mechanically from some other local file which is - edited by humans. This file is called the - zone file or - master file. - - - - In some cases, however, the master file may not be edited - by humans at all, but may instead be the result of - dynamic update operations. - -
- -
Slave Servers - - - The other authoritative servers, the slave - servers (also known as secondary servers) - load the zone contents from another server using a replication - process known as a zone transfer. - Typically the data are transferred directly from the primary - master, but it is also possible to transfer it from another - slave. In other words, a slave server may itself act as a - master to a subordinate slave server. - - - Periodically, the slave server must send a refresh query to - determine whether the zone contents have been updated. This - is done by sending a query for the zone's SOA record and - checking whether the SERIAL field has been updated; if so, - a new transfer request is initiated. The timing of these - refresh queries is controlled by the SOA REFRESH and RETRY - fields, but can be overridden with the - max-refresh-time, - min-refresh-time, - max-retry-time, and - min-retry-time options. - - - If the zone data cannot be updated within the time specified - by the SOA EXPIRE option (up to a hard-coded maximum of - 24 weeks) then the slave zone expires and will no longer - respond to queries. - -
- -
Stealth Servers - - - Usually all of the zone's authoritative servers are listed in - NS records in the parent zone. These NS records constitute - a delegation of the zone from the parent. - The authoritative servers are also listed in the zone file itself, - at the top level or apex - of the zone. You can list servers in the zone's top-level NS - records that are not in the parent's NS delegation, but you cannot - list servers in the parent's delegation that are not present at - the zone's top level. - - - - A stealth server is a server that is - authoritative for a zone but is not listed in that zone's NS - records. Stealth servers can be used for keeping a local copy of - a - zone to speed up access to the zone's records or to make sure that - the - zone is available even if all the "official" servers for the zone - are - inaccessible. - - - - A configuration where the primary master server itself is a - stealth server is often referred to as a "hidden primary" - configuration. One use for this configuration is when the primary - master - is behind a firewall and therefore unable to communicate directly - with the outside world. - - -
- -
-
Caching Name Servers - - - - - The resolver libraries provided by most operating systems are - stub resolvers, meaning that they are not - capable of - performing the full DNS resolution process by themselves by talking - directly to the authoritative servers. Instead, they rely on a - local - name server to perform the resolution on their behalf. Such a - server - is called a recursive name server; it performs - recursive lookups for local clients. - - - - To improve performance, recursive servers cache the results of - the lookups they perform. Since the processes of recursion and - caching are intimately connected, the terms - recursive server and - caching server are often used synonymously. - - - - The length of time for which a record may be retained in - the cache of a caching name server is controlled by the - Time To Live (TTL) field associated with each resource record. - - -
Forwarding - - - Even a caching name server does not necessarily perform - the complete recursive lookup itself. Instead, it can - forward some or all of the queries - that it cannot satisfy from its cache to another caching name - server, - commonly referred to as a forwarder. - - - - There may be one or more forwarders, - and they are queried in turn until the list is exhausted or an - answer - is found. Forwarders are typically used when you do not - wish all the servers at a given site to interact directly with the - rest of - the Internet servers. A typical scenario would involve a number - of internal DNS servers and an - Internet firewall. Servers unable - to pass packets through the firewall would forward to the server - that can do it, and that server would query the Internet DNS servers - on the internal server's behalf. - -
- -
- -
Name Servers in Multiple Roles - - - The BIND name server can - simultaneously act as - a master for some zones, a slave for other zones, and as a caching - (recursive) server for a set of local clients. - - - - However, since the functions of authoritative name service - and caching/recursive name service are logically separate, it is - often advantageous to run them on separate server machines. - - A server that only provides authoritative name service - (an authoritative-only server) can run with - recursion disabled, improving reliability and security. - - A server that is not authoritative for any zones and only provides - recursive service to local - clients (a caching-only server) - does not need to be reachable from the Internet at large and can - be placed inside a firewall. - - -
-
- -
- - <acronym>BIND</acronym> Resource Requirements - -
Hardware requirements - - DNS hardware requirements have - traditionally been quite modest. - For many installations, servers that have been pensioned off from - active duty have performed admirably as DNS servers. - - - The DNSSEC features of BIND 9 - may prove to be quite - CPU intensive however, so organizations that make heavy use of these - features may wish to consider larger systems for these applications. - BIND 9 is fully multithreaded, allowing - full utilization of - multiprocessor systems for installations that need it. - -
-
CPU Requirements - - CPU requirements for BIND 9 range from - i386-class machines - for serving of static zones without caching, to enterprise-class - machines if you intend to process many dynamic updates and DNSSEC - signed zones, serving many thousands of queries per second. - -
-
Memory Requirements - - The memory of the server has to be large enough to fit the - cache and zones loaded off disk. The max-cache-size - option can be used to limit the amount of memory used by the cache, - at the expense of reducing cache hit rates and causing more DNS - traffic. - It is still good practice to have enough memory to load - all zone and cache data into memory — unfortunately, the best - way - to determine this for a given installation is to watch the name server - in operation. After a few weeks the server process should reach - a relatively stable size where entries are expiring from the cache as - fast as they are being inserted. - - -
- -
Name Server Intensive Environment Issues - - - For name server intensive environments, there are two alternative - configurations that may be used. The first is where clients and - any second-level internal name servers query a main name server, which - has enough memory to build a large cache. This approach minimizes - the bandwidth used by external name lookups. The second alternative - is to set up second-level internal name servers to make queries - independently. - In this configuration, none of the individual machines needs to - have as much memory or CPU power as in the first alternative, but - this has the disadvantage of making many more external queries, - as none of the name servers share their cached data. - -
- -
Supported Operating Systems - - - ISC BIND 9 compiles and runs on a large - number - of Unix-like operating systems and on - Microsoft Windows Server 2012 R2, 2016 and Windows 10. - For an up-to-date - list of supported systems, see the PLATFORMS file in the top level - directory - of the BIND 9 source distribution. - -
-
- - Name Server Configuration - - - In this chapter we provide some suggested configurations along - with guidelines for their use. We suggest reasonable values for - certain option settings. - - -
Sample Configurations - -
A Caching-only Name Server - - - The following sample configuration is appropriate for a caching-only - name server for use by clients internal to a corporation. All - queries - from outside clients are refused using the allow-query - option. Alternatively, the same effect could be achieved using - suitable - firewall rules. - - - -// Two corporate subnets we wish to allow queries from. -acl corpnets { 192.168.4.0/24; 192.168.7.0/24; }; -options { - // Working directory - directory "/etc/namedb"; - - allow-query { corpnets; }; -}; -// Provide a reverse mapping for the loopback -// address 127.0.0.1 -zone "0.0.127.in-addr.arpa" { - type master; - file "localhost.rev"; - notify no; -}; - - -
- -
An Authoritative-only Name Server - - - This sample configuration is for an authoritative-only server - that is the master server for "example.com" - and a slave for the subdomain "eng.example.com". - - - -options { - // Working directory - directory "/etc/namedb"; - // Do not allow access to cache - allow-query-cache { none; }; - // This is the default - allow-query { any; }; - // Do not provide recursive service - recursion no; -}; - -// Provide a reverse mapping for the loopback -// address 127.0.0.1 -zone "0.0.127.in-addr.arpa" { - type master; - file "localhost.rev"; - notify no; -}; -// We are the master server for example.com -zone "example.com" { - type master; - file "example.com.db"; - // IP addresses of slave servers allowed to - // transfer example.com - allow-transfer { - 192.168.4.14; - 192.168.5.53; - }; -}; -// We are a slave server for eng.example.com -zone "eng.example.com" { - type slave; - file "eng.example.com.bk"; - // IP address of eng.example.com master server - masters { 192.168.4.12; }; -}; - - -
-
- -
Load Balancing - - - - - A primitive form of load balancing can be achieved in - the DNS by using multiple records - (such as multiple A records) for one name. - - - - For example, if you have three HTTP servers with network addresses - of 10.0.0.1, 10.0.0.2 and 10.0.0.3, a set of records such as the - following means that clients will connect to each machine one third - of the time: - - - - - - - - - - - - - - Name - - - - - TTL - - - - - CLASS - - - - - TYPE - - - - - Resource Record (RR) Data - - - - - - - www - - - - - 600 - - - - - IN - - - - - A - - - - - 10.0.0.1 - - - - - - - - - - 600 - - - - - IN - - - - - A - - - - - 10.0.0.2 - - - - - - - - - - 600 - - - - - IN - - - - - A - - - - - 10.0.0.3 - - - - - - - - When a resolver queries for these records, BIND will rotate - them and respond to the query with the records in a different - order. In the example above, clients will randomly receive - records in the order 1, 2, 3; 2, 3, 1; and 3, 1, 2. Most clients - will use the first record returned and discard the rest. - - - For more detail on ordering responses, check the - rrset-order sub-statement in the - options statement, see - . - - -
- -
Name Server Operations - -
Tools for Use With the Name Server Daemon - - This section describes several indispensable diagnostic, - administrative and monitoring tools available to the system - administrator for controlling and debugging the name server - daemon. - -
Diagnostic Tools - - The dig, host, and - nslookup programs are all command - line tools - for manually querying name servers. They differ in style and - output format. - - - - - dig - - - dig - is the most versatile and complete of these lookup tools. - It has two modes: simple interactive - mode for a single query, and batch mode which executes a - query for - each in a list of several query lines. All query options are - accessible - from the command line. - - - dig - @server - domain - query-type - query-class - +query-option - -dig-option - %comment - - - The usual simple use of dig will take the form - - - dig @server domain query-type query-class - - - For more information and a list of available commands and - options, see the dig man - page. - - - - - - host - - - The host utility emphasizes - simplicity - and ease of use. By default, it converts - between host names and Internet addresses, but its - functionality - can be extended with the use of options. - - - host - -aCdlnrsTwv - -c class - -N ndots - -t type - -W timeout - -R retries - -m flag - -4 - -6 - hostname - server - - - For more information and a list of available commands and - options, see the host man - page. - - - - - - nslookup - - nslookup - has two modes: interactive and - non-interactive. Interactive mode allows the user to - query name servers for information about various - hosts and domains or to print a list of hosts in a - domain. Non-interactive mode is used to print just - the name and requested information for a host or - domain. - - - nslookup - -option - - host-to-find - - server - - - - Interactive mode is entered when no arguments are given (the - default name server will be used) or when the first argument - is a - hyphen (`-') and the second argument is the host name or - Internet address - of a name server. - - - Non-interactive mode is used when the name or Internet - address - of the host to be looked up is given as the first argument. - The - optional second argument specifies the host name or address - of a name server. - - - Due to its arcane user interface and frequently inconsistent - behavior, we do not recommend the use of nslookup. - Use dig instead. - - - - - -
- -
Administrative Tools - - Administrative tools play an integral part in the management - of a server. - - - - - named-checkconf - - - The named-checkconf program - checks the syntax of a named.conf file. - - - named-checkconf - -jvz - -t directory - filename - - - - - - named-checkzone - - - The named-checkzone program - checks a master file for - syntax and consistency. - - - named-checkzone - -djqvD - -c class - -o output - -t directory - -w directory - -k (ignore|warn|fail) - -n (ignore|warn|fail) - -W (ignore|warn) - zone - filename - - - - - named-compilezone - - - Similar to named-checkzone, but - it always dumps the zone content to a specified file - (typically in a different format). - - - - - - rndc - - - The remote name daemon control - (rndc) program allows the - system - administrator to control the operation of a name server. - If you run rndc without any - options, it will display a usage message as follows: - - - rndc - -c config - -s server - -p port - -y key - command - command - - - See for details of - the available rndc commands. - - - - rndc requires a configuration file, - since all - communication with the server is authenticated with - digital signatures that rely on a shared secret, and - there is no way to provide that secret other than with a - configuration file. The default location for the - rndc configuration file is - /etc/rndc.conf, but an - alternate - location can be specified with the - option. If the configuration file is not found, - rndc will also look in - /etc/rndc.key (or whatever - sysconfdir was defined when - the BIND build was - configured). - The rndc.key file is - generated by - running rndc-confgen -a as - described in - . - - - - The format of the configuration file is similar to - that of named.conf, but - limited to - only four statements, the options, - key, server and - include - statements. These statements are what associate the - secret keys to the servers with which they are meant to - be shared. The order of statements is not - significant. - - - - The options statement has - three clauses: - default-server, default-key, - and default-port. - default-server takes a - host name or address argument and represents the server - that will - be contacted if no - option is provided on the command line. - default-key takes - the name of a key as its argument, as defined by a key statement. - default-port specifies the - port to which - rndc should connect if no - port is given on the command line or in a - server statement. - - - - The key statement defines a - key to be used - by rndc when authenticating - with - named. Its syntax is - identical to the - key statement in named.conf. - The keyword key is - followed by a key name, which must be a valid - domain name, though it need not actually be hierarchical; - thus, - a string like "rndc_key" is a valid - name. - The key statement has two - clauses: - algorithm and secret. - While the configuration parser will accept any string as the - argument - to algorithm, currently only the strings - "hmac-md5", - "hmac-sha1", - "hmac-sha224", - "hmac-sha256", - "hmac-sha384" - and "hmac-sha512" - have any meaning. The secret is a Base64 encoded string - as specified in RFC 3548. - - - - The server statement - associates a key - defined using the key - statement with a server. - The keyword server is followed by a - host name or address. The server statement - has two clauses: key and port. - The key clause specifies the - name of the key - to be used when communicating with this server, and the - port clause can be used to - specify the port rndc should - connect - to on the server. - - - - A sample minimal configuration file is as follows: - - - -key rndc_key { - algorithm "hmac-sha256"; - secret - "c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K"; -}; -options { - default-server 127.0.0.1; - default-key rndc_key; -}; - - - - This file, if installed as /etc/rndc.conf, - would allow the command: - - - - $ rndc reload - - - - to connect to 127.0.0.1 port 953 and cause the name server - to reload, if a name server on the local machine were - running with - following controls statements: - - - -controls { - inet 127.0.0.1 - allow { localhost; } keys { rndc_key; }; -}; - - - - and it had an identical key statement for - rndc_key. - - - - Running the rndc-confgen - program will - conveniently create a rndc.conf - file for you, and also display the - corresponding controls - statement that you need to - add to named.conf. - Alternatively, - you can run rndc-confgen -a - to set up - a rndc.key file and not - modify - named.conf at all. - - - - - - -
-
- -
Signals - - Certain UNIX signals cause the name server to take specific - actions, as described in the following table. These signals can - be sent using the kill command. - - - - - - - - - SIGHUP - - - - Causes the server to read named.conf and - reload the database. - - - - - - SIGTERM - - - - Causes the server to clean up and exit. - - - - - - SIGINT - - - - Causes the server to clean up and exit. - - - - - - -
-
- - - -
- - Advanced DNS Features - -
Notify - - DNS NOTIFY is a mechanism that allows master - servers to notify their slave servers of changes to a zone's data. In - response to a NOTIFY from a master server, the - slave will check to see that its version of the zone is the - current version and, if not, initiate a zone transfer. - - - - For more information about DNS - NOTIFY, see the description of the - notify option in and - the description of the zone option also-notify in - . The NOTIFY - protocol is specified in RFC 1996. - - - - As a slave zone can also be a master to other slaves, named, - by default, sends NOTIFY messages for every zone - it loads. Specifying notify master-only; will - cause named to only send NOTIFY for master - zones that it loads. - - -
- -
Dynamic Update - - - Dynamic Update is a method for adding, replacing or deleting - records in a master server by sending it a special form of DNS - messages. The format and meaning of these messages is specified - in RFC 2136. - - - - Dynamic update is enabled by including an - allow-update or an update-policy - clause in the zone statement. - - - - If the zone's update-policy is set to - local, updates to the zone - will be permitted for the key local-ddns, - which will be generated by named at startup. - See for more details. - - - - Dynamic updates using Kerberos signed requests can be made - using the TKEY/GSS protocol by setting either the - tkey-gssapi-keytab option, or alternatively - by setting both the tkey-gssapi-credential - and tkey-domain options. Once enabled, - Kerberos signed requests will be matched against the update - policies for the zone, using the Kerberos principal as the - signer for the request. - - - - Updating of secure zones (zones using DNSSEC) follows RFC - 3007: RRSIG, NSEC and NSEC3 records affected by updates are - automatically regenerated by the server using an online - zone key. Update authorization is based on transaction - signatures and an explicit server policy. - - -
The journal file - - - All changes made to a zone using dynamic update are stored - in the zone's journal file. This file is automatically created - by the server when the first dynamic update takes place. - The name of the journal file is formed by appending the extension - .jnl to the name of the - corresponding zone - file unless specifically overridden. The journal file is in a - binary format and should not be edited manually. - - - - The server will also occasionally write ("dump") - the complete contents of the updated zone to its zone file. - This is not done immediately after - each dynamic update, because that would be too slow when a large - zone is updated frequently. Instead, the dump is delayed by - up to 15 minutes, allowing additional updates to take place. - During the dump process, transient files will be created - with the extensions .jnw and - .jbk; under ordinary circumstances, these - will be removed when the dump is complete, and can be safely - ignored. - - - - When a server is restarted after a shutdown or crash, it will replay - the journal file to incorporate into the zone any updates that - took - place after the last zone dump. - - - - Changes that result from incoming incremental zone transfers are - also - journaled in a similar way. - - - - The zone files of dynamic zones cannot normally be edited by - hand because they are not guaranteed to contain the most recent - dynamic changes — those are only in the journal file. - The only way to ensure that the zone file of a dynamic zone - is up to date is to run rndc stop. - - - - If you have to make changes to a dynamic zone - manually, the following procedure will work: - Disable dynamic updates to the zone using - rndc freeze zone. - This will update the zone's master file with the changes - stored in its .jnl file. - Edit the zone file. Run - rndc thaw zone - to reload the changed zone and re-enable dynamic updates. - - - - rndc sync zone - will update the zone file with changes from the journal file - without stopping dynamic updates; this may be useful for viewing - the current zone state. To remove the .jnl - file after updating the zone file, use - rndc sync -clean. - - -
- -
- -
Incremental Zone Transfers (IXFR) - - - The incremental zone transfer (IXFR) protocol is a way for - secondary servers to transfer only changed data, instead of having to - transfer the entire zone. The IXFR protocol is specified in RFC - 1995. See . - - - - When acting as a primary server, BIND 9 - supports IXFR for those zones - where the necessary change history information is available. These - include primary zones maintained by dynamic update and secondary zones - whose data was obtained by IXFR. For manually maintained master - zones, and for secondary zones obtained by performing a full zone - transfer (AXFR), IXFR is supported only if the option - ixfr-from-differences is set - to yes. - - - - When acting as a secondary server, BIND 9 will - attempt to use IXFR unless - it is explicitly disabled. For more information about disabling - IXFR, see the description of the request-ixfr clause - of the server statement. - - - - When a secondary server receives a zone via AXFR, it creates a - new copy of the zone database and then swaps it into place; during - the loading process, queries continue to be served from the old - database with no interference. When receiving a zone via IXFR, - however, changes are applied to the running zone, which may - degrade query performance during the transfer. If a server - receiving an IXFR request determines that the response size would - be similar in size to an AXFR response, it may wish to send AXFR - instead. The threshold at which this determination is made can - be configured using the max-ixfr-ratio option. - -
- -
Split DNS - - - Setting up different views, or visibility, of the DNS space to - internal and external resolvers is usually referred to as a - Split DNS setup. There are several - reasons an organization would want to set up its DNS this way. - - - One common reason for setting up a DNS system this way is - to hide "internal" DNS information from "external" clients on the - Internet. There is some debate as to whether or not this is actually - useful. - Internal DNS information leaks out in many ways (via email headers, - for example) and most savvy "attackers" can find the information - they need using other means. - However, since listing addresses of internal servers that - external clients cannot possibly reach can result in - connection delays and other annoyances, an organization may - choose to use a Split DNS to present a consistent view of itself - to the outside world. - - - Another common reason for setting up a Split DNS system is - to allow internal networks that are behind filters or in RFC 1918 - space (reserved IP space, as documented in RFC 1918) to resolve DNS - on the Internet. Split DNS can also be used to allow mail from outside - back in to the internal network. - -
Example split DNS setup - - Let's say a company named Example, Inc. - (example.com) - has several corporate sites that have an internal network with - reserved - Internet Protocol (IP) space and an external demilitarized zone (DMZ), - or "outside" section of a network, that is available to the public. - - - Example, Inc. wants its internal clients - to be able to resolve external hostnames and to exchange mail with - people on the outside. The company also wants its internal resolvers - to have access to certain internal-only zones that are not available - at all outside of the internal network. - - - In order to accomplish this, the company will set up two sets - of name servers. One set will be on the inside network (in the - reserved - IP space) and the other set will be on bastion hosts, which are - "proxy" - hosts that can talk to both sides of its network, in the DMZ. - - - The internal servers will be configured to forward all queries, - except queries for site1.internal, site2.internal, site1.example.com, - and site2.example.com, to the servers - in the - DMZ. These internal servers will have complete sets of information - for site1.example.com, site2.example.com, site1.internal, - and site2.internal. - - - To protect the site1.internal and site2.internal domains, - the internal name servers must be configured to disallow all queries - to these domains from any external hosts, including the bastion - hosts. - - - The external servers, which are on the bastion hosts, will - be configured to serve the "public" version of the site1 and site2.example.com zones. - This could include things such as the host records for public servers - (www.example.com and ftp.example.com), - and mail exchange (MX) records (a.mx.example.com and b.mx.example.com). - - - In addition, the public site1 and site2.example.com zones - should have special MX records that contain wildcard (`*') records - pointing to the bastion hosts. This is needed because external mail - servers do not have any other way of looking up how to deliver mail - to those internal hosts. With the wildcard records, the mail will - be delivered to the bastion host, which can then forward it on to - internal hosts. - - - Here's an example of a wildcard MX record: - - * IN MX 10 external1.example.com. - - Now that they accept mail on behalf of anything in the internal - network, the bastion hosts will need to know how to deliver mail - to internal hosts. In order for this to work properly, the resolvers - on - the bastion hosts will need to be configured to point to the internal - name servers for DNS resolution. - - - Queries for internal hostnames will be answered by the internal - servers, and queries for external hostnames will be forwarded back - out to the DNS servers on the bastion hosts. - - - In order for all this to work properly, internal clients will - need to be configured to query only the internal - name servers for DNS queries. This could also be enforced via - selective - filtering on the network. - - - If everything has been set properly, Example, Inc.'s - internal clients will now be able to: - - - - - Look up any hostnames in the site1 - and - site2.example.com zones. - - - - - Look up any hostnames in the site1.internal and - site2.internal domains. - - - - Look up any hostnames on the Internet. - - - Exchange mail with both internal and external people. - - - - Hosts on the Internet will be able to: - - - - - Look up any hostnames in the site1 - and - site2.example.com zones. - - - - - Exchange mail with anyone in the site1 and - site2.example.com zones. - - - - - - Here is an example configuration for the setup we just - described above. Note that this is only configuration information; - for information on how to configure your zone files, see . - - - - Internal DNS server config: - - - - -acl internals { 172.16.72.0/24; 192.168.1.0/24; }; - -acl externals { bastion-ips-go-here; }; - -options { - ... - ... - forward only; - // forward to external servers - forwarders { - bastion-ips-go-here; - }; - // sample allow-transfer (no one) - allow-transfer { none; }; - // restrict query access - allow-query { internals; externals; }; - // restrict recursion - allow-recursion { internals; }; - ... - ... -}; - -// sample master zone -zone "site1.example.com" { - type master; - file "m/site1.example.com"; - // do normal iterative resolution (do not forward) - forwarders { }; - allow-query { internals; externals; }; - allow-transfer { internals; }; -}; - -// sample slave zone -zone "site2.example.com" { - type slave; - file "s/site2.example.com"; - masters { 172.16.72.3; }; - forwarders { }; - allow-query { internals; externals; }; - allow-transfer { internals; }; -}; - -zone "site1.internal" { - type master; - file "m/site1.internal"; - forwarders { }; - allow-query { internals; }; - allow-transfer { internals; } -}; - -zone "site2.internal" { - type slave; - file "s/site2.internal"; - masters { 172.16.72.3; }; - forwarders { }; - allow-query { internals }; - allow-transfer { internals; } -}; - - - - External (bastion host) DNS server config: - - - -acl internals { 172.16.72.0/24; 192.168.1.0/24; }; - -acl externals { bastion-ips-go-here; }; - -options { - ... - ... - // sample allow-transfer (no one) - allow-transfer { none; }; - // default query access - allow-query { any; }; - // restrict cache access - allow-query-cache { internals; externals; }; - // restrict recursion - allow-recursion { internals; externals; }; - ... - ... -}; - -// sample slave zone -zone "site1.example.com" { - type master; - file "m/site1.foo.com"; - allow-transfer { internals; externals; }; -}; - -zone "site2.example.com" { - type slave; - file "s/site2.foo.com"; - masters { another_bastion_host_maybe; }; - allow-transfer { internals; externals; } -}; - - - - In the resolv.conf (or equivalent) on - the bastion host(s): - - - -search ... -nameserver 172.16.72.2 -nameserver 172.16.72.3 -nameserver 172.16.72.4 - - -
-
-
TSIG - - - TSIG (Transaction SIGnatures) is a mechanism for authenticating DNS - messages, originally specified in RFC 2845. It allows DNS messages - to be cryptographically signed using a shared secret. TSIG can - be used in any DNS transaction, as a way to restrict access to - certain server functions (e.g., recursive queries) to authorized - clients when IP-based access control is insufficient or needs to - be overridden, or as a way to ensure message authenticity when it - is critical to the integrity of the server, such as with dynamic - UPDATE messages or zone transfers from a master to a slave server. - - - This is a guide to setting up TSIG in BIND. - It describes the configuration syntax and the process of creating - TSIG keys. - - - named supports TSIG for server-to-server - communication, and some of the tools included with - BIND support it for sending messages to - named: - - - supports TSIG via the - , and - command line options, or via - the key command when running - interactively. - - - supports TSIG via the - and command - line options. - - - - -
Generating a Shared Key - - TSIG keys can be generated using the tsig-keygen - command; the output of the command is a key directive - suitable for inclusion in named.conf. The - key name, algorithm and size can be specified by command line parameters; - the defaults are "tsig-key", HMAC-SHA256, and 256 bits, respectively. - - - Any string which is a valid DNS name can be used as a key name. - For example, a key to be shared between servers called - host1 and host2 could - be called "host1-host2.", and this key could be generated using: - - - $ tsig-keygen host1-host2. > host1-host2.key - - - This key may then be copied to both hosts. The key name and secret - must be identical on both hosts. - (Note: copying a shared secret from one server to another is beyond - the scope of the DNS. A secure transport mechanism should be used: - secure FTP, SSL, ssh, telephone, encrypted email, etc.) - - - tsig-keygen can also be run as - ddns-confgen, in which case its output includes - additional configuration text for setting up dynamic DNS in - named. See - for details. - -
- -
Loading A New Key - - For a key shared between servers called - host1 and host2, - the following could be added to each server's - named.conf file: - - -key "host1-host2." { - algorithm hmac-sha256; - secret "DAopyf1mhCbFVZw7pgmNPBoLUq8wEUT7UuPoLENP2HY="; -}; - - - (This is the same key generated above using - tsig-keygen.) - - - Since this text contains a secret, it - is recommended that either named.conf not be - world-readable, or that the key directive - be stored in a file which is not world-readable, and which is - included in named.conf via the - include directive. - - - Once a key has been added to named.conf and the - server has been restarted or reconfigured, the server can recognize - the key. If the server receives a message signed by the - key, it will be able to verify the signature. If the signature - is valid, the response will be signed using the same key. - - - TSIG keys that are known to a server can be listed using the - command rndc tsig-list. - -
- -
Instructing the Server to Use a Key - - A server sending a request to another server must be told whether - to use a key, and if so, which key to use. - - - For example, a key may be specified for each server in the - masters statement in the definition of a - slave zone; in this case, all SOA QUERY messages, NOTIFY - messages, and zone transfer requests (AXFR or IXFR) will be - signed using the specified key. Keys may also be specified - in the also-notify statement of a master - or slave zone, causing NOTIFY messages to be signed using - the specified key. - - - Keys can also be specified in a server - directive. Adding the following on host1, - if the IP address of host2 is 10.1.2.3, would - cause all requests from host1 - to host2, including normal DNS queries, to be - signed using the host1-host2. key: - - -server 10.1.2.3 { - keys { host1-host2. ;}; -}; - - - Multiple keys may be present in the keys - statement, but only the first one is used. As this directive does - not contain secrets, it can be used in a world-readable file. - - - Requests sent by host2 to host1 - would not be signed, unless a similar - server directive were in host2's - configuration file. - - - Whenever any server sends a TSIG-signed DNS request, it will expect - the response to be signed with the same key. If a response is not - signed, or if the signature is not valid, the response will be - rejected. - -
- -
TSIG-Based Access Control - - TSIG keys may be specified in ACL definitions and ACL directives - such as allow-query, allow-transfer - and allow-update. - The above key would be denoted in an ACL element as - key host1-host2. - - - An example of an allow-update directive using - a TSIG key: - - -allow-update { !{ !localnets; any; }; key host1-host2. ;}; - - - This allows dynamic updates to succeed only if the UPDATE - request comes from an address in localnets, - and if it is signed using the - host1-host2. key. - - - See for a discussion of - the more flexible update-policy statement. - -
- -
Errors - - Processing of TSIG-signed messages can result in several errors: - - - If a TSIG-aware server receives a message signed by an - unknown key, the response will be unsigned, with the TSIG - extended error code set to BADKEY. - - - If a TSIG-aware server receives a message from a known key - but with an invalid signature, the response will be unsigned, - with the TSIG extended error code set to BADSIG. - - - If a TSIG-aware server receives a message with a time - outside of the allowed range, the response will be signed, with - the TSIG extended error code set to BADTIME, and the time values - will be adjusted so that the response can be successfully - verified. - - - In all of the above cases, the server will return a response code - of NOTAUTH (not authenticated). - -
-
- -
TKEY - - - TKEY (Transaction KEY) is a mechanism for automatically negotiating - a shared secret between two hosts, originally specified in RFC 2930. - - - There are several TKEY "modes" that specify how a key is to be - generated or assigned. BIND 9 implements only - one of these modes: Diffie-Hellman key exchange. Both hosts are - required to have a KEY record with algorithm DH (though this - record is not required to be present in a zone). - - - The TKEY process is initiated by a client or server by sending - a query of type TKEY to a TKEY-aware server. The query must include - an appropriate KEY record in the additional section, and - must be signed using either TSIG or SIG(0) with a previously - established key. The server's response, if successful, will - contain a TKEY record in its answer section. After this transaction, - both participants will have enough information to calculate a - shared secret using Diffie-Hellman key exchange. The shared secret - can then be used by to sign subsequent transactions between the - two servers. - - - TSIG keys known by the server, including TKEY-negotiated keys, can - be listed using rndc tsig-list. - - - TKEY-negotiated keys can be deleted from a server using - rndc tsig-delete. This can also be done via - the TKEY protocol itself, by sending an authenticated TKEY query - specifying the "key deletion" mode. - - -
-
SIG(0) - - - BIND partially supports DNSSEC SIG(0) - transaction signatures as specified in RFC 2535 and RFC 2931. - SIG(0) uses public/private keys to authenticate messages. Access control - is performed in the same manner as TSIG keys; privileges can be - granted or denied in ACL directives based on the key name. - - - When a SIG(0) signed message is received, it will only be - verified if the key is known and trusted by the server. The - server will not attempt to recursively fetch or validate the - key. - - - SIG(0) signing of multiple-message TCP streams is not supported. - - - The only tool shipped with BIND 9 that - generates SIG(0) signed messages is nsupdate. - -
- -
DNSSEC - - Cryptographic authentication of DNS information is possible - through the DNS Security (DNSSEC-bis) extensions, - defined in RFC 4033, RFC 4034, and RFC 4035. - This section describes the creation and use of DNSSEC signed zones. - - - - In order to set up a DNSSEC secure zone, there are a series - of steps which must be followed. BIND - 9 ships - with several tools - that are used in this process, which are explained in more detail - below. In all cases, the option prints a - full list of parameters. Note that the DNSSEC tools require the - keyset files to be in the working directory or the - directory specified by the option, and - that the tools shipped with BIND 9.2.x and earlier are not compatible - with the current ones. - - - - There must also be communication with the administrators of - the parent and/or child zone to transmit keys. A zone's security - status must be indicated by the parent zone for a DNSSEC capable - resolver to trust its data. This is done through the presence - or absence of a DS record at the - delegation - point. - - - - For other servers to trust data in this zone, they must - either be statically configured with this zone's zone key or the - zone key of another zone above this one in the DNS tree. - - -
Generating Keys - - - The dnssec-keygen program is used to - generate keys. - - - - A secure zone must contain one or more zone keys. The zone keys will - sign all other records in the zone, as well as the zone keys of any - secure delegated zones. Zone keys must have the same name as the - zone, a name type of ZONE, and must be usable for - authentication. It is recommended that zone keys use a cryptographic - algorithm designated as "mandatory to implement" by the IETF; - currently the are two algorithms: RSASHA256 and ECDSAP256SHA256. - ECDSAP256SHA256 is recommended for current and future deployments. - - - - The following command will generate a ECDSAP256SHA256 key for - the child.example zone: - - - - dnssec-keygen -a ECDSAP256SHA256 -n ZONE child.example. - - - - Two output files will be produced: - Kchild.example.+013+12345.key and - Kchild.example.+013+12345.private (where 12345 is - an example of a key tag). The key filenames contain the key name - (child.example.), algorithm (5 is RSASHA1, 8 is - RSASHA256, 13 is ECDSAP256SHA256, 15 is ED25519 etc.), and the key tag - (12345 in this case). The private key (in the - .private file) is used to generate signatures, - and the public key (in the .key file) is used for - signature verification. - - - - To generate another key with the same properties (but with - a different key tag), repeat the above command. - - - - The dnssec-keyfromlabel program is used - to get a key pair from a crypto hardware and build the key - files. Its usage is similar to dnssec-keygen. - - - - The public keys should be inserted into the zone file by - including the .key files using - $INCLUDE statements. - - -
-
Signing the Zone - - - The dnssec-signzone program is used - to sign a zone. - - - - Any keyset files corresponding to - secure sub-zones should be present. The zone signer will - generate NSEC, NSEC3 - and RRSIG records for the zone, as - well as DS for the child zones if - '-g' is specified. If '-g' - is not specified, then DS RRsets for the secure child - zones need to be added manually. - - - - The following command signs the zone, assuming it is in a - file called zone.child.example. By - default, all zone keys which have an available private key are - used to generate signatures. - - - - dnssec-signzone -o child.example zone.child.example - - - - One output file is produced: - zone.child.example.signed. This - file - should be referenced by named.conf - as the - input file for the zone. - - - dnssec-signzone - will also produce a keyset and dsset files. These are used - to provide the parent zone administrators with the - DNSKEYs (or their corresponding - DS records) that are the secure entry - point to the zone. - - -
- -
Configuring Servers for DNSSEC - - To enable named to validate answers - received from other servers, the - dnssec-validation option must be set to - either yes or auto. - - - When dnssec-validation is set to - auto, a trust anchor for the DNS - root zone will automatically be used. This trust anchor is - provided as part of BIND and is kept up to date using RFC 5011 - key management. - - - When dnssec-validation is set to - yes, DNSSEC validation will only occur - if at least one trust anchor has been explicitly configured - in named.conf - using a trust-anchors statement (or the - managed-keys and trusted-keys - statements, both deprecated). - - - When dnssec-validation is set to - no, DNSSEC validation will not occur. - - - The default is auto unless BIND is - built with configure --disable-auto-validation, - in which case the default is yes. - - - - The keys specified in trust-anchors - copies of DNSKEY RRs for zones that are used to form the - first link in the cryptographic chain of trust. Keys configured - with the keyword static-key or - static-ds are loaded directly - into the table of trust anchors, and can only be changed by - altering the configuration. Keys configured with - initial-key or initial-ds - are used to initialize RFC 5011 trust anchor maintenance, and - will be kept up to date automatically after the first time - named runs. - - - - trust-anchors is described in more detail - later in this document. - - - - Unlike BIND 8, BIND - 9 does not verify signatures on load, so zone keys for - authoritative zones do not need to be specified in the - configuration file. - - - - After DNSSEC gets established, a typical DNSSEC configuration - will look something like the following. It has one or - more public keys for the root. This allows answers from - outside the organization to be validated. It will also - have several keys for parts of the namespace the organization - controls. These are here to ensure that named - is immune to compromises in the DNSSEC components of the security - of parent zones. - - - -trust-anchors { - /* Root Key */ - "." initial-key 257 3 3 "BNY4wrWM1nCfJ+CXd0rVXyYmobt7sEEfK3clRbGaTwS - JxrGkxJWoZu6I7PzJu/E9gx4UC1zGAHlXKdE4zYIpRh - aBKnvcC2U9mZhkdUpd1Vso/HAdjNe8LmMlnzY3zy2Xy - 4klWOADTPzSv9eamj8V18PHGjBLaVtYvk/ln5ZApjYg - hf+6fElrmLkdaz MQ2OCnACR817DF4BBa7UR/beDHyp - 5iWTXWSi6XmoJLbG9Scqc7l70KDqlvXR3M/lUUVRbke - g1IPJSidmK3ZyCllh4XSKbje/45SKucHgnwU5jefMtq - 66gKodQj+MiA21AfUVe7u99WzTLzY3qlxDhxYQQ20FQ - 97S+LKUTpQcq27R7AT3/V5hRQxScINqwcz4jYqZD2fQ - dgxbcDTClU0CRBdiieyLMNzXG3"; - /* Key for our organization's forward zone */ - example.com. static-ds 54135 5 2 "8EF922C97F1D07B23134440F19682E7519ADDAE180E20B1B1EC52E7F58B2831D" - - /* Key for our reverse zone. */ - 2.0.192.IN-ADDRPA.NET. static-key 257 3 5 "AQOnS4xn/IgOUpBPJ3bogzwc - xOdNax071L18QqZnQQQAVVr+i - LhGTnNGp3HoWQLUIzKrJVZ3zg - gy3WwNT6kZo6c0tszYqbtvchm - gQC8CzKojM/W16i6MG/eafGU3 - siaOdS0yOI6BgPsw+YZdzlYMa - IJGf4M4dyoKIhzdZyQ2bYQrjy - Q4LB0lC7aOnsMyYKHHYeRvPxj - IQXmdqgOJGq+vsevG06zW+1xg - YJh9rCIfnm1GX/KMgxLPG2vXT - D/RnLX+D3T3UL7HJYHJhAZD5L - 59VvjSPsZJHeDCUyWYrvPZesZ - DIRvhDD52SKvbheeTJUm6Ehkz - ytNN2SN96QRk8j/iI8ib"; -}; - -options { - ... - dnssec-validation yes; -}; - - - - None of the keys listed in this example are valid. In particular, - the root key is not valid. - - - - When DNSSEC validation is enabled and properly configured, - the resolver will reject any answers from signed, secure zones - which fail to validate, and will return SERVFAIL to the client. - - - - Responses may fail to validate for any of several reasons, - including missing, expired, or invalid signatures, a key which - does not match the DS RRset in the parent zone, or an insecure - response from a zone which, according to its parent, should have - been secure. - - - - - When the validator receives a response from an unsigned zone - that has a signed parent, it must confirm with the parent - that the zone was intentionally left unsigned. It does - this by verifying, via signed and validated NSEC/NSEC3 records, - that the parent zone contains no DS records for the child. - - - If the validator can prove that the zone - is insecure, then the response is accepted. However, if it - cannot, then it must assume an insecure response to be a - forgery; it rejects the response and logs an error. - - - The logged error reads "insecurity proof failed" and - "got insecure response; parent indicates it should be secure". - - -
-
- - - - - - - - - - - - - -
IPv6 Support in <acronym>BIND</acronym> 9 - - BIND 9 fully supports all currently - defined forms of IPv6 name to address and address to name - lookups. It will also use IPv6 addresses to make queries when - running on an IPv6 capable system. - - - - For forward lookups, BIND 9 supports - only AAAA records. RFC 3363 deprecated the use of A6 records, - and client-side support for A6 records was accordingly removed - from BIND 9. - However, authoritative BIND 9 name servers still - load zone files containing A6 records correctly, answer queries - for A6 records, and accept zone transfer for a zone containing A6 - records. - - - - For IPv6 reverse lookups, BIND 9 supports - the traditional "nibble" format used in the - ip6.arpa domain, as well as the older, deprecated - ip6.int domain. - Older versions of BIND 9 - supported the "binary label" (also known as "bitstring") format, - but support of binary labels has been completely removed per - RFC 3363. - Many applications in BIND 9 do not understand - the binary label format at all any more, and will return an - error if given. - In particular, an authoritative BIND 9 - name server will not load a zone file containing binary labels. - - - - For an overview of the format and structure of IPv6 addresses, - see . - - -
Address Lookups Using AAAA Records - - - The IPv6 AAAA record is a parallel to the IPv4 A record, - and, unlike the deprecated A6 record, specifies the entire - IPv6 address in a single record. For example, - - - -$ORIGIN example.com. -host 3600 IN AAAA 2001:db8::1 - - - - Use of IPv4-in-IPv6 mapped addresses is not recommended. - If a host has an IPv4 address, use an A record, not - a AAAA, with ::ffff:192.168.42.1 as - the address. - -
-
Address to Name Lookups Using Nibble Format - - - When looking up an address in nibble format, the address - components are simply reversed, just as in IPv4, and - ip6.arpa. is appended to the - resulting name. - For example, the following would provide reverse name lookup for - a host with address - 2001:db8::1. - - - -$ORIGIN 0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa. -1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 14400 IN PTR ( - host.example.com. ) - - -
-
-
- - <acronym>BIND</acronym> 9 Configuration Reference - - - BIND 9 configuration is broadly similar - to BIND 8; however, there are a few new - areas - of configuration, such as views. BIND - 8 configuration files should work with few alterations in BIND - 9, although more complex configurations should be reviewed to check - if they can be more efficiently implemented using the new features - found in BIND 9. - - - - BIND 4 configuration files can be - converted to the new format - using the shell script - contrib/named-bootconf/named-bootconf.sh. - -
Configuration File Elements - - - Following is a list of elements used throughout the BIND configuration - file documentation: - - - - - - - - - - acl_name - - - - - The name of an address_match_list as - defined by the acl statement. - - - - - - - address_match_list - - - - - A list of one or more - ip_addr, - ip_prefix, key_id, - or acl_name elements, see - . - - - - - - - masters_list - - - - - A named list of one or more ip_addr - with optional key_id and/or - ip_port. - A masters_list may include other - masters_lists. - - - - - - - domain_name - - - - - A quoted string which will be used as - a DNS name, for example "my.test.domain". - - - - - - - namelist - - - - - A list of one or more domain_name - elements. - - - - - - - dotted_decimal - - - - - One to four integers valued 0 through - 255 separated by dots (`.'), such as 123, - 45.67 or 89.123.45.67. - - - - - - - ip4_addr - - - - - An IPv4 address with exactly four elements - in dotted_decimal notation. - - - - - - - ip6_addr - - - - - An IPv6 address, such as 2001:db8::1234. - IPv6 scoped addresses that have ambiguity on their - scope zones must be disambiguated by an appropriate - zone ID with the percent character (`%') as - delimiter. It is strongly recommended to use - string zone names rather than numeric identifiers, - in order to be robust against system configuration - changes. However, since there is no standard - mapping for such names and identifier values, - currently only interface names as link identifiers - are supported, assuming one-to-one mapping between - interfaces and links. For example, a link-local - address fe80::1 on the link - attached to the interface ne0 - can be specified as fe80::1%ne0. - Note that on most systems link-local addresses - always have the ambiguity, and need to be - disambiguated. - - - - - - - ip_addr - - - - - An ip4_addr or ip6_addr. - - - - - - - ip_dscp - - - - - A number between 0 and 63, used - to select a differentiated services code point (DSCP) - value for use with outgoing traffic on operating systems - that support DSCP. - - - - - - - ip_port - - - - - An IP port number. - The number is limited to 0 - through 65535, with values - below 1024 typically restricted to use by processes running - as root. - In some cases, an asterisk (`*') character can be used as a - placeholder to - select a random high-numbered port. - - - - - - - ip_prefix - - - - - An IP network specified as an ip_addr, - followed by a slash (`/') and then the number of bits in the - netmask. - Trailing zeros in a ip_addr - may omitted. - For example, 127/8 is the - network 127.0.0.0 with - netmask 255.0.0.0 and 1.2.3.0/28 is - network 1.2.3.0 with netmask 255.255.255.240. - - - When specifying a prefix involving a IPv6 scoped address - the scope may be omitted. In that case the prefix will - match packets from any scope. - - - - - - - key_id - - - - - A domain_name representing - the name of a shared key, to be used for transaction - security. - - - - - - - key_list - - - - - A list of one or more - key_ids, - separated by semicolons and ending with a semicolon. - - - - - - - number - - - - - A non-negative 32-bit integer - (i.e., a number between 0 and 4294967295, inclusive). - Its acceptable value might be further - limited by the context in which it is used. - - - - - - - fixedpoint - - - - - A non-negative real number that can be specified to - the nearest one hundredth. Up to five digits can be - specified before a decimal point, and up to two - digits after, so the maximum value is 99999.99. - Acceptable values might be further limited by the - context in which it is used. - - - - - - - path_name - - - - - A quoted string which will be used as - a pathname, such as zones/master/my.test.domain. - - - - - - - port_list - - - - - A list of an ip_port or a port - range. - A port range is specified in the form of - range followed by - two ip_ports, - port_low and - port_high, which represents - port numbers from port_low through - port_high, inclusive. - port_low must not be larger than - port_high. - For example, - range 1024 65535 represents - ports from 1024 through 65535. - In either case an asterisk (`*') character is not - allowed as a valid ip_port. - - - - - - - size_spec - - - - - A 64-bit unsigned integer, or the keywords - unlimited or - default. - - - Integers may take values - 0 <= value <= 18446744073709551615, though - certain parameters - (such as max-journal-size) may - use a more limited range within these extremes. - In most cases, setting a value to 0 does not - literally mean zero; it means "undefined" or - "as big as possible", depending on the context. - See the explanations of particular parameters - that use size_spec - for details on how they interpret its use. - - - Numeric values can optionally be followed by a - scaling factor: - K or k - for kilobytes, - M or m - for megabytes, and - G or g - for gigabytes, which scale by 1024, 1024*1024, and - 1024*1024*1024 respectively. - - - unlimited generally means - "as big as possible", and is usually the best - way to safely set a very large number. - - - default - uses the limit that was in force when the server was started. - - - - - - - size_or_percent - - - - - size_spec or integer value - followed by '%' to represent percents. - - - The behavior is exactly the same as - size_spec, but - size_or_percent allows also - to specify a positive integer value followed by - '%' sign to represent percents. - - - - - - - yes_or_no - - - - - Either yes or no. - The words true and false are - also accepted, as are the numbers 1 - and 0. - - - - - - - dialup_option - - - - - One of yes, - no, notify, - notify-passive, refresh or - passive. - When used in a zone, notify-passive, - refresh, and passive - are restricted to slave and stub zones. - - - - - - -
Address Match Lists - -
Syntax - -address_match_list = address_match_list_element ; ... - -address_match_list_element = [ ! ] ( ip_address | ip_prefix | - key key_id | acl_name | { address_match_list } ) - - -
-
Definition and Usage - - - Address match lists are primarily used to determine access - control for various server operations. They are also used in - the listen-on and sortlist - statements. The elements which constitute an address match - list can be any of the following: - - - - an IP address (IPv4 or IPv6) - - - an IP prefix (in `/' notation) - - - - a key ID, as defined by the key - statement - - - - the name of an address match list defined with - the acl statement - - - - a nested address match list enclosed in braces - - - - - Elements can be negated with a leading exclamation mark (`!'), - and the match list names "any", "none", "localhost", and - "localnets" are predefined. More information on those names - can be found in the description of the acl statement. - - - - The addition of the key clause made the name of this syntactic - element something of a misnomer, since security keys can be used - to validate access without regard to a host or network address. - Nonetheless, the term "address match list" is still used - throughout the documentation. - - - - When a given IP address or prefix is compared to an address - match list, the comparison takes place in approximately O(1) - time. However, key comparisons require that the list of keys - be traversed until a matching key is found, and therefore may - be somewhat slower. - - - - The interpretation of a match depends on whether the list is being - used for access control, defining listen-on ports, or in a - sortlist, and whether the element was negated. - - - - When used as an access control list, a non-negated match - allows access and a negated match denies access. If - there is no match, access is denied. The clauses - allow-notify, - allow-recursion, - allow-recursion-on, - allow-query, - allow-query-on, - allow-query-cache, - allow-query-cache-on, - allow-transfer, - allow-update, - allow-update-forwarding, - blackhole, and - keep-response-order all use address match - lists. Similarly, the listen-on option will cause the - server to refuse queries on any of the machine's - addresses which do not match the list. - - - - Order of insertion is significant. If more than one element - in an ACL is found to match a given IP address or prefix, - preference will be given to the one that came - first in the ACL definition. - Because of this first-match behavior, an element that - defines a subset of another element in the list should - come before the broader element, regardless of whether - either is negated. For example, in - 1.2.3/24; ! 1.2.3.13; - the 1.2.3.13 element is completely useless because the - algorithm will match any lookup for 1.2.3.13 to the 1.2.3/24 - element. Using ! 1.2.3.13; 1.2.3/24 fixes - that problem by having 1.2.3.13 blocked by the negation, but - all other 1.2.3.* hosts fall through. - -
-
- -
Comment Syntax - - - The BIND 9 comment syntax allows for - comments to appear - anywhere that whitespace may appear in a BIND configuration - file. To appeal to programmers of all kinds, they can be written - in the C, C++, or shell/perl style. - - -
Syntax - - - /* This is a BIND comment as in C */ - // This is a BIND comment as in C++ - # This is a BIND comment as in common UNIX shells -# and perl - -
-
Definition and Usage - - - Comments may appear anywhere that whitespace may appear in - a BIND configuration file. - - - C-style comments start with the two characters /* (slash, - star) and end with */ (star, slash). Because they are completely - delimited with these characters, they can be used to comment only - a portion of a line or to span multiple lines. - - - C-style comments cannot be nested. For example, the following - is not valid because the entire comment ends with the first */: - - - -/* This is the start of a comment. - This is still part of the comment. -/* This is an incorrect attempt at nesting a comment. */ - This is no longer in any comment. */ - - - - - - C++-style comments start with the two characters // (slash, - slash) and continue to the end of the physical line. They cannot - be continued across multiple physical lines; to have one logical - comment span multiple lines, each line must use the // pair. - For example: - - - -// This is the start of a comment. The next line -// is a new comment, even though it is logically -// part of the previous comment. - - - - - Shell-style (or perl-style, if you prefer) comments start - with the character # (number sign) - and continue to the end of the - physical line, as in C++ comments. - For example: - - - - -# This is the start of a comment. The next line -# is a new comment, even though it is logically -# part of the previous comment. - - - - - - - You cannot use the semicolon (`;') character - to start a comment such as you would in a zone file. The - semicolon indicates the end of a configuration - statement. - - -
-
-
- -
Configuration File Grammar - - - A BIND 9 configuration consists of - statements and comments. - Statements end with a semicolon. Statements and comments are the - only elements that can appear without enclosing braces. Many - statements contain a block of sub-statements, which are also - terminated with a semicolon. - - - - The following statements are supported: - - - - - - - - - - acl - - - - defines a named IP address - matching list, for access control and other uses. - - - - - - controls - - - - declares control channels to be used - by the rndc utility. - - - - - - dnssec-policy - - - - describes a DNSSEC key and signing policy for zones. - See for details. - - - - - - include - - - - includes a file. - - - - - - key - - - - specifies key information for use in - authentication and authorization using TSIG. - - - - - - logging - - - - specifies what the server logs, and where - the log messages are sent. - - - - - - masters - - - - defines a named masters list for - inclusion in stub and slave zones' - masters or - also-notify lists. - - - - - - options - - - - controls global server configuration - options and sets defaults for other statements. - - - - - - server - - - - sets certain configuration options on - a per-server basis. - - - - - - statistics-channels - - - - declares communication channels to get access to - named statistics. - - - - - - trust-anchors - - - - defines DNSSEC trust anchors: if used with - the initial-key or - initial-ds keyword, - trust anchors are kept up to date using RFC - 5011 trust anchor maintenance, and if used with - static-key or - static-ds, trust anchors - are permanent. - - - - - - managed-keys - - - - is identical to trust-anchors; - this option is deprecated in favor - of trust-anchors with - the initial-key keyword, - and may be removed in a future release. - - - - - - trusted-keys - - - - defines permanent trusted DNSSEC keys; - this option is deprecated in favor - of trust-anchors with - the static-key keyword, - and may be removed in a future release. - - - - - - view - - - - defines a view. - - - - - - zone - - - - defines a zone. - - - - - - - - - The logging and - options statements may only occur once - per - configuration. - - -
<command>acl</command> Statement Grammar - -
-
<command>acl</command> Statement Definition and - Usage - - - The acl statement assigns a symbolic - name to an address match list. It gets its name from a primary - use of address match lists: Access Control Lists (ACLs). - - - - The following ACLs are built-in: - - - - - - - - - - any - - - - Matches all hosts. - - - - - - none - - - - Matches no hosts. - - - - - - localhost - - - - Matches the IPv4 and IPv6 addresses of all network - interfaces on the system. When addresses are - added or removed, the localhost - ACL element is updated to reflect the changes. - - - - - - localnets - - - - Matches any host on an IPv4 or IPv6 network - for which the system has an interface. - When addresses are added or removed, - the localnets - ACL element is updated to reflect the changes. - Some systems do not provide a way to determine the prefix - lengths of - local IPv6 addresses. - In such a case, localnets - only matches the local - IPv6 addresses, just like localhost. - - - - - - -
-
<command>controls</command> Statement Grammar - -
- -
<command>controls</command> Statement Definition and - Usage - - - The controls statement declares control - channels to be used by system administrators to control the - operation of the name server. These control channels are - used by the rndc utility to send - commands to and retrieve non-DNS results from a name server. - - - - An inet control channel is a TCP socket - listening at the specified ip_port on the - specified ip_addr, which can be an IPv4 or IPv6 - address. An ip_addr of * (asterisk) is - interpreted as the IPv4 wildcard address; connections will be - accepted on any of the system's IPv4 addresses. - To listen on the IPv6 wildcard address, - use an ip_addr of ::. - If you will only use rndc on the local host, - using the loopback address (127.0.0.1 - or ::1) is recommended for maximum security. - - - - If no port is specified, port 953 is used. The asterisk - "*" cannot be used for ip_port. - - - - The ability to issue commands over the control channel is - restricted by the allow and - keys clauses. - Connections to the control channel are permitted based on the - address_match_list. This is for simple - IP address based filtering only; any key_id - elements of the address_match_list - are ignored. - - - - A unix control channel is a UNIX domain - socket listening at the specified path in the file system. - Access to the socket is specified by the perm, - owner and group clauses. - Note on some platforms (SunOS and Solaris) the permissions - (perm) are applied to the parent directory - as the permissions on the socket itself are ignored. - - - - The primary authorization mechanism of the command - channel is the key_list, which - contains a list of key_ids. - Each key_id in the key_list - is authorized to execute commands over the control channel. - See in ) - for information about configuring keys in rndc. - - - - If the read-only clause is enabled, the - control channel is limited to the following set of read-only - commands: nta -dump, - null, status, - showzone, testgen, and - zonestatus. By default, - read-only is not enabled and the control - channel allows read-write access. - - - - If no controls statement is present, - named will set up a default - control channel listening on the loopback address 127.0.0.1 - and its IPv6 counterpart ::1. - In this case, and also when the controls statement - is present but does not have a keys clause, - named will attempt to load the command channel key - from the file rndc.key in - /etc (or whatever sysconfdir - was specified as when BIND was built). - To create a rndc.key file, run - rndc-confgen -a. - - - - The rndc.key feature was created to - ease the transition of systems from BIND 8, - which did not have digital signatures on its command channel - messages and thus did not have a keys clause. - - It makes it possible to use an existing BIND 8 - configuration file in BIND 9 unchanged, - and still have rndc work the same way - ndc worked in BIND 8, simply by executing the - command rndc-confgen -a after BIND 9 is - installed. - - - - Since the rndc.key feature - is only intended to allow the backward-compatible usage of - BIND 8 configuration files, this - feature does not - have a high degree of configurability. You cannot easily change - the key name or the size of the secret, so you should make a - rndc.conf with your own key if you - wish to change - those things. The rndc.key file - also has its - permissions set such that only the owner of the file (the user that - named is running as) can access it. - If you - desire greater flexibility in allowing other users to access - rndc commands, then you need to create - a - rndc.conf file and make it group - readable by a group - that contains the users who should have access. - - - - To disable the command channel, use an empty - controls statement: - controls { };. - - -
-
<command>include</command> Statement Grammar - - include filename; -
-
<command>include</command> Statement Definition and Usage - - - The include statement inserts the - specified file (or files if a valid glob expression is detected) - at the point where the include - statement is encountered. The include - statement facilitates the administration of configuration - files - by permitting the reading or writing of some things but not - others. For example, the statement could include private keys - that are readable only by the name server. - - -
-
<command>key</command> Statement Grammar - -
- -
<command>key</command> Statement Definition and Usage - - - The key statement defines a shared - secret key for use with TSIG (see ) - or the command channel - (see ). - - - - The key statement can occur at the - top level - of the configuration file or inside a view - statement. Keys defined in top-level key - statements can be used in all views. Keys intended for use in - a controls statement - (see ) - must be defined at the top level. - - - - The key_id, also known as the - key name, is a domain name uniquely identifying the key. It can - be used in a server - statement to cause requests sent to that - server to be signed with this key, or in address match lists to - verify that incoming requests have been signed with a key - matching this name, algorithm, and secret. - - - - The algorithm_id is a string - that specifies a security/authentication algorithm. The - named server supports hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384 - and hmac-sha512 TSIG authentication. - Truncated hashes are supported by appending the minimum - number of required bits preceded by a dash, e.g. - hmac-sha1-80. The - secret_string is the secret - to be used by the algorithm, and is treated as a Base64 - encoded string. - - -
-
<command>logging</command> Statement Grammar - -
- -
<command>logging</command> Statement Definition and Usage - - - The logging statement configures a - wide - variety of logging options for the name server. Its channel phrase - associates output methods, format options and severity levels with - a name that can then be used with the category phrase - to select how various classes of messages are logged. - - - Only one logging statement is used to - define - as many channels and categories as are wanted. If there is no logging statement, - the logging configuration will be: - - -logging { - category default { default_syslog; default_debug; }; - category unmatched { null; }; -}; - - - - If named is started with the - option, it logs to the specified file - at startup, instead of using syslog. In this case the logging - configuration will be: - - -logging { - category default { default_logfile; default_debug; }; - category unmatched { null; }; -}; - - - - The logging configuration is only established when - the entire configuration file has been parsed. - When the server is starting up, all logging messages - regarding syntax errors in the configuration file go to the default - channels, or to standard error if the option - was specified. - - -
The <command>channel</command> Phrase - - - All log output goes to one or more channels; - you can make as many of them as you want. - - - - Every channel definition must include a destination clause that - says whether messages selected for the channel go to a file, to a - particular syslog facility, to the standard error stream, or are - discarded. It can optionally also limit the message severity level - that will be accepted by the channel (the default is - info), and whether to include a - named-generated time stamp, the - category name - and/or severity level (the default is not to include any). - - - - The null destination clause - causes all messages sent to the channel to be discarded; - in that case, other options for the channel are meaningless. - - - - The file destination clause directs - the channel to a disk file. It can include additional - arguments to specify how large the file is allowed to - become before it is rolled to a backup file - (size), how many backup versions of - the file will be saved each time this happens - (versions), and the format to use - for naming backup versions (suffix). - - - - The size option is used to limit - log file growth. If the file ever exceeds the specified - size, then named will stop writing to the - file unless it has a versions option - associated with it. If backup versions are kept, the files - are rolled as described below. If there is no - versions option, no more data will - be written to the log until some out-of-band mechanism - removes or truncates the log to less than the maximum size. - The default behavior is not to limit the size of the file. - - - File rolling only occurs when the file exceeds the size - specified with the size option. No - backup versions are kept by default; any existing - log file is simply appended. The - versions option specifies - how many backup versions of the file should be kept. - If set to unlimited, there is no limit. - - - The suffix option can be set to - either increment or - timestamp. If set to - timestamp, then when a log file is - rolled, it is saved with the current timestamp as a - file suffix. If set to increment, - then backup files are saved with incrementing numbers - as suffixes; older files are renamed when rolling. - For example, if versions - is set to 3 and suffix to - increment, then when - filename.log reaches the size - specified by size, - filename.log.1 is renamed to - filename.log.2, - filename.log.0 is renamed - to filename.log.1, - and filename.log is - renamed to filename.log.0, - whereupon a new filename.log is - opened. - - - - Example usage of the size, - versions, and suffix - options: - - -channel an_example_channel { - file "example.log" versions 3 size 20m suffix increment; - print-time yes; - print-category yes; -}; - - - - The syslog destination clause - directs the - channel to the system log. Its argument is a - syslog facility as described in the syslog man - page. Known facilities are kern, user, - mail, daemon, auth, - syslog, lpr, news, - uucp, cron, authpriv, - ftp, local0, local1, - local2, local3, local4, - local5, local6 and - local7, however not all facilities - are supported on - all operating systems. - How syslog will handle messages - sent to - this facility is described in the syslog.conf man - page. If you have a system which uses a very old version of syslog that - only uses two arguments to the openlog() function, - then this clause is silently ignored. - - - On Windows machines syslog messages are directed to the EventViewer. - - - The severity clause works like syslog's - "priorities", except that they can also be used if you are writing - straight to a file rather than using syslog. - Messages which are not at least of the severity level given will - not be selected for the channel; messages of higher severity - levels - will be accepted. - - - If you are using syslog, then the syslog.conf priorities - will also determine what eventually passes through. For example, - defining a channel facility and severity as daemon and debug but - only logging daemon.warning via syslog.conf will - cause messages of severity info and - notice to - be dropped. If the situation were reversed, with named writing - messages of only warning or higher, - then syslogd would - print all messages it received from the channel. - - - - The stderr destination clause - directs the - channel to the server's standard error stream. This is intended - for - use when the server is running as a foreground process, for - example - when debugging a configuration. - - - - The server can supply extensive debugging information when - it is in debugging mode. If the server's global debug level is - greater - than zero, then debugging mode will be active. The global debug - level is set either by starting the named server - with the flag followed by a positive integer, - or by running rndc trace. - The global debug level - can be set to zero, and debugging mode turned off, by running rndc -notrace. All debugging messages in the server have a debug - level, and higher debug levels give more detailed output. Channels - that specify a specific debug severity, for example: - - -channel specific_debug_level { - file "foo"; - severity debug 3; -}; - - - - will get debugging output of level 3 or less any time the - server is in debugging mode, regardless of the global debugging - level. Channels with dynamic - severity use the - server's global debug level to determine what messages to print. - - - print-time can be set to - yes, no, - or a time format specifier, which may be one of - local, iso8601 or - iso8601-utc. If set to - no, then the date and time will - not be logged. If set to yes - or local, the date and time are logged - in a human readable format, using the local time zone. - If set to iso8601 the local time is - logged in ISO8601 format. If set to - iso8601-utc, then the date and time - are logged in ISO8601 format, with time zone set to - UTC. The default is no. - - - print-time may - be specified for a syslog channel, - but it is usually - pointless since syslog also logs - the date and time. - - - If print-category is - requested, then the - category of the message will be logged as well. Finally, if print-severity is - on, then the severity level of the message will be logged. The print- options may - be used in any combination, and will always be printed in the - following - order: time, category, severity. Here is an example where all - three print- options - are on: - - - - 28-Feb-2000 15:05:32.863 general: notice: running - - - - If buffered has been turned on the output - to files will not be flushed after each log entry. By default - all log messages are flushed. - - - - There are four predefined channels that are used for - named's default logging as follows. - If named is started with the - then a - fifth channel default_logfile is added. - How they are - used is described in . - - -channel default_syslog { - // send to syslog's daemon facility - syslog daemon; - // only send priority info and higher - severity info; -}; - -channel default_debug { - // write to named.run in the working directory - // Note: stderr is used instead of "named.run" if - // the server is started with the '-g' option. - file "named.run"; - // log at the server's current debug level - severity dynamic; -}; - -channel default_stderr { - // writes to stderr - stderr; - // only send priority info and higher - severity info; -}; - -channel null { - // toss anything sent to this channel - null; -}; - -channel default_logfile { - // this channel is only present if named is - // started with the -L option, whose argument - // provides the file name - file "..."; - // log at the server's current debug level - severity dynamic; -}; - - - - The default_debug channel has the - special - property that it only produces output when the server's debug - level is - nonzero. It normally writes to a file called named.run - in the server's working directory. - - - - For security reasons, when the - command line option is used, the named.run file - is created only after named has - changed to the - new UID, and any debug output generated while named is - starting up and still running as root is discarded. If you need - to capture this output, you must run the server with the - option to specify a default logfile, or the - option to log to standard error which you can redirect to a file. - - - - Once a channel is defined, it cannot be redefined. Thus you - cannot alter the built-in channels directly, but you can modify - the default logging by pointing categories at channels you have - defined. - -
- -
The <command>category</command> Phrase - - - There are many categories, so you can send the logs you want - to see wherever you want, without seeing logs you don't want. If - you don't specify a list of channels for a category, then log - messages - in that category will be sent to the default category - instead. If you don't specify a default category, the following - "default default" is used: - - -category default { default_syslog; default_debug; }; - - - - If you start named with the - option then the default category is: - - -category default { default_logfile; default_debug; }; - - - - As an example, let's say you want to log security events to - a file, but you also want keep the default logging behavior. You'd - specify the following: - - -channel my_security_channel { - file "my_security_file"; - severity info; -}; -category security { - my_security_channel; - default_syslog; - default_debug; -}; - - - To discard all messages in a category, specify the null channel: - - -category xfer-out { null; }; -category notify { null; }; - - - - Following are the available categories and brief descriptions - of the types of log information they contain. More - categories may be added in future BIND releases. - - -
-
The <command>query-errors</command> Category - - The query-errors category is - used to indicate why and how specific queries resulted in - responses which indicate an error. Normally, these messages - will be logged at debug logging levels; - note, however, that if query logging is active, some will be - logged at info. The logging levels are - described below: - - - - At debug level 1 or higher - or at - info, when query logging is active - each - response with response code SERVFAIL will be logged as follows: - - - client 127.0.0.1#61502: query failed (SERVFAIL) for www.example.com/IN/AAAA at query.c:3880 - - - This means an error resulting in SERVFAIL was detected at line - 3880 of source file query.c. Log messages - of this level will particularly help identify the cause of - SERVFAIL for an authoritative server. - - - At debug level 2 or higher, detailed - context information about recursive resolutions that resulted in - SERVFAIL will be logged. The log message will look like this: - - - - -fetch completed at resolver.c:2970 for www.example.com/A -in 10.000183: timed out/success [domain:example.com, -referral:2,restart:7,qrysent:8,timeout:5,lame:0,quota:0,neterr:0, -badresp:1,adberr:0,findfail:0,valfail:0] - - - - The first part before the colon shows that a recursive - resolution for AAAA records of www.example.com completed - in 10.000183 seconds and the final result that led to the - SERVFAIL was determined at line 2970 of source file - resolver.c. - - - The following part shows the detected final result and the - latest result of DNSSEC validation. The latter is always - "success" when no validation attempt was made. In this example, - this query probably resulted in SERVFAIL because all name - servers are down or unreachable, leading to a timeout in 10 - seconds. DNSSEC validation was probably not attempted. - - - The last part, enclosed in square brackets, shows statistics - collected for this particular resolution attempt. - The domain field shows the deepest zone that - the resolver reached; it is the zone where the error was - finally detected. The meaning of the other fields is - summarized in the following table. - - - - - - - - - - referral - - - - The number of referrals the resolver received - throughout the resolution process. - In the above example this is 2, which are most - likely com and example.com. - - - - - - restart - - - - The number of cycles that the resolver tried - remote servers at the domain - zone. - In each cycle the resolver sends one query - (possibly resending it, depending on the response) - to each known name server of - the domain zone. - - - - - - qrysent - - - - The number of queries the resolver sent at the - domain zone. - - - - - - timeout - - - - The number of timeouts since the resolver - received the last response. - - - - - - lame - - - - The number of lame servers the resolver detected - at the domain zone. - A server is detected to be lame either by an - invalid response or as a result of lookup in - BIND9's address database (ADB), where lame - servers are cached. - - - - - - quota - - - - The number of times the resolver was unable - to send a query because it had exceeded the - permissible fetch quota for a server. - - - - - - neterr - - - - The number of erroneous results that the - resolver encountered in sending queries - at the domain zone. - One common case is the remote server is - unreachable and the resolver receives an ICMP - unreachable error message. - - - - - - badresp - - - - The number of unexpected responses (other than - lame) to queries sent by the - resolver at the domain zone. - - - - - - adberr - - - - Failures in finding remote server addresses - of the domain zone in the ADB. - One common case of this is that the remote - server's name does not have any address records. - - - - - - findfail - - - - Failures of resolving remote server addresses. - This is a total number of failures throughout - the resolution process. - - - - - - valfail - - - - Failures of DNSSEC validation. - Validation failures are counted throughout - the resolution process (not limited to - the domain zone), but should - only happen in domain. - - - - - - - - At debug level 3 or higher, the same - messages as those at debug level 1 will be - logged for other errors than SERVFAIL. Note that negative - responses such as NXDOMAIN are not errors, and are not logged - at this debug level. - - - At debug level 4 or higher, the - detailed context information logged at debug - level 2 will be logged for other errors than SERVFAIL and - for negative resonses such as NXDOMAIN. - -
-
- -
<command>masters</command> Statement Grammar - -
- -
<command>masters</command> Statement Definition and - Usage - - masters - lists allow for a common set of masters to be easily used by - multiple stub and slave zones in their masters - or also-notify lists. - -
- -
<command>options</command> Statement Grammar - - - This is the grammar of the options - statement in the named.conf file: - - -
- -
<command>options</command> Statement Definition and - Usage - - - The options statement sets up global - options - to be used by BIND. This statement - may appear only - once in a configuration file. If there is no options - statement, an options block with each option set to its default will - be used. - - - - - - attach-cache - - - Allows multiple views to share a single cache - database. - Each view has its own cache database by default, but - if multiple views have the same operational policy - for name resolution and caching, those views can - share a single cache to save memory and possibly - improve resolution efficiency by using this option. - - - - The attach-cache option - may also be specified in view - statements, in which case it overrides the - global attach-cache option. - - - - The cache_name specifies - the cache to be shared. - When the named server configures - views which are supposed to share a cache, it - creates a cache with the specified name for the - first view of these sharing views. - The rest of the views will simply refer to the - already created cache. - - - - One common configuration to share a cache would be to - allow all views to share a single cache. - This can be done by specifying - the attach-cache as a global - option with an arbitrary name. - - - - Another possible operation is to allow a subset of - all views to share a cache while the others to - retain their own caches. - For example, if there are three views A, B, and C, - and only A and B should share a cache, specify the - attach-cache option as a view A (or - B)'s option, referring to the other view name: - - - - view "A" { - // this view has its own cache - ... - }; - view "B" { - // this view refers to A's cache - attach-cache "A"; - }; - view "C" { - // this view has its own cache - ... - }; - - - - Views that share a cache must have the same policy - on configurable parameters that may affect caching. - The current implementation requires the following - configurable options be consistent among these - views: - check-names, - dnssec-accept-expired, - dnssec-validation, - max-cache-ttl, - max-ncache-ttl, - max-stale-ttl, - max-cache-size, and - min-cache-ttl, - min-ncache-ttl, - zero-no-soa-ttl. - - - - Note that there may be other parameters that may - cause confusion if they are inconsistent for - different views that share a single cache. - For example, if these views define different sets of - forwarders that can return different answers for the - same question, sharing the answer does not make - sense or could even be harmful. - It is administrator's responsibility to ensure - configuration differences in different views do - not cause disruption with a shared cache. - - - - - - - directory - - - The working directory of the server. - Any non-absolute pathnames in the configuration file will - be taken as relative to this directory. The default - location for most server output files - (e.g. named.run) is this directory. - If a directory is not specified, the working directory - defaults to `.', the directory from - which the server was started. The directory specified - should be an absolute path, and must - be writable by the effective user ID of the - named process. - - - - - - dnstap - - - dnstap is a fast, flexible method - for capturing and logging DNS traffic. Developed by - Robert Edmonds at Farsight Security, Inc., and supported - by multiple DNS implementations, dnstap - uses - libfstrm (a lightweight high-speed - framing library, see - https://github.com/farsightsec/fstrm) to send - event payloads which are encoded using Protocol Buffers - (libprotobuf-c, a mechanism for - serializing structured data developed - by Google, Inc.; see - https://developers.google.com/protocol-buffers). - - - To enable dnstap at compile time, - the fstrm and protobuf-c - libraries must be available, and BIND must be configured with - . - - - The dnstap option is a bracketed list - of message types to be logged. These may be set differently - for each view. Supported types are client, - auth, resolver, - forwarder, and update. - Specifying type all will cause all - dnstap messages to be logged, regardless of - type. - - - Each type may take an additional argument to indicate whether - to log query messages or - response messages; if not specified, - both queries and responses are logged. - - - Example: To log all authoritative queries and responses, - recursive client responses, and upstream queries sent by - the resolver, use: -dnstap { - auth; - client response; - resolver query; -}; - - - - Logged dnstap messages can be parsed - using the dnstap-read utility (see - for details). - - - For more information on dnstap, see - http://dnstap.info. - - - The fstrm library has a number of tunables that are exposed - in named.conf, and can be modified - if necessary to improve performance or prevent loss of data. - These are: - - - - - fstrm-set-buffer-hint: The - threshold number of bytes to accumulate in the output - buffer before forcing a buffer flush. The minimum is - 1024, the maximum is 65536, and the default is 8192. - - - - - fstrm-set-flush-timeout: The number - of seconds to allow unflushed data to remain in the - output buffer. The minimum is 1 second, the maximum is - 600 seconds (10 minutes), and the default is 1 second. - - - - - fstrm-set-output-notify-threshold: - The number of outstanding queue entries to allow on - an input queue before waking the I/O thread. - The minimum is 1 and the default is 32. - - - - - fstrm-set-output-queue-model: - Controls the queuing semantics to use for queue - objects. The default is mpsc - (multiple producer, single consumer); the other - option is spsc (single producer, - single consumer). - - - - - fstrm-set-input-queue-size: The - number of queue entries to allocate for each - input queue. This value must be a power of 2. - The minimum is 2, the maximum is 16384, and - the default is 512. - - - - - fstrm-set-output-queue-size: - The number of queue entries to allocate for each - output queue. The minimum is 2, the maximum is - system-dependent and based on , - and the default is 64. - - - - - fstrm-set-reopen-interval: - The number of seconds to wait between attempts to - reopen a closed output stream. The minimum is 1 second, - the maximum is 600 seconds (10 minutes), and the default - is 5 seconds. For convenience, TTL-style time unit - suffixes may be used to specify the value. It also - accepts ISO 8601 duration formats. - - - - - Note that all of the above minimum, maximum, and default - values are set by the libfstrm library, - and may be subject to change in future versions of the - library. See the libfstrm documentation - for more information. - - - - - - dnstap-output - - - Configures the path to which the dnstap - frame stream will be sent if dnstap - is enabled at compile time and active. - - - The first argument is either file or - unix, indicating whether the destination - is a file or a UNIX domain socket. The second argument - is the path of the file or socket. (Note: when using a - socket, dnstap messages will - only be sent if another process such as - fstrm_capture - (provided with libfstrm) is listening on - the socket.) - - - If the first argument is file, then - up to three additional options can be added: - size indicates the size to which a - dnstap log file can grow before being - rolled to a new file; versions - specifies the number of rolled log files to retain; and - suffix indicates whether to retain - rolled log files with an incrementing counter as the - suffix (increment) or with the - current timestamp (timestamp). - These are similar to the size, - versions, and suffix - options in a logging channel. - The default is to allow dnstap log - files to grow to any size without rolling. - - - dnstap-output can only be set globally - in options. Currently, it can only be - set once while named is running; - once set, it cannot be changed by - rndc reload or - rndc reconfig. - - - - - - dnstap-identity - - - Specifies an identity string to send in - dnstap messages. If set to - hostname, which is the default, the - server's hostname will be sent. If set to - none, no identity string will be sent. - - - - - - dnstap-version - - - Specifies a version string to send in - dnstap messages. The default is the - version number of the BIND release. If set to - none, no version string will be sent. - - - - - - geoip-directory - - - When named is compiled using the - MaxMind GeoIP2 geolocation API, - this specifies the directory containing GeoIP - database files. By default, the option is set based on - the prefix used to build the libmaxminddb - module: for example, if the library is installed in - /usr/local/lib, then the default - geoip-directory will be - /usr/local/share/GeoIP. On Windows, - the default is the named working - directory. See for details about - geoip ACLs. - - - - - - key-directory - - - When performing dynamic update of secure zones, the - directory where the public and private DNSSEC key files - should be found, if different than the current working - directory. (Note that this option has no effect on the - paths for files containing non-DNSSEC keys such as - bind.keys, - rndc.key or - session.key.) - - - - - - lmdb-mapsize - - - When named is built with liblmdb, - this option sets a maximum size for the memory map of - the new-zone database (NZD) in LMDB database format. - This database is used to store configuration information - for zones added using rndc addzone. - Note that this is not the NZD database file size, but - the largest size that the database may grow to. - - - Because the database file is memory mapped, its size is - limited by the address space of the named process. The - default of 32 megabytes was chosen to be usable with - 32-bit named builds. The largest - permitted value is 1 terabyte. Given typical zone - configurations without elaborate ACLs, a 32 MB NZD file - ought to be able to hold configurations of about 100,000 - zones. - - - - - - managed-keys-directory - - - Specifies the directory in which to store the files that - track managed DNSSEC keys (i.e., those configured using - the initial-key or - initial-ds keywords in a - trust-anchors statement). By default, - this is the working directory. The directory - must be writable by the effective - user ID of the named process. - - - If named is not configured to use views, - then managed keys for the server will be tracked in a single - file called managed-keys.bind. - Otherwise, managed keys will be tracked in separate files, - one file per view; each file name will be the view name - (or, if it contains characters that are incompatible with - use as a file name, the SHA256 hash of the view name), - followed by the extension - .mkeys. - - - (Note: in previous releases, file names for views - always used the SHA256 hash of the view name. To ensure - compatibility after upgrade, if a file using the old - name format is found to exist, it will be used instead - of the new format.) - - - - - - max-ixfr-ratio - - - Sets the size threshold (expressed as a percentage - of the size of the full zone) beyond which - named will choose to use an AXFR - response rather than IXFR when answering zone transfer - requests. See . - - - The minimum value is 1%. The keyword - unlimited disables ratio checking and - allows IXFRs of any size. The default is - 100%. - - - - - - new-zones-directory - - - Specifies the directory in which to store the configuration - parameters for zones added via rndc addzone. - By default, this is the working directory. If set to a relative - path, it will be relative to the working directory. The - directory must be writable by the - effective user ID of the named process. - - - - - - qname-minimization - - - This option controls QNAME minimization behaviour - in the BIND resolver. When set to strict, - BIND will follow the QNAME minimization algorithm to - the letter, as specified in RFC 7816. Setting this - option to relaxed will cause BIND - to fall back to normal (non-minimized) query mode - when it receives either NXDOMAIN or other unexpected - responses (e.g. SERVFAIL, improper zone cut, REFUSED) - to a minimized query. disabled disables - QNAME minimization completely. The current default is - relaxed, but it might be changed to - strict in a future release. - - - - - - tkey-gssapi-keytab - - - The KRB5 keytab file to use for GSS-TSIG updates. If - this option is set and tkey-gssapi-credential is not - set, then updates will be allowed with any key - matching a principal in the specified keytab. - - - - - - tkey-gssapi-credential - - - The security credential with which the server should - authenticate keys requested by the GSS-TSIG protocol. - Currently only Kerberos 5 authentication is available - and the credential is a Kerberos principal which the - server can acquire through the default system key - file, normally /etc/krb5.keytab. - The location keytab file can be overridden using the - tkey-gssapi-keytab option. Normally this principal is - of the form "DNS/server.domain". - To use GSS-TSIG, tkey-domain must - also be set if a specific keytab is not set with - tkey-gssapi-keytab. - - - - - - tkey-domain - - - The domain appended to the names of all shared keys - generated with TKEY. When a - client requests a TKEY exchange, - it may or may not specify the desired name for the - key. If present, the name of the shared key will - be client specified part + - tkey-domain. Otherwise, the - name of the shared key will be random hex - digits + tkey-domain. - In most cases, the domainname - should be the server's domain name, or an otherwise - non-existent subdomain like - "_tkey.domainname". If you are - using GSS-TSIG, this variable must be defined, unless - you specify a specific keytab using tkey-gssapi-keytab. - - - - - - tkey-dhkey - - - The Diffie-Hellman key used by the server - to generate shared keys with clients using the Diffie-Hellman - mode - of TKEY. The server must be - able to load the - public and private keys from files in the working directory. - In - most cases, the key_name should be the server's host name. - - - - - - cache-file - - - This is for testing only. Do not use. - - - - - - dump-file - - - The pathname of the file the server dumps - the database to when instructed to do so with - rndc dumpdb. - If not specified, the default is named_dump.db. - - - - - - memstatistics-file - - - The pathname of the file the server writes memory - usage statistics to on exit. If not specified, - the default is named.memstats. - - - - - - lock-file - - - The pathname of a file on which named will - attempt to acquire a file lock when starting up for - the first time; if unsuccessful, the server will - will terminate, under the assumption that another - server is already running. If not specified, the default is - none. - - - Specifying lock-file none disables the - use of a lock file. lock-file is - ignored if named was run using the - option, which overrides it. Changes to - lock-file are ignored if - named is being reloaded or - reconfigured; it is only effective when the server is - first started up. - - - - - - pid-file - - - The pathname of the file the server writes its process ID - in. If not specified, the default is - /var/run/named/named.pid. - The PID file is used by programs that want to send signals to - the running - name server. Specifying pid-file none disables the - use of a PID file — no file will be written and any - existing one will be removed. Note that none - is a keyword, not a filename, and therefore is not enclosed - in - double quotes. - - - - - - recursing-file - - - The pathname of the file the server dumps - the queries that are currently recursing when instructed - to do so with rndc recursing. - If not specified, the default is named.recursing. - - - - - - statistics-file - - - The pathname of the file the server appends statistics - to when instructed to do so using rndc stats. - If not specified, the default is named.stats in the - server's current directory. The format of the file is - described - in . - - - - - - bindkeys-file - - - The pathname of a file to override the built-in trusted - keys provided by named. - See the discussion of dnssec-validation - for details. If not specified, the default is - /etc/bind.keys. - - - - - - secroots-file - - - The pathname of the file the server dumps - security roots to when instructed to do so with - rndc secroots. - If not specified, the default is - named.secroots. - - - - - - session-keyfile - - - The pathname of the file into which to write a TSIG - session key generated by named for use by - nsupdate -l. If not specified, the - default is /var/run/named/session.key. - (See , and in - particular the discussion of the - update-policy statement's - local option for more - information about this feature.) - - - - - - session-keyname - - - The key name to use for the TSIG session key. - If not specified, the default is "local-ddns". - - - - - - session-keyalg - - - The algorithm to use for the TSIG session key. - Valid values are hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384, hmac-sha512 and hmac-md5. If not - specified, the default is hmac-sha256. - - - - - - port - - - The UDP/TCP port number the server uses for - receiving and sending DNS protocol traffic. - The default is 53. This option is mainly intended for server - testing; - a server using a port other than 53 will not be able to - communicate with - the global DNS. - - - - - - dscp - - - The global Differentiated Services Code Point (DSCP) - value to classify outgoing DNS traffic on operating - systems that support DSCP. Valid values are 0 through 63. - It is not configured by default. - - - - - - random-device - - - Specifies a source of entropy to be used by the server. - This is a device or file from which to read entropy. - If it is a file, operations requiring entropy - will fail when the file has been exhausted. - - - Entropy is needed for cryptographic operations such as - TKEY transactions, dynamic update of signed zones, and - generation of TSIG session keys. It is also used for - seeding and stirring the pseudo-random number generator, - which is used for less critical functions requiring - randomness such as generation of DNS message transaction - ID's. - - - If random-device is not specified, or - if it is set to none, entropy will be - read from the random number generation function supplied - by the cryptographic library with which BIND was linked - (i.e. OpenSSL or a PKCS#11 provider). - - - The random-device option takes - effect during the initial configuration load at server - startup time and is ignored on subsequent reloads. - - - - - - preferred-glue - - - If specified, the listed type (A or AAAA) will be emitted - before other glue - in the additional section of a query response. - The default is to prefer A records when responding - to queries that arrived via IPv4 and AAAA when - responding to queries that arrived via IPv6. - - - - - - root-delegation-only - - - Turn on enforcement of delegation-only in TLDs - (top level domains) and root zones with an optional - exclude list. - - - DS queries are expected to be made to and be answered by - delegation only zones. Such queries and responses are - treated as an exception to delegation-only processing - and are not converted to NXDOMAIN responses provided - a CNAME is not discovered at the query name. - - - If a delegation only zone server also serves a child - zone it is not always possible to determine whether - an answer comes from the delegation only zone or the - child zone. SOA NS and DNSKEY records are apex - only records and a matching response that contains - these records or DS is treated as coming from a - child zone. RRSIG records are also examined to see - if they are signed by a child zone or not. The - authority section is also examined to see if there - is evidence that the answer is from the child zone. - Answers that are determined to be from a child zone - are not converted to NXDOMAIN responses. Despite - all these checks there is still a possibility of - false negatives when a child zone is being served. - - - Similarly false positives can arise from empty nodes - (no records at the name) in the delegation only zone - when the query type is not ANY. - - - Note some TLDs are not delegation only (e.g. "DE", "LV", - "US" and "MUSEUM"). This list is not exhaustive. - - - -options { - root-delegation-only exclude { "de"; "lv"; "us"; "museum"; }; -}; - - - - - - - disable-algorithms - - - Disable the specified DNSSEC algorithms at and below the - specified name. - Multiple disable-algorithms - statements are allowed. - Only the best match disable-algorithms - clause will be used to determine which algorithms are used. - - - If all supported algorithms are disabled, the zones covered - by the disable-algorithms will be treated - as insecure. - - - Configured trust anchors in trust-anchors - (or managed-keys or - trusted-keys, both deprecated) - that match a disabled algorithm will be ignored and treated - as if they were not configured at all. - - - - - - disable-ds-digests - - - Disable the specified DS digest types at and below the - specified name. - Multiple disable-ds-digests - statements are allowed. - Only the best match disable-ds-digests - clause will be used to determine which digest types are used. - - - If all supported digest types are disabled, the zones covered - by the disable-ds-digests will be treated - as insecure. - - - - - - dnssec-must-be-secure - - - Specify hierarchies which must be or may not be secure - (signed and validated). If yes, - then named will only accept answers if - they are secure. If no, then normal - DNSSEC validation applies allowing for insecure answers to - be accepted. The specified domain must be defined as a - trust anchor, for instance in a trust-anchors - statement, or dnssec-validation auto must - be active. - - - - - - dns64 - - - This directive instructs named to - return mapped IPv4 addresses to AAAA queries when - there are no AAAA records. It is intended to be - used in conjunction with a NAT64. Each - dns64 defines one DNS64 prefix. - Multiple DNS64 prefixes can be defined. - - - Compatible IPv6 prefixes have lengths of 32, 40, 48, 56, - 64 and 96 as per RFC 6052. Bits 64..71 inclusive must - be zero with the most significate bit of the prefix in - position 0. - - - Additionally a reverse IP6.ARPA zone will be created for - the prefix to provide a mapping from the IP6.ARPA names - to the corresponding IN-ADDR.ARPA names using synthesized - CNAMEs. dns64-server and - dns64-contact can be used to specify - the name of the server and contact for the zones. These - are settable at the view / options level. These are - not settable on a per-prefix basis. - - - Each dns64 supports an optional - clients ACL that determines which - clients are affected by this directive. If not defined, - it defaults to any;. - - - Each dns64 supports an optional - mapped ACL that selects which - IPv4 addresses are to be mapped in the corresponding - A RRset. If not defined it defaults to - any;. - - - Normally, DNS64 won't apply to a domain name that - owns one or more AAAA records; these records will - simply be returned. The optional - exclude ACL allows specification - of a list of IPv6 addresses that will be ignored - if they appear in a domain name's AAAA records, and - DNS64 will be applied to any A records the domain - name owns. If not defined, exclude - defaults to ::ffff:0.0.0.0/96. - - - A optional suffix can also - be defined to set the bits trailing the mapped - IPv4 address bits. By default these bits are - set to ::. The bits - matching the prefix and mapped IPv4 address - must be zero. - - - If recursive-only is set to - yes the DNS64 synthesis will - only happen for recursive queries. The default - is no. - - - If break-dnssec is set to - yes the DNS64 synthesis will - happen even if the result, if validated, would - cause a DNSSEC validation failure. If this option - is set to no (the default), the DO - is set on the incoming query, and there are RRSIGs on - the applicable records, then synthesis will not happen. - - - acl rfc1918 { 10/8; 192.168/16; 172.16/12; }; - - dns64 64:FF9B::/96 { - clients { any; }; - mapped { !rfc1918; any; }; - exclude { 64:FF9B::/96; ::ffff:0000:0000/96; }; - suffix ::; - }; - - - - - - dnssec-loadkeys-interval - - - When a zone is configured with auto-dnssec - maintain; its key repository must be checked - periodically to see if any new keys have been added - or any existing keys' timing metadata has been updated - (see and - ). The - dnssec-loadkeys-interval option - sets the frequency of automatic repository checks, in - minutes. The default is 60 (1 hour), - the minimum is 1 (1 minute), and the - maximum is 1440 (24 hours); any higher - value is silently reduced. - - - - - - dnssec-update-mode - - - If this option is set to its default value of - maintain in a zone of type - master which is DNSSEC-signed - and configured to allow dynamic updates (see - ), and - if named has access to the - private signing key(s) for the zone, then - named will automatically sign all new - or changed records and maintain signatures for the zone - by regenerating RRSIG records whenever they approach - their expiration date. - - - If the option is changed to no-resign, - then named will sign all new or - changed records, but scheduled maintenance of - signatures is disabled. - - - With either of these settings, named - will reject updates to a DNSSEC-signed zone when the - signing keys are inactive or unavailable to - named. (A planned third option, - external, will disable all automatic - signing and allow DNSSEC data to be submitted into a zone - via dynamic update; this is not yet implemented.) - - - - - - nta-lifetime - - - Species the default lifetime, in seconds, - that will be used for negative trust anchors added - via rndc nta. - - - A negative trust anchor selectively disables - DNSSEC validation for zones that are known to be - failing because of misconfiguration rather than - an attack. When data to be validated is - at or below an active NTA (and above any other - configured trust anchors), named will - abort the DNSSEC validation process and treat the data as - insecure rather than bogus. This continues until the - NTA's lifetime is elapsed. NTAs persist - across named restarts. - - - For convenience, TTL-style time unit suffixes can be - used to specify the NTA lifetime in seconds, minutes - or hours. It also accepts ISO 8601 duration formats. - - - defaults to one hour. It - cannot exceed one week. - - - - - - nta-recheck - - - Species how often to check whether negative - trust anchors added via rndc nta - are still necessary. - - - A negative trust anchor is normally used when a - domain has stopped validating due to operator error; - it temporarily disables DNSSEC validation for that - domain. In the interest of ensuring that DNSSEC - validation is turned back on as soon as possible, - named will periodically send a - query to the domain, ignoring negative trust anchors, - to find out whether it can now be validated. If so, - the negative trust anchor is allowed to expire early. - - - Validity checks can be disabled for an individual - NTA by using rndc nta -f, or - for all NTAs by setting - to zero. - - - For convenience, TTL-style time unit suffixes can be - used to specify the NTA recheck interval in seconds, - minutes or hours. It also accepts ISO 8601 duration - formats. - - - The default is five minutes. It cannot be longer than - (which cannot be longer - than a week). - - - - - - max-zone-ttl - - - Specifies a maximum permissible TTL value in seconds. - For convenience, TTL-style time unit suffixes may be - used to specify the maximum value. It also - accepts ISO 8601 duration formats. - - - When loading a zone file using a - of - text or raw, - any record encountered with a TTL higher than - will cause the zone to - be rejected. - - - This is useful in DNSSEC-signed zones because when - rolling to a new DNSKEY, the old key needs to remain - available until RRSIG records have expired from - caches. The option guarantees - that the largest TTL in the zone will be no higher - than the set value. - - - (NOTE: Because map-format files - load directly into memory, this option cannot be - used with them.) - - - The default value is unlimited. - A of zero is treated as - unlimited. - - - - - - stale-answer-ttl - - - Specifies the TTL to be returned on stale answers. - The default is 1 second. The minimum allowed is - also 1 second; a value of 0 will be updated silently - to 1 second. - - - For stale answers to be returned, they must be enabled, - either in the configuration file using - stale-answer-enable or via - rndc serve-stale on. - - - - - - serial-update-method - - - Zones configured for dynamic DNS may use this - option to set the update method that will be used for - the zone serial number in the SOA record. - - - With the default setting of - serial-update-method increment;, the - SOA serial number will be incremented by one each time - the zone is updated. - - - When set to - serial-update-method unixtime;, the - SOA serial number will be set to the number of seconds - since the UNIX epoch, unless the serial number is - already greater than or equal to that value, in which - case it is simply incremented by one. - - - When set to - serial-update-method date;, the - new SOA serial number will be the current date - in the form "YYYYMMDD", followed by two zeroes, - unless the existing serial number is already greater - than or equal to that value, in which case it is - incremented by one. - - - - - - zone-statistics - - - If full, the server will collect - statistical data on all zones (unless specifically - turned off on a per-zone basis by specifying - zone-statistics terse or - zone-statistics none - in the zone statement). - These include, for example, DNSSEC signing operations - and the number of authoritative answers per query type. - The default is terse, providing - minimal statistics on zones (including name and - current serial number, but not query type - counters). - - - These statistics may be accessed via the - statistics-channel or - using rndc stats, which - will dump them to the file listed - in the statistics-file. See - also . - - - For backward compatibility with earlier versions - of BIND 9, the zone-statistics - option can also accept yes - or no; yes - has the same meaning as full. - As of BIND 9.10, - no has the same meaning - as none; previously, it - was the same as terse. - - - - - -
Boolean Options - - - - - automatic-interface-scan - - - If yes and supported by the operating - system, automatically rescan network interfaces when the - interface addresses are added or removed. The default is - yes. This configuration option does - not affect time based interface-interval - option, and it is recommended to set the time based - interface-interval to 0 when the operator - confirms that automatic interface scanning is supported by the - operating system. - - - The automatic-interface-scan implementation - uses routing sockets for the network interface discovery, - and therefore the operating system has to support the routing - sockets for this feature to work. - - - - - - allow-new-zones - - - If yes, then zones can be - added at runtime via rndc addzone. - The default is no. - - - Newly added zones' configuration parameters - are stored so that they can persist after the - server is restarted. The configuration information - is saved in a file called - viewname.nzf - (or, if named is compiled with - liblmdb, in an LMDB database file called - viewname.nzd). - viewname is the name of the - view, unless the view name contains characters that are - incompatible with use as a file name, in which case a - cryptographic hash of the view name is used instead. - - - Zones added at runtime will have their configuration - stored either in a new-zone file (NZF) or a new-zone - database (NZD) depending on whether - named was linked with - liblmdb at compile time. - See for further details - about rndc addzone. - - - - - - auth-nxdomain - - - If yes, then the - AA bit is always set on NXDOMAIN - responses, even if the server is not actually - authoritative. The default is no. - If you are using very old DNS software, you - may need to set it to yes. - - - - - - deallocate-on-exit - - - This option was used in BIND - 8 to enable checking - for memory leaks on exit. BIND 9 ignores the option and always performs - the checks. - - - - - - memstatistics - - - Write memory statistics to the file specified by - memstatistics-file at exit. - The default is no unless - '-m record' is specified on the command line in - which case it is yes. - - - - - - dialup - - - If yes, then the - server treats all zones as if they are doing zone transfers - across - a dial-on-demand dialup link, which can be brought up by - traffic - originating from this server. This has different effects - according - to zone type and concentrates the zone maintenance so that - it all - happens in a short interval, once every heartbeat-interval and - hopefully during the one call. It also suppresses some of - the normal - zone maintenance traffic. The default is no. - - - The dialup option - may also be specified in the view and - zone statements, - in which case it overrides the global dialup - option. - - - If the zone is a master zone, then the server will send out a - NOTIFY - request to all the slaves (default). This should trigger the - zone serial - number check in the slave (providing it supports NOTIFY) - allowing the slave - to verify the zone while the connection is active. - The set of servers to which NOTIFY is sent can be controlled - by - notify and also-notify. - - - If the - zone is a slave or stub zone, then the server will suppress - the regular - "zone up to date" (refresh) queries and only perform them - when the - heartbeat-interval expires in - addition to sending - NOTIFY requests. - - - Finer control can be achieved by using - notify which only sends NOTIFY - messages, - notify-passive which sends NOTIFY - messages and - suppresses the normal refresh queries, refresh - which suppresses normal refresh processing and sends refresh - queries - when the heartbeat-interval - expires, and - passive which just disables normal - refresh - processing. - - - - - - - - - - - - - dialup mode - - - - - normal refresh - - - - - heart-beat refresh - - - - - heart-beat notify - - - - - - no (default) - - - - yes - - - - - no - - - - - no - - - - - - yes - - - - no - - - - - yes - - - - - yes - - - - - - notify - - - - yes - - - - - no - - - - - yes - - - - - - refresh - - - - no - - - - - yes - - - - - no - - - - - - passive - - - - no - - - - - no - - - - - no - - - - - - notify-passive - - - - no - - - - - no - - - - - yes - - - - - - - - - Note that normal NOTIFY processing is not affected by - dialup. - - - - - - - flush-zones-on-shutdown - - - When the nameserver exits due receiving SIGTERM, - flush or do not flush any pending zone writes. The default - is - flush-zones-on-shutdown no. - - - - - - geoip-use-ecs - - - This option was part of an experimental implementation - of the EDNS CLIENT-SUBNET for authoritative servers, - but is now obsolete. - - - - - - root-key-sentinel - - - Respond to root key sentinel probes as described in - draft-ietf-dnsop-kskroll-sentinel-08. The default is - yes. - - - - - - message-compression - - If yes, DNS name compression is - used in responses to regular queries (not including - AXFR or IXFR, which always uses compression). Setting - this option to no reduces CPU - usage on servers and may improve throughput. However, - it increases response size, which may cause more queries - to be processed using TCP; a server with compression - disabled is out of compliance with RFC 1123 Section - 6.1.3.2. The default is yes. - - - - - - minimal-responses - - - This option controls the addition of records to the - authority and additional sections of responses. Such - records may be included in responses to be helpful - to clients; for example, NS or MX records may - have associated address records included in the additional - section, obviating the need for a separate address lookup. - However, adding these records to responses is not mandatory - and requires additional database lookups, causing extra - latency when marshalling responses. - minimal-responses takes one of - four values: - - - - no: the server will be - as complete as possible when generating responses. - - - yes: the server will only add - records to the authority and additional sections when - such records are required by the DNS protocol (for - example, when returning delegations or negative - responses). This provides the best server performance - but may result in more client queries. - - - no-auth: the server - will omit records from the authority section except - when they are required, but it may still add records - to the additional section. - - - no-auth-recursive: the same - as no-auth when recursion is - requested in the query (RD=1), or the same as - no if recursion is not - requested. - - - - no-auth and - no-auth-recursive are useful when - answering stub clients, which usually ignore the - authority section. no-auth-recursive - is meant for use in mixed-mode servers that handle both - authoritative and recursive queries. - - - The default is no-auth-recursive. - - - - - - glue-cache - - - When set to yes, a cache is - used to improve query performance when adding - address-type (A and AAAA) glue records to the - additional section of DNS response messages that - delegate to a child zone. - - - The glue cache uses memory proportional to the number - of delegations in the zone. The default setting is - yes, which improves performance - at the cost of increased memory usage for the zone. If - you don't want this, set it to no. - - - - - - minimal-any - - - If set to yes, then when - generating a positive response to a query of type - ANY over UDP, the server will reply with only one - of the RRsets for the query name, and its covering - RRSIGs if any, instead of replying with all known - RRsets for the name. Similarly, a query for type - RRSIG will be answered with the RRSIG records covering - only one type. This can reduce the impact of some kinds - of attack traffic, without harming legitimate - clients. (Note, however, that the RRset returned is the - first one found in the database; it is not necessarily - the smallest available RRset.) - Additionally, is - turned on for these queries, so no unnecessary records - will be added to the authority or additional sections. - The default is no. - - - - - - notify - - - If yes (the default), - DNS NOTIFY messages are sent when a zone the server is - authoritative for - changes, see . The messages are - sent to the - servers listed in the zone's NS records (except the master - server identified - in the SOA MNAME field), and to any servers listed in the - also-notify option. - - - If master-only, notifies are only - sent - for master zones. - If explicit, notifies are sent only - to - servers explicitly listed using also-notify. - If no, no notifies are sent. - - - The notify option may also be - specified in the zone - statement, - in which case it overrides the options notify statement. - It would only be necessary to turn off this option if it - caused slaves - to crash. - - - - - - notify-to-soa - - - If yes do not check the nameservers - in the NS RRset against the SOA MNAME. Normally a NOTIFY - message is not sent to the SOA MNAME (SOA ORIGIN) as it is - supposed to contain the name of the ultimate master. - Sometimes, however, a slave is listed as the SOA MNAME in - hidden master configurations and in that case you would - want the ultimate master to still send NOTIFY messages to - all the nameservers listed in the NS RRset. - - - - - - recursion - - - If yes, and a - DNS query requests recursion, then the server will attempt - to do - all the work required to answer the query. If recursion is - off - and the server does not already know the answer, it will - return a - referral response. The default is - yes. - Note that setting recursion no does not prevent - clients from getting data from the server's cache; it only - prevents new data from being cached as an effect of client - queries. - Caching may still occur as an effect the server's internal - operation, such as NOTIFY address lookups. - - - - - - request-nsid - - - If yes, then an empty EDNS(0) - NSID (Name Server Identifier) option is sent with all - queries to authoritative name servers during iterative - resolution. If the authoritative server returns an NSID - option in its response, then its contents are logged in - the nsid category at level - info. - The default is no. - - - - - - request-sit - - - This experimental option is obsolete. - - - - - - require-server-cookie - - - Require a valid server cookie before sending a full - response to a UDP request from a cookie aware client. - BADCOOKIE is sent if there is a bad or no existent - server cookie. - The default is no. - - - Set this to yes to test that DNS - COOKIE clients correctly handle BADCOOKIE or if you are - getting a lot of forged DNS requests with DNS COOKIES - present. Setting this to yes will - result in reduced amplification effect in a reflection - attack, as the BADCOOKIE response will be smaller than - a full response, while also requiring a legitimate client - to follow up with a second query with the new, valid, cookie. - - - - - - answer-cookie - - - When set to the default value of yes, - COOKIE EDNS options will be sent when applicable in - replies to client queries. If set to - no, COOKIE EDNS options will not - be sent in replies. This can only be set at the global - options level, not per-view. - - - answer-cookie no is intended as a - temporary measure, for use when named - shares an IP address with other servers that do not yet - support DNS COOKIE. A mismatch between servers on the same - address is not expected to cause operational problems, but - the option to disable COOKIE responses so that all servers - have the same behavior is provided out of an abundance of - caution. DNS COOKIE is an important security mechanism, - and should not be disabled unless absolutely necessary. - - - - - - send-cookie - - - If yes, then a COOKIE EDNS - option is sent along with the query. If the - resolver has previously talked to the server, the - COOKIE returned in the previous transaction is sent. - This is used by the server to determine whether - the resolver has talked to it before. A resolver - sending the correct COOKIE is assumed not to be an - off-path attacker sending a spoofed-source query; - the query is therefore unlikely to be part of a - reflection/amplification attack, so resolvers - sending a correct COOKIE option are not subject to - response rate limiting (RRL). Resolvers which - do not send a correct COOKIE option may be limited - to receiving smaller responses via the - nocookie-udp-size option. - The default is yes. - - - - - - stale-answer-enable - - - Enable the returning of "stale" cached answers when - the nameservers for a zone are not answering. The - default is not to return stale answers. - - - Stale answers can also be enabled or disabled at - runtime via rndc serve-stale on or - rndc serve-stale off; these - override the configured setting. - rndc serve-stale reset - restores the setting to the one specified in - named.conf. Note that if - stale answers have been disabled by rndc, - then they cannot be re-enabled by reloading or - reconfiguring named; - they must be re-enabled with - rndc serve-stale on, - or the server must be restarted. - - - Information about stale answers is logged under - the serve-stale log category. - - - - - - nocookie-udp-size - - - Sets the maximum size of UDP responses that will be - sent to queries without a valid server COOKIE. A value - below 128 will be silently raised to 128. The default - value is 4096, but the max-udp-size - option may further limit the response size. - - - - - - sit-secret - - - This experimental option is obsolete. - - - - - - cookie-algorithm - - - Set the algorithm to be used when generating the - server cookie. One of "aes", "sha1" or "sha256". - The default is "aes" if supported by the cryptographic - library or otherwise "sha256". - - - - - - cookie-secret - - - If set, this is a shared secret used for generating - and verifying EDNS COOKIE options - within an anycast cluster. If not set, the system - will generate a random secret at startup. The - shared secret is encoded as a hex string and needs - to be 128 bits for AES128, 160 bits for SHA1 and - 256 bits for SHA256. - - - If there are multiple secrets specified, the first - one listed in named.conf is - used to generate new server cookies. The others - will only be used to verify returned cookies. - - - - - - response-padding - - - The EDNS Padding option is intended to improve - confidentiality when DNS queries are sent over an - encrypted channel by reducing the variability in - packet sizes. If a query: - - - contains an EDNS Padding option, - - - includes a valid server cookie or uses TCP, - - - is not signed using TSIG or - SIG(0), and - - - is from a client whose address matches the specified ACL, - - - then the response is padded with an EDNS Padding option - to a multiple of block-size bytes. - If these conditions are not met, the response is not - padded. - - - If block-size is 0 or the ACL is - none;, then this feature is - disabled and no padding will occur; this is the - default. If block-size is greater - than 512, a warning is logged and the value is truncated - to 512. Block sizes are ordinarily expected to be powers - of two (for instance, 128), but this is not mandatory. - - - - - - trust-anchor-telemetry - - - Causes named to send specially-formed - queries once per day to domains for which trust anchors - have been configured via, e.g., - trust-anchors or - dnssec-validation auto. - - - The query name used for these queries has the - form "_ta-xxxx(-xxxx)(...)".<domain>, where - each "xxxx" is a group of four hexadecimal digits - representing the key ID of a trusted DNSSEC key. - The key IDs for each domain are sorted smallest - to largest prior to encoding. The query type is NULL. - - - By monitoring these queries, zone operators will - be able to see which resolvers have been updated to - trust a new key; this may help them decide when it - is safe to remove an old one. - - - The default is yes. - - - - - - use-ixfr - - - This option is obsolete. - If you need to disable IXFR to a particular server or - servers, see - the information on the provide-ixfr option - in . - See also - . - - - - - - provide-ixfr - - - See the description of - provide-ixfr in - . - - - - - - request-ixfr - - - See the description of - request-ixfr in - . - - - - - - request-expire - - - See the description of - request-expire in - . - - - - - - match-mapped-addresses - - - If yes, then an - IPv4-mapped IPv6 address will match any address match - list entries that match the corresponding IPv4 address. - - - This option was introduced to work around a kernel quirk - in some operating systems that causes IPv4 TCP - connections, such as zone transfers, to be accepted on an - IPv6 socket using mapped addresses. This caused address - match lists designed for IPv4 to fail to match. However, - named now solves this problem - internally. The use of this option is discouraged. - - - - - - ixfr-from-differences - - - When yes and the server loads a new - version of a master zone from its zone file or receives a - new version of a slave file via zone transfer, it will - compare the new version to the previous one and calculate - a set of differences. The differences are then logged in - the zone's journal file such that the changes can be - transmitted to downstream slaves as an incremental zone - transfer. - - - By allowing incremental zone transfers to be used for - non-dynamic zones, this option saves bandwidth at the - expense of increased CPU and memory consumption at the - master. - In particular, if the new version of a zone is completely - different from the previous one, the set of differences - will be of a size comparable to the combined size of the - old and new zone version, and the server will need to - temporarily allocate memory to hold this complete - difference set. - - ixfr-from-differences - also accepts master (or - primary) and - slave (or secondary) - at the view and options levels, which causes - ixfr-from-differences to be enabled for - all primary or secondary zones, respectively. - It is off for all zones by default. - - - Note: if inline signing is enabled for a zone, the - user-provided ixfr-from-differences - setting is ignored for that zone. - - - - - - multi-master - - - This should be set when you have multiple masters for a zone - and the - addresses refer to different machines. If yes, named will - not log - when the serial number on the master is less than what named - currently - has. The default is no. - - - - - - auto-dnssec - - - Zones configured for dynamic DNS may use this - option to allow varying levels of automatic DNSSEC key - management. There are three possible settings: - - - auto-dnssec allow; permits - keys to be updated and the zone fully re-signed - whenever the user issues the command rndc sign - zonename. - - - auto-dnssec maintain; includes the - above, but also automatically adjusts the zone's DNSSEC - keys on schedule, according to the keys' timing metadata - (see and - ). The command - rndc sign - zonename causes - named to load keys from the key - repository and sign the zone with all keys that are - active. - rndc loadkeys - zonename causes - named to load keys from the key - repository and schedule key maintenance events to occur - in the future, but it does not sign the full zone - immediately. Note: once keys have been loaded for a - zone the first time, the repository will be searched - for changes periodically, regardless of whether - rndc loadkeys is used. The recheck - interval is defined by - dnssec-loadkeys-interval.) - - - The default setting is auto-dnssec off. - - - - - - dnssec-enable - - - This option is obsolete and has no effect. - - - - - - dnssec-validation - - - This option enables DNSSEC validation in - named. - - - If set to auto, - DNSSEC validation is enabled, and a default trust anchor - for the DNS root zone is used. - - - If set to yes, DNSSEC validation is - enabled, but a trust anchor must be manually configured - using a trust-anchors statement (or - the managed-keys or the - trusted-keys statements, both deprecated). - If there is no configured trust anchor, validation will - not take place. - - - If set to no, DNSSEC validation - is disabled. - - - The default is auto, unless - BIND is built with - configure --disable-auto-validation, - in which case the default is yes. - - - The default root trust anchor is stored in the file - bind.keys. - named will load that key at - startup if dnssec-validation is - set to auto. A copy of the file is - installed along with BIND 9, and is current as of the - release date. If the root key expires, a new copy of - bind.keys can be downloaded - from https://www.isc.org/bind-keys. - - - (To prevent problems if bind.keys is - not found, the current trust anchor is also compiled in - to named. Relying on this is not - recommended, however, as it requires named - to be recompiled with a new key when the root key expires.) - - - - named loads only - the root key from bind.keys. - The file cannot be used to store keys for other zones. - The root key in bind.keys is ignored - if dnssec-validation auto is not in - use. - - - Whenever the resolver sends out queries to an - EDNS-compliant server, it always sets the DO bit - indicating it can support DNSSEC responses even if - dnssec-validation is off. - - - - - - - validate-except - - - Specifies a list of domain names at and beneath which DNSSEC - validation should not be performed, - regardless of the presence of a trust anchor at or above - those names. This may be used, for example, when configuring - a top-level domain intended only for local use, so that the - lack of a secure delegation for that domain in the root zone - will not cause validation failures. (This is similar - to setting a negative trust anchor, except that it is a - permanent configuration, whereas negative trust anchors - expire and are removed after a set period of time.) - - - - - - dnssec-accept-expired - - - Accept expired signatures when verifying DNSSEC signatures. - The default is no. - Setting this option to yes - leaves named vulnerable to - replay attacks. - - - - - - querylog - - - Query logging provides a complete log of all incoming - queries and all query errors. This provides more insight - into the server's activity, but with a cost to - performance which may be significant on heavily-loaded - servers. - - - The querylog option specifies - whether query logging should be active when - named first starts. - If querylog is not specified, then - query logging is determined by the presence of the - logging category queries. - Query logging can also be activated at runtime using the - command rndc querylog on, or - deactivated with rndc querylog off. - - - - - - check-names - - - This option is used to restrict the character set and syntax - of - certain domain names in master files and/or DNS responses - received - from the network. The default varies according to usage - area. For - master zones the default is fail. - For slave zones the default - is warn. - For answers received from the network (response) - the default is ignore. - - - The rules for legal hostnames and mail domains are derived - from RFC 952 and RFC 821 as modified by RFC 1123. - - check-names - applies to the owner names of A, AAAA and MX records. - It also applies to the domain names in the RDATA of NS, SOA, - MX, and SRV records. - It also applies to the RDATA of PTR records where the owner - name indicated that it is a reverse lookup of a hostname - (the owner name ends in IN-ADDR.ARPA, IP6.ARPA, or IP6.INT). - - - - - - check-dup-records - - - Check master zones for records that are treated as different - by DNSSEC but are semantically equal in plain DNS. The - default is to warn. Other possible - values are fail and - ignore. - - - - - - check-mx - - - Check whether the MX record appears to refer to a IP address. - The default is to warn. Other possible - values are fail and - ignore. - - - - - - check-wildcard - - - This option is used to check for non-terminal wildcards. - The use of non-terminal wildcards is almost always as a - result of a failure - to understand the wildcard matching algorithm (RFC 1034). - This option - affects master zones. The default (yes) is to check - for non-terminal wildcards and issue a warning. - - - - - - check-integrity - - - Perform post load zone integrity checks on master - zones. This checks that MX and SRV records refer - to address (A or AAAA) records and that glue - address records exist for delegated zones. For - MX and SRV records only in-zone hostnames are - checked (for out-of-zone hostnames use - named-checkzone). - For NS records only names below top of zone are - checked (for out-of-zone names and glue consistency - checks use named-checkzone). - The default is yes. - - - The use of the SPF record for publishing Sender - Policy Framework is deprecated as the migration - from using TXT records to SPF records was abandoned. - Enabling this option also checks that a TXT Sender - Policy Framework record exists (starts with "v=spf1") - if there is an SPF record. Warnings are emitted if the - TXT record does not exist and can be suppressed with - check-spf. - - - - - - check-mx-cname - - - If check-integrity is set then - fail, warn or ignore MX records that refer - to CNAMES. The default is to warn. - - - - - - check-srv-cname - - - If check-integrity is set then - fail, warn or ignore SRV records that refer - to CNAMES. The default is to warn. - - - - - - check-sibling - - - When performing integrity checks, also check that - sibling glue exists. The default is yes. - - - - - - check-spf - - - If check-integrity is set then - check that there is a TXT Sender Policy Framework - record present (starts with "v=spf1") if there is an - SPF record present. The default is - warn. - - - - - - zero-no-soa-ttl - - - When returning authoritative negative responses to - SOA queries set the TTL of the SOA record returned in - the authority section to zero. - The default is yes. - - - - - - zero-no-soa-ttl-cache - - - When caching a negative response to a SOA query - set the TTL to zero. - The default is no. - - - - - - update-check-ksk - - - When set to the default value of yes, - check the KSK bit in each key to determine how the key - should be used when generating RRSIGs for a secure zone. - - - Ordinarily, zone-signing keys (that is, keys without the - KSK bit set) are used to sign the entire zone, while - key-signing keys (keys with the KSK bit set) are only - used to sign the DNSKEY RRset at the zone apex. - However, if this option is set to no, - then the KSK bit is ignored; KSKs are treated as if they - were ZSKs and are used to sign the entire zone. This is - similar to the dnssec-signzone -z - command line option. - - - When this option is set to yes, there - must be at least two active keys for every algorithm - represented in the DNSKEY RRset: at least one KSK and one - ZSK per algorithm. If there is any algorithm for which - this requirement is not met, this option will be ignored - for that algorithm. - - - - - - dnssec-dnskey-kskonly - - - When this option and update-check-ksk - are both set to yes, only key-signing - keys (that is, keys with the KSK bit set) will be used - to sign the DNSKEY, CDNSKEY, and CDS RRsets at the zone apex. - Zone-signing keys (keys without the KSK bit set) will be used - to sign the remainder of the zone, but not the DNSKEY RRset. - This is similar to the - dnssec-signzone -x command line option. - - - The default is no. If - update-check-ksk is set to - no, this option is ignored. - - - - - - try-tcp-refresh - - - Try to refresh the zone using TCP if UDP queries fail. - The default is yes. - - - - - - dnssec-secure-to-insecure - - - Allow a dynamic zone to transition from secure to - insecure (i.e., signed to unsigned) by deleting all - of the DNSKEY records. The default is no. - If set to yes, and if the DNSKEY RRset - at the zone apex is deleted, all RRSIG and NSEC records - will be removed from the zone as well. - - - If the zone uses NSEC3, then it is also necessary to - delete the NSEC3PARAM RRset from the zone apex; this will - cause the removal of all corresponding NSEC3 records. - (It is expected that this requirement will be eliminated - in a future release.) - - - Note that if a zone has been configured with - auto-dnssec maintain and the - private keys remain accessible in the key repository, - then the zone will be automatically signed again the - next time named is started. - - - - - - synth-from-dnssec - - - Synthesize answers from cached NSEC, NSEC3 and - other RRsets that have been proved to be correct - using DNSSEC. The default is no, - but it will become yes again - in the future releases. - - - Note: - - - - DNSSEC validation must be enabled for this - option to be effective. - - - This initial implementation only covers synthesis - of answers from NSEC records. Synthesis from NSEC3 - is planned for the future. This will also be - controlled by synth-from-dnssec. - - - - - - - - - -
- -
Forwarding - - - The forwarding facility can be used to create a large site-wide - cache on a few servers, reducing traffic over links to external - name servers. It can also be used to allow queries by servers that - do not have direct access to the Internet, but wish to look up - exterior - names anyway. Forwarding occurs only on those queries for which - the server is not authoritative and does not have the answer in - its cache. - - - - - forward - - - This option is only meaningful if the - forwarders list is not empty. A value of first, - the default, causes the server to query the forwarders - first — and - if that doesn't answer the question, the server will then - look for - the answer itself. If only is - specified, the - server will only query the forwarders. - - - - - - forwarders - - - Specifies a list of IP addresses to which queries shall be - forwarded. The default is the empty list (no forwarding). - Each address in the list can be associated with an optional - port number and/or DSCP value, and a default port number and - DSCP value can be set for the entire list. - - - - - - - - Forwarding can also be configured on a per-domain basis, allowing - for the global forwarding options to be overridden in a variety - of ways. You can set particular domains to use different - forwarders, - or have a different forward only/first behavior, - or not forward at all, see . - -
- -
Dual-stack Servers - - - Dual-stack servers are used as servers of last resort to work - around - problems in reachability due the lack of support for either IPv4 - or IPv6 - on the host machine. - - - - - dual-stack-servers - - - Specifies host names or addresses of machines with access to - both IPv4 and IPv6 transports. If a hostname is used, the - server must be able - to resolve the name using only the transport it has. If the - machine is dual - stacked, then the dual-stack-servers have no effect unless - access to a transport has been disabled on the command line - (e.g. named -4). - - - - -
- -
Access Control - - - - Access to the server can be restricted based on the IP address - of the requesting system. See for - details on how to specify IP address lists. - - - - - - allow-notify - - - This ACL specifies which hosts may send NOTIFY messages - to inform this server of changes to zones for which it - is acting as a secondary server. This is only - applicable for secondary zones (i.e., type - secondary or slave). - - - If this option is set in view or - options, it is globally applied to - all secondary zones. If set in the zone - statement, the global value is overridden. - - - If not specified, the default is to process NOTIFY - messages only from the configured - masters for the zone. - allow-notify can be used to expand the - list of permitted hosts, not to reduce it. - - - - - - allow-query - - - Specifies which hosts are allowed to ask ordinary - DNS questions. allow-query may - also be specified in the zone - statement, in which case it overrides the - options allow-query statement. - If not specified, the default is to allow queries - from all hosts. - - - - allow-query-cache is now - used to specify access to the cache. - - - - - - - allow-query-on - - - Specifies which local addresses can accept ordinary - DNS questions. This makes it possible, for instance, - to allow queries on internal-facing interfaces but - disallow them on external-facing ones, without - necessarily knowing the internal network's addresses. - - - Note that allow-query-on is only - checked for queries that are permitted by - allow-query. A query must be - allowed by both ACLs, or it will be refused. - - - allow-query-on may - also be specified in the zone - statement, in which case it overrides the - options allow-query-on statement. - - - If not specified, the default is to allow queries - on all addresses. - - - - allow-query-cache is - used to specify access to the cache. - - - - - - - allow-query-cache - - - Specifies which hosts are allowed to get answers - from the cache. If allow-query-cache - is not set then allow-recursion - is used if set, otherwise allow-query - is used if set unless recursion no; is - set in which case none; is used, - otherwise the default (localnets; - localhost;) is used. - - - - - - allow-query-cache-on - - - Specifies which local addresses can send answers - from the cache. If allow-query-cache-on - is not set, then allow-recursion-on is - used if set. Otherwise, the default is - to allow cache responses to be sent from any address. - Note: Both allow-query-cache and - allow-query-cache-on must be - satisfied before a cache response can be sent; - a client that is blocked by one cannot be allowed - by the other. - - - - - - allow-recursion - - - Specifies which hosts are allowed to make recursive - queries through this server. If - allow-recursion is not set - then allow-query-cache is - used if set, otherwise allow-query - is used if set, otherwise the default - (localnets; - localhost;) is used. - - - - - - allow-recursion-on - - - Specifies which local addresses can accept recursive - queries. If allow-recursion-on - is not set, then allow-query-cache-on - is used if set; otherwise, the default is to allow - recursive queries on all addresses: Any client permitted - to send recursive queries can send them to any address - on which named is listening. - Note: Both allow-recursion and - allow-recursion-on must be - satisfied before recursion is allowed; - a client that is blocked by one cannot be allowed - by the other. - - - - - - allow-update - - - When set in the zone statement for - a master zone, specifies which hosts are allowed to - submit Dynamic DNS updates to that zone. The default - is to deny updates from all hosts. - - - Note that allowing updates based on the - requestor's IP address is insecure; see - for details. - - - In general this option should only be set at the - zone level. While a default - value can be set at the options or - view level and inherited by zones, - this could lead to some zones unintentionally allowing - updates. - - - - - - allow-update-forwarding - - - When set in the zone statement for - a slave zone, specifies which hosts are allowed to - submit Dynamic DNS updates and have them be forwarded - to the master. The default is - { none; }, which means that no - update forwarding will be performed. - - - To enable update forwarding, specify - allow-update-forwarding { any; };. - in the zone statement. - Specifying values other than { none; } - or { any; } is usually - counterproductive; the responsibility for update - access control should rest with the master server, not - the slave. - - - Note that enabling the update forwarding feature on a slave - server may expose master servers to attacks if they rely - on insecure IP-address-based access control; see - for more details. - - - In general this option should only be set at the - zone level. While a default - value can be set at the options or - view level and inherited by zones, - this can lead to some zones unintentionally forwarding - updates. - - - - - - allow-v6-synthesis - - - This option was introduced for the smooth transition from - AAAA - to A6 and from "nibble labels" to binary labels. - However, since both A6 and binary labels were then - deprecated, - this option was also deprecated. - It is now ignored with some warning messages. - - - - - - allow-transfer - - - Specifies which hosts are allowed to receive zone - transfers from the server. allow-transfer - may also be specified in the zone - statement, in which case it overrides the - allow-transfer statement set in - options or view. - If not specified, the default is to allow transfers to - all hosts. - - - - - - blackhole - - - Specifies a list of addresses that the - server will not accept queries from or use to resolve a - query. Queries - from these addresses will not be responded to. The default - is none. - - - - - - keep-response-order - - - Specifies a list of addresses to which the server - will send responses to TCP queries in the same order - in which they were received. This disables the - processing of TCP queries in parallel. The default - is none. - - - - - - no-case-compress - - Specifies a list of addresses which require responses - to use case-insensitive compression. This ACL can be - used when named needs to work with - clients that do not comply with the requirement in RFC - 1034 to use case-insensitive name comparisons when - checking for matching domain names. - - - If left undefined, the ACL defaults to - none: case-insensitive compression - will be used for all clients. If the ACL is defined and - matches a client, then case will be ignored when - compressing domain names in DNS responses sent to that - client. - - - This can result in slightly smaller responses: if - a response contains the names "example.com" and - "example.COM", case-insensitive compression would treat - the second one as a duplicate. It also ensures - that the case of the query name exactly matches the - case of the owner names of returned records, rather - than matching the case of the records entered in - the zone file. This allows responses to exactly - match the query, which is required by some clients - due to incorrect use of case-sensitive comparisons. - - - Case-insensitive compression is always - used in AXFR and IXFR responses, regardless of whether - the client matches this ACL. - - - There are circumstances in which named - will not preserve the case of owner names of records: - if a zone file defines records of different types with - the same name, but the capitalization of the name is - different (e.g., "www.example.com/A" and - "WWW.EXAMPLE.COM/AAAA"), then all responses for that - name will use the first version - of the name that was used in the zone file. This - limitation may be addressed in a future release. However, - domain names specified in the rdata of resource records - (i.e., records of type NS, MX, CNAME, etc) will always - have their case preserved unless the client matches this - ACL. - - - - - - resolver-query-timeout - - - The amount of time in milliseconds that the resolver - will spend attempting to resolve a recursive - query before failing. The default and minimum - is 10000 and the maximum is - 30000. Setting it to - 0 will result in the default - being used. - - - This value was originally specified in seconds. - Values less than or equal to 300 will be be treated - as seconds and converted to milliseconds before - applying the above limits. - - - - - -
- -
Interfaces - - - The interfaces and ports that the server will answer queries - from may be specified using the listen-on option. listen-on takes - an optional port and an address_match_list - of IPv4 addresses. (IPv6 addresses are ignored, with a - logged warning.) - The server will listen on all interfaces allowed by the address - match list. If a port is not specified, port 53 will be used. - - - Multiple listen-on statements are - allowed. - For example, - - -listen-on { 5.6.7.8; }; -listen-on port 1234 { !1.2.3.4; 1.2/16; }; - - - - will enable the name server on port 53 for the IP address - 5.6.7.8, and on port 1234 of an address on the machine in net - 1.2 that is not 1.2.3.4. - - - - If no listen-on is specified, the - server will listen on port 53 on all IPv4 interfaces. - - - - The listen-on-v6 option is used to - specify the interfaces and the ports on which the server will - listen for incoming queries sent using IPv6. If not specified, - the server will listen on port 53 on all IPv6 interfaces. - - - - When { any; } is - specified - as the address_match_list for the - listen-on-v6 option, - the server does not bind a separate socket to each IPv6 interface - address as it does for IPv4 if the operating system has enough API - support for IPv6 (specifically if it conforms to RFC 3493 and RFC - 3542). - Instead, it listens on the IPv6 wildcard address. - If the system only has incomplete API support for IPv6, however, - the behavior is the same as that for IPv4. - - - - A list of particular IPv6 addresses can also be specified, in - which case - the server listens on a separate socket for each specified - address, - regardless of whether the desired API is supported by the system. - IPv4 addresses specified in listen-on-v6 - will be ignored, with a logged warning. - - - - Multiple listen-on-v6 options can - be used. - For example, - - -listen-on-v6 { any; }; -listen-on-v6 port 1234 { !2001:db8::/32; any; }; - - - - will enable the name server on port 53 for any IPv6 addresses - (with a single wildcard socket), - and on port 1234 of IPv6 addresses that is not in the prefix - 2001:db8::/32 (with separate sockets for each matched address.) - - - - To make the server not listen on any IPv6 address, use - - -listen-on-v6 { none; }; - - -
- -
Query Address - - - If the server doesn't know the answer to a question, it will - query other name servers. query-source specifies - the address and port used for such queries. For queries sent over - IPv6, there is a separate query-source-v6 option. - If address is * (asterisk) or is omitted, - a wildcard IP address (INADDR_ANY) - will be used. - - - - If port is * or is omitted, - a random port number from a pre-configured - range is picked up and will be used for each query. - The port range(s) is that specified in - the use-v4-udp-ports (for IPv4) - and use-v6-udp-ports (for IPv6) - options, excluding the ranges specified in - the avoid-v4-udp-ports - and avoid-v6-udp-ports options, respectively. - - - - The defaults of the query-source and - query-source-v6 options - are: - - -query-source address * port *; -query-source-v6 address * port *; - - - - If use-v4-udp-ports or - use-v6-udp-ports is unspecified, - named will check if the operating - system provides a programming interface to retrieve the - system's default range for ephemeral ports. - If such an interface is available, - named will use the corresponding system - default range; otherwise, it will use its own defaults: - - -use-v4-udp-ports { range 1024 65535; }; -use-v6-udp-ports { range 1024 65535; }; - - - - Note: make sure the ranges be sufficiently large for - security. A desirable size depends on various parameters, - but we generally recommend it contain at least 16384 ports - (14 bits of entropy). - Note also that the system's default range when used may be - too small for this purpose, and that the range may even be - changed while named is running; the new - range will automatically be applied when named - is reloaded. - It is encouraged to - configure use-v4-udp-ports and - use-v6-udp-ports explicitly so that the - ranges are sufficiently large and are reasonably - independent from the ranges used by other applications. - - - - Note: the operational configuration - where named runs may prohibit the use - of some ports. For example, UNIX systems will not allow - named running without a root privilege - to use ports less than 1024. - If such ports are included in the specified (or detected) - set of query ports, the corresponding query attempts will - fail, resulting in resolution failures or delay. - It is therefore important to configure the set of ports - that can be safely used in the expected operational environment. - - - - The defaults of the avoid-v4-udp-ports and - avoid-v6-udp-ports options - are: - - -avoid-v4-udp-ports {}; -avoid-v6-udp-ports {}; - - - - Note: BIND 9.5.0 introduced - the use-queryport-pool - option to support a pool of such random ports, but this - option is now obsolete because reusing the same ports in - the pool may not be sufficiently secure. - For the same reason, it is generally strongly discouraged to - specify a particular port for the - query-source or - query-source-v6 options; - it implicitly disables the use of randomized port numbers. - - - - - use-queryport-pool - - - This option is obsolete. - - - - - - queryport-pool-ports - - - This option is obsolete. - - - - - - queryport-pool-updateinterval - - - This option is obsolete. - - - - - - - - The address specified in the query-source option - is used for both UDP and TCP queries, but the port applies only - to UDP queries. TCP queries always use a random - unprivileged port. - - - - - Solaris 2.5.1 and earlier does not support setting the source - address for TCP sockets. - - - - - See also transfer-source and - notify-source. - - -
- -
Zone Transfers - - - BIND has mechanisms in place to - facilitate zone transfers - and set limits on the amount of load that transfers place on the - system. The following options apply to zone transfers. - - - - - - also-notify - - - Defines a global list of IP addresses of name servers - that are also sent NOTIFY messages whenever a fresh copy of - the - zone is loaded, in addition to the servers listed in the - zone's NS records. - This helps to ensure that copies of the zones will - quickly converge on stealth servers. - Optionally, a port may be specified with each - also-notify address to send - the notify messages to a port other than the - default of 53. - An optional TSIG key can also be specified with each - address to cause the notify messages to be signed; this - can be useful when sending notifies to multiple views. - In place of explicit addresses, one or more named - masters lists can be used. - - - If an also-notify list - is given in a zone statement, - it will override - the options also-notify - statement. When a zone notify - statement - is set to no, the IP - addresses in the global also-notify list will - not be sent NOTIFY messages for that zone. The default is - the empty - list (no global notification list). - - - - - - max-transfer-time-in - - - Inbound zone transfers running longer than - this many minutes will be terminated. The default is 120 - minutes - (2 hours). The maximum value is 28 days (40320 minutes). - - - - - - max-transfer-idle-in - - - Inbound zone transfers making no progress - in this many minutes will be terminated. The default is 60 - minutes - (1 hour). The maximum value is 28 days (40320 minutes). - - - - - - max-transfer-time-out - - - Outbound zone transfers running longer than - this many minutes will be terminated. The default is 120 - minutes - (2 hours). The maximum value is 28 days (40320 minutes). - - - - - - max-transfer-idle-out - - - Outbound zone transfers making no progress - in this many minutes will be terminated. The default is 60 - minutes (1 - hour). The maximum value is 28 days (40320 minutes). - - - - - - notify-rate - - - The rate at which NOTIFY requests will be sent - during normal zone maintenance operations. (NOTIFY - requests due to initial zone loading are subject - to a separate rate limit; see below.) The default is - 20 per second. - The lowest possible rate is one per second; when set - to zero, it will be silently raised to one. - - - - - - startup-notify-rate - - - The rate at which NOTIFY requests will be sent - when the name server is first starting up, or when - zones have been newly added to the nameserver. - The default is 20 per second. - The lowest possible rate is one per second; when set - to zero, it will be silently raised to one. - - - - - - serial-query-rate - - - Slave servers will periodically query master - servers to find out if zone serial numbers have - changed. Each such query uses a minute amount of - the slave server's network bandwidth. To limit - the amount of bandwidth used, BIND 9 limits the - rate at which queries are sent. The value of the - serial-query-rate option, an - integer, is the maximum number of queries sent - per second. The default is 20 per second. - The lowest possible rate is one per second; when set - to zero, it will be silently raised to one. - - - - - - transfer-format - - - - Zone transfers can be sent using two different formats, - one-answer and - many-answers. - The transfer-format option is used - on the master server to determine which format it sends. - one-answer uses one DNS message per - resource record transferred. - many-answers packs as many resource - records as possible into a message. - many-answers is more efficient, but is - only supported by relatively new slave servers, - such as BIND 9, BIND - 8.x and BIND 4.9.5 onwards. - The many-answers format is also supported by - recent Microsoft Windows nameservers. - The default is many-answers. - transfer-format may be overridden on a - per-server basis by using the server - statement. - - - - - - - transfer-message-size - - - This is an upper bound on the uncompressed size of DNS - messages used in zone transfers over TCP. If a message - grows larger than this size, additional messages will be - used to complete the zone transfer. (Note, however, - that this is a hint, not a hard limit; if a message - contains a single resource record whose RDATA does not - fit within the size limit, a larger message will be - permitted so the record can be transferred.) - - - Valid values are between 512 and 65535 octets, and any - values outside that range will be adjusted to the nearest - value within it. The default is 20480, - which was selected to improve message compression: - most DNS messages of this size will compress to less - than 16536 bytes. Larger messages cannot be compressed - as effectively, because 16536 is the largest permissible - compression offset pointer in a DNS message. - - - This option is mainly intended for server testing; - there is rarely any benefit in setting a value other - than the default. - - - - - - transfers-in - - - The maximum number of inbound zone transfers - that can be running concurrently. The default value is 10. - Increasing transfers-in may - speed up the convergence - of slave zones, but it also may increase the load on the - local system. - - - - - - transfers-out - - - The maximum number of outbound zone transfers - that can be running concurrently. Zone transfer requests in - excess - of the limit will be refused. The default value is 10. - - - - - - transfers-per-ns - - - The maximum number of inbound zone transfers - that can be concurrently transferring from a given remote - name server. - The default value is 2. - Increasing transfers-per-ns - may - speed up the convergence of slave zones, but it also may - increase - the load on the remote name server. transfers-per-ns may - be overridden on a per-server basis by using the transfers phrase - of the server statement. - - - - - - transfer-source - - transfer-source - determines which local address will be bound to IPv4 - TCP connections used to fetch zones transferred - inbound by the server. It also determines the - source IPv4 address, and optionally the UDP port, - used for the refresh queries and forwarded dynamic - updates. If not set, it defaults to a system - controlled value which will usually be the address - of the interface "closest to" the remote end. This - address must appear in the remote end's - allow-transfer option for the - zone being transferred, if one is specified. This - statement sets the - transfer-source for all zones, - but can be overridden on a per-view or per-zone - basis by including a - transfer-source statement within - the view or - zone block in the configuration - file. - - - - Solaris 2.5.1 and earlier does not support setting the - source address for TCP sockets. - - - - - - - transfer-source-v6 - - - The same as transfer-source, - except zone transfers are performed using IPv6. - - - - - - alt-transfer-source - - - An alternate transfer source if the one listed in - transfer-source fails and - use-alt-transfer-source is - set. - - - If you do not wish the alternate transfer source - to be used, you should set - use-alt-transfer-source - appropriately and you should not depend upon - getting an answer back to the first refresh - query. - - - - - - alt-transfer-source-v6 - - - An alternate transfer source if the one listed in - transfer-source-v6 fails and - use-alt-transfer-source is - set. - - - - - - use-alt-transfer-source - - - Use the alternate transfer sources or not. If views are - specified this defaults to no, - otherwise it defaults to - yes. - - - - - - notify-source - - notify-source - determines which local source address, and - optionally UDP port, will be used to send NOTIFY - messages. This address must appear in the slave - server's masters zone clause or - in an allow-notify clause. This - statement sets the notify-source - for all zones, but can be overridden on a per-zone or - per-view basis by including a - notify-source statement within - the zone or - view block in the configuration - file. - - - - Solaris 2.5.1 and earlier does not support setting the - source address for TCP sockets. - - - - - - - notify-source-v6 - - - Like notify-source, - but applies to notify messages sent to IPv6 addresses. - - - - - - -
- -
UDP Port Lists - - - use-v4-udp-ports, - avoid-v4-udp-ports, - use-v6-udp-ports, and - avoid-v6-udp-ports - specify a list of IPv4 and IPv6 UDP ports that will be - used or not used as source ports for UDP messages. - See about how the - available ports are determined. - For example, with the following configuration - - - -use-v6-udp-ports { range 32768 65535; }; -avoid-v6-udp-ports { 40000; range 50000 60000; }; - - - - UDP ports of IPv6 messages sent - from named will be in one - of the following ranges: 32768 to 39999, 40001 to 49999, - and 60001 to 65535. - - - - avoid-v4-udp-ports and - avoid-v6-udp-ports can be used - to prevent named from choosing as its random source port a - port that is blocked by your firewall or a port that is - used by other applications; - if a query went out with a source port blocked by a - firewall, the - answer would not get by the firewall and the name server would - have to query again. - Note: the desired range can also be represented only with - use-v4-udp-ports and - use-v6-udp-ports, and the - avoid- options are redundant in that - sense; they are provided for backward compatibility and - to possibly simplify the port specification. - -
- -
Operating System Resource Limits - - - The server's usage of many system resources can be limited. - Scaled values are allowed when specifying resource limits. For - example, 1G can be used instead of - 1073741824 to specify a limit of - one - gigabyte. unlimited requests - unlimited use, or the - maximum available amount. default - uses the limit - that was in force when the server was started. See the description - of size_spec in . - - - - The following options set operating system resource limits for - the name server process. Some operating systems don't support - some or - any of the limits. On such systems, a warning will be issued if - the - unsupported limit is used. - - - - - - coresize - - - The maximum size of a core dump. The default - is default. - - - - - - datasize - - - The maximum amount of data memory the server - may use. The default is default. - This is a hard limit on server memory usage. - If the server attempts to allocate memory in excess of this - limit, the allocation will fail, which may in turn leave - the server unable to perform DNS service. Therefore, - this option is rarely useful as a way of limiting the - amount of memory used by the server, but it can be used - to raise an operating system data size limit that is - too small by default. If you wish to limit the amount - of memory used by the server, use the - max-cache-size and - recursive-clients - options instead. - - - - - - files - - - The maximum number of files the server - may have open concurrently. The default is unlimited. - - - - - - stacksize - - - The maximum amount of stack memory the server - may use. The default is default. - - - - - - -
- -
Server Resource Limits - - - The following options set limits on the server's - resource consumption that are enforced internally by the - server rather than the operating system. - - - - - - max-journal-size - - - Sets a maximum size for each journal file (see - ), expressed in bytes - or, if followed by an optional unit suffix ('k', - 'm', or 'g'), in kilobytes, megabytes, or gigabytes. - When the journal file approaches the specified size, - some of the oldest transactions in the journal - will be automatically removed. The largest - permitted value is 2 gigabytes. Very small - values are rounded up to 4096 bytes. You - can specify unlimited, which - also means 2 gigabytes. If you set the limit to - default or leave it unset, the - journal is allowed to grow up to twice as large as - the zone. (There is little benefit in storing - larger journals.) - - - This option may also be set on a per-zone basis. - - - - - - max-records - - - The maximum number of records permitted in a zone. - The default is zero which means unlimited. - - - - - - recursive-clients - - - The maximum number ("hard quota") of simultaneous - recursive lookups the server will perform on behalf - of clients. The default is - 1000. Because each recursing - client uses a fair - bit of memory (on the order of 20 kilobytes), the - value of the - recursive-clients option may - have to be decreased on hosts with limited memory. - - - defines a "hard - quota" limit for pending recursive clients: when more - clients than this are pending, new incoming requests - will not be accepted, and for each incoming request - a previous pending request will also be dropped. - - - A "soft quota" is also set. When this lower - quota is exceeded, incoming requests are accepted, but - for each one, a pending request will be dropped. - If is greater than - 1000, the soft quota is set to - minus 100; - otherwise it is set to 90% of - . - - - - - - tcp-clients - - - The maximum number of simultaneous client TCP - connections that the server will accept. - The default is 150. - - - - - - clients-per-query - max-clients-per-query - - These set the - initial value (minimum) and maximum number of recursive - simultaneous clients for any given query - (<qname,qtype,qclass>) that the server will accept - before dropping additional clients. named will attempt to - self tune this value and changes will be logged. The - default values are 10 and 100. - - - This value should reflect how many queries come in for - a given name in the time it takes to resolve that name. - If the number of queries exceed this value, named will - assume that it is dealing with a non-responsive zone - and will drop additional queries. If it gets a response - after dropping queries, it will raise the estimate. The - estimate will then be lowered in 20 minutes if it has - remained unchanged. - - - If clients-per-query is set to zero, - then there is no limit on the number of clients per query - and no queries will be dropped. - - - If max-clients-per-query is set to zero, - then there is no upper bound other than imposed by - recursive-clients. - - - - - - fetches-per-zone - - - The maximum number of simultaneous iterative - queries to any one domain that the server will - permit before blocking new queries for data - in or beneath that zone. - This value should reflect how many fetches would - normally be sent to any one zone in the time it - would take to resolve them. It should be smaller - than . - - - When many clients simultaneously query for the - same name and type, the clients will all be attached - to the same fetch, up to the - limit, - and only one iterative query will be sent. - However, when clients are simultaneously - querying for different names - or types, multiple queries will be sent and - is not - effective as a limit. - - - Optionally, this value may be followed by the keyword - drop or fail, - indicating whether queries which exceed the fetch - quota for a zone will be dropped with no response, - or answered with SERVFAIL. The default is - drop. - - - If fetches-per-zone is set to zero, - then there is no limit on the number of fetches per query - and no queries will be dropped. The default is zero. - - - The current list of active fetches can be dumped by - running rndc recursing. The list - includes the number of active fetches for each - domain and the number of queries that have been - passed or dropped as a result of the - limit. (Note: - these counters are not cumulative over time; whenever - the number of active fetches for a domain drops to - zero, the counter for that domain is deleted, and the - next time a fetch is sent to that domain, it is - recreated with the counters set to zero.) - - - - - - fetches-per-server - - - The maximum number of simultaneous iterative - queries that the server will allow to be sent to - a single upstream name server before blocking - additional queries. - This value should reflect how many fetches would - normally be sent to any one server in the time it - would take to resolve them. It should be smaller - than . - - - Optionally, this value may be followed by the keyword - drop or fail, - indicating whether queries will be dropped with no - response, or answered with SERVFAIL, when all of the - servers authoritative for a zone are found to have - exceeded the per-server quota. The default is - fail. - - - If fetches-per-server is set to zero, - then there is no limit on the number of fetches per query - and no queries will be dropped. The default is zero. - - - The fetches-per-server quota is - dynamically adjusted in response to detected - congestion. As queries are sent to a server - and are either answered or time out, an - exponentially weighted moving average is calculated - of the ratio of timeouts to responses. If the - current average timeout ratio rises above a "high" - threshold, then fetches-per-server - is reduced for that server. If the timeout ratio - drops below a "low" threshold, then - fetches-per-server is increased. - The fetch-quota-params options - can be used to adjust the parameters for this - calculation. - - - - - - fetch-quota-params - - - Sets the parameters to use for dynamic resizing of - the quota in - response to detected congestion. - - - The first argument is an integer value indicating - how frequently to recalculate the moving average - of the ratio of timeouts to responses for each - server. The default is 100, meaning we recalculate - the average ratio after every 100 queries have either - been answered or timed out. - - - The remaining three arguments represent the "low" - threshold (defaulting to a timeout ratio of 0.1), - the "high" threshold (defaulting to a timeout - ratio of 0.3), and the discount rate for - the moving average (defaulting to 0.7). - A higher discount rate causes recent events to - weigh more heavily when calculating the moving - average; a lower discount rate causes past - events to weigh more heavily, smoothing out - short-term blips in the timeout ratio. - These arguments are all fixed-point numbers with - precision of 1/100: at most two places after - the decimal point are significant. - - - - - - reserved-sockets - - - The number of file descriptors reserved for TCP, stdio, - etc. This needs to be big enough to cover the number of - interfaces named listens on plus - tcp-clients, as well as - to provide room for outgoing TCP queries and incoming zone - transfers. The default is 512. - The minimum value is 128 and the - maximum value is 128 less than - maxsockets (-S). This option may be removed in the future. - - - This option has little effect on Windows. - - - - - - max-cache-size - - - The maximum amount of memory to use for the - server's cache, in bytes or % of total physical memory. - When the amount of data in the cache - reaches this limit, the server will cause records to - expire prematurely based on an LRU based strategy so - that the limit is not exceeded. - The keyword unlimited, - or the value 0, will place no limit on cache size; - records will be purged from the cache only when their - TTLs expire. - Any positive values less than 2MB will be ignored - and reset to 2MB. - In a server with multiple views, the limit applies - separately to the cache of each view. - The default is 90%. - On systems where detection of amount of physical - memory is not supported values represented as % - fall back to unlimited. - Note that the detection of physical memory is done only - once at startup, so named will not - adjust the cache size if the amount of physical memory - is changed during runtime. - - - - - - tcp-listen-queue - - - The listen queue depth. The default and minimum is 10. - If the kernel supports the accept filter "dataready" this - also controls how - many TCP connections that will be queued in kernel space - waiting for - some data before being passed to accept. Nonzero values - less than 10 will be silently raised. A value of 0 may also - be used; on most platforms this sets the listen queue - length to a system-defined default value. - - - - - - tcp-initial-timeout - - - The amount of time (in units of 100 milliseconds) the - server waits on a new TCP connection for the first message - from the client. The default is 300 (30 seconds), - the minimum is 25 (2.5 seconds), and the maximum is - 1200 (two minutes). Values above the maximum or below - the minimum will be adjusted with a logged warning. - (Note: This value must be greater than the expected - round trip delay time; otherwise no client will ever - have enough time to submit a message.) - This value can be updated at runtime by using - rndc tcp-timeouts. - - - - - - tcp-idle-timeout - - - The amount of time (in units of 100 milliseconds) the - server waits on an idle TCP connection before closing - it when the client is not using the EDNS TCP keepalive - option. The default is 300 (30 seconds), the maximum - is 1200 (two minutes), and the minimum is 1 (one tenth - of a second). Values above the maximum or below the minimum - will be adjusted with a logged warning. - See tcp-keepalive-timeout - for clients using the EDNS TCP keepalive option. - This value can be updated at runtime by using - rndc tcp-timeouts. - - - - - - tcp-keepalive-timeout - - - The amount of time (in units of 100 milliseconds) the - server waits on an idle TCP connection before closing - it when the client is using the EDNS TCP keepalive - option. The default is 300 (30 seconds), the maximum - is 65535 (about 1.8 hours), and the minimum is 1 (one tenth - of a second). Values above the maximum or below the minimum - will be adjusted with a logged warning. - This value may be greater than - tcp-idle-timeout, because - clients using the EDNS TCP keepalive option are expected - to use TCP connections for more than one message. - This value can be updated at runtime by using - rndc tcp-timeouts. - - - - - - tcp-advertised-timeout - - - The timeout value (in units of 100 milliseconds) the - server will send in respones containing the EDNS TCP - keepalive option. This informs a client of the - amount of time it may keep the session open. - The default is 300 (30 seconds), the maximum is - 65535 (about 1.8 hours), and the minimum is 0, which - signals that the clients must close TCP connections - immediately. Ordinarily this should be set to the - same value as tcp-keepalive-timeout. - This value can be updated at runtime by using - rndc tcp-timeouts. - - - - - - -
- -
Periodic Task Intervals - - - - - cleaning-interval - - - This option is obsolete. - - - - - - heartbeat-interval - - - The server will perform zone maintenance tasks - for all zones marked as dialup whenever this - interval expires. The default is 60 minutes. Reasonable - values are up - to 1 day (1440 minutes). The maximum value is 28 days - (40320 minutes). - If set to 0, no zone maintenance for these zones will occur. - - - - - - interface-interval - - - The server will scan the network interface list - every interface-interval - minutes. The default - is 60 minutes. The maximum value is 28 days (40320 minutes). - If set to 0, interface scanning will only occur when - the configuration file is loaded, or when - automatic-interface-scan is enabled - and supported by the operating system. After the scan, the - server will begin listening for queries on any newly - discovered interfaces (provided they are allowed by the - listen-on configuration), and - will stop listening on interfaces that have gone away. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 - duration formats. - - - - - - -
- -
The <command>sortlist</command> Statement - - - The response to a DNS query may consist of multiple resource - records (RRs) forming a resource record set (RRset). The name - server will normally return the RRs within the RRset in an - indeterminate order (but see the rrset-order - statement in ). The client - resolver code should rearrange the RRs as appropriate, that is, - using any addresses on the local net in preference to other - addresses. However, not all resolvers can do this or are - correctly configured. When a client is using a local server, - the sorting can be performed in the server, based on the - client's address. This only requires configuring the name - servers, not all the clients. - - - - The sortlist statement (see below) takes an - address_match_list and interprets it in a - special way. Each top level statement in the - sortlist must itself be an explicit - address_match_list with one or two elements. - The first element (which may be an IP address, an IP prefix, an - ACL name or a nested address_match_list) of - each top level list is checked against the source address of - the query until a match is found. When the addresses in the - first element overlap, the first rule to match gets selected. - - - Once the source address of the query has been matched, if the - top level statement contains only one element, the actual - primitive element that matched the source address is used to - select the address in the response to move to the beginning of - the response. If the statement is a list of two elements, then - the second element is interpreted as a topology preference - list. Each top level element is assigned a distance and the - address in the response with the minimum distance is moved to - the beginning of the response. - - - In the following example, any queries received from any of the - addresses of the host itself will get responses preferring - addresses on any of the locally connected networks. Next most - preferred are addresses on the 192.168.1/24 network, and after - that either the 192.168.2/24 or 192.168.3/24 network with no - preference shown between these two networks. Queries received - from a host on the 192.168.1/24 network will prefer other - addresses on that network to the 192.168.2/24 and 192.168.3/24 - networks. Queries received from a host on the 192.168.4/24 or - the 192.168.5/24 network will only prefer other addresses on - their directly connected networks. - - -sortlist { - // IF the local host - // THEN first fit on the following nets - { localhost; - { localnets; - 192.168.1/24; - { 192.168.2/24; 192.168.3/24; }; }; }; - // IF on class C 192.168.1 THEN use .1, or .2 or .3 - { 192.168.1/24; - { 192.168.1/24; - { 192.168.2/24; 192.168.3/24; }; }; }; - // IF on class C 192.168.2 THEN use .2, or .1 or .3 - { 192.168.2/24; - { 192.168.2/24; - { 192.168.1/24; 192.168.3/24; }; }; }; - // IF on class C 192.168.3 THEN use .3, or .1 or .2 - { 192.168.3/24; - { 192.168.3/24; - { 192.168.1/24; 192.168.2/24; }; }; }; - // IF .4 or .5 THEN prefer that net - { { 192.168.4/24; 192.168.5/24; }; - }; -}; - - - The following example will give reasonable behavior for the - local host and hosts on directly connected networks. It is - similar to the behavior of the address sort in - BIND 4.9.x. Responses sent to queries from - the local host will favor any of the directly connected - networks. Responses sent to queries from any other hosts on a - directly connected network will prefer addresses on that same - network. Responses to other queries will not be sorted. - - -sortlist { - { localhost; localnets; }; - { localnets; }; -}; - - -
-
RRset Ordering - - - When multiple records are returned in an answer it may be - useful to configure the order of the records placed into the - response. The rrset-order statement permits - configuration of the ordering of the records in a - multiple-record response. - See also the sortlist statement, - . - - - An order_spec is defined as follows: - - - class class_name - type type_name - name "domain_name" - order ordering - - - If no class is specified, the default is ANY. - If no type is specified, the default is ANY. - If no name is specified, the default is "*" (asterisk). - - - The legal values for ordering are: - - - - - - - - - fixed - - - - Records are returned in the order they - are defined in the zone file. This option - is only available if BIND - is configured with "--enable-fixed-rrset" at - compile time. - - - - - - random - - - - Records are returned in some random order. - - - - - - cyclic - - - - Records are returned in a cyclic round-robin order, - rotating by one record per query. - - - If BIND is configured with - "--enable-fixed-rrset" at compile time, then - the initial ordering of the RRset will match the - one specified in the zone file; otherwise the - initial ordering is indeterminate. - - - - - - none - - - - Records are returned in whatever order they were - retrieved from the database. This order is - indeterminate, but will be consistent as long as the - database is not modified. When no ordering is - specified, this is the default. - - - - - - - - - - For example: - -rrset-order { - class IN type A name "host.example.com" order random; - order cyclic; -}; - - - will cause any responses for type A records in class IN that - have "host.example.com" as a - suffix, to always be returned - in random order. All other records are returned in cyclic order. - - - If multiple rrset-order statements - appear, they are not combined — the last one applies. - - - By default, records are returned in random order. - - - - - In this release of BIND 9, the - rrset-order statement does not support - "fixed" ordering by default. Fixed ordering can be enabled - at compile time by specifying "--enable-fixed-rrset" on - the "configure" command line. - - -
- -
Tuning - - - - - lame-ttl - - - Sets the number of seconds to cache a - lame server indication. 0 disables caching. (This is - NOT recommended.) - The default is 600 (10 minutes) and the - maximum value is - 1800 (30 minutes). - - - - - - - servfail-ttl - - - Sets the number of seconds to cache a - SERVFAIL response due to DNSSEC validation failure or - other general server failure. If set to - 0, SERVFAIL caching is disabled. - The SERVFAIL cache is not consulted if a query has - the CD (Checking Disabled) bit set; this allows a - query that failed due to DNSSEC validation to be retried - without waiting for the SERVFAIL TTL to expire. - - - The maximum value is 30 - seconds; any higher value will be silently - reduced. The default is 1 - second. - - - - - - min-ncache-ttl - - - To reduce network traffic and increase performance, the server - stores negative answers. min-ncache-ttl is - used to set a minimum retention time for these answers in the - server in seconds. For convenience, TTL-style time unit - suffixes may be used to specify the value. It also - accepts ISO 8601 duration formats. - - - The default min-ncache-ttl is - 0 seconds. - min-ncache-ttl cannot exceed 90 - seconds and will be truncated to 90 seconds if set to a - greater value. - - - - - - min-cache-ttl - - - Sets the minimum time for which the server will cache ordinary - (positive) answers in seconds. For convenience, TTL-style - time unit suffixes may be used to specify the value. It also - accepts ISO 8601 duration formats. - - - The default min-cache-ttl is - 0 seconds. - min-cache-ttl cannot exceed 90 - seconds and will be truncated to 90 seconds if set to a - greater value. - - - - - - max-ncache-ttl - - - To reduce network traffic and increase performance, - the server stores negative answers. - max-ncache-ttl is - used to set a maximum retention time for these answers in - the server in seconds. For convenience, TTL-style time unit - suffixes may be used to specify the value. It also accepts - ISO 8601 duration formats. - - - The default max-ncache-ttl is - 10800 seconds (3 hours). - max-ncache-ttl cannot exceed 7 days and - will be silently truncated to 7 days if set to a greater - value. - - - - - - max-cache-ttl - - - Sets the maximum time for which the server will - cache ordinary (positive) answers in seconds. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 - duration formats. - - - The default is 604800 (one week). - A value of zero may cause all queries to return - SERVFAIL, because of lost caches of intermediate - RRsets (such as NS and glue AAAA/A records) in the - resolution process. - - - - - - max-stale-ttl - - - If stale answers are enabled, - max-stale-ttl - sets the maximum time for which the server will - retain records past their normal expiry to - return them as stale records when the servers - for those records are not reachable. - The default is 1 week. The minimum allowed is - 1 second; a value of 0 will be updated silently - to 1 second. - - - For stale answers to be returned, they must be enabled, - either in the configuration file using - stale-answer-enable or via - rndc serve-stale on. - - - - - - resolver-nonbackoff-tries - - - Specifies how many retries occur before exponential - backoff kicks in. The default is 3. - - - - - - resolver-retry-interval - - - The base retry interval in milliseconds. - The default is 800. - - - - - - sig-validity-interval - - - Specifies the number of days into the future when - DNSSEC signatures automatically generated as a - result of dynamic updates () will expire. There - is an optional second field which specifies how - long before expiry that the signatures will be - regenerated. If not specified, the signatures will - be regenerated at 1/4 of base interval. The second - field is specified in days if the base interval is - greater than 7 days otherwise it is specified in hours. - The default base interval is 30 days - giving a re-signing interval of 7 1/2 days. The maximum - values are 10 years (3660 days). - - - The signature inception time is unconditionally - set to one hour before the current time to allow - for a limited amount of clock skew. - - - The sig-validity-interval can be - overridden for DNSKEY records by setting - dnskey-sig-validity. - - - The sig-validity-interval - should be, at least, several multiples of the SOA - expire interval to allow for reasonable interaction - between the various timer and expiry dates. - - - - - - dnskey-sig-validity - - - Specifies the number of days into the future when - DNSSEC signatures that are automatically generated - for DNSKEY RRsets as a result of dynamic updates - () will expire. - If set to a non-zero value, this overrides the - value set by sig-validity-interval. - The default is zero, meaning - sig-validity-interval is used. - The maximum value is 3660 days (10 years), and - higher values will be rejected. - - - - - - sig-signing-nodes - - - Specify the maximum number of nodes to be - examined in each quantum when signing a zone with - a new DNSKEY. The default is - 100. - - - - - - sig-signing-signatures - - - Specify a threshold number of signatures that - will terminate processing a quantum when signing - a zone with a new DNSKEY. The default is - 10. - - - - - - sig-signing-type - - - Specify a private RDATA type to be used when generating - signing state records. The default is - 65534. - - - It is expected that this parameter may be removed - in a future version once there is a standard type. - - - Signing state records are used to internally by - named to track the current state of - a zone-signing process, i.e., whether it is still active - or has been completed. The records can be inspected - using the command - rndc signing -list zone. - Once named has finished signing - a zone with a particular key, the signing state - record associated with that key can be removed from - the zone by running - rndc signing -clear keyid/algorithm zone. - To clear all of the completed signing state - records for a zone, use - rndc signing -clear all zone. - - - - - - min-refresh-time - max-refresh-time - min-retry-time - max-retry-time - - - These options control the server's behavior on refreshing a - zone (querying for SOA changes) or retrying failed - transfers. Usually the SOA values for the zone are used, - up to a hard-coded maximum expiry of 24 weeks. However, - these values are set by the master, giving slave server - administrators little control over their contents. - - - These options allow the administrator to set a minimum and - maximum refresh and retry time in seconds per-zone, - per-view, or globally. These options are valid for - slave and stub zones, and clamp the SOA refresh and - retry times to the specified values. - - - The following defaults apply. - min-refresh-time 300 seconds, - max-refresh-time 2419200 seconds - (4 weeks), min-retry-time 500 seconds, - and max-retry-time 1209600 seconds - (2 weeks). - - - - - - edns-udp-size - - - Sets the maximum advertised EDNS UDP buffer size in - bytes, to control the size of packets received from - authoritative servers in response to recursive queries. - Valid values are 512 to 4096 (values outside this range - will be silently adjusted to the nearest value within - it). The default value is 4096. - - - The usual reason for setting - edns-udp-size to a non-default value - is to get UDP answers to pass through broken firewalls - that block fragmented packets and/or block UDP DNS - packets that are greater than 512 bytes. - - - When named first queries a remote - server, it will advertise a UDP buffer size of 512, as - this has the greatest chance of success on the first try. - - - If the initial query is successful with - EDNS advertising a buffer size of 512, then - named will advertise progressively - larger buffer sizes on successive queries, until - responses begin timing out or - edns-udp-size is reached. - - - The default buffer sizes used by named - are 512, 1232, 1432, and 4096, but never exceeding - edns-udp-size. (The values 1232 and - 1432 are chosen to allow for an IPv4/IPv6 encapsulated - UDP message to be sent without fragmentation at the - minimum MTU sizes for Ethernet and IPv6 networks.) - - - - - - max-udp-size - - - Sets the maximum EDNS UDP message size - named will send in bytes. - Valid values are 512 to 4096 (values outside this - range will be silently adjusted to the nearest - value within it). The default value is 4096. - - - This value applies to responses sent by a server; to - set the advertised buffer size in queries, see - edns-udp-size. - - - The usual reason for setting - max-udp-size to a non-default - value is to get UDP answers to pass through broken - firewalls that block fragmented packets and/or - block UDP packets that are greater than 512 bytes. - This is independent of the advertised receive - buffer (edns-udp-size). - - - Setting this to a low value will encourage additional - TCP traffic to the nameserver. - - - - - - masterfile-format - - Specifies - the file format of zone files (see - ). - The default value is text, which is the - standard textual representation, except for slave zones, - in which the default value is raw. - Files in other formats than text are - typically expected to be generated by the - named-compilezone tool, or dumped by - named. - - - Note that when a zone file in a different format than - text is loaded, named - may omit some of the checks which would be performed for a - file in the text format. In particular, - check-names checks do not apply - for the raw format. This means - a zone file in the raw format - must be generated with the same check level as that - specified in the named configuration - file. Also, map format files are - loaded directly into memory via memory mapping, with only - minimal checking. - - - This statement sets the - masterfile-format for all zones, - but can be overridden on a per-zone or per-view basis - by including a masterfile-format - statement within the zone or - view block in the configuration - file. - - - - - - masterfile-style - - - Specifies the formatting of zone files during dump - when the is - text. (This option is ignored - with any other .) - - - When set to relative, - records are printed in a multi-line format with owner - names expressed relative to a shared origin. When set - to full, records are printed in - a single-line format with absolute owner names. - The full format is most suitable - when a zone file needs to be processed automatically - by a script. The relative format - is more human-readable, and is thus suitable when a - zone is to be edited by hand. The default is - relative. - - - - - - max-recursion-depth - - - Sets the maximum number of levels of recursion - that are permitted at any one time while servicing - a recursive query. Resolving a name may require - looking up a name server address, which in turn - requires resolving another name, etc; if the number - of indirections exceeds this value, the recursive - query is terminated and returns SERVFAIL. The - default is 7. - - - - - - max-recursion-queries - - - Sets the maximum number of iterative queries that - may be sent while servicing a recursive query. - If more queries are sent, the recursive query - is terminated and returns SERVFAIL. Queries to - look up top level domains such as "com" and "net" - and the DNS root zone are exempt from this limitation. - The default is 75. - - - - - - notify-delay - - - The delay, in seconds, between sending sets of notify - messages for a zone. The default is five (5) seconds. - - - The overall rate that NOTIFY messages are sent for all - zones is controlled by serial-query-rate. - - - - - - max-rsa-exponent-size - - - The maximum RSA exponent size, in bits, that will - be accepted when validating. Valid values are 35 - to 4096 bits. The default zero (0) is also accepted - and is equivalent to 4096. - - - - - - prefetch - - - When a query is received for cached data which - is to expire shortly, named can - refresh the data from the authoritative server - immediately, ensuring that the cache always has an - answer available. - - - The specifies the - "trigger" TTL value at which prefetch of the current - query will take place: when a cache record with a - lower TTL value is encountered during query processing, - it will be refreshed. Valid trigger TTL values are 1 to - 10 seconds. Values larger than 10 seconds will be silently - reduced to 10. - Setting a trigger TTL to zero (0) causes - prefetch to be disabled. - The default trigger TTL is 2. - - - An optional second argument specifies the "eligibility" - TTL: the smallest original - TTL value that will be accepted for a record to be - eligible for prefetching. The eligibility TTL must - be at least six seconds longer than the trigger TTL; - if it isn't, named will silently - adjust it upward. - The default eligibility TTL is 9. - - - - - - v6-bias - - - When determining the next nameserver to try - preference IPv6 nameservers by this many milliseconds. - The default is 50 milliseconds. - - - - - -
- -
Built-in server information zones - - - The server provides some helpful diagnostic information - through a number of built-in zones under the - pseudo-top-level-domain bind in the - CHAOS class. These zones are part - of a - built-in view (see ) of - class - CHAOS which is separate from the - default view of class IN. Most global - configuration options (allow-query, - etc) will apply to this view, but some are locally - overridden: notify, - recursion and - allow-new-zones are - always set to no, and - rate-limit is set to allow - three responses per second. - - - If you need to disable these zones, use the options - below, or hide the built-in CHAOS - view by - defining an explicit view of class CHAOS - that matches all clients. - - - - - - version - - - The version the server should report - via a query of the name version.bind - with type TXT, class CHAOS. - The default is the real version number of this server. - Specifying version none - disables processing of the queries. - - - Setting version to any value - (including none) will also - disable queries for authors.bind TXT CH. - - - - - - hostname - - - The hostname the server should report via a query of - the name hostname.bind - with type TXT, class CHAOS. - This defaults to the hostname of the machine hosting the - name server as - found by the gethostname() function. The primary purpose of such queries - is to - identify which of a group of anycast servers is actually - answering your queries. Specifying hostname none; - disables processing of the queries. - - - - - - server-id - - - The ID the server should report when receiving a Name - Server Identifier (NSID) query, or a query of the name - ID.SERVER with type - TXT, class CHAOS. - The primary purpose of such queries is to - identify which of a group of anycast servers is actually - answering your queries. Specifying server-id none; - disables processing of the queries. - Specifying server-id hostname; will cause named to - use the hostname as found by the gethostname() function. - The default server-id is none. - - - - - - -
- -
Built-in Empty Zones - - - The named server has some built-in - empty zones (SOA and NS records only). - These are for zones that should normally be answered locally - and which queries should not be sent to the Internet's root - servers. The official servers which cover these namespaces - return NXDOMAIN responses to these queries. In particular, - these cover the reverse namespaces for addresses from - RFC 1918, RFC 4193, RFC 5737 and RFC 6598. They also include the - reverse namespace for IPv6 local address (locally assigned), - IPv6 link local addresses, the IPv6 loopback address and the - IPv6 unknown address. - - - The server will attempt to determine if a built-in zone - already exists or is active (covered by a forward-only - forwarding declaration) and will not create an empty - zone in that case. - - - The current list of empty zones is: - - 10.IN-ADDR.ARPA - 16.172.IN-ADDR.ARPA - 17.172.IN-ADDR.ARPA - 18.172.IN-ADDR.ARPA - 19.172.IN-ADDR.ARPA - 20.172.IN-ADDR.ARPA - 21.172.IN-ADDR.ARPA - 22.172.IN-ADDR.ARPA - 23.172.IN-ADDR.ARPA - 24.172.IN-ADDR.ARPA - 25.172.IN-ADDR.ARPA - 26.172.IN-ADDR.ARPA - 27.172.IN-ADDR.ARPA - 28.172.IN-ADDR.ARPA - 29.172.IN-ADDR.ARPA - 30.172.IN-ADDR.ARPA - 31.172.IN-ADDR.ARPA - 168.192.IN-ADDR.ARPA - 64.100.IN-ADDR.ARPA - 65.100.IN-ADDR.ARPA - 66.100.IN-ADDR.ARPA - 67.100.IN-ADDR.ARPA - 68.100.IN-ADDR.ARPA - 69.100.IN-ADDR.ARPA - 70.100.IN-ADDR.ARPA - 71.100.IN-ADDR.ARPA - 72.100.IN-ADDR.ARPA - 73.100.IN-ADDR.ARPA - 74.100.IN-ADDR.ARPA - 75.100.IN-ADDR.ARPA - 76.100.IN-ADDR.ARPA - 77.100.IN-ADDR.ARPA - 78.100.IN-ADDR.ARPA - 79.100.IN-ADDR.ARPA - 80.100.IN-ADDR.ARPA - 81.100.IN-ADDR.ARPA - 82.100.IN-ADDR.ARPA - 83.100.IN-ADDR.ARPA - 84.100.IN-ADDR.ARPA - 85.100.IN-ADDR.ARPA - 86.100.IN-ADDR.ARPA - 87.100.IN-ADDR.ARPA - 88.100.IN-ADDR.ARPA - 89.100.IN-ADDR.ARPA - 90.100.IN-ADDR.ARPA - 91.100.IN-ADDR.ARPA - 92.100.IN-ADDR.ARPA - 93.100.IN-ADDR.ARPA - 94.100.IN-ADDR.ARPA - 95.100.IN-ADDR.ARPA - 96.100.IN-ADDR.ARPA - 97.100.IN-ADDR.ARPA - 98.100.IN-ADDR.ARPA - 99.100.IN-ADDR.ARPA - 100.100.IN-ADDR.ARPA - 101.100.IN-ADDR.ARPA - 102.100.IN-ADDR.ARPA - 103.100.IN-ADDR.ARPA - 104.100.IN-ADDR.ARPA - 105.100.IN-ADDR.ARPA - 106.100.IN-ADDR.ARPA - 107.100.IN-ADDR.ARPA - 108.100.IN-ADDR.ARPA - 109.100.IN-ADDR.ARPA - 110.100.IN-ADDR.ARPA - 111.100.IN-ADDR.ARPA - 112.100.IN-ADDR.ARPA - 113.100.IN-ADDR.ARPA - 114.100.IN-ADDR.ARPA - 115.100.IN-ADDR.ARPA - 116.100.IN-ADDR.ARPA - 117.100.IN-ADDR.ARPA - 118.100.IN-ADDR.ARPA - 119.100.IN-ADDR.ARPA - 120.100.IN-ADDR.ARPA - 121.100.IN-ADDR.ARPA - 122.100.IN-ADDR.ARPA - 123.100.IN-ADDR.ARPA - 124.100.IN-ADDR.ARPA - 125.100.IN-ADDR.ARPA - 126.100.IN-ADDR.ARPA - 127.100.IN-ADDR.ARPA - 0.IN-ADDR.ARPA - 127.IN-ADDR.ARPA - 254.169.IN-ADDR.ARPA - 2.0.192.IN-ADDR.ARPA - 100.51.198.IN-ADDR.ARPA - 113.0.203.IN-ADDR.ARPA - 255.255.255.255.IN-ADDR.ARPA - 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA - 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA - 8.B.D.0.1.0.0.2.IP6.ARPA - D.F.IP6.ARPA - 8.E.F.IP6.ARPA - 9.E.F.IP6.ARPA - A.E.F.IP6.ARPA - B.E.F.IP6.ARPA - EMPTY.AS112.ARPA - HOME.ARPA - - - - Empty zones are settable at the view level and only apply to - views of class IN. Disabled empty zones are only inherited - from options if there are no disabled empty zones specified - at the view level. To override the options list of disabled - zones, you can disable the root zone at the view level, for example: - - disable-empty-zone "."; - - - - If you are using the address ranges covered here, you should - already have reverse zones covering the addresses you use. - In practice this appears to not be the case with many queries - being made to the infrastructure servers for names in these - spaces. So many in fact that sacrificial servers were needed - to be deployed to channel the query load away from the - infrastructure servers. - - - The real parent servers for these zones should disable all - empty zone under the parent zone they serve. For the real - root servers, this is all built-in empty zones. This will - enable them to return referrals to deeper in the tree. - - - - empty-server - - - Specify what server name will appear in the returned - SOA record for empty zones. If none is specified, then - the zone's name will be used. - - - - - - empty-contact - - - Specify what contact name will appear in the returned - SOA record for empty zones. If none is specified, then - "." will be used. - - - - - - empty-zones-enable - - - Enable or disable all empty zones. By default, they - are enabled. - - - - - - disable-empty-zone - - - Disable individual empty zones. By default, none are - disabled. This option can be specified multiple times. - - - - -
- -
Content Filtering - - - BIND 9 provides the ability to filter - out DNS responses from external DNS servers containing - certain types of data in the answer section. - Specifically, it can reject address (A or AAAA) records if - the corresponding IPv4 or IPv6 addresses match the given - address_match_list of the - deny-answer-addresses option. - It can also reject CNAME or DNAME records if the "alias" - name (i.e., the CNAME alias or the substituted query name - due to DNAME) matches the - given namelist of the - deny-answer-aliases option, where - "match" means the alias name is a subdomain of one of - the name_list elements. - If the optional namelist is specified - with except-from, records whose query name - matches the list will be accepted regardless of the filter - setting. - Likewise, if the alias name is a subdomain of the - corresponding zone, the deny-answer-aliases - filter will not apply; - for example, even if "example.com" is specified for - deny-answer-aliases, - -www.example.com. CNAME xxx.example.com. - - - returned by an "example.com" server will be accepted. - - - - In the address_match_list of the - deny-answer-addresses option, only - ip_addr - and ip_prefix - are meaningful; - any key_id will be silently ignored. - - - - If a response message is rejected due to the filtering, - the entire message is discarded without being cached, and - a SERVFAIL error will be returned to the client. - - - - This filtering is intended to prevent "DNS rebinding attacks," in - which an attacker, in response to a query for a domain name the - attacker controls, returns an IP address within your own network or - an alias name within your own domain. - A naive web browser or script could then serve as an - unintended proxy, allowing the attacker - to get access to an internal node of your local network - that couldn't be externally accessed otherwise. - See the paper available at - - http://portal.acm.org/citation.cfm?id=1315245.1315298 - - for more details about the attacks. - - - - For example, if you own a domain named "example.net" and - your internal network uses an IPv4 prefix 192.0.2.0/24, - you might specify the following rules: - - -deny-answer-addresses { 192.0.2.0/24; } except-from { "example.net"; }; -deny-answer-aliases { "example.net"; }; - - - - If an external attacker lets a web browser in your local - network look up an IPv4 address of "attacker.example.com", - the attacker's DNS server would return a response like this: - - -attacker.example.com. A 192.0.2.1 - - - in the answer section. - Since the rdata of this record (the IPv4 address) matches - the specified prefix 192.0.2.0/24, this response will be - ignored. - - - - On the other hand, if the browser looks up a legitimate - internal web server "www.example.net" and the - following response is returned to - the BIND 9 server - - -www.example.net. A 192.0.2.2 - - - it will be accepted since the owner name "www.example.net" - matches the except-from element, - "example.net". - - - - Note that this is not really an attack on the DNS per se. - In fact, there is nothing wrong for an "external" name to - be mapped to your "internal" IP address or domain name - from the DNS point of view. - It might actually be provided for a legitimate purpose, - such as for debugging. - As long as the mapping is provided by the correct owner, - it is not possible or does not make sense to detect - whether the intent of the mapping is legitimate or not - within the DNS. - The "rebinding" attack must primarily be protected at the - application that uses the DNS. - For a large site, however, it may be difficult to protect - all possible applications at once. - This filtering feature is provided only to help such an - operational environment; - it is generally discouraged to turn it on unless you are - very sure you have no other choice and the attack is a - real threat for your applications. - - - - Care should be particularly taken if you want to use this - option for addresses within 127.0.0.0/8. - These addresses are obviously "internal", but many - applications conventionally rely on a DNS mapping from - some name to such an address. - Filtering out DNS records containing this address - spuriously can break such applications. - -
- -
Response Policy Zone (RPZ) Rewriting - - - BIND 9 includes a limited - mechanism to modify DNS responses for requests - analogous to email anti-spam DNS blacklists. - Responses can be changed to deny the existence of domains (NXDOMAIN), - deny the existence of IP addresses for domains (NODATA), - or contain other IP addresses or data. - - - - Response policy zones are named in the - response-policy option for the view or among the - global options if there is no response-policy option for the view. - Response policy zones are ordinary DNS zones containing RRsets - that can be queried normally if allowed. - It is usually best to restrict those queries with something like - allow-query { localhost; };. - Note that zones using masterfile-format map - cannot be used as policy zones. - - - - A response-policy option can support - multiple policy zones. To maximize performance, a radix - tree is used to quickly identify response policy zones - containing triggers that match the current query. This - imposes an upper limit of 64 on the number of policy zones - in a single response-policy option; more - than that is a configuration error. - - - - Rules encoded in response policy zones are processed after - Access Control Lists - (ACLs). All queries from clients which are not - permitted access to the resolver will be answered with a - status code of REFUSED, regardless of configured RPZ rules. - - - - Five policy triggers can be encoded in RPZ records. - - - RPZ-CLIENT-IP - - - IP records are triggered by the IP address of the - DNS client. - Client IP address triggers are encoded in records that have - owner names that are subdomains of - rpz-client-ip relativized to the - policy zone origin name - and encode an address or address block. - IPv4 addresses are represented as - prefixlength.B4.B3.B2.B1.rpz-client-ip. - The IPv4 prefix length must be between 1 and 32. - All four bytes, B4, B3, B2, and B1, must be present. - B4 is the decimal value of the least significant byte of the - IPv4 address as in IN-ADDR.ARPA. - - - - IPv6 addresses are encoded in a format similar - to the standard IPv6 text representation, - prefixlength.W8.W7.W6.W5.W4.W3.W2.W1.rpz-client-ip. - Each of W8,...,W1 is a one to four digit hexadecimal number - representing 16 bits of the IPv6 address as in the standard - text representation of IPv6 addresses, but reversed as in - IP6.ARPA. (Note that this representation of IPv6 - address is different from IP6.ARPA where each hex - digit occupies a label.) - All 8 words must be present except when one set of consecutive - zero words is replaced with .zz. - analogous to double colons (::) in standard IPv6 text - encodings. - The IPv6 prefix length must be between 1 and 128. - - - - - - QNAME - - - QNAME policy records are triggered by query names of - requests and targets of CNAME records resolved to generate - the response. - The owner name of a QNAME policy record is - the query name relativized to the policy zone. - - - - - - RPZ-IP - - - IP triggers are IP addresses in an - A or AAAA record in the ANSWER section of a response. - They are encoded like client-IP triggers except as - subdomains of rpz-ip. - - - - - - RPZ-NSDNAME - - - NSDNAME triggers match names of authoritative servers - for the query name, a parent of the query name, a CNAME - for query name, or a parent of a CNAME. They are - encoded as subdomains of rpz-nsdname - relativized to the RPZ origin name. NSIP triggers match - IP addresses in A and AAAA RRsets for domains that can - be checked against NSDNAME policy records. The - nsdname-enable phrase turns NSDNAME - triggers off or on for a single policy zone or all - zones. - - - If authoritative nameservers for the query name are not - yet known, named will recursively - look up the authoritative servers for the query name - before applying an RPZ-NSDNAME rule. - This can cause a processing delay. To speed up - processing at the cost of precision, the - nsdname-wait-recurse option - can be used: when set to no, - RPZ-NSDNAME rules will only be applied when authoritative - servers for the query name have already been looked up and - cached. If authoritative servers for the query name - are not in the cache, then the RPZ-NSDNAME rule will be - ignored, but the authoritative servers for the query name - will be looked up in the background, and the rule will be - applied to subsequent queries. The default is - yes, meaning RPZ-NSDNAME - rules should always be applied even if authoritative - servers for the query name need to be looked up first. - - - - - - RPZ-NSIP - - - NSIP triggers match the IP addresses of authoritative - servers. They are enncoded like IP triggers, except as - subdomains of rpz-nsip. - NSDNAME and NSIP triggers are checked only for names with at - least min-ns-dots dots. - The default value of min-ns-dots is - 1, to exclude top level domains. - The nsip-enable phrase turns NSIP - triggers off or on for a single policy zone or all - zones. - - - If a name server's IP address is not yet known, - named will recursively look up - the IP address before applying an RPZ-NSIP rule. - This can cause a processing delay. To speed up - processing at the cost of precision, the - nsip-wait-recurse option - can be used: when set to no, - RPZ-NSIP rules will only be applied when a name - servers's IP address has already been looked up and - cached. If a server's IP address is not in the - cache, then the RPZ-NSIP rule will be ignored, - but the address will be looked up in the - background, and the rule will be applied - to subsequent queries. The default is - yes, meaning RPZ-NSIP - rules should always be applied even if an - address needs to be looked up first. - - - - - - - - The query response is checked against all response policy zones, - so two or more policy records can be triggered by a response. - Because DNS responses are rewritten according to at most one - policy record, a single record encoding an action (other than - DISABLED actions) must be chosen. - Triggers or the records that encode them are chosen for the - rewriting in the following order: - - Choose the triggered record in the zone that appears - first in the response-policy option. - - Prefer CLIENT-IP to QNAME to IP to NSDNAME to NSIP - triggers in a single zone. - - Among NSDNAME triggers, prefer the - trigger that matches the smallest name under the DNSSEC ordering. - - Among IP or NSIP triggers, prefer the trigger - with the longest prefix. - - Among triggers with the same prefix length, - prefer the IP or NSIP trigger that matches - the smallest IP address. - - - - - - When the processing of a response is restarted to resolve - DNAME or CNAME records and a policy record set has - not been triggered, - all response policy zones are again consulted for the - DNAME or CNAME names and addresses. - - - - RPZ record sets are any types of DNS record except - DNAME or DNSSEC that encode actions or responses to - individual queries. - Any of the policies can be used with any of the triggers. - For example, while the TCP-only policy is - commonly used with client-IP triggers, - it can be used with any type of trigger to force the use of - TCP for responses with owner names in a zone. - - - PASSTHRU - - - The whitelist policy is specified - by a CNAME whose target is rpz-passthru. - It causes the response to not be rewritten - and is most often used to "poke holes" in policies for - CIDR blocks. - - - - - - DROP - - - The blacklist policy is specified - by a CNAME whose target is rpz-drop. - It causes the response to be discarded. - Nothing is sent to the DNS client. - - - - - - TCP-Only - - - The "slip" policy is specified - by a CNAME whose target is rpz-tcp-only. - It changes UDP responses to short, truncated DNS responses - that require the DNS client to try again with TCP. - It is used to mitigate distributed DNS reflection attacks. - - - - - - NXDOMAIN - - - The domain undefined response is encoded - by a CNAME whose target is the root domain (.) - - - - - - NODATA - - - The empty set of resource records is specified by - CNAME whose target is the wildcard top-level - domain (*.). - It rewrites the response to NODATA or ANCOUNT=0. - - - - - - Local Data - - - A set of ordinary DNS records can be used to answer queries. - Queries for record types not the set are answered with - NODATA. - - - - A special form of local data is a CNAME whose target is a - wildcard such as *.example.com. - It is used as if were an ordinary CNAME after the asterisk (*) - has been replaced with the query name. - The purpose for this special form is query logging in the - walled garden's authority DNS server. - - - - - - - - All of the actions specified in all of the individual records - in a policy zone - can be overridden with a policy clause in the - response-policy option. - An organization using a policy zone provided by another - organization might use this mechanism to redirect domains - to its own walled garden. - - - GIVEN - - The placeholder policy says "do not override but - perform the action specified in the zone." - - - - - - DISABLED - - - The testing override policy causes policy zone records to do - nothing but log what they would have done if the - policy zone were not disabled. - The response to the DNS query will be written (or not) - according to any triggered policy records that are not - disabled. - Disabled policy zones should appear first, - because they will often not be logged - if a higher precedence trigger is found first. - - - - - - PASSTHRU, - DROP, - TCP-Only, - NXDOMAIN, - and - NODATA - - - override with the corresponding per-record policy. - - - - - - CNAME domain - - - causes all RPZ policy records to act as if they were - "cname domain" records. - - - - - - - - By default, the actions encoded in a response policy zone - are applied only to queries that ask for recursion (RD=1). - That default can be changed for a single policy zone or - all response policy zones in a view - with a recursive-only no clause. - This feature is useful for serving the same zone files - both inside and outside an RFC 1918 cloud and using RPZ to - delete answers that would otherwise contain RFC 1918 values - on the externally visible name server or view. - - - - Also by default, RPZ actions are applied only to DNS requests - that either do not request DNSSEC metadata (DO=0) or when no - DNSSEC records are available for request name in the original - zone (not the response policy zone). This default can be - changed for all response policy zones in a view with a - break-dnssec yes clause. In that case, RPZ - actions are applied regardless of DNSSEC. The name of the - clause option reflects the fact that results rewritten by RPZ - actions cannot verify. - - - - No DNS records are needed for a QNAME or Client-IP trigger. - The name or IP address itself is sufficient, - so in principle the query name need not be recursively resolved. - However, not resolving the requested - name can leak the fact that response policy rewriting is in use - and that the name is listed in a policy zone to operators of - servers for listed names. To prevent that information leak, by - default any recursion needed for a request is done before any - policy triggers are considered. Because listed domains often - have slow authoritative servers, this behavior can cost - significant time. - The qname-wait-recurse yes option - overrides the default and enables that behavior - when recursion cannot change a non-error response. - The option does not affect QNAME or client-IP triggers - in policy zones listed - after other zones containing IP, NSIP and NSDNAME triggers, because - those may depend on the A, AAAA, and NS records that would be - found during recursive resolution. It also does not affect - DNSSEC requests (DO=1) unless break-dnssec yes - is in use, because the response would depend on whether or not - RRSIG records were found during resolution. - Using this option can cause error responses such as SERVFAIL to - appear to be rewritten, since no recursion is being done to - discover problems at the authoritative server. - - - - The dnsrps-enable yes option turns on - the DNS Rsponse Policy Service (DNSRPS) interface, if it has been - compiled in to named using - configure --enable-dnsrps. - - - - The dnsrps-options block provides additional - RPZ configuration settings, which are passed through to the - DNSRPS provider library. - Multiple DNSRPS settings in an dnsrps-options - string should be separated with semi-colons. - The DNSRPS provider, librpz, is passed a configuration string - consisting of the dnsrps-options text, - concatenated with settings derived from the - response-policy statement. - - - - Note: The dnsrps-options text should only include - configuration settings that are specific to the DNSRPS - provider. For example, the DNSRPS provider from - Farsight Security takes options such as - dnsrpzd-conf, - dnsrpzd-sock, and - dnzrpzd-args (for details of these options, - see the librpz documentation). - Other RPZ configuration settings could be included in - dnsrps-options - as well, but if named were switched - back to traditional RPZ by setting - dnsrps-enable to "no", those options would - be ignored. - - - - The TTL of a record modified by RPZ policies is set from the - TTL of the relevant record in policy zone. It is then limited - to a maximum value. - The max-policy-ttl clause changes the - maximum seconds from its default of 5. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 duration - formats. - - - - - For example, you might use this option statement - - response-policy { zone "badlist"; }; - - and this zone statement - - zone "badlist" {type master; file "master/badlist"; allow-query {none;}; }; - - with this zone file - -$TTL 1H -@ SOA LOCALHOST. named-mgr.example.com (1 1h 15m 30d 2h) - NS LOCALHOST. - -; QNAME policy records. There are no periods (.) after the owner names. -nxdomain.domain.com CNAME . ; NXDOMAIN policy -*.nxdomain.domain.com CNAME . ; NXDOMAIN policy -nodata.domain.com CNAME *. ; NODATA policy -*.nodata.domain.com CNAME *. ; NODATA policy -bad.domain.com A 10.0.0.1 ; redirect to a walled garden - AAAA 2001:2::1 -bzone.domain.com CNAME garden.example.com. - -; do not rewrite (PASSTHRU) OK.DOMAIN.COM -ok.domain.com CNAME rpz-passthru. - -; redirect x.bzone.domain.com to x.bzone.domain.com.garden.example.com -*.bzone.domain.com CNAME *.garden.example.com. - - -; IP policy records that rewrite all responses containing A records in 127/8 -; except 127.0.0.1 -8.0.0.0.127.rpz-ip CNAME . -32.1.0.0.127.rpz-ip CNAME rpz-passthru. - -; NSDNAME and NSIP policy records -ns.domain.com.rpz-nsdname CNAME . -48.zz.2.2001.rpz-nsip CNAME . - -; blacklist and whitelist some DNS clients -112.zz.2001.rpz-client-ip CNAME rpz-drop. -8.0.0.0.127.rpz-client-ip CNAME rpz-drop. - -; force some DNS clients and responses in the example.com zone to TCP -16.0.0.1.10.rpz-client-ip CNAME rpz-tcp-only. -example.com CNAME rpz-tcp-only. -*.example.com CNAME rpz-tcp-only. - - - - RPZ can affect server performance. - Each configured response policy zone requires the server to - perform one to four additional database lookups before a - query can be answered. - For example, a DNS server with four policy zones, each with all - four kinds of response triggers, QNAME, IP, NSIP, and - NSDNAME, requires a total of 17 times as many database - lookups as a similar DNS server with no response policy zones. - A BIND9 server with adequate memory and one - response policy zone with QNAME and IP triggers might achieve a - maximum queries-per-second rate about 20% lower. - A server with four response policy zones with QNAME and IP - triggers might have a maximum QPS rate about 50% lower. - - - - Responses rewritten by RPZ are counted in the - RPZRewrites statistics. - - - - The log clause can be used to optionally - turn off rewrite logging for a particular response policy - zone. By default, all rewrites are logged. - - - - The add-soa option controls whether the RPZ's - SOA record is added to the additional section for traceback - of changes from this zone or not. This can be set at the - individual policy zone level or at the response-policy level. - The default is yes. - - - - Updates to RPZ zones are processed asynchronously; if there - is more than one update pending they are bundled together. - If an update to a RPZ zone (for example, via IXFR) happens less - than seconds after the most - recent update, then the changes will not be carried out until this - interval has elapsed. The default is 60 seconds. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 duration - formats. - -
- -
Response Rate Limiting - - - Excessive almost identical UDP responses - can be controlled by configuring a - rate-limit clause in an - options or view statement. - This mechanism keeps authoritative BIND 9 from being used - in amplifying reflection denial of service (DoS) attacks. - Short truncated (TC=1) responses can be sent to provide - rate-limited responses to legitimate clients within - a range of forged, attacked IP addresses. - Legitimate clients react to dropped or truncated response - by retrying with UDP or with TCP respectively. - - - - This mechanism is intended for authoritative DNS servers. - It can be used on recursive servers but can slow - applications such as SMTP servers (mail receivers) and - HTTP clients (web browsers) that repeatedly request the - same domains. - When possible, closing "open" recursive servers is better. - - - - Response rate limiting uses a "credit" or "token bucket" scheme. - Each combination of identical response and client - has a conceptual account that earns a specified number - of credits every second. - A prospective response debits its account by one. - Responses are dropped or truncated - while the account is negative. - Responses are tracked within a rolling window of time - which defaults to 15 seconds, but can be configured with - the window option to any value from - 1 to 3600 seconds (1 hour). - The account cannot become more positive than - the per-second limit - or more negative than window - times the per-second limit. - When the specified number of credits for a class of - responses is set to 0, those responses are not rate limited. - - - - The notions of "identical response" and "DNS client" - for rate limiting are not simplistic. - All responses to an address block are counted as if to a - single client. - The prefix lengths of addresses blocks are - specified with ipv4-prefix-length (default 24) - and ipv6-prefix-length (default 56). - - - - All non-empty responses for a valid domain name (qname) - and record type (qtype) are identical and have a limit specified - with responses-per-second - (default 0 or no limit). - All empty (NODATA) responses for a valid domain, - regardless of query type, are identical. - Responses in the NODATA class are limited by - nodata-per-second - (default responses-per-second). - Requests for any and all undefined subdomains of a given - valid domain result in NXDOMAIN errors, and are identical - regardless of query type. - They are limited by nxdomains-per-second - (default responses-per-second). - This controls some attacks using random names, but - can be relaxed or turned off (set to 0) - on servers that expect many legitimate - NXDOMAIN responses, such as from anti-spam blacklists. - Referrals or delegations to the server of a given - domain are identical and are limited by - referrals-per-second - (default responses-per-second). - - - - Responses generated from local wildcards are counted and limited - as if they were for the parent domain name. - This controls flooding using random.wild.example.com. - - - - All requests that result in DNS errors other - than NXDOMAIN, such as SERVFAIL and FORMERR, are identical - regardless of requested name (qname) or record type (qtype). - This controls attacks using invalid requests or distant, - broken authoritative servers. - By default the limit on errors is the same as the - responses-per-second value, - but it can be set separately with - errors-per-second. - - - - Many attacks using DNS involve UDP requests with forged source - addresses. - Rate limiting prevents the use of BIND 9 to flood a network - with responses to requests with forged source addresses, - but could let a third party block responses to legitimate requests. - There is a mechanism that can answer some legitimate - requests from a client whose address is being forged in a flood. - Setting slip to 2 (its default) causes every - other UDP request to be answered with a small truncated (TC=1) - response. - The small size and reduced frequency, and so lack of - amplification, of "slipped" responses make them unattractive - for reflection DoS attacks. - slip must be between 0 and 10. - A value of 0 does not "slip": - no truncated responses are sent due to rate limiting, - all responses are dropped. - A value of 1 causes every response to slip; - values between 2 and 10 cause every n'th response to slip. - Some error responses including REFUSED and SERVFAIL - cannot be replaced with truncated responses and are instead - leaked at the slip rate. - - - - (NOTE: Dropped responses from an authoritative server may - reduce the difficulty of a third party successfully forging - a response to a recursive resolver. The best security - against forged responses is for authoritative operators - to sign their zones using DNSSEC and for resolver operators - to validate the responses. When this is not an option, - operators who are more concerned with response integrity - than with flood mitigation may consider setting - slip to 1, causing all rate-limited - responses to be truncated rather than dropped. This reduces - the effectiveness of rate-limiting against reflection attacks.) - - - - When the approximate query per second rate exceeds - the qps-scale value, - then the responses-per-second, - errors-per-second, - nxdomains-per-second and - all-per-second values are reduced by the - ratio of the current rate to the qps-scale value. - This feature can tighten defenses during attacks. - For example, with - qps-scale 250; responses-per-second 20; and - a total query rate of 1000 queries/second for all queries from - all DNS clients including via TCP, - then the effective responses/second limit changes to - (250/1000)*20 or 5. - Responses sent via TCP are not limited - but are counted to compute the query per second rate. - - - - Communities of DNS clients can be given their own parameters or no - rate limiting by putting - rate-limit statements in view - statements instead of the global option - statement. - A rate-limit statement in a view replaces, - rather than supplementing, a rate-limit - statement among the main options. - DNS clients within a view can be exempted from rate limits - with the exempt-clients clause. - - - - UDP responses of all kinds can be limited with the - all-per-second phrase. This rate - limiting is unlike the rate limiting provided by - responses-per-second, - errors-per-second, and - nxdomains-per-second on a DNS server - which are often invisible to the victim of a DNS - reflection attack. Unless the forged requests of the - attack are the same as the legitimate requests of the - victim, the victim's requests are not affected. Responses - affected by an all-per-second limit - are always dropped; the slip value - has no effect. An all-per-second - limit should be at least 4 times as large as the other - limits, because single DNS clients often send bursts - of legitimate requests. For example, the receipt of a - single mail message can prompt requests from an SMTP - server for NS, PTR, A, and AAAA records as the incoming - SMTP/TCP/IP connection is considered. The SMTP server - can need additional NS, A, AAAA, MX, TXT, and SPF records - as it considers the STMP Mail From - command. Web browsers often repeatedly resolve the - same names that are repeated in HTML <IMG> tags - in a page. all-per-second is similar - to the rate limiting offered by firewalls but often - inferior. Attacks that justify ignoring the contents - of DNS responses are likely to be attacks on the DNS - server itself. They usually should be discarded before - the DNS server spends resources make TCP connections - or parsing DNS requests, but that rate limiting must - be done before the DNS server sees the requests. - - - - The maximum size of the table used to track requests and - rate limit responses is set with max-table-size. - Each entry in the table is between 40 and 80 bytes. - The table needs approximately as many entries as the number - of requests received per second. - The default is 20,000. - To reduce the cold start of growing the table, - min-table-size (default 500) - can set the minimum table size. - Enable rate-limit category logging to monitor - expansions of the table and inform - choices for the initial and maximum table size. - - - - Use log-only yes to test rate limiting parameters - without actually dropping any requests. - - - - Responses dropped by rate limits are included in the - RateDropped and QryDropped - statistics. - Responses that truncated by rate limits are included in - RateSlipped and RespTruncated. - -
- -
- - Named supports NXDOMAIN redirection via two methods: - - Redirect zone - Redirect namespace - - - - With both methods when named gets a NXDOMAIN response - it examines a separate namespace to see if the NXDOMAIN - response should be replaced with an alternative response. - - - With a redirect zone (zone "." { type redirect; };), the - data used to replace the NXDOMAIN is held in a single - zone which is not part of the normal namespace. All the - redirect information is contained in the zone; there are - no delegations. - - - With a redirect namespace (option { nxdomain-redirect - <suffix> };) the data used to replace the - NXDOMAIN is part of the normal namespace and is looked up by - appending the specified suffix to the original query name. - This roughly doubles the cache required to process NXDOMAIN - responses as you have the original NXDOMAIN response and - the replacement data or a NXDOMAIN indicating that there - is no replacement. - - - If both a redirect zone and a redirect namespace are configured, - the redirect zone is tried first. - -
-
- -
<command>server</command> Statement Grammar - -
- -
<command>server</command> Statement Definition and - Usage - - - The server statement defines - characteristics - to be associated with a remote name server. If a prefix length is - specified, then a range of servers is covered. Only the most - specific - server clause applies regardless of the order in - named.conf. - - - - The server statement can occur at - the top level of the - configuration file or inside a view - statement. - If a view statement contains - one or more server statements, only - those - apply to the view and any top-level ones are ignored. - If a view contains no server - statements, - any top-level server statements are - used as - defaults. - - - - If you discover that a remote server is giving out bad data, - marking it as bogus will prevent further queries to it. The - default - value of bogus is no. - - - The provide-ixfr clause determines - whether - the local server, acting as master, will respond with an - incremental - zone transfer when the given remote server, a slave, requests it. - If set to yes, incremental transfer - will be provided - whenever possible. If set to no, - all transfers - to the remote server will be non-incremental. If not set, the - value - of the provide-ixfr option in the - view or - global options block is used as a default. - - - - The request-ixfr clause determines - whether - the local server, acting as a slave, will request incremental zone - transfers from the given remote server, a master. If not set, the - value of the request-ixfr option in - the view or global options block is used as a default. It may - also be set in the zone block and, if set there, it will - override the global or view setting for that zone. - - - - IXFR requests to servers that do not support IXFR will - automatically - fall back to AXFR. Therefore, there is no need to manually list - which servers support IXFR and which ones do not; the global - default - of yes should always work. - The purpose of the provide-ixfr and - request-ixfr clauses is - to make it possible to disable the use of IXFR even when both - master - and slave claim to support it, for example if one of the servers - is buggy and crashes or corrupts data when IXFR is used. - - - - The request-expire clause determines - whether the local server, when acting as a slave, will - request the EDNS EXPIRE value. The EDNS EXPIRE value - indicates the remaining time before the zone data will - expire and need to be be refreshed. This is used - when a secondary server transfers a zone from another - secondary server; when transferring from the primary, the - expiration timer is set from the EXPIRE field of the SOA - record instead. - The default is yes. - - - - The edns clause determines whether - the local server will attempt to use EDNS when communicating - with the remote server. The default is yes. - - - - The edns-udp-size option sets the - EDNS UDP size that is advertised by named - when querying the remote server. Valid values are 512 - to 4096 bytes (values outside this range will be silently - adjusted to the nearest value within it). This option - is useful when you wish to advertise a different value - to this server than the value you advertise globally, - for example, when there is a firewall at the remote - site that is blocking large replies. (Note: Currently, - this sets a single UDP size for all packets sent to the - server; named will not deviate from - this value. This differs from the behavior of - edns-udp-size in options - or view statements, where it specifies - a maximum value. The server statement - behavior may be brought into conformance with the - options/view behavior in future releases.) - - - - The edns-version option sets the - maximum EDNS VERSION that will be sent to the server(s) - by the resolver. The actual EDNS version sent is still - subject to normal EDNS version negotiation rules (see - RFC 6891), the maximum EDNS version supported by the - server, and any other heuristics that indicate that a - lower version should be sent. This option is intended - to be used when a remote server reacts badly to a given - EDNS version or higher; it should be set to the highest - version the remote server is known to support. Valid - values are 0 to 255; higher values will be silently - adjusted. This option will not be needed until higher - EDNS versions than 0 are in use. - - - - The max-udp-size option sets the - maximum EDNS UDP message size named - will send. Valid values are 512 to 4096 bytes (values - outside this range will be silently adjusted). This - option is useful when you know that there is a firewall - that is blocking large replies from named. - - - - The padding option adds EDNS Padding - options to outgoing messages, increasing the packet size to - a multiple of the specified block size. Valid block sizes - range from 0 (the default, which disables the use of - EDNS Padding) to 512 bytes. Larger values will be reduced - to 512, with a logged warning. - Note: This option is not currently compatible with no TSIG - or SIG(0), as the EDNS OPT record containing the padding - would have to be added to the packet after it had already - been signed. - - - - The tcp-only option sets the transport - protocol to TCP. The default is to use the UDP transport - and to fallback on TCP only when a truncated response - is received. - - - - The tcp-keepalive option adds EDNS - TCP keepalive to messages sent over TCP. Note currently - idle timeouts in responses are ignored. - - - - The server supports two zone transfer methods. The first, one-answer, - uses one DNS message per resource record transferred. many-answers packs - as many resource records as possible into a message. many-answers is - more efficient, but is only known to be understood by BIND 9, BIND - 8.x, and patched versions of BIND - 4.9.5. You can specify which method - to use for a server with the transfer-format option. - If transfer-format is not - specified, the transfer-format - specified - by the options statement will be - used. - - - transfers - is used to limit the number of concurrent inbound zone - transfers from the specified server. If no - transfers clause is specified, the - limit is set according to the - transfers-per-ns option. - - - - The keys clause identifies a - key_id defined by the key statement, - to be used for transaction security (TSIG, ) - when talking to the remote server. - When a request is sent to the remote server, a request signature - will be generated using the key specified here and appended to the - message. A request originating from the remote server is not - required - to be signed by this key. - - - - Only a single key per server is currently supported. - - - - The transfer-source and - transfer-source-v6 clauses specify - the IPv4 and IPv6 source - address to be used for zone transfer with the remote server, - respectively. - For an IPv4 remote server, only transfer-source can - be specified. - Similarly, for an IPv6 remote server, only - transfer-source-v6 can be - specified. - For more details, see the description of - transfer-source and - transfer-source-v6 in - . - - - - The notify-source and - notify-source-v6 clauses specify the - IPv4 and IPv6 source address to be used for notify - messages sent to remote servers, respectively. For an - IPv4 remote server, only notify-source - can be specified. Similarly, for an IPv6 remote server, - only notify-source-v6 can be specified. - - - - The query-source and - query-source-v6 clauses specify the - IPv4 and IPv6 source address to be used for queries - sent to remote servers, respectively. For an IPv4 - remote server, only query-source can - be specified. Similarly, for an IPv6 remote server, - only query-source-v6 can be specified. - - - - The request-nsid clause determines - whether the local server will add a NSID EDNS option - to requests sent to the server. This overrides - request-nsid set at the view or - option level. - - - - The send-cookie clause determines - whether the local server will add a COOKIE EDNS option - to requests sent to the server. This overrides - send-cookie set at the view or - option level. The named server may - determine that COOKIE is not supported by the remote server - and not add a COOKIE EDNS option to requests. - -
- -
<command>statistics-channels</command> Statement Grammar - -
- -
<command>statistics-channels</command> Statement Definition and - Usage - - - The statistics-channels statement - declares communication channels to be used by system - administrators to get access to statistics information of - the name server. - - - - This statement intends to be flexible to support multiple - communication protocols in the future, but currently only - HTTP access is supported. - It requires that BIND 9 be compiled with libxml2 and/or - json-c (also known as libjson0); the - statistics-channels statement is - still accepted even if it is built without the library, - but any HTTP access will fail with an error. - - - - An inet control channel is a TCP socket - listening at the specified ip_port on the - specified ip_addr, which can be an IPv4 or IPv6 - address. An ip_addr of * - (asterisk) is - interpreted as the IPv4 wildcard address; connections will be - accepted on any of the system's IPv4 addresses. - To listen on the IPv6 wildcard address, - use an ip_addr of ::. - - - - If no port is specified, port 80 is used for HTTP channels. - The asterisk "*" cannot be used for - ip_port. - - - - The attempt of opening a statistics channel is - restricted by the optional allow clause. - Connections to the statistics channel are permitted based on the - address_match_list. - If no allow clause is present, - named accepts connection - attempts from any address; since the statistics may - contain sensitive internal information, it is highly - recommended to restrict the source of connection requests - appropriately. - - - - If no statistics-channels statement is present, - named will not open any communication channels. - - - - The statistics are available in various formats and views - depending on the URI used to access them. For example, if - the statistics channel is configured to listen on 127.0.0.1 - port 8888, then the statistics are accessible in XML format at - http://127.0.0.1:8888/ or - http://127.0.0.1:8888/xml. A CSS file is - included which can format the XML statistics into tables - when viewed with a stylesheet-capable browser, and into - charts and graphs using the Google Charts API when using a - javascript-capable browser. - - - - Broken-out subsets of the statistics can be viewed at - http://127.0.0.1:8888/xml/v3/status - (server uptime and last reconfiguration time), - http://127.0.0.1:8888/xml/v3/server - (server and resolver statistics), - http://127.0.0.1:8888/xml/v3/zones - (zone statistics), - http://127.0.0.1:8888/xml/v3/net - (network status and socket statistics), - http://127.0.0.1:8888/xml/v3/mem - (memory manager statistics), - http://127.0.0.1:8888/xml/v3/tasks - (task manager statistics), and - http://127.0.0.1:8888/xml/v3/traffic - (traffic sizes). - - - - The full set of statistics can also be read in JSON format at - http://127.0.0.1:8888/json, - with the broken-out subsets at - http://127.0.0.1:8888/json/v1/status - (server uptime and last reconfiguration time), - http://127.0.0.1:8888/json/v1/server - (server and resolver statistics), - http://127.0.0.1:8888/json/v1/zones - (zone statistics), - http://127.0.0.1:8888/json/v1/net - (network status and socket statistics), - http://127.0.0.1:8888/json/v1/mem - (memory manager statistics), - http://127.0.0.1:8888/json/v1/tasks - (task manager statistics), and - http://127.0.0.1:8888/json/v1/traffic - (traffic sizes). - -
- -
<command>trust-anchors</command> Statement Grammar - -
-
<command>trust-anchors</command> Statement Definition - and Usage - - - The trust-anchors statement defines DNSSEC - trust anchors. DNSSEC is described in . - - - A trust anchor is defined when the public key or public key - digest for a non-authoritative zone is known, but cannot be - securely obtained through DNS, either because it is the DNS - root zone or because its parent zone is unsigned. Once a key - or digest has been configured as a trust anchor, it is treated - as if it had been validated and proven secure. - - - The resolver attempts DNSSEC validation on all DNS data - in subdomains of configured trust anchors. (Validation below - specified names can be temporarily disabled by using - rndc nta, or permanently disabled with - the validate-except option). - - - All keys listed in trust-anchors, and - their corresponding zones, are deemed to exist regardless - of what parent zones say. Only keys configured as trust anchors - are used to validate the DNSKEY RRset for the corresponding - name. The parent's DS RRset will not be used. - - - trust-anchors may be set at the top level - of named.conf or within a view. If it is - set in both places, the configurations are additive: keys - defined at the top level are inherited by all views, but keys - defined in a view are only used within that view. - - - The trust-anchors statement can contain - multiple trust anchor entries, each consisting of a - domain name, followed by an "anchor type" keyword indicating - the trust anchor's format, followed by the key or digest data. - - - If the anchor type is static-key or - initial-key, then it is followed with the - key's flags, protocol, algorithm, and the Base64 representation - of the public key data. This is identical to the text - representation of a DNSKEY record. Spaces, tabs, newlines and - carriage returns are ignored in the key data, so the - configuration may be split up into multiple lines. - - - If the anchor type is static-ds or - initial-ds, then it is followed with the - key tag, algorithm, digest type, and the hexadecimal - representation of the key digest. This is identical to the - text representation of a DS record. Spaces, tabs, newlines - and carriage returns are ignored. - - - Trust anchors configured with the - static-key or static-ds - anchor types are immutable, while keys configured with - initial-key or initial-ds - can be kept up to date automatically, without intervention - from the resolver operator. (static-key - keys are identical to keys configured using the deprecated - trusted-keys statement.) - - - Suppose, for example, that a zone's key-signing - key was compromised, and the zone owner had to revoke and - replace the key. A resolver which had the original key - configured using static-key or - static-ds would be unable to validate - this zone any longer; it would reply with a SERVFAIL response - code. This would continue until the resolver operator had - updated the trust-anchors statement with - the new key. - - - If, however, the trust anchor had been configured with - initial-key or initial-ds - instead, then the zone owner could add a "stand-by" key to - their zone in advance. named would store - the stand-by key, and when the original key was revoked, - named would be able to transition smoothly - to the new key. It would also recognize that the old key had - been revoked, and cease using that key to validate answers, - minimizing the damage that the compromised key could do. - This is the process used to keep the ICANN root DNSSEC key - up to date. - - - Whereas static-key and - static-ds trust anchors continue - to be trusted until they are removed from - named.conf, an - initial-key or initial-ds - is only trusted once: for as long as it - takes to load the managed key database and start the RFC 5011 - key maintenance process. - - - It is not possible to mix static with initial trust anchors - for the same domain name. - - - The first time named runs with an - initial-key or initial-ds - configured in named.conf, it fetches the - DNSKEY RRset directly from the zone apex, and validates it - using the trust anchor specified in trust-anchors. - If the DNSKEY RRset is validly signed by a key matching - the trust anchor, then it is used as the basis for a new - managed keys database. - - - From that point on, whenever named runs, it - sees the initial-key or - initial-ds listed in - trust-anchors, checks to - make sure RFC 5011 key maintenance has already been initialized - for the specified domain, and if so, it simply moves on. The - key specified in the trust-anchors - statement is not used to validate answers; it is - superseded by the key or keys stored in the managed keys - database. - - - The next time named runs after an - initial-key or initial-ds - trust anchor has been removed from the - trust-anchors statement (or changed to - a static-key or static-ds), - the corresponding keys will be removed from the managed keys - database, and RFC 5011 key maintenance will no longer be used - for that domain. - - - In the current implementation, the managed keys database - is stored as a master-format zone file. - - - On servers which do not use views, this file is named - managed-keys.bind. When views are in - use, there will be a separate managed keys database for each - view; the filename will be the view name (or, if a view name - contains characters which would make it illegal as a filename, - a hash of the view name), followed by - the suffix .mkeys. - - - When the key database is changed, the zone is updated. - As with any other dynamic zone, changes will be written - into a journal file, e.g., - managed-keys.bind.jnl or - internal.mkeys.jnl. - Changes are committed to the master file as soon as - possible afterward; this will usually occur within 30 - seconds. So, whenever named is using - automatic key maintenance, the zone file and journal file - can be expected to exist in the working directory. - (For this reason among others, the working directory - should be always be writable by named.) - - - If the dnssec-validation option is - set to auto, named - will automatically initialize an initial-key - for the root zone. The key that is used to initialize the key - maintenance process is stored in bind.keys; - the location of this file can be overridden with the - bindkeys-file option. As a fallback - in the event no bind.keys can be - found, the initializing key is also compiled directly - into named. - -
- -
<command>dnssec-policy</command> Statement Grammar - -
- -
<command>dnssec-policy</command> Statement Definition and Usage - - - The dnssec-policy statement defines a key and - signing policy (KASP) for zones. - - - A KASP determines how one or more zones will be signed - with DNSSEC. For example, it specifies how often keys should - roll, which cryptographic algorithms to use, and how often RRSIG - records need to be refreshed. - - - Keys are not shared among zones, which means that one set of keys - per zone will be generated even if they have the same policy. - If multiple views are configured with different versions of the - same zone, each separate version will use the same set of signing - keys. - - - Multiple key and signing policies can be configured. To - attach a policy to a zone, add a dnssec-policy - option to the zone statement, specifying he - name of the policy that should be used. - - - Key rollover timing is computed for each key according to - the key lifetime defined in the KASP. The lifetime may be - modified by zone TTLs and propagation delays, in order to - prevent validation failures. When a key reaches the end of its - lifetime, - named will generate and publish a new key - automatically, then deactivate the old key and activate the - new one, and finally retire the old key according to a computed - schedule. - - - Zone-signing key (ZSK) rollovers require no operator input. - Key-signing key (KSK) and combined signing key (CSK) rollovers - require action to be taken to submit a DS record to the parent. - Rollover timing for KSKs and CSKs is adjusted to take into account - delays in processing and propagating DS updates. - - - There are two predefined dnssec-policy names: - none and default. - Setting a zone's policy to - none is the same as not setting - dnssec-policy at all; the zone will not - be signed. Policy default causes the - zone to be signed with a single combined signing key (CSK) - using algorithm ECDSAP256SHA256; this key will have an - unlimited lifetime. (A verbose copy of this policy - may be found in the source tree, in the file - doc/misc/dnssec-policy.default.conf.) - - The default signing policy may change in future releases. - This could result in changes to your signing policy - occurring when you upgrade to a new version of BIND. Check - the release notes carefully when upgrading to be informed - of such changes. To prevent policy changes on upgrade, - use an explicitly defined dnssec-policy - rather than default. - - - - If a dnssec-policy statement is modified - and the server restarted or reconfigured, named - will attempt to change the policy smoothly from the old one to - the new. For example, if the key algorithm is changed, then - a new key will be generated with the new algorithm, and the old - algorithm will be retired when the existing key's lifetime ends. - - Rolling to a new policy while another key rollover is - already in progress is not yet supported, and may result in - unexpected behavior. - - - - The following options can be specified in a - dnssec-policy statement: - - - - - dnskey-ttl - - - The TTL to use when generating DNSKEY resource records. - The default is 1 hour (3600 seconds). - - - - - - keys - - - A list specifying the algorithms and roles to use when - generating keys and signing the zone. - Entries in this list do not represent specific - DNSSEC keys, which may be changed on a regular basis, - but the roles that keys will play in the signing policy. - For example, configuring a KSK of algorithm RSASHA256 ensures - that the DNSKEY RRset will always include a key-signing key - for that algorithm. - - - Here is an example (for illustration purposes only) of - some possible entries in a keys - list: - - -keys { - ksk key-directory lifetime unlimited algorithm rsasha1 2048; - zsk lifetime P30D algorithm 8; - csk lifetime P6MT12H3M15S algorithm ecdsa256; -}; - - - - This example specifies that three keys should be used - in the zone. The first token determines which role the - key will play in signing RRsets. If set to - ksk, then this will be - a key-signing key; it will have the KSK flag set and - will only be used to sign DNSKEY, CDS, and CDNSKEY RRsets. - If set to zsk, this will be - a zone-signing key; the KSK flag will be unset, and - the key will sign all RRsets except - DNSKEY, CDS, and CDNSKEY. If set to - csk the key will have the KSK - flag set and will be used to sign all RRsets. - - - An optional second token determines where the key will - be stored. Currently, keys can only be stored in the - configured key-directory. This token - may be used in the future to store keys in hardware - service modules or separate directories. - - - The lifetime parameter specifies how - long a key may be used before rolling over. In the - example above, the first key will have an unlimited - lifetime, the second key may be used for 30 days, and the - third key has a rather peculiar lifetime of 6 months, - 12 hours, 3 minutes and 15 seconds. A lifetime of 0 - seconds is the same as unlimited. - - - Note that the lifetime of a key may be extended if - retiring it too soon would cause validation failures. - For example, if the key were configured to roll more - frequently than its own TTL, its lifetime would - automatically be extended to account for this. - - - The algorithm parameter specifies - the key's algorithm, expressed either as a string - ("rsasha256", "ecdsa384", etc) or as a decimal number. - An optional second parameter specifies the key's size - in size in bits. If it is omitted, as shown in the - example for the second and third keys, an appropriate - default size for the algorithm will be used. - - - - - - publish-safety - - - A margin that is added to the pre-publication - interval in rollover timing calculations to give some - extra time to cover unforeseen events. This increases - the time that keys are published before becoming active. - The default is PT1H (1 hour). - - - - - - retire-safety - - - A margin that is added to the post-publication interval - in rollover timing calculations to give some extra time - to cover unforeseen events. This increases the time a key - remains published after it is no longer active. The - default is PT1H (1 hour). - - - - - - signatures-refresh - - - This determines how frequently an RRSIG record needs to be - refreshed. The signature is renewed when the time until - the expiration time is closer than the specified interval. - The default is P5D (5 days), meaning - signatures that will expire in 5 days or sooner will be - refreshed. - - - - - - signatures-validity - - - The validity period of an RRSIG record (subject to - inception offset and jitter). The default is - P2W (2 weeks). - - - - - - signatures-validity-dnskey - - - Similar to signatures-validity but for - DNSKEY records. The default is P2W - (2 weeks). - - - - - - max-zone-ttl - - - Like the max-zone-ttl zone option, - this specifies the maximum permissible TTL value in - seconds for the zone. When loading a zone file using - a of - text or raw, - any record encountered with a TTL higher than - will be capped at the - maximum permissible TTL value. - - - This is needed in DNSSEC-maintained zones because when - rolling to a new DNSKEY, the old key needs to remain - available until RRSIG records have expired from caches. - The option guarantees that - the largest TTL in the zone will be no higher than the - set value. - - - (NOTE: Because map-format files - load directly into memory, this option cannot be - used with them.) - - - The default value is PT24H (24 hours). - A of zero is treated as if - the default value were in use. - - - - - - zone-propagation-delay - - - The expected propagation delay from the time when a zone - is first updated to the time when the new version of the - zone will be served by all secondary servers. The default - is PT5M (5 minutes). - - - - - - parent-ds-ttl - - - The TTL of the DS RRset that the parent zone uses. The - default is P1D (1 day). - - - - - - parent-propagation-delay - - - The expected propagation delay from the time when the - parent zone is updated to the time when the new version - is served by all of the parent zone's name servers. - The default is PT1H (1 hour). - - - - - - parent-registration-delay - - - The expected registration delay from the time when a DS - RRset change is requested to the time when the DS RRset - will be updated in the parent zone. The default is - P1D (1 day). - - - - -
- -
<command>managed-keys</command> Statement Grammar - -
-
<command>managed-keys</command> Statement Definition - and Usage - - - The managed-keys statement has been - deprecated in favor of - with the initial-key keyword. - -
- -
<command>trusted-keys</command> Statement Grammar - -
-
<command>trusted-keys</command> Statement Definition - and Usage - - - The trusted-keys statement has been - deprecated in favor of - with the static-key keyword. - -
- -
<command>view</command> Statement Grammar - -view view_name [ class ] { - match-clients { address_match_list } ; - match-destinations { address_match_list } ; - match-recursive-only yes_or_no ; - [ view_option ; ... ] - [ zone_statement ; ... ] -} ; - - -
-
<command>view</command> Statement Definition and Usage - - - The view statement is a powerful - feature - of BIND 9 that lets a name server - answer a DNS query differently - depending on who is asking. It is particularly useful for - implementing - split DNS setups without having to run multiple servers. - - - - Each view statement defines a view - of the - DNS namespace that will be seen by a subset of clients. A client - matches - a view if its source IP address matches the - address_match_list of the view's - match-clients clause and its - destination IP address matches - the address_match_list of the - view's - match-destinations clause. If not - specified, both - match-clients and match-destinations - default to matching all addresses. In addition to checking IP - addresses - match-clients and match-destinations - can also take keys which provide an - mechanism for the - client to select the view. A view can also be specified - as match-recursive-only, which - means that only recursive - requests from matching clients will match that view. - The order of the view statements is - significant — - a client request will be resolved in the context of the first - view that it matches. - - - - Zones defined within a view - statement will - only be accessible to clients that match the view. - By defining a zone of the same name in multiple views, different - zone data can be given to different clients, for example, - "internal" - and "external" clients in a split DNS setup. - - - - Many of the options given in the options statement - can also be used within a view - statement, and then - apply only when resolving queries with that view. When no - view-specific - value is given, the value in the options statement - is used as a default. Also, zone options can have default values - specified - in the view statement; these - view-specific defaults - take precedence over those in the options statement. - - - - Views are class specific. If no class is given, class IN - is assumed. Note that all non-IN views must contain a hint zone, - since only the IN class has compiled-in default hints. - - - - If there are no view statements in - the config - file, a default view that matches any client is automatically - created - in class IN. Any zone statements - specified on - the top level of the configuration file are considered to be part - of - this default view, and the options - statement will - apply to the default view. If any explicit view - statements are present, all zone - statements must - occur inside view statements. - - - - Here is an example of a typical split DNS setup implemented - using view statements: - - -view "internal" { - // This should match our internal networks. - match-clients { 10.0.0.0/8; }; - - // Provide recursive service to internal - // clients only. - recursion yes; - - // Provide a complete view of the example.com - // zone including addresses of internal hosts. - zone "example.com" { - type master; - file "example-internal.db"; - }; -}; - -view "external" { - // Match all clients not matched by the - // previous view. - match-clients { any; }; - - // Refuse recursive service to external clients. - recursion no; - - // Provide a restricted view of the example.com - // zone containing only publicly accessible hosts. - zone "example.com" { - type master; - file "example-external.db"; - }; -}; - - -
-
<command>zone</command> - Statement Grammar - - - - - - - - - - - - -
-
<command>zone</command> Statement Definition and Usage - -
Zone Types - - The type keyword is required - for the zone configuration unless - it is an in-view configuration. Its - acceptable values include: - master (or primary), - slave (or secondary), - mirror, - delegation-only, - forward, - hint, - redirect, - static-stub, - and stub. - - - - - - - - - - - - - primary - - - - - The server has a master copy of the data - for the zone and will be able to provide authoritative - answers for it. Type master is - a synonym for primary. - - - - - - - secondary - - - - - A secondary zone is a replica of a master - zone. Type slave is a - synonym for secondary. - The masters list - specifies one or more IP addresses - of master servers that the slave contacts to update - its copy of the zone. Masters list elements can - also be names of other masters lists. By default, - transfers are made from port 53 on the servers; - this can be changed for all servers by specifying - a port number before the list of IP addresses, - or on a per-server basis after the IP address. - Authentication to the master can also be done with - per-server TSIG keys. If a file is specified, then the - replica will be written to this file whenever the zone - is changed, and reloaded from this file on a server - restart. Use of a file is recommended, since it - often speeds server startup and eliminates a - needless waste of bandwidth. Note that for large - numbers (in the tens or hundreds of thousands) of - zones per server, it is best to use a two-level - naming scheme for zone filenames. For example, - a slave server for the zone - example.com might place - the zone contents into a file called - ex/example.com where - ex/ is just the first two - letters of the zone name. (Most operating systems - behave very slowly if you put 100000 files into - a single directory.) - - - - - - - stub - - - - - A stub zone is similar to a slave zone, - except that it replicates only the NS records of a - master zone instead - of the entire zone. Stub zones are not a standard part - of the DNS; - they are a feature specific to the BIND implementation. - - - - Stub zones can be used to eliminate the need for glue - NS record - in a parent zone at the expense of maintaining a stub - zone entry and - a set of name server addresses in named.conf. - This usage is not recommended for new configurations, - and BIND 9 - supports it only in a limited way. - In BIND 4/8, zone - transfers of a parent zone - included the NS records from stub children of that - zone. This meant - that, in some cases, users could get away with - configuring child stubs - only in the master server for the parent zone. BIND - 9 never mixes together zone data from different zones - in this - way. Therefore, if a BIND 9 master serving a parent - zone has child stub zones configured, all the slave - servers for the - parent zone also need to have the same child stub - zones - configured. - - - - Stub zones can also be used as a way of forcing the - resolution - of a given domain to use a particular set of - authoritative servers. - For example, the caching name servers on a private - network using - RFC1918 addressing may be configured with stub zones - for - 10.in-addr.arpa - to use a set of internal name servers as the - authoritative - servers for that domain. - - - - - - - mirror - - - - - A mirror zone is similar to a zone of type - secondary, except its data - is subject to DNSSEC validation before being used - in answers. Validation is applied to the entire - zone during the zone transfer process, and again - when the zone file is loaded from disk when - named is restarted. If - validation of a new version of a mirror zone - fails, a retransfer is scheduled and the most - recent correctly validated version of that zone - is used until it either expires or a newer version - validates correctly. If no usable zone data is - available for a mirror zone at all, either due to - transfer failure or expiration, traditional DNS - recursion is used to look up the answers instead. - Mirror zones cannot be used in a view that does - not have recursion enabled. - - - Answers coming from a mirror zone look almost - exactly like answers from a zone of type - secondary, with the - notable exceptions that the AA bit - ("authoritative answer") is not set, and the AD - bit ("authenticated data") is. - - - Mirror zones are intended to be used to set up a - fast local copy of the root zone, similar to the - one described in RFC 7706. A default list of primary - servers for the IANA root zone is built into - named and thus its mirroring - can be enabled using the following configuration: - -zone "." { - type mirror; -}; - - Other zones can be configured as mirror zones, - but this should be considered - experimental and may cause - performance issues, especially with zones that - are large and/or frequently updated. - Mirroring a zone other than root requires an - explicit list of primary servers to be provided - using the masters option - (see - for details), and a key-signing key (KSK) - for the specified zone to be explicitly - configured as a trust anchor. - - - To make mirror zone contents persist between - named restarts, use the - - option. - - - When configuring NOTIFY for a mirror zone, only - notify no; and - notify explicit; can be - used at the zone level. Using any other - notify setting at the - options or - view level will cause - that setting to be overridden with - notify explicit; for the - mirror zone. The global default for the - notify option is - yes, so mirror - zones are by default configured with - notify explicit;. - - - Outgoing transfers of mirror zones are disabled - by default but may be enabled using - . - - - - - - - static-stub - - - - - A static-stub zone is similar to a stub zone - with the following exceptions: - the zone data is statically configured, rather - than transferred from a master server; - when recursion is necessary for a query that - matches a static-stub zone, the locally - configured data (nameserver names and glue addresses) - is always used even if different authoritative - information is cached. - - - Zone data is configured via the - server-addresses and - server-names zone options. - - - The zone data is maintained in the form of NS - and (if necessary) glue A or AAAA RRs - internally, which can be seen by dumping zone - databases by rndc dumpdb -all. - The configured RRs are considered local configuration - parameters rather than public data. - Non recursive queries (i.e., those with the RD - bit off) to a static-stub zone are therefore - prohibited and will be responded with REFUSED. - - - Since the data is statically configured, no - zone maintenance action takes place for a static-stub - zone. - For example, there is no periodic refresh - attempt, and an incoming notify message - will be rejected with an rcode of NOTAUTH. - - - Each static-stub zone is configured with - internally generated NS and (if necessary) - glue A or AAAA RRs - - - - - - - forward - - - - - A "forward zone" is a way to configure - forwarding on a per-domain basis. A zone statement - of type forward can - contain a forward - and/or forwarders - statement, - which will apply to queries within the domain given by - the zone - name. If no forwarders - statement is present or - an empty list for forwarders is given, then no - forwarding will be done for the domain, canceling the - effects of - any forwarders in the options statement. Thus - if you want to use this type of zone to change the - behavior of the - global forward option - (that is, "forward first" - to, then "forward only", or vice versa, but want to - use the same - servers as set globally) you need to re-specify the - global forwarders. - - - - - - - hint - - - - - The initial set of root name servers is - specified using a "hint zone". When the server starts - up, it uses - the root hints to find a root name server and get the - most recent - list of root name servers. If no hint zone is - specified for class - IN, the server uses a compiled-in default set of root - servers hints. - Classes other than IN have no built-in defaults hints. - - - - - - - redirect - - - - - Redirect zones are used to provide answers to - queries when normal resolution would result in - NXDOMAIN being returned. - Only one redirect zone is supported - per view. allow-query can be - used to restrict which clients see these answers. - - - If the client has requested DNSSEC records (DO=1) and - the NXDOMAIN response is signed then no substitution - will occur. - - - To redirect all NXDOMAIN responses to - 100.100.100.2 and - 2001:ffff:ffff::100.100.100.2, one would - configure a type redirect zone named ".", - with the zone file containing wildcard records - that point to the desired addresses: - "*. IN A 100.100.100.2" - and - "*. IN AAAA 2001:ffff:ffff::100.100.100.2". - - - To redirect all Spanish names (under .ES) one - would use similar entries but with the names - "*.ES." instead of "*.". To redirect all - commercial Spanish names (under COM.ES) one - would use wildcard entries called "*.COM.ES.". - - - Note that the redirect zone supports all - possible types; it is not limited to A and - AAAA records. - - - If a redirect zone is configured with a - option, then it is - transferred in as if it were a slave zone. - Otherwise, it is loaded from a file as if it - were a master zone. - - - Because redirect zones are not referenced - directly by name, they are not kept in the - zone lookup table with normal master and slave - zones. To reload a redirect zone, use - rndc reload -redirect, - and to retransfer a redirect zone configured - as slave, use - rndc retransfer -redirect. - When using rndc reload - without specifying a zone name, redirect zones - will be reloaded along with other zones. - - - - - - - delegation-only - - - - - This is used to enforce the delegation-only - status of infrastructure zones (e.g. COM, - NET, ORG). Any answer that is received - without an explicit or implicit delegation - in the authority section will be treated - as NXDOMAIN. This does not apply to the - zone apex. This should not be applied to - leaf zones. - - - delegation-only has no - effect on answers received from forwarders. - - - See caveats in . - - - - - - -
- -
Class - - - The zone's name may optionally be followed by a class. If - a class is not specified, class IN (for Internet), - is assumed. This is correct for the vast majority of cases. - - - The hesiod class is - named for an information service from MIT's Project Athena. It - is - used to share information about various systems databases, such - as users, groups, printers and so on. The keyword - HS is - a synonym for hesiod. - - - Another MIT development is Chaosnet, a LAN protocol created - in the mid-1970s. Zone data for it can be specified with the CHAOS class. - -
- -
Zone Options - - - - - allow-notify - - - See the description of - allow-notify in . - - - - - - allow-query - - - See the description of - allow-query in . - - - - - - allow-query-on - - - See the description of - allow-query-on in . - - - - - - allow-transfer - - - See the description of allow-transfer - in . - - - - - - allow-update - - - See the description of allow-update - in . - - - - - - update-policy - - - Specifies a "Simple Secure Update" policy. See - . - - - - - - allow-update-forwarding - - - See the description of allow-update-forwarding - in . - - - - - - also-notify - - - Only meaningful if notify - is - active for this zone. The set of machines that will - receive a - DNS NOTIFY message - for this zone is made up of all the listed name servers - (other than - the primary master) for the zone plus any IP addresses - specified - with also-notify. A port - may be specified - with each also-notify - address to send the notify - messages to a port other than the default of 53. - A TSIG key may also be specified to cause the - NOTIFY to be signed by the - given key. - also-notify is not - meaningful for stub zones. - The default is the empty list. - - - - - - check-names - - - This option is used to restrict the character set and - syntax of - certain domain names in master files and/or DNS responses - received from the - network. The default varies according to zone type. For master zones the default is fail. For slave - zones the default is warn. - It is not implemented for hint zones. - - - - - - check-mx - - - See the description of - check-mx in . - - - - - - check-spf - - - See the description of - check-spf in . - - - - - - check-wildcard - - - See the description of - check-wildcard in . - - - - - - check-integrity - - - See the description of - check-integrity in . - - - - - - check-sibling - - - See the description of - check-sibling in . - - - - - - zero-no-soa-ttl - - - See the description of - zero-no-soa-ttl in . - - - - - - update-check-ksk - - - See the description of - update-check-ksk in . - - - - - - dnssec-loadkeys-interval - - - See the description of - dnssec-loadkeys-interval in . - - - - - - dnssec-policy - - - Specifies which key and signing policy (KASP) should - be used for this zone. This is a string referring to - a dnssec-policy statement. - There are two built-in policies: - default allows you to use the - default policy, and none means - not to use any DNSSEC policy, keeping the zone unsigned. - The default is none. - See for - more details. - - - - - - dnssec-update-mode - - - See the description of - dnssec-update-mode in . - - - - - - dnssec-dnskey-kskonly - - - See the description of - dnssec-dnskey-kskonly in . - - - - - - try-tcp-refresh - - - See the description of - try-tcp-refresh in . - - - - - - database - - - Specify the type of database to be used for storing the - zone data. The string following the database keyword - is interpreted as a list of whitespace-delimited words. - The first word - identifies the database type, and any subsequent words are - passed - as arguments to the database to be interpreted in a way - specific - to the database type. - - - The default is "rbt", BIND 9's - native in-memory - red-black-tree database. This database does not take - arguments. - - - Other values are possible if additional database drivers - have been linked into the server. Some sample drivers are - included - with the distribution but none are linked in by default. - - - - - - dialup - - - See the description of - dialup in . - - - - - - delegation-only - - - The flag only applies to forward, hint and stub - zones. If set to yes, - then the zone will also be treated as if it is - also a delegation-only type zone. - - - See caveats in . - - - - - - file - - - Set the zone's filename. In master, - hint, and redirect - zones which do not have masters - defined, zone data is loaded from this file. In - slave, mirror, - stub, and redirect - zones which do have masters - defined, zone data is retrieved from another server - and saved in this file. This option is not - applicable to other zone types. - - - - - - forward - - - Only meaningful if the zone has a forwarders - list. The only value causes - the lookup to fail - after trying the forwarders and getting no answer, while first would - allow a normal lookup to be tried. - - - - - - forwarders - - - Used to override the list of global forwarders. - If it is not specified in a zone of type forward, - no forwarding is done for the zone and the global options are - not used. - - - - - - journal - - - Allow the default journal's filename to be overridden. - The default is the zone's filename with ".jnl" appended. - This is applicable to master and slave zones. - - - - - - max-ixfr-ratio - - - See the description of - max-ixfr-ratio in - . - - - - - - max-journal-size - - - See the description of - max-journal-size in . - - - - - - max-records - - - See the description of - max-records in . - - - - - - max-transfer-time-in - - - See the description of - max-transfer-time-in in . - - - - - - max-transfer-idle-in - - - See the description of - max-transfer-idle-in in . - - - - - - max-transfer-time-out - - - See the description of - max-transfer-time-out in . - - - - - - max-transfer-idle-out - - - See the description of - max-transfer-idle-out in . - - - - - - notify - - - See the description of - notify in . - - - - - - notify-delay - - - See the description of - notify-delay in . - - - - - - notify-to-soa - - - See the description of - notify-to-soa in - . - - - - - - zone-statistics - - - See the description of - zone-statistics in - . - - - - - - server-addresses - - - Only meaningful for static-stub zones. - This is a list of IP addresses to which queries - should be sent in recursive resolution for the - zone. - A non empty list for this option will internally - configure the apex NS RR with associated glue A or - AAAA RRs. - - - For example, if "example.com" is configured as a - static-stub zone with 192.0.2.1 and 2001:db8::1234 - in a server-addresses option, - the following RRs will be internally configured. - -example.com. NS example.com. -example.com. A 192.0.2.1 -example.com. AAAA 2001:db8::1234 - - These records are internally used to resolve - names under the static-stub zone. - For instance, if the server receives a query for - "www.example.com" with the RD bit on, the server - will initiate recursive resolution and send - queries to 192.0.2.1 and/or 2001:db8::1234. - - - - - - server-names - - - Only meaningful for static-stub zones. - This is a list of domain names of nameservers that - act as authoritative servers of the static-stub - zone. - These names will be resolved to IP addresses when - named needs to send queries to - these servers. - To make this supplemental resolution successful, - these names must not be a subdomain of the origin - name of static-stub zone. - That is, when "example.net" is the origin of a - static-stub zone, "ns.example" and - "master.example.com" can be specified in the - server-names option, but - "ns.example.net" cannot, and will be rejected by - the configuration parser. - - - A non empty list for this option will internally - configure the apex NS RR with the specified names. - For example, if "example.com" is configured as a - static-stub zone with "ns1.example.net" and - "ns2.example.net" - in a server-names option, - the following RRs will be internally configured. - -example.com. NS ns1.example.net. -example.com. NS ns2.example.net. - - - These records are internally used to resolve - names under the static-stub zone. - For instance, if the server receives a query for - "www.example.com" with the RD bit on, the server - initiate recursive resolution, - resolve "ns1.example.net" and/or - "ns2.example.net" to IP addresses, and then send - queries to (one or more of) these addresses. - - - - - - sig-validity-interval - - - See the description of - sig-validity-interval in . - - - - - - sig-signing-nodes - - - See the description of - sig-signing-nodes in . - - - - - - sig-signing-signatures - - - See the description of - sig-signing-signatures in . - - - - - - sig-signing-type - - - See the description of - sig-signing-type in . - - - - - - transfer-source - - - See the description of - transfer-source in . - - - - - - transfer-source-v6 - - - See the description of - transfer-source-v6 in . - - - - - - alt-transfer-source - - - See the description of - alt-transfer-source in . - - - - - - alt-transfer-source-v6 - - - See the description of - alt-transfer-source-v6 in . - - - - - - use-alt-transfer-source - - - See the description of - use-alt-transfer-source in . - - - - - - - notify-source - - - See the description of - notify-source in . - - - - - - notify-source-v6 - - - See the description of - notify-source-v6 in . - - - - - - min-refresh-time - max-refresh-time - min-retry-time - max-retry-time - - - See the description in . - - - - - - ixfr-from-differences - - - See the description of - ixfr-from-differences in . - (Note that the ixfr-from-differences - master and - slave choices are not - available at the zone level.) - - - - - - key-directory - - - See the description of - key-directory in . - - - - - - auto-dnssec - - - See the description of - auto-dnssec in - . - - - - - - serial-update-method - - - See the description of - serial-update-method in - . - - - - - - inline-signing - - - If yes, this enables - "bump in the wire" signing of a zone, where a - unsigned zone is transferred in or loaded from - disk and a signed version of the zone is served, - with possibly, a different serial number. This - behavior is disabled by default. - - - - - - multi-master - - - See the description of multi-master in - . - - - - - - masterfile-format - - - See the description of masterfile-format - in . - - - - - - max-zone-ttl - - - See the description of max-zone-ttl - in . - - - - - - dnssec-secure-to-insecure - - - See the description of - dnssec-secure-to-insecure in . - - - - - - -
-
Dynamic Update Policies - - BIND 9 supports two alternative - methods of granting clients the right to perform - dynamic updates to a zone, configured by the - allow-update and - update-policy option, respectively. - - - The allow-update clause is a simple - access control list. Any client that matches - the ACL is granted permission to update any record - in the zone. - - - The update-policy clause - allows more fine-grained control over what updates are - allowed. It specifies a set of rules, in which each rule - either grants or denies permission for one or more - names in the zone to be updated by one or more - identities. Identity is determined by the key that - signed the update request using either TSIG or SIG(0). - In most cases, update-policy rules - only apply to key-based identities. There is no way - to specify update permissions based on client source - address. - - - update-policy rules are only meaningful - for zones of type master, and are - not allowed in any other zone type. - It is a configuration error to specify both - allow-update and - update-policy at the same time. - - - A pre-defined update-policy rule can be - switched on with the command - update-policy local;. - Using this in a zone causes - named to generate a TSIG session key - when starting up and store it in a file; this key can then - be used by local clients to update the zone while - named is running. - By default, the session key is stored in the file - /var/run/named/session.key, the key name - is "local-ddns", and the key algorithm is HMAC-SHA256. - These values are configurable with the - session-keyfile, - session-keyname and - session-keyalg options, respectively. - A client running on the local system, if run with appropriate - permissions, may read the session key from the key file and - use it to sign update requests. The zone's update - policy will be set to allow that key to change any record - within the zone. Assuming the key name is "local-ddns", - this policy is equivalent to: - - - update-policy { grant local-ddns zonesub any; }; - - - - ...with the additional restriction that only clients - connecting from the local system will be permitted to send - updates. - - - Note that only one session key is generated by - named; all zones configured to use - update-policy local will accept the same key. - - - The command nsupdate -l implements this - feature, sending requests to localhost and signing them using - the key retrieved from the session key file. - - - - Other rule definitions look like this: - - - -( grant | deny ) identity ruletype name types - - - - Each rule grants or denies privileges. Rules are checked - in the order in which they are specified in the - update-policy statement. Once a message - has successfully matched a rule, the operation is immediately - granted or denied, and no further rules are examined. There - are 13 types of rules; the rule type is specified by the - ruletype field, and the interpretation - of other fields varies depending on the rule type. - - - In general, a rule is matched when the - key that signed an update request matches the - identity field, the name of the record - to be updated matches the name field - (in the manner specified by the ruletype - field), and the type of the record to be updated matches the - types field. Details for each rule type - are described below. - - - The identity field must be set to - a fully-qualified domain name. In most cases, this - represensts the name of the TSIG or SIG(0) key that must be - used to sign the update request. If the specified name is a - wildcard, it is subject to DNS wildcard expansion, and the - rule may apply to multiple identities. When a TKEY exchange - has been used to create a shared secret, the identity of - the key used to authenticate the TKEY exchange will be - used as the identity of the shared secret. Some rule types - use identities matching the client's Kerberos principal - (e.g, "host/machine@REALM") or - Windows realm (machine$@REALM). - - - The name field also specifies - a fully-qualified domain name. This often - represents the name of the record to be updated. - Interpretation of this field is dependent on rule type. - - - If no types are explicitly specified, - then a rule matches all types except RRSIG, NS, SOA, NSEC - and NSEC3. Types may be specified by name, including - "ANY" (ANY matches all types except NSEC and NSEC3, - which can never be updated). Note that when an attempt - is made to delete all records associated with a name, - the rules are checked for each existing record type. - - - The ruletype field has 16 - values: - name, subdomain, - wildcard, self, - selfsub, selfwild, - krb5-self, ms-self, - krb5-selfsub, ms-selfsub, - krb5-subdomain, - ms-subdomain, - tcp-self, 6to4-self, - zonesub, and external. - - - - - - - - - - name - - - - Exact-match semantics. This rule matches - when the name being updated is identical - to the contents of the - name field. - - - - - - - subdomain - - - - This rule matches when the name being updated - is a subdomain of, or identical to, the - contents of the name - field. - - - - - - - zonesub - - - - This rule is similar to subdomain, except that - it matches when the name being updated is a - subdomain of the zone in which the - update-policy statement - appears. This obviates the need to type the zone - name twice, and enables the use of a standard - update-policy statement in - multiple zones without modification. - - - When this rule is used, the - name field is omitted. - - - - - - - wildcard - - - - The name field - is subject to DNS wildcard expansion, and - this rule matches when the name being updated - is a valid expansion of the wildcard. - - - - - - - self - - - - - This rule matches when the name of the record - being updated matches the contents of the - identity field. - The name field - is ignored. To avoid confusion, it is recommended - that this field be set to the same value as the - identity field or to - "." - - - The self rule type is - most useful when allowing one key per - name to update, where the key has the same - name as the record to be updated. In this case, - the identity field - can be specified as * - (an asterisk). - - - - - - - selfsub - - - - This rule is similar to self - except that subdomains of self - can also be updated. - - - - - - - selfwild - - - - This rule is similar to self - except that only subdomains of - self can be updated. - - - - - - - ms-self - - - - When a client sends an UPDATE using a Windows - machine principal (for example, 'machine$@REALM'), - this rule allows records with the absolute name - of 'machine.REALM' to be updated. - - - The realm to be matched is specified in the - identity field. - - - The name field has - no effect on this rule; it should be set to "." - as a placeholder. - - - For example, - grant EXAMPLE.COM ms-self . A AAAA - allows any machine with a valid principal in - the realm EXAMPLE.COM to update - its own address records. - - - - - - - ms-selfsub - - - - This is similar to ms-self - except it also allows updates to any subdomain of - the name specified in the Windows machine - principal, not just to the name itself. - - - - - - - ms-subdomain - - - - When a client sends an UPDATE using a Windows - machine principal (for example, 'machine$@REALM'), - this rule allows any machine in the specified - realm to update any record in the zone or in a - specified subdomain of the zone. - - - The realm to be matched is specified in the - identity field. - - - The name field - specifies the subdomain that may be updated. - If set to "." (or any other name at or above - the zone apex), any name in the zone can be - updated. - - - For example, if update-policy - for the zone "example.com" includes - grant EXAMPLE.COM ms-subdomain hosts.example.com. A AAAA, - any machine with a valid principal in - the realm EXAMPLE.COM will - be able to update address records at or below - "hosts.example.com". - - - - - - - krb5-self - - - - When a client sends an UPDATE using a - Kerberos machine principal (for example, - 'host/machine@REALM'), this rule allows - records with the absolute name of 'machine' - to be updated provided it has been authenticated - by REALM. This is similar but not identical - to ms-self due to the - 'machine' part of the Kerberos principal - being an absolute name instead of a unqualified - name. - - - The realm to be matched is specified in the - identity field. - - - The name field has - no effect on this rule; it should be set to "." - as a placeholder. - - - For example, - grant EXAMPLE.COM krb5-self . A AAAA - allows any machine with a valid principal in - the realm EXAMPLE.COM to update - its own address records. - - - - - - - krb5-selfsub - - - - This is similar to krb5-self - except it also allows updates to any subdomain of - the name specified in the 'machine' part of the - Kerberos principal, not just to the name itself. - - - - - - - krb5-subdomain - - - - This rule is identical to - ms-subdomain, except that it works - with Kerberos machine principals (i.e., - 'host/machine@REALM') rather than Windows machine - principals. - - - - - - - tcp-self - - - - This rule allows updates that have been sent via - TCP and for which the standard mapping from the - client's IP address into the - in-addr.arpa and - ip6.arpa - namespaces match the name to be updated. - The identity field must match - that name. The name field - should be set to ".". - Note that, since identity is based on the client's - IP address, it is not necessary for update request - messages to be signed. - - - It is theoretically possible to spoof these TCP - sessions. - - - - - - - 6to4-self - - - - This allows the name matching a 6to4 IPv6 prefix, - as specified in RFC 3056, to be updated by any - TCP connection from either the 6to4 network or - from the corresponding IPv4 address. This is - intended to allow NS or DNAME RRsets to be added - to the ip6.arpa reverse tree. - - - The identity field must match - the 6to4 prefix in ip6.arpa. - The name field should - be set to ".". - Note that, since identity is based on the client's - IP address, it is not necessary for update request - messages to be signed. - - - In addition, if specified for an - ip6.arpa name outside of the - 2.0.0.2.ip6.arpa namespace, - the corresponding /48 reverse name can be updated. - For example, TCP/IPv6 connections - from 2001:DB8:ED0C::/48 can update records at - C.0.D.E.8.B.D.0.1.0.0.2.ip6.arpa. - - - It is theoretically possible to spoof these TCP - sessions. - - - - - - - external - - - - This rule allows named - to defer the decision of whether to allow a - given update to an external daemon. - - - The method of communicating with the daemon is - specified in the identity - field, the format of which is - "local:path", - where path is the location - of a UNIX-domain socket. (Currently, "local" is the - only supported mechanism.) - - - Requests to the external daemon are sent over the - UNIX-domain socket as datagrams with the following - format: - - - Protocol version number (4 bytes, network byte order, currently 1) - Request length (4 bytes, network byte order) - Signer (null-terminated string) - Name (null-terminated string) - TCP source address (null-terminated string) - Rdata type (null-terminated string) - Key (null-terminated string) - TKEY token length (4 bytes, network byte order) - TKEY token (remainder of packet) - - The daemon replies with a four-byte value in - network byte order, containing either 0 or 1; 0 - indicates that the specified update is not - permitted, and 1 indicates that it is. - - - - - - -
- -
Multiple views - - - When multiple views are in use, a zone may be - referenced by more than one of them. Often, the views - will contain different zones with the same name, allowing - different clients to receive different answers for the same - queries. At times, however, it is desirable for multiple - views to contain identical zones. The - in-view zone option provides an efficient - way to do this: it allows a view to reference a zone that - was defined in a previously configured view. Example: - - -view internal { - match-clients { 10/8; }; - - zone example.com { - type master; - file "example-external.db"; - }; -}; - -view external { - match-clients { any; }; - - zone example.com { - in-view internal; - }; -}; - - - An in-view option cannot refer to a view - that is configured later in the configuration file. - - - A zone statement which uses the - in-view option may not use any other - options with the exception of forward - and forwarders. (These options control - the behavior of the containing view, rather than changing - the zone object itself.) - - - Zone level acls (e.g. allow-query, allow-transfer) and - other configuration details of the zone are all set - in the view the referenced zone is defined in. Care - need to be taken to ensure that acls are wide enough - for all views referencing the zone. - - - An in-view zone cannot be used as a - response policy zone. - - - An in-view zone is not intended to reference - a forward zone. - -
- -
-
-
Zone File - -
Types of Resource Records and When to Use Them - - - This section, largely borrowed from RFC 1034, describes the - concept of a Resource Record (RR) and explains when each is used. - Since the publication of RFC 1034, several new RRs have been - identified - and implemented in the DNS. These are also included. - -
Resource Records - - - A domain name identifies a node. Each node has a set of - resource information, which may be empty. The set of resource - information associated with a particular name is composed of - separate RRs. The order of RRs in a set is not significant and - need not be preserved by name servers, resolvers, or other - parts of the DNS. However, sorting of multiple RRs is - permitted for optimization purposes, for example, to specify - that a particular nearby server be tried first. See and . - - - - The components of a Resource Record are: - - - - - - - - - - owner name - - - - - The domain name where the RR is found. - - - - - - - type - - - - - An encoded 16-bit value that specifies - the type of the resource record. - - - - - - - TTL - - - - - The time-to-live of the RR. This field - is a 32-bit integer in units of seconds, and is - primarily used by - resolvers when they cache RRs. The TTL describes how - long a RR can - be cached before it should be discarded. - - - - - - - class - - - - - An encoded 16-bit value that identifies - a protocol family or instance of a protocol. - - - - - - - RDATA - - - - - The resource data. The format of the - data is type (and sometimes class) specific. - - - - - - - - The following are types of valid RRs: - - - - - - - - - - A - - - - - A host address. In the IN class, this is a - 32-bit IP address. Described in RFC 1035. - - - - - - - AAAA - - - - - IPv6 address. Described in RFC 1886. - - - - - - - A6 - - - - - IPv6 address. This can be a partial - address (a suffix) and an indirection to the name - where the rest of the - address (the prefix) can be found. Experimental. - Described in RFC 2874. - - - - - - - AFSDB - - - - - Location of AFS database servers. - Experimental. Described in RFC 1183. - - - - - - - AMTRELAY - - - - - Automatic Multicast Tunneling Relay - discovery record. - Work in progress draft-ietf-mboned-driad-amt-discovery. - - - - - - - APL - - - - - Address prefix list. Experimental. - Described in RFC 3123. - - - - - - - ATMA - - - - - ATM Address. - - - - - - - AVC - - - - - Application Visibility and Control record. - - - - - - - CAA - - - - - Identifies which Certificate Authorities can issue - certificates for this domain and what rules they - need to follow when doing so. Defined in RFC 6844. - - - - - - - CDNSKEY - - - - - Identifies which DNSKEY records should be published - as DS records in the parent zone. - - - - - - - CDS - - - - - Contains the set of DS records that should be published - by the parent zone. - - - - - - - CERT - - - - - Holds a digital certificate. - Described in RFC 2538. - - - - - - - CNAME - - - - - Identifies the canonical name of an alias. - Described in RFC 1035. - - - - - - - CSYNC - - - - - Child-to-Parent Synchronization in DNS as described - in RFC 7477. - - - - - - - DHCID - - - - - Is used for identifying which DHCP client is - associated with this name. Described in RFC 4701. - - - - - - - DLV - - - - - A DNS Lookaside Validation record which contains - the records that are used as trust anchors for - zones in a DLV namespace. Described in RFC 4431. - - - - - - - DNAME - - - - - Replaces the domain name specified with - another name to be looked up, effectively aliasing an - entire - subtree of the domain name space rather than a single - record - as in the case of the CNAME RR. - Described in RFC 2672. - - - - - - - DNSKEY - - - - - Stores a public key associated with a signed - DNS zone. Described in RFC 4034. - - - - - - - DOA - - - - - Implements the Digital Object Architecture over - DNS. Experimental. - - - - - - - DS - - - - - Stores the hash of a public key associated with a - signed DNS zone. Described in RFC 4034. - - - - - - - EID - - - - - End Point Identifier. - - - - - - - EUI48 - - - - - A 48-bit EUI address. Described in RFC 7043. - - - - - - - EUI64 - - - - - A 64-bit EUI address. Described in RFC 7043. - - - - - - - GID - - - - - Reserved. - - - - - - - GPOS - - - - - Specifies the global position. Superseded by LOC. - - - - - - - HINFO - - - - - Identifies the CPU and OS used by a host. - Described in RFC 1035. - - - - - - - HIP - - - - - Host Identity Protocol Address. - Described in RFC 5205. - - - - - - - IPSECKEY - - - - - Provides a method for storing IPsec keying material in - DNS. Described in RFC 4025. - - - - - - - ISDN - - - - - Representation of ISDN addresses. - Experimental. Described in RFC 1183. - - - - - - - KEY - - - - - Stores a public key associated with a - DNS name. Used in original DNSSEC; replaced - by DNSKEY in DNSSECbis, but still used with - SIG(0). Described in RFCs 2535 and 2931. - - - - - - - KX - - - - - Identifies a key exchanger for this - DNS name. Described in RFC 2230. - - - - - - - L32 - - - - - Holds 32-bit Locator values for - Identifier-Locator Network Protocol. Described - in RFC 6742. - - - - - - - L64 - - - - - Holds 64-bit Locator values for - Identifier-Locator Network Protocol. Described - in RFC 6742. - - - - - - - LOC - - - - - For storing GPS info. Described in RFC 1876. - Experimental. - - - - - - - LP - - - - - Identifier-Locator Network Protocol. - Described in RFC 6742. - - - - - - - MB - - - - - Mail Box. Historical. - - - - - - - MD - - - - - Mail Destination. Historical. - - - - - - - MF - - - - - Mail Forwarder. Historical. - - - - - - - MG - - - - - Mail Group. Historical. - - - - - - - MINFO - - - - - Mail Information. - - - - - - - MR - - - - - Mail Rename. Historical. - - - - - - - MX - - - - - Identifies a mail exchange for the domain with - a 16-bit preference value (lower is better) - followed by the host name of the mail exchange. - Described in RFC 974, RFC 1035. - - - - - - - NAPTR - - - - - Name authority pointer. Described in RFC 2915. - - - - - - - NID - - - - - Holds values for Node Identifiers in - Identifier-Locator Network Protocol. Described - in RFC 6742. - - - - - - - NINFO - - - - - Contains zone status information. - - - - - - - NIMLOC - - - - - Nimrod Locator. - - - - - - - NSAP - - - - - A network service access point. - Described in RFC 1706. - - - - - - - NSAP-PTR - - - - - Historical. - - - - - - - NS - - - - - The authoritative name server for the - domain. Described in RFC 1035. - - - - - - - NSEC - - - - - Used in DNSSECbis to securely indicate that - RRs with an owner name in a certain name interval do - not exist in - a zone and indicate what RR types are present for an - existing name. - Described in RFC 4034. - - - - - - - NSEC3 - - - - - Used in DNSSECbis to securely indicate that - RRs with an owner name in a certain name - interval do not exist in a zone and indicate - what RR types are present for an existing - name. NSEC3 differs from NSEC in that it - prevents zone enumeration but is more - computationally expensive on both the server - and the client than NSEC. Described in RFC - 5155. - - - - - - - NSEC3PARAM - - - - - Used in DNSSECbis to tell the authoritative - server which NSEC3 chains are available to use. - Described in RFC 5155. - - - - - - - NULL - - - - - This is an opaque container. - - - - - - - NXT - - - - - Used in DNSSEC to securely indicate that - RRs with an owner name in a certain name interval do - not exist in - a zone and indicate what RR types are present for an - existing name. - Used in original DNSSEC; replaced by NSEC in - DNSSECbis. - Described in RFC 2535. - - - - - - - OPENPGPKEY - - - - - Used to hold an OPENPGPKEY. - - - - - - - PTR - - - - - A pointer to another part of the domain - name space. Described in RFC 1035. - - - - - - - PX - - - - - Provides mappings between RFC 822 and X.400 - addresses. Described in RFC 2163. - - - - - - - RKEY - - - - - Resource key. - - - - - - - RP - - - - - Information on persons responsible - for the domain. Experimental. Described in RFC 1183. - - - - - - - RRSIG - - - - - Contains DNSSECbis signature data. Described - in RFC 4034. - - - - - - - RT - - - - - Route-through binding for hosts that - do not have their own direct wide area network - addresses. - Experimental. Described in RFC 1183. - - - - - - - SIG - - - - - Contains DNSSEC signature data. Used in - original DNSSEC; replaced by RRSIG in - DNSSECbis, but still used for SIG(0). - Described in RFCs 2535 and 2931. - - - - - - - SINK - - - - - The kitchen sink record. - - - - - - - SMIMEA - - - - - The S/MIME Security Certificate Association. - - - - - - - SOA - - - - - Identifies the start of a zone of authority. - Described in RFC 1035. - - - - - - - SPF - - - - - Contains the Sender Policy Framework information - for a given email domain. Described in RFC 4408. - - - - - - - SRV - - - - - Information about well known network - services (replaces WKS). Described in RFC 2782. - - - - - - - SSHFP - - - - - Provides a way to securely publish a secure shell key's - fingerprint. Described in RFC 4255. - - - - - - - TA - - - - - Trust Anchor. Experimental. - - - - - - - TALINK - - - - - Trust Anchor Link. Experimental. - - - - - - - TLSA - - - - - Transport Layer Security Certificate Association. - Described in RFC 6698. - - - - - - - TXT - - - - - Text records. Described in RFC 1035. - - - - - - - UID - - - - - Reserved. - - - - - - - UINFO - - - - - Reserved. - - - - - - - UNSPEC - - - - - Reserved. Historical. - - - - - - - URI - - - - - Holds a URI. Described in RFC 7553. - - - - - - - WKS - - - - - Information about which well known - network services, such as SMTP, that a domain - supports. Historical. - - - - - - - X25 - - - - - Representation of X.25 network addresses. - Experimental. Described in RFC 1183. - - - - - - - ZONEMD - - - - - Zone Message Digest. - Work in progress draft-wessels-dns-zone-digest. - - - - - - - - The following classes of resource records - are currently valid in the DNS: - - - - - - - - - - IN - - - - - The Internet. - - - - - - - - CH - - - - - Chaosnet, a LAN protocol created at MIT in the - mid-1970s. - Rarely used for its historical purpose, but reused for - BIND's - built-in server information zones, e.g., - version.bind. - - - - - - - - HS - - - - - Hesiod, an information service - developed by MIT's Project Athena. It is used to share - information - about various systems databases, such as users, - groups, printers - and so on. - - - - - - - - - - The owner name is often implicit, rather than forming an - integral - part of the RR. For example, many name servers internally form - tree - or hash structures for the name space, and chain RRs off nodes. - The remaining RR parts are the fixed header (type, class, TTL) - which is consistent for all RRs, and a variable part (RDATA) - that - fits the needs of the resource being described. - - - The meaning of the TTL field is a time limit on how long an - RR can be kept in a cache. This limit does not apply to - authoritative - data in zones; it is also timed out, but by the refreshing - policies - for the zone. The TTL is assigned by the administrator for the - zone where the data originates. While short TTLs can be used to - minimize caching, and a zero TTL prohibits caching, the - realities - of Internet performance suggest that these times should be on - the - order of days for the typical host. If a change can be - anticipated, - the TTL can be reduced prior to the change to minimize - inconsistency - during the change, and then increased back to its former value - following - the change. - - - The data in the RDATA section of RRs is carried as a combination - of binary strings and domain names. The domain names are - frequently - used as "pointers" to other data in the DNS. - -
-
Textual expression of RRs - - - RRs are represented in binary form in the packets of the DNS - protocol, and are usually represented in highly encoded form - when - stored in a name server or resolver. In the examples provided - in - RFC 1034, a style similar to that used in master files was - employed - in order to show the contents of RRs. In this format, most RRs - are shown on a single line, although continuation lines are - possible - using parentheses. - - - The start of the line gives the owner of the RR. If a line - begins with a blank, then the owner is assumed to be the same as - that of the previous RR. Blank lines are often included for - readability. - - - Following the owner, we list the TTL, type, and class of the - RR. Class and type use the mnemonics defined above, and TTL is - an integer before the type field. In order to avoid ambiguity - in - parsing, type and class mnemonics are disjoint, TTLs are - integers, - and the type mnemonic is always last. The IN class and TTL - values - are often omitted from examples in the interests of clarity. - - - The resource data or RDATA section of the RR are given using - knowledge of the typical representation for the data. - - - For example, we might show the RRs carried in a message as: - - - - - - - - - - ISI.EDU. - - - - - MX - - - - - 10 VENERA.ISI.EDU. - - - - - - - - - - MX - - - - - 10 VAXA.ISI.EDU - - - - - - - VENERA.ISI.EDU - - - - - A - - - - - 128.9.0.32 - - - - - - - - - - A - - - - - 10.1.0.52 - - - - - - - VAXA.ISI.EDU - - - - - A - - - - - 10.2.0.27 - - - - - - - - - - A - - - - - 128.9.0.33 - - - - - - - - The MX RRs have an RDATA section which consists of a 16-bit - number followed by a domain name. The address RRs use a - standard - IP address format to contain a 32-bit internet address. - - - The above example shows six RRs, with two RRs at each of three - domain names. - - - Similarly we might see: - - - - - - - - - - XX.LCS.MIT.EDU. - - - - - IN A - - - - - 10.0.0.44 - - - - - - - - CH A - - - - - MIT.EDU. 2420 - - - - - - - - This example shows two addresses for - XX.LCS.MIT.EDU, each of a different class. - -
-
- -
Discussion of MX Records - - - As described above, domain servers store information as a - series of resource records, each of which contains a particular - piece of information about a given domain name (which is usually, - but not always, a host). The simplest way to think of a RR is as - a typed pair of data, a domain name matched with a relevant datum, - and stored with some additional type information to help systems - determine when the RR is relevant. - - - - MX records are used to control delivery of email. The data - specified in the record is a priority and a domain name. The - priority - controls the order in which email delivery is attempted, with the - lowest number first. If two priorities are the same, a server is - chosen randomly. If no servers at a given priority are responding, - the mail transport agent will fall back to the next largest - priority. - Priority numbers do not have any absolute meaning — they are - relevant - only respective to other MX records for that domain name. The - domain - name given is the machine to which the mail will be delivered. - It must have an associated address record - (A or AAAA) — CNAME is not sufficient. - - - For a given domain, if there is both a CNAME record and an - MX record, the MX record is in error, and will be ignored. - Instead, - the mail will be delivered to the server specified in the MX - record - pointed to by the CNAME. - For example: - - - - - - - - - - - - - example.com. - - - - - IN - - - - - MX - - - - - 10 - - - - - mail.example.com. - - - - - - - - - - IN - - - - - MX - - - - - 10 - - - - - mail2.example.com. - - - - - - - - - - IN - - - - - MX - - - - - 20 - - - - - mail.backup.org. - - - - - - - mail.example.com. - - - - - IN - - - - - A - - - - - 10.0.0.1 - - - - - - - - - - mail2.example.com. - - - - - IN - - - - - A - - - - - 10.0.0.2 - - - - - - - - - - Mail delivery will be attempted to mail.example.com and - mail2.example.com (in - any order), and if neither of those succeed, delivery to mail.backup.org will - be attempted. - -
-
Setting TTLs - - - The time-to-live of the RR field is a 32-bit integer represented - in units of seconds, and is primarily used by resolvers when they - cache RRs. The TTL describes how long a RR can be cached before it - should be discarded. The following three types of TTL are - currently - used in a zone file. - - - - - - - - - - SOA - - - - - The last field in the SOA is the negative - caching TTL. This controls how long other servers will - cache no-such-domain - (NXDOMAIN) responses from you. - - - The maximum time for - negative caching is 3 hours (3h). - - - - - - - $TTL - - - - - The $TTL directive at the top of the - zone file (before the SOA) gives a default TTL for every - RR without - a specific TTL set. - - - - - - - RR TTLs - - - - - Each RR can have a TTL as the second - field in the RR, which will control how long other - servers can cache it. - - - - - - - - All of these TTLs default to units of seconds, though units - can be explicitly specified, for example, 1h30m. - -
-
Inverse Mapping in IPv4 - - - Reverse name resolution (that is, translation from IP address - to name) is achieved by means of the in-addr.arpa domain - and PTR records. Entries in the in-addr.arpa domain are made in - least-to-most significant order, read left to right. This is the - opposite order to the way IP addresses are usually written. Thus, - a machine with an IP address of 10.1.2.3 would have a - corresponding - in-addr.arpa name of - 3.2.1.10.in-addr.arpa. This name should have a PTR resource record - whose data field is the name of the machine or, optionally, - multiple - PTR records if the machine has more than one name. For example, - in the example.com domain: - - - - - - - - - - $ORIGIN - - - - - 2.1.10.in-addr.arpa - - - - - - - 3 - - - - - IN PTR foo.example.com. - - - - - - - - - The $ORIGIN lines in the examples - are for providing context to the examples only — they do not - necessarily - appear in the actual usage. They are only used here to indicate - that the example is relative to the listed origin. - - -
-
Other Zone File Directives - - - The Master File Format was initially defined in RFC 1035 and - has subsequently been extended. While the Master File Format - itself - is class independent all records in a Master File must be of the - same - class. - - - Master File Directives include $ORIGIN, $INCLUDE, - and $TTL. - -
The <command>@</command> (at-sign) - - - When used in the label (or name) field, the asperand or - at-sign (@) symbol represents the current origin. - At the start of the zone file, it is the - <zone_name> (followed by - trailing dot). - -
-
The <command>$ORIGIN</command> Directive - - - Syntax: $ORIGIN - domain-name - comment - - $ORIGIN - sets the domain name that will be appended to any - unqualified records. When a zone is first read in there - is an implicit $ORIGIN - <zone_name>. - (followed by trailing dot). - The current $ORIGIN is appended to - the domain specified in the $ORIGIN - argument if it is not absolute. - - - -$ORIGIN example.com. -WWW CNAME MAIN-SERVER - - - - is equivalent to - - - -WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM. - - -
-
The <command>$INCLUDE</command> Directive - - - Syntax: $INCLUDE - filename - -origin - comment - - - Read and process the file filename as - if it were included into the file at this point. If origin is - specified the file is processed with $ORIGIN set - to that value, otherwise the current $ORIGIN is - used. - - - The origin and the current domain name - revert to the values they had prior to the $INCLUDE once - the file has been read. - - - - RFC 1035 specifies that the current origin should be restored - after - an $INCLUDE, but it is silent - on whether the current - domain name should also be restored. BIND 9 restores both of - them. - This could be construed as a deviation from RFC 1035, a - feature, or both. - - -
-
The <command>$TTL</command> Directive - - - Syntax: $TTL - default-ttl - -comment - - - Set the default Time To Live (TTL) for subsequent records - with undefined TTLs. Valid TTLs are of the range 0-2147483647 - seconds. - - $TTL - is defined in RFC 2308. - -
-
-
<acronym>BIND</acronym> Master File Extension: the <command>$GENERATE</command> Directive - - - Syntax: $GENERATE - range - lhs - ttl - class - type - rhs - comment - - $GENERATE - is used to create a series of resource records that only - differ from each other by an - iterator. $GENERATE can be used to - easily generate the sets of records required to support - sub /24 reverse delegations described in RFC 2317: - Classless IN-ADDR.ARPA delegation. - - -$ORIGIN 0.0.192.IN-ADDR.ARPA. -$GENERATE 1-2 @ NS SERVER$.EXAMPLE. -$GENERATE 1-127 $ CNAME $.0 - - - is equivalent to - - -0.0.0.192.IN-ADDR.ARPA. NS SERVER1.EXAMPLE. -0.0.0.192.IN-ADDR.ARPA. NS SERVER2.EXAMPLE. -1.0.0.192.IN-ADDR.ARPA. CNAME 1.0.0.0.192.IN-ADDR.ARPA. -2.0.0.192.IN-ADDR.ARPA. CNAME 2.0.0.0.192.IN-ADDR.ARPA. -... -127.0.0.192.IN-ADDR.ARPA. CNAME 127.0.0.0.192.IN-ADDR.ARPA. - - - - Generate a set of A and MX records. Note the MX's right hand - side is a quoted string. The quotes will be stripped when the - right hand side is processed. - - - -$ORIGIN EXAMPLE. -$GENERATE 1-127 HOST-$ A 1.2.3.$ -$GENERATE 1-127 HOST-$ MX "0 ." - - - is equivalent to - - -HOST-1.EXAMPLE. A 1.2.3.1 -HOST-1.EXAMPLE. MX 0 . -HOST-2.EXAMPLE. A 1.2.3.2 -HOST-2.EXAMPLE. MX 0 . -HOST-3.EXAMPLE. A 1.2.3.3 -HOST-3.EXAMPLE. MX 0 . -... -HOST-127.EXAMPLE. A 1.2.3.127 -HOST-127.EXAMPLE. MX 0 . - - - - - - - - - - range - - - - This can be one of two forms: start-stop - or start-stop/step. If the first form is used, then step - is set to 1. start, stop and step must be positive - integers between 0 and (2^31)-1. start must not be - larger than stop. - - - - - - lhs - - - This - describes the owner name of the resource records - to be created. Any single $ - (dollar sign) - symbols within the lhs string - are replaced by the iterator value. - - To get a $ in the output, you need to escape the - $ using a backslash - \, - e.g. \$. The - $ may optionally be followed - by modifiers which change the offset from the - iterator, field width and base. - - Modifiers are introduced by a - { (left brace) immediately following the - $ as - ${offset[,width[,base]]}. - For example, ${-20,3,d} - subtracts 20 from the current value, prints the - result as a decimal in a zero-padded field of - width 3. - - Available output forms are decimal - (d), octal - (o), hexadecimal - (x or X - for uppercase) and nibble - (n or N\ - for uppercase). The default modifier is - ${0,0,d}. If the - lhs is not absolute, the - current $ORIGIN is appended - to the name. - - - In nibble mode the value will be treated as - if it was a reversed hexadecimal string - with each hexadecimal digit as a separate - label. The width field includes the label - separator. - - - For compatibility with earlier versions, - $$ is still recognized as - indicating a literal $ in the output. - - - - - - ttl - - - - Specifies the time-to-live of the generated records. If - not specified this will be inherited using the - normal TTL inheritance rules. - - class - and ttl can be - entered in either order. - - - - - - class - - - - Specifies the class of the generated records. - This must match the zone class if it is - specified. - - class - and ttl can be - entered in either order. - - - - - - type - - - - Any valid type. - - - - - - rhs - - - - rhs, optionally, quoted string. - - - - - - - - The $GENERATE directive is a BIND extension - and not part of the standard zone file format. - -
- -
Additional File Formats - - - In addition to the standard textual format, BIND 9 - supports the ability to read or dump to zone files in - other formats. - - - The raw format is - a binary representation of zone data in a manner similar - to that used in zone transfers. Since it does not require - parsing text, load time is significantly reduced. - - - An even faster alternative is the map - format, which is an image of a BIND 9 - in-memory zone database; it is capable of being loaded - directly into memory via the mmap() - function; the zone can begin serving queries almost - immediately. - - - For a primary server, a zone file in - raw or map - format is expected to be generated from a textual zone - file by the named-compilezone command. - For a secondary server or for a dynamic zone, it is automatically - generated (if this format is specified by the - masterfile-format option) when - named dumps the zone contents after - zone transfer or when applying prior updates. - - - If a zone file in a binary format needs manual modification, - it first must be converted to a textual form by the - named-compilezone command. All - necessary modification should go to the text file, which - should then be converted to the binary form by the - named-compilezone command again. - - - Note that map format is extremely - architecture-specific. A map - file cannot be used on a system - with different pointer size, endianness or data alignment - than the system on which it was generated, and should in - general be used only inside a single system. - While raw format uses - network byte order and avoids architecture-dependent - data alignment so that it is as portable as - possible, it is also primarily expected to be used - inside the same single system. To export a - zone file in either raw or - map format, or make a - portable backup of such a file, conversion to - text format is recommended. - -
-
- -
BIND9 Statistics - - - BIND 9 maintains lots of statistics - information and provides several interfaces for users to - get access to the statistics. - The available statistics include all statistics counters - that were available in BIND 8 and - are meaningful in BIND 9, - and other information that is considered useful. - - - - The statistics information is categorized into the following - sections. - - - - - - - - - - - Incoming Requests - - - - The number of incoming DNS requests for each OPCODE. - - - - - - - Incoming Queries - - - - The number of incoming queries for each RR type. - - - - - - - Outgoing Queries - - - - The number of outgoing queries for each RR - type sent from the internal resolver. - Maintained per view. - - - - - - - Name Server Statistics - - - - Statistics counters about incoming request processing. - - - - - - - Zone Maintenance Statistics - - - - Statistics counters regarding zone maintenance - operations such as zone transfers. - - - - - - - Resolver Statistics - - - - Statistics counters about name resolution - performed in the internal resolver. - Maintained per view. - - - - - - - Cache DB RRsets - - - - Statistics counters related to cache contents; - maintained per view. - - - The "NXDOMAIN" counter is the number of names - that have been cached as nonexistent. - Counters named for RR types indicate the - number of active RRsets for each type in the cache - database. - - - If an RR type name is preceded by an exclamation - mark (!), it represents the number of records in the - cache which indicate that the type does not exist - for a particular name (this is also known as "NXRRSET"). - If an RR type name is preceded by a hash mark (#), it - represents the number of RRsets for this type that are - present in the cache but whose TTLs have expired; these - RRsets may only be used if stale answers are enabled. - If an RR type name is preceded by a tilde (~), it - represents the number of RRsets for this type that are - present in the cache database but are marked for garbage - collection; these RRsets cannot be used. - - - - - - - Socket I/O Statistics - - - - Statistics counters about network related events. - - - - - - - - - - A subset of Name Server Statistics is collected and shown - per zone for which the server has the authority when - zone-statistics is set to - full (or yes - for backward compatibility. See the description of - zone-statistics in - for further details. - - - - These statistics counters are shown with their zone and - view names. The view name is omitted when the server is - not configured with explicit views. - - - There are currently two user interfaces to get access to the - statistics. - One is in the plain text format dumped to the file specified - by the statistics-file configuration option. - The other is remotely accessible via a statistics channel - when the statistics-channels statement - is specified in the configuration file - (see .) - - -
The Statistics File - - - The text format statistics dump begins with a line, like: - - - +++ Statistics Dump +++ (973798949) - - - The number in parentheses is a standard - Unix-style timestamp, measured as seconds since January 1, 1970. - - Following - that line is a set of statistics information, which is categorized - as described above. - Each section begins with a line, like: - - - - ++ Name Server Statistics ++ - - - - Each section consists of lines, each containing the statistics - counter value followed by its textual description. - See below for available counters. - For brevity, counters that have a value of 0 are not shown - in the statistics file. - - - - The statistics dump ends with the line where the - number is identical to the number in the beginning line; for example: - - - --- Statistics Dump --- (973798949) - -
- -
Statistics Counters - - - The following tables summarize statistics counters that - BIND 9 provides. - For each row of the tables, the leftmost column is the - abbreviated symbol name of that counter. - These symbols are shown in the statistics information - accessed via an HTTP statistics channel. - The rightmost column gives the description of the counter, - which is also shown in the statistics file - (but, in this document, possibly with slight modification - for better readability). - Additional notes may also be provided in this column. - When a middle column exists between these two columns, - it gives the corresponding counter name of the - BIND 8 statistics, if applicable. - - - - Note: BIND statistics counters are signed 64-bit values on - all platforms except one: 32-bit Windows, where they are - signed 32-bit values. Given that 32-bit values have a - vastly smaller range than 64-bit values, BIND statistics - counters in 32-bit Windows builds overflow significantly - more quickly than on all other platforms. - - -
Name Server Statistics Counters - - - - - - - - - - - Symbol - - - - - BIND8 Symbol - - - - - Description - - - - - - - Requestv4 - - - RQ - - - - IPv4 requests received. - Note: this also counts non query requests. - - - - - - Requestv6 - - - RQ - - - - IPv6 requests received. - Note: this also counts non query requests. - - - - - - ReqEdns0 - - - - - - - Requests with EDNS(0) received. - - - - - - ReqBadEDNSVer - - - - - - - Requests with unsupported EDNS version received. - - - - - - ReqTSIG - - - - - - - Requests with TSIG received. - - - - - - ReqSIG0 - - - - - - - Requests with SIG(0) received. - - - - - - ReqBadSIG - - - - - - - Requests with invalid (TSIG or SIG(0)) signature. - - - - - - ReqTCP - - - RTCP - - - - TCP requests received. - - - - - - AuthQryRej - - - RUQ - - - - Authoritative (non recursive) queries rejected. - - - - - - RecQryRej - - - RURQ - - - - Recursive queries rejected. - - - - - - XfrRej - - - RUXFR - - - - Zone transfer requests rejected. - - - - - - UpdateRej - - - RUUpd - - - - Dynamic update requests rejected. - - - - - - Response - - - SAns - - - - Responses sent. - - - - - - RespTruncated - - - - - - - Truncated responses sent. - - - - - - RespEDNS0 - - - - - - - Responses with EDNS(0) sent. - - - - - - RespTSIG - - - - - - - Responses with TSIG sent. - - - - - - RespSIG0 - - - - - - - Responses with SIG(0) sent. - - - - - - QrySuccess - - - - - - - Queries resulted in a successful answer. - This means the query which returns a NOERROR response - with at least one answer RR. - This corresponds to the - success counter - of previous versions of - BIND 9. - - - - - - QryAuthAns - - - - - - - Queries resulted in authoritative answer. - - - - - - QryNoauthAns - - - SNaAns - - - - Queries resulted in non authoritative answer. - - - - - - QryReferral - - - - - - - Queries resulted in referral answer. - This corresponds to the - referral counter - of previous versions of - BIND 9. - - - - - - QryNxrrset - - - - - - - Queries resulted in NOERROR responses with no data. - This corresponds to the - nxrrset counter - of previous versions of - BIND 9. - - - - - - QrySERVFAIL - - - SFail - - - - Queries resulted in SERVFAIL. - - - - - - QryFORMERR - - - SFErr - - - - Queries resulted in FORMERR. - - - - - - QryNXDOMAIN - - - SNXD - - - - Queries resulted in NXDOMAIN. - This corresponds to the - nxdomain counter - of previous versions of - BIND 9. - - - - - - QryRecursion - - - RFwdQ - - - - Queries which caused the server - to perform recursion in order to find the final answer. - This corresponds to the - recursion counter - of previous versions of - BIND 9. - - - - - - QryDuplicate - - - RDupQ - - - - Queries which the server attempted to - recurse but discovered an existing query with the same - IP address, port, query ID, name, type and class - already being processed. - This corresponds to the - duplicate counter - of previous versions of - BIND 9. - - - - - - QryDropped - - - - - - - Recursive queries for which the server - discovered an excessive number of existing - recursive queries for the same name, type and - class and were subsequently dropped. - This is the number of dropped queries due to - the reason explained with the - clients-per-query - and - max-clients-per-query - options - (see the description about - .) - This corresponds to the - dropped counter - of previous versions of - BIND 9. - - - - - - QryFailure - - - - - - - Other query failures. - This corresponds to the - failure counter - of previous versions of - BIND 9. - Note: this counter is provided mainly for - backward compatibility with the previous versions. - Normally a more fine-grained counters such as - AuthQryRej and - RecQryRej - that would also fall into this counter are provided, - and so this counter would not be of much - interest in practice. - - - - - - QryNXRedir - - - - - - - Queries resulted in NXDOMAIN that were redirected. - - - - - - QryNXRedirRLookup - - - - - - - Queries resulted in NXDOMAIN that were redirected - and resulted in a successful remote lookup. - - - - - - XfrReqDone - - - - - - - Requested zone transfers completed. - - - - - - UpdateReqFwd - - - - - - - Update requests forwarded. - - - - - - UpdateRespFwd - - - - - - - Update responses forwarded. - - - - - - UpdateFwdFail - - - - - - - Dynamic update forward failed. - - - - - - UpdateDone - - - - - - - Dynamic updates completed. - - - - - - UpdateFail - - - - - - - Dynamic updates failed. - - - - - - UpdateBadPrereq - - - - - - - Dynamic updates rejected due to prerequisite failure. - - - - - - RateDropped - - - - - - - Responses dropped by rate limits. - - - - - - RateSlipped - - - - - - - Responses truncated by rate limits. - - - - - - RPZRewrites - - - - - - - Response policy zone rewrites. - - - - - - -
- -
Zone Maintenance Statistics Counters - - - - - - - - - - Symbol - - - - - Description - - - - - - - NotifyOutv4 - - - - IPv4 notifies sent. - - - - - - NotifyOutv6 - - - - IPv6 notifies sent. - - - - - - NotifyInv4 - - - - IPv4 notifies received. - - - - - - NotifyInv6 - - - - IPv6 notifies received. - - - - - - NotifyRej - - - - Incoming notifies rejected. - - - - - - SOAOutv4 - - - - IPv4 SOA queries sent. - - - - - - SOAOutv6 - - - - IPv6 SOA queries sent. - - - - - - AXFRReqv4 - - - - IPv4 AXFR requested. - - - - - - AXFRReqv6 - - - - IPv6 AXFR requested. - - - - - - IXFRReqv4 - - - - IPv4 IXFR requested. - - - - - - IXFRReqv6 - - - - IPv6 IXFR requested. - - - - - - XfrSuccess - - - - Zone transfer requests succeeded. - - - - - - XfrFail - - - - Zone transfer requests failed. - - - - - - -
- -
Resolver Statistics Counters - - - - - - - - - - - Symbol - - - - - BIND8 Symbol - - - - - Description - - - - - - - Queryv4 - - - SFwdQ - - - - IPv4 queries sent. - - - - - - Queryv6 - - - SFwdQ - - - - IPv6 queries sent. - - - - - - Responsev4 - - - RR - - - - IPv4 responses received. - - - - - - Responsev6 - - - RR - - - - IPv6 responses received. - - - - - - NXDOMAIN - - - RNXD - - - - NXDOMAIN received. - - - - - - SERVFAIL - - - RFail - - - - SERVFAIL received. - - - - - - FORMERR - - - RFErr - - - - FORMERR received. - - - - - - OtherError - - - RErr - - - - Other errors received. - - - - - - EDNS0Fail - - - - - - - EDNS(0) query failures. - - - - - - Mismatch - - - RDupR - - - - Mismatch responses received. - The DNS ID, response's source address, - and/or the response's source port does not - match what was expected. - (The port must be 53 or as defined by - the port option.) - This may be an indication of a cache - poisoning attempt. - - - - - - Truncated - - - - - - - Truncated responses received. - - - - - - Lame - - - RLame - - - - Lame delegations received. - - - - - - Retry - - - SDupQ - - - - Query retries performed. - - - - - - QueryAbort - - - - - - - Queries aborted due to quota control. - - - - - - QuerySockFail - - - - - - - Failures in opening query sockets. - One common reason for such failures is a - failure of opening a new socket due to a - limitation on file descriptors. - - - - - - QueryTimeout - - - - - - - Query timeouts. - - - - - - GlueFetchv4 - - - SSysQ - - - - IPv4 NS address fetches invoked. - - - - - - GlueFetchv6 - - - SSysQ - - - - IPv6 NS address fetches invoked. - - - - - - GlueFetchv4Fail - - - - - - - IPv4 NS address fetch failed. - - - - - - GlueFetchv6Fail - - - - - - - IPv6 NS address fetch failed. - - - - - - ValAttempt - - - - - - - DNSSEC validation attempted. - - - - - - ValOk - - - - - - - DNSSEC validation succeeded. - - - - - - ValNegOk - - - - - - - DNSSEC validation on negative information succeeded. - - - - - - ValFail - - - - - - - DNSSEC validation failed. - - - - - - QryRTTnn - - - - - - - Frequency table on round trip times (RTTs) of - queries. - Each nn specifies the corresponding - frequency. - In the sequence of - nn_1, - nn_2, - ..., - nn_m, - the value of nn_i is the - number of queries whose RTTs are between - nn_(i-1) (inclusive) and - nn_i (exclusive) milliseconds. - For the sake of convenience we define - nn_0 to be 0. - The last entry should be represented as - nn_m+, which means the - number of queries whose RTTs are equal to or over - nn_m milliseconds. - - - - - - - -
- -
Socket I/O Statistics Counters - - - Socket I/O statistics counters are defined per socket - types, which are - UDP4 (UDP/IPv4), - UDP6 (UDP/IPv6), - TCP4 (TCP/IPv4), - TCP6 (TCP/IPv6), - Unix (Unix Domain), and - FDwatch (sockets opened outside the - socket module). - In the following table <TYPE> - represents a socket type. - Not all counters are available for all socket types; - exceptions are noted in the description field. - - - - - - - - - - - Symbol - - - - - Description - - - - - - - <TYPE>Open - - - - Sockets opened successfully. - This counter is not applicable to the - FDwatch type. - - - - - - <TYPE>OpenFail - - - - Failures of opening sockets. - This counter is not applicable to the - FDwatch type. - - - - - - <TYPE>Close - - - - Sockets closed. - - - - - - <TYPE>BindFail - - - - Failures of binding sockets. - - - - - - <TYPE>ConnFail - - - - Failures of connecting sockets. - - - - - - <TYPE>Conn - - - - Connections established successfully. - - - - - - <TYPE>AcceptFail - - - - Failures of accepting incoming connection requests. - This counter is not applicable to the - UDP and - FDwatch types. - - - - - - <TYPE>Accept - - - - Incoming connections successfully accepted. - This counter is not applicable to the - UDP and - FDwatch types. - - - - - - <TYPE>SendErr - - - - Errors in socket send operations. - This counter corresponds - to SErr counter of - BIND 8. - - - - - - <TYPE>RecvErr - - - - Errors in socket receive operations. - This includes errors of send operations on a - connected UDP socket notified by an ICMP error - message. - - - - - - -
- -
Compatibility with <emphasis>BIND</emphasis> 8 Counters - - - Most statistics counters that were available - in BIND 8 are also supported in - BIND 9 as shown in the above tables. - Here are notes about other counters that do not appear - in these tables. - - - - - RFwdR,SFwdR - - - These counters are not supported - because BIND 9 does not adopt - the notion of forwarding - as BIND 8 did. - - - - - - RAXFR - - - This counter is accessible in the Incoming Queries section. - - - - - - RIQ - - - This counter is accessible in the Incoming Requests section. - - - - - - ROpts - - - This counter is not supported - because BIND 9 does not care - about IP options in the first place. - - - - -
-
-
- -
- <acronym>BIND</acronym> 9 Security Considerations - -
Access Control Lists - - - Access Control Lists (ACLs) are address match lists that - you can set up and nickname for future use in - allow-notify, allow-query, - allow-query-on, allow-recursion, - blackhole, allow-transfer, - match-clients, etc. - - - Using ACLs allows you to have finer control over who can access - your name server, without cluttering up your config files with huge - lists of IP addresses. - - - It is a good idea to use ACLs, and to - control access to your server. Limiting access to your server by - outside parties can help prevent spoofing and denial of service - (DoS) attacks against your server. - - - ACLs match clients on the basis of up to three characteristics: - 1) The client's IP address; 2) the TSIG or SIG(0) key that was - used to sign the request, if any; and 3) an address prefix - encoded in an EDNS Client Subnet option, if any. - - - Here is an example of ACLs based on client addresses: - - - -// Set up an ACL named "bogusnets" that will block -// RFC1918 space and some reserved space, which is -// commonly used in spoofing attacks. -acl bogusnets { - 0.0.0.0/8; 192.0.2.0/24; 224.0.0.0/3; - 10.0.0.0/8; 172.16.0.0/12; 192.168.0.0/16; -}; - -// Set up an ACL called our-nets. Replace this with the -// real IP numbers. -acl our-nets { x.x.x.x/24; x.x.x.x/21; }; -options { - ... - ... - allow-query { our-nets; }; - allow-recursion { our-nets; }; - ... - blackhole { bogusnets; }; - ... -}; - -zone "example.com" { - type master; - file "m/example.com"; - allow-query { any; }; -}; - - - - This allows authoritative queries for "example.com" from any - address, but recursive queries only from the networks specified - in "our-nets", and no queries at all from the networks - specified in "bogusnets". - - - In addition to network addresses and prefixes, which are - matched against the source address of the DNS request, ACLs - may include elements, which specify the - name of a TSIG or SIG(0) key. - - - When BIND 9 is built with GeoIP support, - ACLs can also be used for geographic access restrictions. - This is done by specifying an ACL element of the form: - geoip db database field value - - - The field indicates which field - to search for a match. Available fields are "country", - "region", "city", "continent", "postal" (postal code), - "metro" (metro code), "area" (area code), "tz" (timezone), - "isp", "asnum", and "domain". - - - value is the value to search - for within the database. A string may be quoted if it - contains spaces or other special characters. An "asnum" - search for autonomous system number can be specified using - the string "ASNNNN" or the integer NNNN. - When "country" search is specified with a string is two - characters long, then it must be a standard ISO-3166-1 - two-letter country code; otherwise it is interpreted as - the full name of the country. Similarly, if this is a - "region" search and the string is two characters long, - then it treated as a standard two-letter state or province - abbreviation; otherwise it treated as the full name of the - state or province. - - - The database field indicates which - GeoIP database to search for a match. In most cases this is - unnecessary, because most search fields can only be found in - a single database. However, searches for "continent" or "country" - can be answered from either the "city" or "country" databases, - so for these search types, specifying a - database - will force the query to be answered from that database and no - other. If database is not - specified, then these queries will be answered from the "city", - database if it is installed, or the "country" database if it - is installed, in that order. Valid database names are - "country", "city", "asnum", "isp", and "domain". - - - Some example GeoIP ACLs: - - geoip country US; -geoip country JP; -geoip db country country Canada; -geoip region WA; -geoip city "San Francisco"; -geoip region Oklahoma; -geoip postal 95062; -geoip tz "America/Los_Angeles"; -geoip org "Internet Systems Consortium"; - - - - ACLs use a "first-match" logic rather than "best-match": - if an address prefix matches an ACL element, then that ACL - is considered to have matched even if a later element would - have matched more specifically. For example, the ACL - { 10/8; !10.0.0.1; } would actually - match a query from 10.0.0.1, because the first element - indicated that the query should be accepted, and the second - element is ignored. - - - When using "nested" ACLs (that is, ACLs included or referenced - within other ACLs), a negative match of a nested ACL will - the containing ACL to continue looking for matches. This - enables complex ACLs to be constructed, in which multiple - client characteristics can be checked at the same time. For - example, to construct an ACL which allows queries only when - it originates from a particular network and - only when it is signed with a particular key, use: - - -allow-query { !{ !10/8; any; }; key example; }; - - - Within the nested ACL, any address that is - not in the 10/8 network prefix will - be rejected, and this will terminate processing of the - ACL. Any address that is in the 10/8 - network prefix will be accepted, but this causes a negative - match of the nested ACL, so the containing ACL continues - processing. The query will then be accepted if it is signed - by the key "example", and rejected otherwise. The ACL, then, - will only matches when both conditions - are true. - -
- -
<command>Chroot</command> and <command>Setuid</command> - - - On UNIX servers, it is possible to run BIND - in a chrooted environment (using - the chroot() function) by specifying - the option for named. - This can help improve system security by placing - BIND in a "sandbox", which will limit - the damage done if a server is compromised. - - - Another useful feature in the UNIX version of BIND is the - ability to run the daemon as an unprivileged user ( user ). - We suggest running as an unprivileged user when using the chroot feature. - - - Here is an example command line to load BIND in a chroot sandbox, - /var/named, and to run named setuid to - user 202: - - - /usr/local/sbin/named -u 202 -t /var/named - - -
The <command>chroot</command> Environment - - - In order for a chroot environment - to work properly in a particular directory (for example, - /var/named), you will need to set - up an environment that includes everything - BIND needs to run. From - BIND's point of view, - /var/named is the root of the - filesystem. You will need to adjust the values of - options like directory and - pid-file to account for this. - - - Unlike with earlier versions of BIND, you typically will - not need to compile named - statically nor install shared libraries under the new root. - However, depending on your operating system, you may need - to set up things like - /dev/zero, - /dev/random, - /dev/log, and - /etc/localtime. - -
- -
Using the <command>setuid</command> Function - - - Prior to running the named daemon, - use - the touch utility (to change file - access and - modification times) or the chown - utility (to - set the user id and/or group id) on files - to which you want BIND - to write. - - - If the named daemon is running as an - unprivileged user, it will not be able to bind to new restricted - ports if the server is reloaded. - -
-
- -
Dynamic Update Security - - - Access to the dynamic - update facility should be strictly limited. In earlier versions of - BIND, the only way to do this was - based on the IP - address of the host requesting the update, by listing an IP address - or - network prefix in the allow-update - zone option. - This method is insecure since the source address of the update UDP - packet - is easily forged. Also note that if the IP addresses allowed by the - allow-update option include the - address of a slave - server which performs forwarding of dynamic updates, the master can - be - trivially attacked by sending the update to the slave, which will - forward it to the master with its own source IP address causing the - master to approve it without question. - - - - For these reasons, we strongly recommend that updates be - cryptographically authenticated by means of transaction signatures - (TSIG). That is, the allow-update - option should - list only TSIG key names, not IP addresses or network - prefixes. Alternatively, the new update-policy - option can be used. - - - - Some sites choose to keep all dynamically-updated DNS data - in a subdomain and delegate that subdomain to a separate zone. This - way, the top-level zone containing critical data such as the IP - addresses - of public web and mail servers need not allow dynamic update at - all. - - -
-
- - Troubleshooting - -
Common Problems - -
It's not working; how can I figure out what's wrong? - - - The best solution to solving installation and - configuration issues is to take preventative measures by setting - up logging files beforehand. The log files provide a - source of hints and information that can be used to figure out - what went wrong and how to fix the problem. - -
- -
EDNS compliance issues - - EDNS (Extended DNS) is a standard that was first specified - in 1999. It is required for DNSSEC validation, DNS COOKIE - options, and other features. There are broken and outdated - DNS servers and firewalls still in use which misbehave when - queried with EDNS; for example, they may drop EDNS queries - rather than replying with FORMERR. BIND and other recursive - name servers have traditionally employed workarounds in this - situation, retrying queries in different ways and eventually - falling back to plain DNS queries without EDNS. - - - Such workarounds cause unnecessary resolution delays, - increase code complexity, and prevent deployment of new DNS - features. As of February 2019, all major DNS software vendors - have agreed to remove these workarounds; see - https://dnsflagday.net - for further details. This change was implemented in BIND - as of release 9.14.0. - - - As a result, some domains may be non-resolvable without manual - intervention. In these cases, resolution can be restored by - adding server clauses for the offending - servers, specifying edns no or - send-cookie no, depending on the specific - noncompliance. - - - To determine which server clause to use, - run the following commands to send queries to the authoritative - servers for the broken domain: - - - dig soa <zone> @<server> +dnssec - dig soa <zone> @<server> +dnssec +nocookie - dig soa <zone> @<server> +noedns - - - If the first command fails but the second succeeds, the - server most likely needs send-cookie no. - If the first two fail but the third succeeds, then the server - needs EDNS to be fully disabled with edns no. - - - Please contact the administrators of noncompliant domains - and encourage them to upgrade their broken DNS servers. - -
-
-
Incrementing and Changing the Serial Number - - - Zone serial numbers are just numbers — they aren't - date related. A lot of people set them to a number that - represents a date, usually of the form YYYYMMDDRR. - Occasionally they will make a mistake and set them to a - "date in the future" then try to correct them by setting - them to the "current date". This causes problems because - serial numbers are used to indicate that a zone has been - updated. If the serial number on the slave server is - lower than the serial number on the master, the slave - server will attempt to update its copy of the zone. - - - - Setting the serial number to a lower number on the master - server than the slave server means that the slave will not perform - updates to its copy of the zone. - - - - The solution to this is to add 2147483647 (2^31-1) to the - number, reload the zone and make sure all slaves have updated to - the new zone serial number, then reset the number to what you want - it to be, and reload the zone again. - - -
-
Where Can I Get Help? - - - The Internet Systems Consortium - (ISC) offers a wide range - of support and service agreements for BIND and DHCP servers. Four - levels of premium support are available and each level includes - support for all ISC programs, - significant discounts on products - and training, and a recognized priority on bug fixes and - non-funded feature requests. In addition, ISC offers a standard - support agreement package which includes services ranging from bug - fix announcements to remote support. It also includes training in - BIND and DHCP. - - - - To discuss arrangements for support, contact - info@isc.org or visit the - ISC web page at - http://www.isc.org/services/support/ - to read more. - -
-
- - Release Notes - - - - A Brief History of the <acronym>DNS</acronym> and <acronym>BIND</acronym> - - Although the "official" beginning of the Domain Name - System occurred in 1984 with the publication of RFC 920, the - core of the new system was described in 1983 in RFCs 882 and - 883. From 1984 to 1987, the ARPAnet (the precursor to today's - Internet) became a testbed of experimentation for developing the - new naming/addressing scheme in a rapidly expanding, - operational network environment. New RFCs were written and - published in 1987 that modified the original documents to - incorporate improvements based on the working model. RFC 1034, - "Domain Names-Concepts and Facilities", and RFC 1035, "Domain - Names-Implementation and Specification" were published and - became the standards upon which all DNS implementations are - built. - - - - The first working domain name server, called "Jeeves", was - written in 1983-84 by Paul Mockapetris for operation on DEC - Tops-20 - machines located at the University of Southern California's - Information - Sciences Institute (USC-ISI) and SRI International's Network - Information - Center (SRI-NIC). A DNS server for - Unix machines, the Berkeley Internet - Name Domain (BIND) package, was - written soon after by a group of - graduate students at the University of California at Berkeley - under - a grant from the US Defense Advanced Research Projects - Administration - (DARPA). - - - Versions of BIND through - 4.8.3 were maintained by the Computer - Systems Research Group (CSRG) at UC Berkeley. Douglas Terry, Mark - Painter, David Riggle and Songnian Zhou made up the initial BIND - project team. After that, additional work on the software package - was done by Ralph Campbell. Kevin Dunlap, a Digital Equipment - Corporation - employee on loan to the CSRG, worked on BIND for 2 years, from 1985 - to 1987. Many other people also contributed to BIND development - during that time: Doug Kingston, Craig Partridge, Smoot - Carl-Mitchell, - Mike Muuss, Jim Bloom and Mike Schwartz. BIND maintenance was subsequently - handled by Mike Karels and Øivind Kure. - - - BIND versions 4.9 and 4.9.1 were - released by Digital Equipment - Corporation (now Compaq Computer Corporation). Paul Vixie, then - a DEC employee, became BIND's - primary caretaker. He was assisted - by Phil Almquist, Robert Elz, Alan Barrett, Paul Albitz, Bryan - Beecher, Andrew - Partan, Andy Cherenson, Tom Limoncelli, Berthold Paffrath, Fuat - Baran, Anant Kumar, Art Harkin, Win Treese, Don Lewis, Christophe - Wolfhugel, and others. - - - In 1994, BIND version 4.9.2 was sponsored by - Vixie Enterprises. Paul - Vixie became BIND's principal - architect/programmer. - - - BIND versions from 4.9.3 onward - have been developed and maintained - by the Internet Systems Consortium and its predecessor, - the Internet Software Consortium, with support being provided - by ISC's sponsors. - - - As co-architects/programmers, Bob Halley and - Paul Vixie released the first production-ready version of - BIND version 8 in May 1997. - - - BIND version 9 was released in September 2000 and is a - major rewrite of nearly all aspects of the underlying - BIND architecture. - - - BIND versions 4 and 8 are officially deprecated. - No additional development is done - on BIND version 4 or BIND version 8. - - - BIND development work is made - possible today by the sponsorship - of several corporations, and by the tireless work efforts of - numerous individuals. - - - - General <acronym>DNS</acronym> Reference Information - -
IPv6 addresses (AAAA) - - - IPv6 addresses are 128-bit identifiers for interfaces and - sets of interfaces which were introduced in the DNS to facilitate - scalable Internet routing. There are three types of addresses: Unicast, - an identifier for a single interface; - Anycast, - an identifier for a set of interfaces; and Multicast, - an identifier for a set of interfaces. Here we describe the global - Unicast address scheme. For more information, see RFC 3587, - "Global Unicast Address Format." - - - IPv6 unicast addresses consist of a - global routing prefix, a - subnet identifier, and an - interface identifier. - - - The global routing prefix is provided by the - upstream provider or ISP, and (roughly) corresponds to the - IPv4 network section - of the address range. - - The subnet identifier is for local subnetting, much the - same as subnetting an - IPv4 /16 network into /24 subnets. - - The interface identifier is the address of an individual - interface on a given network; in IPv6, addresses belong to - interfaces rather than to machines. - - - The subnetting capability of IPv6 is much more flexible than - that of IPv4: subnetting can be carried out on bit boundaries, - in much the same way as Classless InterDomain Routing - (CIDR), and the DNS PTR representation ("nibble" format) - makes setting up reverse zones easier. - - - The Interface Identifier must be unique on the local link, - and is usually generated automatically by the IPv6 - implementation, although it is usually possible to - override the default setting if necessary. A typical IPv6 - address might look like: - 2001:db8:201:9:a00:20ff:fe81:2b32 - - - IPv6 address specifications often contain long strings - of zeros, so the architects have included a shorthand for - specifying - them. The double colon (`::') indicates the longest possible - string - of zeros that can fit, and can be used only once in an address. - -
-
Bibliography (and Suggested Reading) - -
Request for Comments (RFCs) - - - Specification documents for the Internet protocol suite, including - the DNS, are published as part of - the Request for Comments (RFCs) - series of technical notes. The standards themselves are defined - by the Internet Engineering Task Force (IETF) and the Internet - Engineering Steering Group (IESG). RFCs can be obtained online via FTP at: - - - - ftp://www.isi.edu/in-notes/RFCxxxx.txt - - - - (where xxxx is - the number of the RFC). RFCs are also available via the Web at: - - - http://www.ietf.org/rfc/. - - - <bibliodiv><title>Standards - - - - RFC974 - PartridgeC. - Mail Routing and the Domain System - January 1986 - - - RFC1034 - MockapetrisP.V. - Domain Names — Concepts and Facilities - November 1987 - - - RFC1035 - MockapetrisP. V. Domain Names — Implementation and - Specification - November 1987 - - - Proposed Standards - - - - RFC2181 - ElzR., R. Bush - Clarifications to the <acronym>DNS</acronym> - Specification - July 1997 - - - RFC2308 - AndrewsM. - Negative Caching of <acronym>DNS</acronym> - Queries - March 1998 - - - RFC1995 - OhtaM. - Incremental Zone Transfer in <acronym>DNS</acronym> - August 1996 - - - RFC1996 - VixieP. - A Mechanism for Prompt Notification of Zone Changes - August 1996 - - - RFC2136 - - VixieP. - S.Thomson - Y.Rekhter - J.Bound - - Dynamic Updates in the Domain Name System - April 1997 - - - RFC2671 - - P.Vixie - - Extension Mechanisms for DNS (EDNS0) - August 1997 - - - RFC2672 - - M.Crawford - - Non-Terminal DNS Name Redirection - August 1999 - - - RFC2845 - - VixieP. - O.Gudmundsson - D.Eastlake3rd - B.Wellington - - Secret Key Transaction Authentication for <acronym>DNS</acronym> (TSIG) - May 2000 - - - RFC2930 - - D.Eastlake3rd - - Secret Key Establishment for DNS (TKEY RR) - September 2000 - - - RFC2931 - - D.Eastlake3rd - - DNS Request and Transaction Signatures (SIG(0)s) - September 2000 - - - RFC3007 - - B.Wellington - - Secure Domain Name System (DNS) Dynamic Update - November 2000 - - - RFC3645 - - S.Kwan - P.Garg - J.Gilroy - L.Esibov - J.Westhead - R.Hall - - Generic Security Service Algorithm for Secret - Key Transaction Authentication for DNS - (GSS-TSIG) - October 2003 - - - <acronym>DNS</acronym> Security Proposed Standards - - - RFC3225 - - D.Conrad - - Indicating Resolver Support of DNSSEC - December 2001 - - - RFC3833 - - D.Atkins - R.Austein - - Threat Analysis of the Domain Name System (DNS) - August 2004 - - - RFC4033 - - R.Arends - R.Austein - M.Larson - D.Massey - S.Rose - - DNS Security Introduction and Requirements - March 2005 - - - RFC4034 - - R.Arends - R.Austein - M.Larson - D.Massey - S.Rose - - Resource Records for the DNS Security Extensions - March 2005 - - - RFC4035 - - R.Arends - R.Austein - M.Larson - D.Massey - S.Rose - - Protocol Modifications for the DNS - Security Extensions - March 2005 - - - Other Important RFCs About <acronym>DNS</acronym> - Implementation - - - RFC1535 - GavronE. - A Security Problem and Proposed Correction With Widely - Deployed <acronym>DNS</acronym> Software - October 1993 - - - RFC1536 - - KumarA. - J.Postel - C.Neuman - P.Danzig - S.Miller - - Common <acronym>DNS</acronym> Implementation - Errors and Suggested Fixes - October 1993 - - - RFC1982 - - ElzR. - R.Bush - - Serial Number Arithmetic - August 1996 - - - RFC4074 - - MorishitaY. - T.Jinmei - - Common Misbehaviour Against <acronym>DNS</acronym> - Queries for IPv6 Addresses - May 2005 - - - Resource Record Types - - - RFC1183 - - EverhartC.F. - L. A.Mamakos - R.Ullmann - P.Mockapetris - - New <acronym>DNS</acronym> RR Definitions - October 1990 - - - RFC1706 - - ManningB. - R.Colella - - <acronym>DNS</acronym> NSAP Resource Records - October 1994 - - - RFC2168 - - DanielR. - M.Mealling - - Resolution of Uniform Resource Identifiers using - the Domain Name System - June 1997 - - - RFC1876 - - DavisC. - P.Vixie - T.Goodwin - I.Dickinson - - A Means for Expressing Location Information in the - Domain - Name System - January 1996 - - - RFC2052 - - GulbrandsenA. - P.Vixie - - A <acronym>DNS</acronym> RR for Specifying the - Location of - Services - October 1996 - - - RFC2163 - AllocchioA. - Using the Internet <acronym>DNS</acronym> to - Distribute MIXER - Conformant Global Address Mapping - January 1998 - - - RFC2230 - AtkinsonR. - Key Exchange Delegation Record for the <acronym>DNS</acronym> - October 1997 - - - RFC2536 - EastlakeD.3rd - DSA KEYs and SIGs in the Domain Name System (DNS) - March 1999 - - - RFC2537 - EastlakeD.3rd - RSA/MD5 KEYs and SIGs in the Domain Name System (DNS) - March 1999 - - - RFC2538 - - EastlakeD.3rd - GudmundssonO. - - Storing Certificates in the Domain Name System (DNS) - March 1999 - - - RFC2539 - - EastlakeD.3rd - - Storage of Diffie-Hellman Keys in the Domain Name System (DNS) - March 1999 - - - RFC2540 - - EastlakeD.3rd - - Detached Domain Name System (DNS) Information - March 1999 - - - RFC2782 - GulbrandsenA. - VixieP. - EsibovL. - A DNS RR for specifying the location of services (DNS SRV) - February 2000 - - - RFC2915 - MeallingM. - DanielR. - The Naming Authority Pointer (NAPTR) DNS Resource Record - September 2000 - - - RFC3110 - EastlakeD.3rd - RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS) - May 2001 - - - RFC3123 - KochP. - A DNS RR Type for Lists of Address Prefixes (APL RR) - June 2001 - - - RFC3596 - - ThomsonS. - C.Huitema - V.Ksinant - M.Souissi - - <acronym>DNS</acronym> Extensions to support IP - version 6 - October 2003 - - - RFC3597 - GustafssonA. - Handling of Unknown DNS Resource Record (RR) Types - September 2003 - - - <acronym>DNS</acronym> and the Internet - - - RFC1101 - MockapetrisP. V. - <acronym>DNS</acronym> Encoding of Network Names - and Other Types - April 1989 - - - RFC1123 - BradenR. - Requirements for Internet Hosts - Application and - Support - October 1989 - - - RFC1591 - PostelJ. - Domain Name System Structure and Delegation - March 1994 - - - RFC2317 - - EidnesH. - G.de Groot - P.Vixie - - Classless IN-ADDR.ARPA Delegation - March 1998 - - - RFC2826 - - Internet Architecture Board - - IAB Technical Comment on the Unique DNS Root - May 2000 - - - RFC2929 - - EastlakeD.3rd - Brunner-WilliamsE. - ManningB. - - Domain Name System (DNS) IANA Considerations - September 2000 - - - <acronym>DNS</acronym> Operations - - - RFC1033 - LottorM. - Domain administrators operations guide - November 1987 - - - RFC1537 - BeertemaP. - Common <acronym>DNS</acronym> Data File - Configuration Errors - October 1993 - - - RFC1912 - BarrD. - Common <acronym>DNS</acronym> Operational and - Configuration Errors - February 1996 - - - RFC2010 - - ManningB. - P.Vixie - - Operational Criteria for Root Name Servers - October 1996 - - - RFC2219 - - HamiltonM. - R.Wright - - Use of <acronym>DNS</acronym> Aliases for - Network Services - October 1997 - - - Internationalized Domain Names - - - RFC2825 - - IAB - DaigleR. - - A Tangled Web: Issues of I18N, Domain Names, - and the Other Internet protocols - May 2000 - - - RFC3490 - - FaltstromP. - HoffmanP. - CostelloA. - - Internationalizing Domain Names in Applications (IDNA) - March 2003 - - - RFC3491 - - HoffmanP. - BlanchetM. - - Nameprep: A Stringprep Profile for Internationalized Domain Names - March 2003 - - - RFC3492 - - CostelloA. - - Punycode: A Bootstring encoding of Unicode - for Internationalized Domain Names in - Applications (IDNA) - March 2003 - - - Other <acronym>DNS</acronym>-related RFCs - - - - Note: the following list of RFCs, although - DNS-related, are not - concerned with implementing software. - - - - RFC1464 - RosenbaumR. - Using the Domain Name System To Store Arbitrary String - Attributes - May 1993 - - - RFC1713 - RomaoA. - Tools for <acronym>DNS</acronym> Debugging - November 1994 - - - RFC1794 - BriscoT. - <acronym>DNS</acronym> Support for Load - Balancing - April 1995 - - - RFC2240 - VaughanO. - A Legal Basis for Domain Name Allocation - November 1997 - - - RFC2345 - - KlensinJ. - T.Wolf - G.Oglesby - - Domain Names and Company Name Retrieval - May 1998 - - - RFC2352 - VaughanO. - A Convention For Using Legal Names as Domain Names - May 1998 - - - RFC3071 - - KlensinJ. - - Reflections on the DNS, RFC 1591, and Categories of Domains - February 2001 - - - RFC3258 - - HardieT. - - Distributing Authoritative Name Servers via - Shared Unicast Addresses - April 2002 - - - RFC3901 - - DurandA. - J.Ihren - - DNS IPv6 Transport Operational Guidelines - September 2004 - - - Obsolete and Unimplemented Experimental RFC - - - RFC1712 - - FarrellC. - M.Schulze - S.Pleitner - D.Baldoni - - <acronym>DNS</acronym> Encoding of Geographical - Location - November 1994 - - - RFC2673 - - CrawfordM. - - Binary Labels in the Domain Name System - August 1999 - - - RFC2874 - - CrawfordM. - HuitemaC. - - DNS Extensions to Support IPv6 Address Aggregation - and Renumbering - July 2000 - - - Obsoleted DNS Security RFCs - - - - Most of these have been consolidated into RFC4033, - RFC4034 and RFC4035 which collectively describe DNSSECbis. - - - - RFC2065 - - Eastlake3rdD. - C.Kaufman - - Domain Name System Security Extensions - January 1997 - - - RFC2137 - Eastlake3rdD. - Secure Domain Name System Dynamic Update - April 1997 - - - RFC2535 - - Eastlake3rdD. - - Domain Name System Security Extensions - March 1999 - - - RFC3008 - - WellingtonB. - - Domain Name System Security (DNSSEC) - Signing Authority - November 2000 - - - RFC3090 - - LewisE. - - DNS Security Extension Clarification on Zone Status - March 2001 - - - RFC3445 - - MasseyD. - RoseS. - - Limiting the Scope of the KEY Resource Record (RR) - December 2002 - - - RFC3655 - - WellingtonB. - GudmundssonO. - - Redefinition of DNS Authenticated Data (AD) bit - November 2003 - - - RFC3658 - - GudmundssonO. - - Delegation Signer (DS) Resource Record (RR) - December 2003 - - - RFC3755 - - WeilerS. - - Legacy Resolver Compatibility for Delegation Signer (DS) - May 2004 - - - RFC3757 - - KolkmanO. - SchlyterJ. - LewisE. - - Domain Name System KEY (DNSKEY) Resource Record - (RR) Secure Entry Point (SEP) Flag - April 2004 - - - RFC3845 - - SchlyterJ. - - DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format - August 2004 - - - -
-
Internet Drafts - - - Internet Drafts (IDs) are rough-draft working documents of - the Internet Engineering Task Force. They are, in essence, RFCs - in the preliminary stages of development. Implementors are - cautioned not - to regard IDs as archival, and they should not be quoted or cited - in any formal documents unless accompanied by the disclaimer that - they are "works in progress." IDs have a lifespan of six months - after which they are deleted unless updated by their authors. - -
-
Other Documents About <acronym>BIND</acronym> - - - - <biblioentry> - <authorgroup> - <author><personname><surname>Albitz</surname><firstname>Paul</firstname></personname></author> - <author><personname><firstname>Cricket</firstname><surname>Liu</surname></personname></author> - </authorgroup> - <title><acronym>DNS</acronym> and <acronym>BIND</acronym> - - 1998 - Sebastopol, CA: O'Reilly and Associates - - - -
-
-
- - BIND 9 DNS Library Support - - - - Manual pages - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
diff --git a/doc/arm/Bv9ARM.ch01.html b/doc/arm/Bv9ARM.ch01.html deleted file mode 100644 index edb5d11c84..0000000000 --- a/doc/arm/Bv9ARM.ch01.html +++ /dev/null @@ -1,619 +0,0 @@ - - - - - -Chapter 1. Introduction - - - - - - - - -
-

-Chapter 1. Introduction

- - -

- The Internet Domain Name System (DNS) - consists of the syntax - to specify the names of entities in the Internet in a hierarchical - manner, the rules used for delegating authority over names, and the - system implementation that actually maps names to Internet - addresses. DNS data is maintained in a - group of distributed - hierarchical databases. -

- -
-

-Scope of Document

- -

- The Berkeley Internet Name Domain - (BIND) implements a - domain name server for a number of operating systems. This - document provides basic information about the installation and - care of the Internet Systems Consortium (ISC) - BIND version 9 software package for - system administrators. -

-

This version of the manual corresponds to BIND version 9.17.

-
- -
-

-Organization of This Document

- -

- In this document, Chapter 1 introduces - the basic DNS and BIND concepts. Chapter 2 - describes resource requirements for running BIND in various - environments. Information in Chapter 3 is - task-oriented in its presentation and is - organized functionally, to aid in the process of installing the - BIND 9 software. The task-oriented - section is followed by - Chapter 4, which contains more advanced - concepts that the system administrator may need for implementing - certain options. The contents of Chapter 5 are - organized as in a reference manual to aid in the ongoing - maintenance of the software. Chapter 6 addresses - security considerations, and - Chapter 7 contains troubleshooting help. The - main body of the document is followed by several - appendices which contain useful reference - information, such as a bibliography and - historic information related to BIND - and the Domain Name - System. -

-
-
-

-Conventions Used in This Document

- -

- In this document, we use the following general typographic - conventions: -

- -
- ---- - - - - - - - - - - - - - - - - - - -
-

- To describe: -

-
-

- We use the style: -

-
-

- a pathname, filename, URL, hostname, - mailing list name, or new term or concept -

-
-

- Fixed width -

-
-

- literal user - input -

-
-

- Fixed Width Bold -

-
-

- program output -

-
-

- Fixed Width -

-
-
- -

- The following conventions are used in descriptions of the - BIND configuration file:

-
- ---- - - - - - - - - - - - - - - - - - - -
-

- To describe: -

-
-

- We use the style: -

-
-

- keywords -

-
-

- Fixed Width -

-
-

- variables -

-
-

- Fixed Width -

-
-

- Optional input -

-
-

- [Text is enclosed in square brackets] -

-
-
-

-

-
-
-

-The Domain Name System (DNS)

- -

- The purpose of this document is to explain the installation - and upkeep of the BIND (Berkeley Internet - Name Domain) software package, and we - begin by reviewing the fundamentals of the Domain Name System - (DNS) as they relate to BIND. -

- -
-

-DNS Fundamentals

- -

- The Domain Name System (DNS) is a hierarchical, distributed - database. It stores information for mapping Internet host names to - IP - addresses and vice versa, mail routing information, and other data - used by Internet applications. -

- -

- Clients look up information in the DNS by calling a - resolver library, which sends queries to one or - more name servers and interprets the responses. - The BIND 9 software distribution - contains a name server, named, and a set - of associated tools. -

- -
-
-

-Domains and Domain Names

- -

- The data stored in the DNS is identified by domain names that are organized as a tree according to - organizational or administrative boundaries. Each node of the tree, - called a domain, is given a label. The domain - name of the - node is the concatenation of all the labels on the path from the - node to the root node. This is represented - in written form as a string of labels listed from right to left and - separated by dots. A label need only be unique within its parent - domain. -

- -

- For example, a domain name for a host at the - company Example, Inc. could be - ourhost.example.com, - where com is the - top level domain to which - ourhost.example.com belongs, - example is - a subdomain of com, and - ourhost is the - name of the host. -

- -

- For administrative purposes, the name space is partitioned into - areas called zones, each starting at a node and - extending down to the leaf nodes or to nodes where other zones - start. - The data for each zone is stored in a name server, which answers queries about the zone using the - DNS protocol. -

- -

- The data associated with each domain name is stored in the - form of resource records (RRs). - Some of the supported resource record types are described in - the section called “Types of Resource Records and When to Use Them”. -

- -

- For more detailed information about the design of the DNS and - the DNS protocol, please refer to the standards documents listed in - the section called “Request for Comments (RFCs)”. -

-
- -
-

-Zones

- -

- To properly operate a name server, it is important to understand - the difference between a zone - and a domain. -

- -

- As stated previously, a zone is a point of delegation in - the DNS tree. A zone consists of - those contiguous parts of the domain - tree for which a name server has complete information and over which - it has authority. It contains all domain names from a certain point - downward in the domain tree except those which are delegated to - other zones. A delegation point is marked by one or more - NS records in the - parent zone, which should be matched by equivalent NS records at - the root of the delegated zone. -

- -

- For instance, consider the example.com - domain which includes names - such as host.aaa.example.com and - host.bbb.example.com even though - the example.com zone includes - only delegations for the aaa.example.com and - bbb.example.com zones. A zone can - map - exactly to a single domain, but could also include only part of a - domain, the rest of which could be delegated to other - name servers. Every name in the DNS - tree is a - domain, even if it is - terminal, that is, has no - subdomains. Every subdomain is a domain and - every domain except the root is also a subdomain. The terminology is - not intuitive and we suggest that you read RFCs 1033, 1034 and 1035 - to - gain a complete understanding of this difficult and subtle - topic. -

- -

- Though BIND is called a "domain name - server", - it deals primarily in terms of zones. The master and slave - declarations in the named.conf file - specify - zones, not domains. When you ask some other site if it is willing to - be a slave server for your domain, you are - actually asking for slave service for some collection of zones. -

-
- -
-

-Authoritative Name Servers

- -

- Each zone is served by at least - one authoritative name server, - which contains the complete data for the zone. - To make the DNS tolerant of server and network failures, - most zones have two or more authoritative servers, on - different networks. -

- -

- Responses from authoritative servers have the "authoritative - answer" (AA) bit set in the response packets. This makes them - easy to identify when debugging DNS configurations using tools like - dig (the section called “Diagnostic Tools”). -

- -
-

-The Primary Master

- -

- The authoritative server where the master copy of the zone - data is maintained is called the - primary master server, or simply the - primary. Typically it loads the zone - contents from some local file edited by humans or perhaps - generated mechanically from some other local file which is - edited by humans. This file is called the - zone file or - master file. -

- -

- In some cases, however, the master file may not be edited - by humans at all, but may instead be the result of - dynamic update operations. -

-
- -
-

-Slave Servers

- -

- The other authoritative servers, the slave - servers (also known as secondary servers) - load the zone contents from another server using a replication - process known as a zone transfer. - Typically the data are transferred directly from the primary - master, but it is also possible to transfer it from another - slave. In other words, a slave server may itself act as a - master to a subordinate slave server. -

-

- Periodically, the slave server must send a refresh query to - determine whether the zone contents have been updated. This - is done by sending a query for the zone's SOA record and - checking whether the SERIAL field has been updated; if so, - a new transfer request is initiated. The timing of these - refresh queries is controlled by the SOA REFRESH and RETRY - fields, but can be overridden with the - max-refresh-time, - min-refresh-time, - max-retry-time, and - min-retry-time options. -

-

- If the zone data cannot be updated within the time specified - by the SOA EXPIRE option (up to a hard-coded maximum of - 24 weeks) then the slave zone expires and will no longer - respond to queries. -

-
- -
-

-Stealth Servers

- -

- Usually all of the zone's authoritative servers are listed in - NS records in the parent zone. These NS records constitute - a delegation of the zone from the parent. - The authoritative servers are also listed in the zone file itself, - at the top level or apex - of the zone. You can list servers in the zone's top-level NS - records that are not in the parent's NS delegation, but you cannot - list servers in the parent's delegation that are not present at - the zone's top level. -

- -

- A stealth server is a server that is - authoritative for a zone but is not listed in that zone's NS - records. Stealth servers can be used for keeping a local copy of - a - zone to speed up access to the zone's records or to make sure that - the - zone is available even if all the "official" servers for the zone - are - inaccessible. -

- -

- A configuration where the primary master server itself is a - stealth server is often referred to as a "hidden primary" - configuration. One use for this configuration is when the primary - master - is behind a firewall and therefore unable to communicate directly - with the outside world. -

- -
- -
-
-

-Caching Name Servers

- - - -

- The resolver libraries provided by most operating systems are - stub resolvers, meaning that they are not - capable of - performing the full DNS resolution process by themselves by talking - directly to the authoritative servers. Instead, they rely on a - local - name server to perform the resolution on their behalf. Such a - server - is called a recursive name server; it performs - recursive lookups for local clients. -

- -

- To improve performance, recursive servers cache the results of - the lookups they perform. Since the processes of recursion and - caching are intimately connected, the terms - recursive server and - caching server are often used synonymously. -

- -

- The length of time for which a record may be retained in - the cache of a caching name server is controlled by the - Time To Live (TTL) field associated with each resource record. -

- -
-

-Forwarding

- -

- Even a caching name server does not necessarily perform - the complete recursive lookup itself. Instead, it can - forward some or all of the queries - that it cannot satisfy from its cache to another caching name - server, - commonly referred to as a forwarder. -

- -

- There may be one or more forwarders, - and they are queried in turn until the list is exhausted or an - answer - is found. Forwarders are typically used when you do not - wish all the servers at a given site to interact directly with the - rest of - the Internet servers. A typical scenario would involve a number - of internal DNS servers and an - Internet firewall. Servers unable - to pass packets through the firewall would forward to the server - that can do it, and that server would query the Internet DNS servers - on the internal server's behalf. -

-
- -
- -
-

-Name Servers in Multiple Roles

- -

- The BIND name server can - simultaneously act as - a master for some zones, a slave for other zones, and as a caching - (recursive) server for a set of local clients. -

- -

- However, since the functions of authoritative name service - and caching/recursive name service are logically separate, it is - often advantageous to run them on separate server machines. - - A server that only provides authoritative name service - (an authoritative-only server) can run with - recursion disabled, improving reliability and security. - - A server that is not authoritative for any zones and only provides - recursive service to local - clients (a caching-only server) - does not need to be reachable from the Internet at large and can - be placed inside a firewall. -

- -
-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch02.html b/doc/arm/Bv9ARM.ch02.html deleted file mode 100644 index 32b932966a..0000000000 --- a/doc/arm/Bv9ARM.ch02.html +++ /dev/null @@ -1,151 +0,0 @@ - - - - - -Chapter 2. BIND Resource Requirements - - - - - - - - -
-

-Chapter 2. BIND Resource Requirements

- - -
-

-Hardware requirements

-

- DNS hardware requirements have - traditionally been quite modest. - For many installations, servers that have been pensioned off from - active duty have performed admirably as DNS servers. -

-

- The DNSSEC features of BIND 9 - may prove to be quite - CPU intensive however, so organizations that make heavy use of these - features may wish to consider larger systems for these applications. - BIND 9 is fully multithreaded, allowing - full utilization of - multiprocessor systems for installations that need it. -

-
-
-

-CPU Requirements

-

- CPU requirements for BIND 9 range from - i386-class machines - for serving of static zones without caching, to enterprise-class - machines if you intend to process many dynamic updates and DNSSEC - signed zones, serving many thousands of queries per second. -

-
-
-

-Memory Requirements

-

- The memory of the server has to be large enough to fit the - cache and zones loaded off disk. The max-cache-size - option can be used to limit the amount of memory used by the cache, - at the expense of reducing cache hit rates and causing more DNS - traffic. - It is still good practice to have enough memory to load - all zone and cache data into memory — unfortunately, the best - way - to determine this for a given installation is to watch the name server - in operation. After a few weeks the server process should reach - a relatively stable size where entries are expiring from the cache as - fast as they are being inserted. -

- -
- -
-

-Name Server Intensive Environment Issues

- -

- For name server intensive environments, there are two alternative - configurations that may be used. The first is where clients and - any second-level internal name servers query a main name server, which - has enough memory to build a large cache. This approach minimizes - the bandwidth used by external name lookups. The second alternative - is to set up second-level internal name servers to make queries - independently. - In this configuration, none of the individual machines needs to - have as much memory or CPU power as in the first alternative, but - this has the disadvantage of making many more external queries, - as none of the name servers share their cached data. -

-
- -
-

-Supported Operating Systems

- -

- ISC BIND 9 compiles and runs on a large - number - of Unix-like operating systems and on - Microsoft Windows Server 2012 R2, 2016 and Windows 10. - For an up-to-date - list of supported systems, see the PLATFORMS file in the top level - directory - of the BIND 9 source distribution. -

-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch03.html b/doc/arm/Bv9ARM.ch03.html deleted file mode 100644 index 116ac7b6fa..0000000000 --- a/doc/arm/Bv9ARM.ch03.html +++ /dev/null @@ -1,861 +0,0 @@ - - - - - -Chapter 3. Name Server Configuration - - - - - - - - -
-

-Chapter 3. Name Server Configuration

- - -

- In this chapter we provide some suggested configurations along - with guidelines for their use. We suggest reasonable values for - certain option settings. -

- -
-

-Sample Configurations

- -
-

-A Caching-only Name Server

- -

- The following sample configuration is appropriate for a caching-only - name server for use by clients internal to a corporation. All - queries - from outside clients are refused using the allow-query - option. Alternatively, the same effect could be achieved using - suitable - firewall rules. -

- -
-// Two corporate subnets we wish to allow queries from.
-acl corpnets { 192.168.4.0/24; 192.168.7.0/24; };
-options {
-     // Working directory
-     directory "/etc/namedb";
-
-     allow-query { corpnets; };
-};
-// Provide a reverse mapping for the loopback
-// address 127.0.0.1
-zone "0.0.127.in-addr.arpa" {
-     type master;
-     file "localhost.rev";
-     notify no;
-};
-
- -
- -
-

-An Authoritative-only Name Server

- -

- This sample configuration is for an authoritative-only server - that is the master server for "example.com" - and a slave for the subdomain "eng.example.com". -

- -
-options {
-     // Working directory
-     directory "/etc/namedb";
-     // Do not allow access to cache
-     allow-query-cache { none; };
-     // This is the default
-     allow-query { any; };
-     // Do not provide recursive service
-     recursion no;
-};
-
-// Provide a reverse mapping for the loopback
-// address 127.0.0.1
-zone "0.0.127.in-addr.arpa" {
-     type master;
-     file "localhost.rev";
-     notify no;
-};
-// We are the master server for example.com
-zone "example.com" {
-     type master;
-     file "example.com.db";
-     // IP addresses of slave servers allowed to
-     // transfer example.com
-     allow-transfer {
-          192.168.4.14;
-          192.168.5.53;
-     };
-};
-// We are a slave server for eng.example.com
-zone "eng.example.com" {
-     type slave;
-     file "eng.example.com.bk";
-     // IP address of eng.example.com master server
-     masters { 192.168.4.12; };
-};
-
- -
-
- -
-

-Load Balancing

- - - -

- A primitive form of load balancing can be achieved in - the DNS by using multiple records - (such as multiple A records) for one name. -

- -

- For example, if you have three HTTP servers with network addresses - of 10.0.0.1, 10.0.0.2 and 10.0.0.3, a set of records such as the - following means that clients will connect to each machine one third - of the time: -

- -
- ------- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- Name -

-
-

- TTL -

-
-

- CLASS -

-
-

- TYPE -

-
-

- Resource Record (RR) Data -

-
-

- www -

-
-

- 600 -

-
-

- IN -

-
-

- A -

-
-

- 10.0.0.1 -

-
-

-
-

- 600 -

-
-

- IN -

-
-

- A -

-
-

- 10.0.0.2 -

-
-

-
-

- 600 -

-
-

- IN -

-
-

- A -

-
-

- 10.0.0.3 -

-
-
-

- When a resolver queries for these records, BIND will rotate - them and respond to the query with the records in a different - order. In the example above, clients will randomly receive - records in the order 1, 2, 3; 2, 3, 1; and 3, 1, 2. Most clients - will use the first record returned and discard the rest. -

-

- For more detail on ordering responses, check the - rrset-order sub-statement in the - options statement, see - RRset Ordering. -

- -
- -
-

-Name Server Operations

- -
-

-Tools for Use With the Name Server Daemon

-

- This section describes several indispensable diagnostic, - administrative and monitoring tools available to the system - administrator for controlling and debugging the name server - daemon. -

-
-

-Diagnostic Tools

-

- The dig, host, and - nslookup programs are all command - line tools - for manually querying name servers. They differ in style and - output format. -

- -
-
dig
-
-

- dig - is the most versatile and complete of these lookup tools. - It has two modes: simple interactive - mode for a single query, and batch mode which executes a - query for - each in a list of several query lines. All query options are - accessible - from the command line. -

-

- dig - [@server] - domain - [query-type] - [query-class] - [+query-option] - [-dig-option] - [%comment] -

-

- The usual simple use of dig will take the form -

-

- dig @server domain query-type query-class -

-

- For more information and a list of available commands and - options, see the dig man - page. -

-
-
host
-
-

- The host utility emphasizes - simplicity - and ease of use. By default, it converts - between host names and Internet addresses, but its - functionality - can be extended with the use of options. -

-

- host - [-aCdlnrsTwv] - [-c class] - [-N ndots] - [-t type] - [-W timeout] - [-R retries] - [-m flag] - [-4] - [-6] - hostname - [server] -

-

- For more information and a list of available commands and - options, see the host man - page. -

-
-
nslookup
-
-

nslookup - has two modes: interactive and - non-interactive. Interactive mode allows the user to - query name servers for information about various - hosts and domains or to print a list of hosts in a - domain. Non-interactive mode is used to print just - the name and requested information for a host or - domain. -

-

- nslookup - [-option...] - [ - [host-to-find] - | [- [server]] - ] -

-

- Interactive mode is entered when no arguments are given (the - default name server will be used) or when the first argument - is a - hyphen (`-') and the second argument is the host name or - Internet address - of a name server. -

-

- Non-interactive mode is used when the name or Internet - address - of the host to be looked up is given as the first argument. - The - optional second argument specifies the host name or address - of a name server. -

-

- Due to its arcane user interface and frequently inconsistent - behavior, we do not recommend the use of nslookup. - Use dig instead. -

-
-
-
- -
-

-Administrative Tools

-

- Administrative tools play an integral part in the management - of a server. -

-
-
-named-checkconf -
-
-

- The named-checkconf program - checks the syntax of a named.conf file. -

-

- named-checkconf - [-jvz] - [-t directory] - [filename] -

-
-
-named-checkzone -
-
-

- The named-checkzone program - checks a master file for - syntax and consistency. -

-

- named-checkzone - [-djqvD] - [-c class] - [-o output] - [-t directory] - [-w directory] - [-k (ignore|warn|fail)] - [-n (ignore|warn|fail)] - [-W (ignore|warn)] - zone - [filename] -

-
-
-named-compilezone -
-
-

- Similar to named-checkzone, but - it always dumps the zone content to a specified file - (typically in a different format). -

-
-
-rndc -
-
-

- The remote name daemon control - (rndc) program allows the - system - administrator to control the operation of a name server. - If you run rndc without any - options, it will display a usage message as follows: -

-

- rndc - [-c config] - [-s server] - [-p port] - [-y key] - command - [command...] -

- -

See rndc(8) for details of - the available rndc commands. -

- -

- rndc requires a configuration file, - since all - communication with the server is authenticated with - digital signatures that rely on a shared secret, and - there is no way to provide that secret other than with a - configuration file. The default location for the - rndc configuration file is - /etc/rndc.conf, but an - alternate - location can be specified with the -c - option. If the configuration file is not found, - rndc will also look in - /etc/rndc.key (or whatever - sysconfdir was defined when - the BIND build was - configured). - The rndc.key file is - generated by - running rndc-confgen -a as - described in - the section called “controls Statement Definition and - Usage”. -

- -

- The format of the configuration file is similar to - that of named.conf, but - limited to - only four statements, the options, - key, server and - include - statements. These statements are what associate the - secret keys to the servers with which they are meant to - be shared. The order of statements is not - significant. -

- -

- The options statement has - three clauses: - default-server, default-key, - and default-port. - default-server takes a - host name or address argument and represents the server - that will - be contacted if no -s - option is provided on the command line. - default-key takes - the name of a key as its argument, as defined by a key statement. - default-port specifies the - port to which - rndc should connect if no - port is given on the command line or in a - server statement. -

- -

- The key statement defines a - key to be used - by rndc when authenticating - with - named. Its syntax is - identical to the - key statement in named.conf. - The keyword key is - followed by a key name, which must be a valid - domain name, though it need not actually be hierarchical; - thus, - a string like "rndc_key" is a valid - name. - The key statement has two - clauses: - algorithm and secret. - While the configuration parser will accept any string as the - argument - to algorithm, currently only the strings - "hmac-md5", - "hmac-sha1", - "hmac-sha224", - "hmac-sha256", - "hmac-sha384" - and "hmac-sha512" - have any meaning. The secret is a Base64 encoded string - as specified in RFC 3548. -

- -

- The server statement - associates a key - defined using the key - statement with a server. - The keyword server is followed by a - host name or address. The server statement - has two clauses: key and port. - The key clause specifies the - name of the key - to be used when communicating with this server, and the - port clause can be used to - specify the port rndc should - connect - to on the server. -

- -

- A sample minimal configuration file is as follows: -

- -
-key rndc_key {
-     algorithm "hmac-sha256";
-     secret
-       "c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K";
-};
-options {
-     default-server 127.0.0.1;
-     default-key    rndc_key;
-};
-
- -

- This file, if installed as /etc/rndc.conf, - would allow the command: -

- -

- $ rndc reload -

- -

- to connect to 127.0.0.1 port 953 and cause the name server - to reload, if a name server on the local machine were - running with - following controls statements: -

- -
-controls {
-        inet 127.0.0.1
-            allow { localhost; } keys { rndc_key; };
-};
-
- -

- and it had an identical key statement for - rndc_key. -

- -

- Running the rndc-confgen - program will - conveniently create a rndc.conf - file for you, and also display the - corresponding controls - statement that you need to - add to named.conf. - Alternatively, - you can run rndc-confgen -a - to set up - a rndc.key file and not - modify - named.conf at all. -

- -
-
- -
-
- -
-

-Signals

-

- Certain UNIX signals cause the name server to take specific - actions, as described in the following table. These signals can - be sent using the kill command. -

-
- ---- - - - - - - - - - - - - - - -
-

SIGHUP

-
-

- Causes the server to read named.conf and - reload the database. -

-
-

SIGTERM

-
-

- Causes the server to clean up and exit. -

-
-

SIGINT

-
-

- Causes the server to clean up and exit. -

-
-
-
-
- -
-

-Plugins

- -

- Plugins are a mechanism to extend the functionality of - named using dynamically loadable libraries. - By using plugins, core server functionality can be kept simple - for the majority of users; more complex code implementing optional - features need only be installed by users that need those features. -

-

- The plugin interface is a work in progress, and is expected to evolve - as more plugins are added. Currently, only "query plugins" are supported; - these modify the name server query logic. Other plugin types may be added - in the future. -

-

- The only plugin currently included in BIND is - filter-aaaa.so, which replaces the - filter-aaaa feature that previously existed natively - as part of named. - The code for this feature has been removed from named, - and can no longer be configured using standard - named.conf syntax, but linking in the - filter-aaaa.so plugin provides identical - functionality. -

- -
-

-Configuring Plugins

-

- A plugin is configured with the plugin - statement in named.conf: -

-
-    plugin query "library.so" {
-        parameters
-    };
-    
-

- In this example, file library.so is the plugin - library. query indicates that this is a query - plugin. -

-

-

-

- Multiple plugin statements can be specified, to load - different plugins or multiple instances of the same plugin. -

-

- parameters are passed as an opaque - string to the plugin's initialization routine. Configuration - syntax will differ depending on the module. -

-
- -
-

-Developing Plugins

-

- Each plugin implements four functions: -

-
    -
  • -plugin_register to allocate memory, - configure a plugin instance, and attach to hook points within - named,
  • -
  • -plugin_destroy to tear down the plugin - instance and free memory,
  • -
  • -plugin_version to check that the plugin - is compatible with the current version of the plugin API,
  • -
  • -plugin_check to test syntactic - correctness of the plugin parameters.
  • -
-

-

-

- At various locations within the named source code, - there are "hook points" at which a plugin may register itself. - When a hook point is reached while named is - running, it is checked to see whether any plugins have registered - themselves there; if so, the associated "hook action" is called - - this is a function within the plugin library. Hook actions may - examine the runtime state and make changes - for example, modifying - the answers to be sent back to a client or forcing a query to be - aborted. More details can be found in the file - lib/ns/include/ns/hooks.h. -

-
- -
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch04.html b/doc/arm/Bv9ARM.ch04.html deleted file mode 100644 index 51039db6c0..0000000000 --- a/doc/arm/Bv9ARM.ch04.html +++ /dev/null @@ -1,2933 +0,0 @@ - - - - - -Chapter 4. Advanced DNS Features - - - - - - - - -
-

-Chapter 4. Advanced DNS Features

- - -
-

-Notify

-

- DNS NOTIFY is a mechanism that allows master - servers to notify their slave servers of changes to a zone's data. In - response to a NOTIFY from a master server, the - slave will check to see that its version of the zone is the - current version and, if not, initiate a zone transfer. -

- -

- For more information about DNS - NOTIFY, see the description of the - notify option in the section called “Boolean Options” and - the description of the zone option also-notify in - the section called “Zone Transfers”. The NOTIFY - protocol is specified in RFC 1996. -

- -
-

Note

-

- As a slave zone can also be a master to other slaves, named, - by default, sends NOTIFY messages for every zone - it loads. Specifying notify master-only; will - cause named to only send NOTIFY for master - zones that it loads. -

-
- -
- -
-

-Dynamic Update

- -

- Dynamic Update is a method for adding, replacing or deleting - records in a master server by sending it a special form of DNS - messages. The format and meaning of these messages is specified - in RFC 2136. -

- -

- Dynamic update is enabled by including an - allow-update or an update-policy - clause in the zone statement. -

- -

- If the zone's update-policy is set to - local, updates to the zone - will be permitted for the key local-ddns, - which will be generated by named at startup. - See the section called “Dynamic Update Policies” for more details. -

- -

- Dynamic updates using Kerberos signed requests can be made - using the TKEY/GSS protocol by setting either the - tkey-gssapi-keytab option, or alternatively - by setting both the tkey-gssapi-credential - and tkey-domain options. Once enabled, - Kerberos signed requests will be matched against the update - policies for the zone, using the Kerberos principal as the - signer for the request. -

- -

- Updating of secure zones (zones using DNSSEC) follows RFC - 3007: RRSIG, NSEC and NSEC3 records affected by updates are - automatically regenerated by the server using an online - zone key. Update authorization is based on transaction - signatures and an explicit server policy. -

- -
-

-The journal file

- -

- All changes made to a zone using dynamic update are stored - in the zone's journal file. This file is automatically created - by the server when the first dynamic update takes place. - The name of the journal file is formed by appending the extension - .jnl to the name of the - corresponding zone - file unless specifically overridden. The journal file is in a - binary format and should not be edited manually. -

- -

- The server will also occasionally write ("dump") - the complete contents of the updated zone to its zone file. - This is not done immediately after - each dynamic update, because that would be too slow when a large - zone is updated frequently. Instead, the dump is delayed by - up to 15 minutes, allowing additional updates to take place. - During the dump process, transient files will be created - with the extensions .jnw and - .jbk; under ordinary circumstances, these - will be removed when the dump is complete, and can be safely - ignored. -

- -

- When a server is restarted after a shutdown or crash, it will replay - the journal file to incorporate into the zone any updates that - took - place after the last zone dump. -

- -

- Changes that result from incoming incremental zone transfers are - also - journaled in a similar way. -

- -

- The zone files of dynamic zones cannot normally be edited by - hand because they are not guaranteed to contain the most recent - dynamic changes — those are only in the journal file. - The only way to ensure that the zone file of a dynamic zone - is up to date is to run rndc stop. -

- -

- If you have to make changes to a dynamic zone - manually, the following procedure will work: - Disable dynamic updates to the zone using - rndc freeze zone. - This will update the zone's master file with the changes - stored in its .jnl file. - Edit the zone file. Run - rndc thaw zone - to reload the changed zone and re-enable dynamic updates. -

- -

- rndc sync zone - will update the zone file with changes from the journal file - without stopping dynamic updates; this may be useful for viewing - the current zone state. To remove the .jnl - file after updating the zone file, use - rndc sync -clean. -

- -
- -
- -
-

-Incremental Zone Transfers (IXFR)

- -

- The incremental zone transfer (IXFR) protocol is a way for - secondary servers to transfer only changed data, instead of having to - transfer the entire zone. The IXFR protocol is specified in RFC - 1995. See Proposed Standards. -

- -

- When acting as a primary server, BIND 9 - supports IXFR for those zones - where the necessary change history information is available. These - include primary zones maintained by dynamic update and secondary zones - whose data was obtained by IXFR. For manually maintained master - zones, and for secondary zones obtained by performing a full zone - transfer (AXFR), IXFR is supported only if the option - ixfr-from-differences is set - to yes. -

- -

- When acting as a secondary server, BIND 9 will - attempt to use IXFR unless - it is explicitly disabled. For more information about disabling - IXFR, see the description of the request-ixfr clause - of the server statement. -

- -

- When a secondary server receives a zone via AXFR, it creates a - new copy of the zone database and then swaps it into place; during - the loading process, queries continue to be served from the old - database with no interference. When receiving a zone via IXFR, - however, changes are applied to the running zone, which may - degrade query performance during the transfer. If a server - receiving an IXFR request determines that the response size would - be similar in size to an AXFR response, it may wish to send AXFR - instead. The threshold at which this determination is made can - be configured using the max-ixfr-ratio option. -

-
- -
-

-Split DNS

- -

- Setting up different views, or visibility, of the DNS space to - internal and external resolvers is usually referred to as a - Split DNS setup. There are several - reasons an organization would want to set up its DNS this way. -

-

- One common reason for setting up a DNS system this way is - to hide "internal" DNS information from "external" clients on the - Internet. There is some debate as to whether or not this is actually - useful. - Internal DNS information leaks out in many ways (via email headers, - for example) and most savvy "attackers" can find the information - they need using other means. - However, since listing addresses of internal servers that - external clients cannot possibly reach can result in - connection delays and other annoyances, an organization may - choose to use a Split DNS to present a consistent view of itself - to the outside world. -

-

- Another common reason for setting up a Split DNS system is - to allow internal networks that are behind filters or in RFC 1918 - space (reserved IP space, as documented in RFC 1918) to resolve DNS - on the Internet. Split DNS can also be used to allow mail from outside - back in to the internal network. -

-
-

-Example split DNS setup

-

- Let's say a company named Example, Inc. - (example.com) - has several corporate sites that have an internal network with - reserved - Internet Protocol (IP) space and an external demilitarized zone (DMZ), - or "outside" section of a network, that is available to the public. -

-

- Example, Inc. wants its internal clients - to be able to resolve external hostnames and to exchange mail with - people on the outside. The company also wants its internal resolvers - to have access to certain internal-only zones that are not available - at all outside of the internal network. -

-

- In order to accomplish this, the company will set up two sets - of name servers. One set will be on the inside network (in the - reserved - IP space) and the other set will be on bastion hosts, which are - "proxy" - hosts that can talk to both sides of its network, in the DMZ. -

-

- The internal servers will be configured to forward all queries, - except queries for site1.internal, site2.internal, site1.example.com, - and site2.example.com, to the servers - in the - DMZ. These internal servers will have complete sets of information - for site1.example.com, site2.example.com, site1.internal, - and site2.internal. -

-

- To protect the site1.internal and site2.internal domains, - the internal name servers must be configured to disallow all queries - to these domains from any external hosts, including the bastion - hosts. -

-

- The external servers, which are on the bastion hosts, will - be configured to serve the "public" version of the site1 and site2.example.com zones. - This could include things such as the host records for public servers - (www.example.com and ftp.example.com), - and mail exchange (MX) records (a.mx.example.com and b.mx.example.com). -

-

- In addition, the public site1 and site2.example.com zones - should have special MX records that contain wildcard (`*') records - pointing to the bastion hosts. This is needed because external mail - servers do not have any other way of looking up how to deliver mail - to those internal hosts. With the wildcard records, the mail will - be delivered to the bastion host, which can then forward it on to - internal hosts. -

-

- Here's an example of a wildcard MX record: -

-
*   IN MX 10 external1.example.com.
-

- Now that they accept mail on behalf of anything in the internal - network, the bastion hosts will need to know how to deliver mail - to internal hosts. In order for this to work properly, the resolvers - on - the bastion hosts will need to be configured to point to the internal - name servers for DNS resolution. -

-

- Queries for internal hostnames will be answered by the internal - servers, and queries for external hostnames will be forwarded back - out to the DNS servers on the bastion hosts. -

-

- In order for all this to work properly, internal clients will - need to be configured to query only the internal - name servers for DNS queries. This could also be enforced via - selective - filtering on the network. -

-

- If everything has been set properly, Example, Inc.'s - internal clients will now be able to: -

-
    -
  • - - Look up any hostnames in the site1 - and - site2.example.com zones. - -
  • -
  • - - Look up any hostnames in the site1.internal and - site2.internal domains. - -
  • -
  • - Look up any hostnames on the Internet. -
  • -
  • - Exchange mail with both internal and external people. -
  • -
-

- Hosts on the Internet will be able to: -

-
    -
  • - - Look up any hostnames in the site1 - and - site2.example.com zones. - -
  • -
  • - - Exchange mail with anyone in the site1 and - site2.example.com zones. - -
  • -
- -

- Here is an example configuration for the setup we just - described above. Note that this is only configuration information; - for information on how to configure your zone files, see the section called “Sample Configurations”. -

- -

- Internal DNS server config: -

- -
-
-acl internals { 172.16.72.0/24; 192.168.1.0/24; };
-
-acl externals { bastion-ips-go-here; };
-
-options {
-    ...
-    ...
-    forward only;
-    // forward to external servers
-    forwarders {
-        bastion-ips-go-here;
-    };
-    // sample allow-transfer (no one)
-    allow-transfer { none; };
-    // restrict query access
-    allow-query { internals; externals; };
-    // restrict recursion
-    allow-recursion { internals; };
-    ...
-    ...
-};
-
-// sample master zone
-zone "site1.example.com" {
-  type master;
-  file "m/site1.example.com";
-  // do normal iterative resolution (do not forward)
-  forwarders { };
-  allow-query { internals; externals; };
-  allow-transfer { internals; };
-};
-
-// sample slave zone
-zone "site2.example.com" {
-  type slave;
-  file "s/site2.example.com";
-  masters { 172.16.72.3; };
-  forwarders { };
-  allow-query { internals; externals; };
-  allow-transfer { internals; };
-};
-
-zone "site1.internal" {
-  type master;
-  file "m/site1.internal";
-  forwarders { };
-  allow-query { internals; };
-  allow-transfer { internals; }
-};
-
-zone "site2.internal" {
-  type slave;
-  file "s/site2.internal";
-  masters { 172.16.72.3; };
-  forwarders { };
-  allow-query { internals };
-  allow-transfer { internals; }
-};
-
- -

- External (bastion host) DNS server config: -

- -
-acl internals { 172.16.72.0/24; 192.168.1.0/24; };
-
-acl externals { bastion-ips-go-here; };
-
-options {
-  ...
-  ...
-  // sample allow-transfer (no one)
-  allow-transfer { none; };
-  // default query access
-  allow-query { any; };
-  // restrict cache access
-  allow-query-cache { internals; externals; };
-  // restrict recursion
-  allow-recursion { internals; externals; };
-  ...
-  ...
-};
-
-// sample slave zone
-zone "site1.example.com" {
-  type master;
-  file "m/site1.foo.com";
-  allow-transfer { internals; externals; };
-};
-
-zone "site2.example.com" {
-  type slave;
-  file "s/site2.foo.com";
-  masters { another_bastion_host_maybe; };
-  allow-transfer { internals; externals; }
-};
-
- -

- In the resolv.conf (or equivalent) on - the bastion host(s): -

- -
-search ...
-nameserver 172.16.72.2
-nameserver 172.16.72.3
-nameserver 172.16.72.4
-
- -
-
-
-

-TSIG

- -

- TSIG (Transaction SIGnatures) is a mechanism for authenticating DNS - messages, originally specified in RFC 2845. It allows DNS messages - to be cryptographically signed using a shared secret. TSIG can - be used in any DNS transaction, as a way to restrict access to - certain server functions (e.g., recursive queries) to authorized - clients when IP-based access control is insufficient or needs to - be overridden, or as a way to ensure message authenticity when it - is critical to the integrity of the server, such as with dynamic - UPDATE messages or zone transfers from a master to a slave server. -

-

- This is a guide to setting up TSIG in BIND. - It describes the configuration syntax and the process of creating - TSIG keys. -

-

- named supports TSIG for server-to-server - communication, and some of the tools included with - BIND support it for sending messages to - named: -

-
    -
  • - nsupdate(1) supports TSIG via the - -k, -l and - -y command line options, or via - the key command when running - interactively. -
  • -
  • - dig(1) supports TSIG via the - -k and -y command - line options. -
  • -
-

-

- -
-

-Generating a Shared Key

-

- TSIG keys can be generated using the tsig-keygen - command; the output of the command is a key directive - suitable for inclusion in named.conf. The - key name, algorithm and size can be specified by command line parameters; - the defaults are "tsig-key", HMAC-SHA256, and 256 bits, respectively. -

-

- Any string which is a valid DNS name can be used as a key name. - For example, a key to be shared between servers called - host1 and host2 could - be called "host1-host2.", and this key could be generated using: -

-
-  $ tsig-keygen host1-host2. > host1-host2.key
-
-

- This key may then be copied to both hosts. The key name and secret - must be identical on both hosts. - (Note: copying a shared secret from one server to another is beyond - the scope of the DNS. A secure transport mechanism should be used: - secure FTP, SSL, ssh, telephone, encrypted email, etc.) -

-

- tsig-keygen can also be run as - ddns-confgen, in which case its output includes - additional configuration text for setting up dynamic DNS in - named. See ddns-confgen(8) - for details. -

-
- -
-

-Loading A New Key

-

- For a key shared between servers called - host1 and host2, - the following could be added to each server's - named.conf file: -

-
-key "host1-host2." {
-        algorithm hmac-sha256;
-        secret "DAopyf1mhCbFVZw7pgmNPBoLUq8wEUT7UuPoLENP2HY=";
-};
-
-

- (This is the same key generated above using - tsig-keygen.) -

-

- Since this text contains a secret, it - is recommended that either named.conf not be - world-readable, or that the key directive - be stored in a file which is not world-readable, and which is - included in named.conf via the - include directive. -

-

- Once a key has been added to named.conf and the - server has been restarted or reconfigured, the server can recognize - the key. If the server receives a message signed by the - key, it will be able to verify the signature. If the signature - is valid, the response will be signed using the same key. -

-

- TSIG keys that are known to a server can be listed using the - command rndc tsig-list. -

-
- -
-

-Instructing the Server to Use a Key

-

- A server sending a request to another server must be told whether - to use a key, and if so, which key to use. -

-

- For example, a key may be specified for each server in the - masters statement in the definition of a - slave zone; in this case, all SOA QUERY messages, NOTIFY - messages, and zone transfer requests (AXFR or IXFR) will be - signed using the specified key. Keys may also be specified - in the also-notify statement of a master - or slave zone, causing NOTIFY messages to be signed using - the specified key. -

-

- Keys can also be specified in a server - directive. Adding the following on host1, - if the IP address of host2 is 10.1.2.3, would - cause all requests from host1 - to host2, including normal DNS queries, to be - signed using the host1-host2. key: -

-
-server 10.1.2.3 {
-        keys { host1-host2. ;};
-};
-
-

- Multiple keys may be present in the keys - statement, but only the first one is used. As this directive does - not contain secrets, it can be used in a world-readable file. -

-

- Requests sent by host2 to host1 - would not be signed, unless a similar - server directive were in host2's - configuration file. -

-

- Whenever any server sends a TSIG-signed DNS request, it will expect - the response to be signed with the same key. If a response is not - signed, or if the signature is not valid, the response will be - rejected. -

-
- -
-

-TSIG-Based Access Control

-

- TSIG keys may be specified in ACL definitions and ACL directives - such as allow-query, allow-transfer - and allow-update. - The above key would be denoted in an ACL element as - key host1-host2. -

-

- An example of an allow-update directive using - a TSIG key: -

-
-allow-update { !{ !localnets; any; }; key host1-host2. ;};
-
-

- This allows dynamic updates to succeed only if the UPDATE - request comes from an address in localnets, - and if it is signed using the - host1-host2. key. -

-

- See the section called “Dynamic Update Policies” for a discussion of - the more flexible update-policy statement. -

-
- -
-

-Errors

-

- Processing of TSIG-signed messages can result in several errors: -

-
    -
  • - If a TSIG-aware server receives a message signed by an - unknown key, the response will be unsigned, with the TSIG - extended error code set to BADKEY. -
  • -
  • - If a TSIG-aware server receives a message from a known key - but with an invalid signature, the response will be unsigned, - with the TSIG extended error code set to BADSIG. -
  • -
  • - If a TSIG-aware server receives a message with a time - outside of the allowed range, the response will be signed, with - the TSIG extended error code set to BADTIME, and the time values - will be adjusted so that the response can be successfully - verified. -
  • -
-

- In all of the above cases, the server will return a response code - of NOTAUTH (not authenticated). -

-
-
- -
-

-TKEY

- -

- TKEY (Transaction KEY) is a mechanism for automatically negotiating - a shared secret between two hosts, originally specified in RFC 2930. -

-

- There are several TKEY "modes" that specify how a key is to be - generated or assigned. BIND 9 implements only - one of these modes: Diffie-Hellman key exchange. Both hosts are - required to have a KEY record with algorithm DH (though this - record is not required to be present in a zone). -

-

- The TKEY process is initiated by a client or server by sending - a query of type TKEY to a TKEY-aware server. The query must include - an appropriate KEY record in the additional section, and - must be signed using either TSIG or SIG(0) with a previously - established key. The server's response, if successful, will - contain a TKEY record in its answer section. After this transaction, - both participants will have enough information to calculate a - shared secret using Diffie-Hellman key exchange. The shared secret - can then be used by to sign subsequent transactions between the - two servers. -

-

- TSIG keys known by the server, including TKEY-negotiated keys, can - be listed using rndc tsig-list. -

-

- TKEY-negotiated keys can be deleted from a server using - rndc tsig-delete. This can also be done via - the TKEY protocol itself, by sending an authenticated TKEY query - specifying the "key deletion" mode. -

- -
-
-

-SIG(0)

- -

- BIND partially supports DNSSEC SIG(0) - transaction signatures as specified in RFC 2535 and RFC 2931. - SIG(0) uses public/private keys to authenticate messages. Access control - is performed in the same manner as TSIG keys; privileges can be - granted or denied in ACL directives based on the key name. -

-

- When a SIG(0) signed message is received, it will only be - verified if the key is known and trusted by the server. The - server will not attempt to recursively fetch or validate the - key. -

-

- SIG(0) signing of multiple-message TCP streams is not supported. -

-

- The only tool shipped with BIND 9 that - generates SIG(0) signed messages is nsupdate. -

-
- -
-

-DNSSEC

-

- Cryptographic authentication of DNS information is possible - through the DNS Security (DNSSEC-bis) extensions, - defined in RFC 4033, RFC 4034, and RFC 4035. - This section describes the creation and use of DNSSEC signed zones. -

- -

- In order to set up a DNSSEC secure zone, there are a series - of steps which must be followed. BIND - 9 ships - with several tools - that are used in this process, which are explained in more detail - below. In all cases, the -h option prints a - full list of parameters. Note that the DNSSEC tools require the - keyset files to be in the working directory or the - directory specified by the -d option, and - that the tools shipped with BIND 9.2.x and earlier are not compatible - with the current ones. -

- -

- There must also be communication with the administrators of - the parent and/or child zone to transmit keys. A zone's security - status must be indicated by the parent zone for a DNSSEC capable - resolver to trust its data. This is done through the presence - or absence of a DS record at the - delegation - point. -

- -

- For other servers to trust data in this zone, they must - either be statically configured with this zone's zone key or the - zone key of another zone above this one in the DNS tree. -

- -
-

-Generating Keys

- -

- The dnssec-keygen program is used to - generate keys. -

- -

- A secure zone must contain one or more zone keys. The zone keys will - sign all other records in the zone, as well as the zone keys of any - secure delegated zones. Zone keys must have the same name as the - zone, a name type of ZONE, and must be usable for - authentication. It is recommended that zone keys use a cryptographic - algorithm designated as "mandatory to implement" by the IETF; - currently the are two algorithms: RSASHA256 and ECDSAP256SHA256. - ECDSAP256SHA256 is recommended for current and future deployments. -

- -

- The following command will generate a ECDSAP256SHA256 key for - the child.example zone: -

- -

- dnssec-keygen -a ECDSAP256SHA256 -n ZONE child.example. -

- -

- Two output files will be produced: - Kchild.example.+013+12345.key and - Kchild.example.+013+12345.private (where 12345 is - an example of a key tag). The key filenames contain the key name - (child.example.), algorithm (5 is RSASHA1, 8 is - RSASHA256, 13 is ECDSAP256SHA256, 15 is ED25519 etc.), and the key tag - (12345 in this case). The private key (in the - .private file) is used to generate signatures, - and the public key (in the .key file) is used for - signature verification. -

- -

- To generate another key with the same properties (but with - a different key tag), repeat the above command. -

- -

- The dnssec-keyfromlabel program is used - to get a key pair from a crypto hardware and build the key - files. Its usage is similar to dnssec-keygen. -

- -

- The public keys should be inserted into the zone file by - including the .key files using - $INCLUDE statements. -

- -
-
-

-Signing the Zone

- -

- The dnssec-signzone program is used - to sign a zone. -

- -

- Any keyset files corresponding to - secure sub-zones should be present. The zone signer will - generate NSEC, NSEC3 - and RRSIG records for the zone, as - well as DS for the child zones if - '-g' is specified. If '-g' - is not specified, then DS RRsets for the secure child - zones need to be added manually. -

- -

- The following command signs the zone, assuming it is in a - file called zone.child.example. By - default, all zone keys which have an available private key are - used to generate signatures. -

- -

- dnssec-signzone -o child.example zone.child.example -

- -

- One output file is produced: - zone.child.example.signed. This - file - should be referenced by named.conf - as the - input file for the zone. -

- -

dnssec-signzone - will also produce a keyset and dsset files. These are used - to provide the parent zone administrators with the - DNSKEYs (or their corresponding - DS records) that are the secure entry - point to the zone. -

- -
- -
-

-Configuring Servers for DNSSEC

-

- To enable named to validate answers - received from other servers, the - dnssec-validation option must be set to - either yes or auto. -

-

- When dnssec-validation is set to - auto, a trust anchor for the DNS - root zone will automatically be used. This trust anchor is - provided as part of BIND and is kept up to date using RFC 5011 - key management. -

-

- When dnssec-validation is set to - yes, DNSSEC validation will only occur - if at least one trust anchor has been explicitly configured - in named.conf - using a trust-anchors statement (or the - managed-keys and trusted-keys - statements, both deprecated). -

-

- When dnssec-validation is set to - no, DNSSEC validation will not occur. -

-

- The default is auto unless BIND is - built with configure --disable-auto-validation, - in which case the default is yes. -

- -

- The keys specified in trust-anchors - copies of DNSKEY RRs for zones that are used to form the - first link in the cryptographic chain of trust. Keys configured - with the keyword static-key or - static-ds are loaded directly - into the table of trust anchors, and can only be changed by - altering the configuration. Keys configured with - initial-key or initial-ds - are used to initialize RFC 5011 trust anchor maintenance, and - will be kept up to date automatically after the first time - named runs. -

- -

- trust-anchors is described in more detail - later in this document. -

- -

- Unlike BIND 8, BIND - 9 does not verify signatures on load, so zone keys for - authoritative zones do not need to be specified in the - configuration file. -

- -

- After DNSSEC gets established, a typical DNSSEC configuration - will look something like the following. It has one or - more public keys for the root. This allows answers from - outside the organization to be validated. It will also - have several keys for parts of the namespace the organization - controls. These are here to ensure that named - is immune to compromises in the DNSSEC components of the security - of parent zones. -

- -
-trust-anchors {
-        /* Root Key */
-        "." initial-key 257 3 3 "BNY4wrWM1nCfJ+CXd0rVXyYmobt7sEEfK3clRbGaTwS
-                                 JxrGkxJWoZu6I7PzJu/E9gx4UC1zGAHlXKdE4zYIpRh
-                                 aBKnvcC2U9mZhkdUpd1Vso/HAdjNe8LmMlnzY3zy2Xy
-                                 4klWOADTPzSv9eamj8V18PHGjBLaVtYvk/ln5ZApjYg
-                                 hf+6fElrmLkdaz MQ2OCnACR817DF4BBa7UR/beDHyp
-                                 5iWTXWSi6XmoJLbG9Scqc7l70KDqlvXR3M/lUUVRbke
-                                 g1IPJSidmK3ZyCllh4XSKbje/45SKucHgnwU5jefMtq
-                                 66gKodQj+MiA21AfUVe7u99WzTLzY3qlxDhxYQQ20FQ
-                                 97S+LKUTpQcq27R7AT3/V5hRQxScINqwcz4jYqZD2fQ
-                                 dgxbcDTClU0CRBdiieyLMNzXG3";
-        /* Key for our organization's forward zone */
-        example.com. static-ds 54135 5 2 "8EF922C97F1D07B23134440F19682E7519ADDAE180E20B1B1EC52E7F58B2831D"
-
-        /* Key for our reverse zone. */
-        2.0.192.IN-ADDRPA.NET. static-key 257 3 5 "AQOnS4xn/IgOUpBPJ3bogzwc
-                                       xOdNax071L18QqZnQQQAVVr+i
-                                       LhGTnNGp3HoWQLUIzKrJVZ3zg
-                                       gy3WwNT6kZo6c0tszYqbtvchm
-                                       gQC8CzKojM/W16i6MG/eafGU3
-                                       siaOdS0yOI6BgPsw+YZdzlYMa
-                                       IJGf4M4dyoKIhzdZyQ2bYQrjy
-                                       Q4LB0lC7aOnsMyYKHHYeRvPxj
-                                       IQXmdqgOJGq+vsevG06zW+1xg
-                                       YJh9rCIfnm1GX/KMgxLPG2vXT
-                                       D/RnLX+D3T3UL7HJYHJhAZD5L
-                                       59VvjSPsZJHeDCUyWYrvPZesZ
-                                       DIRvhDD52SKvbheeTJUm6Ehkz
-                                       ytNN2SN96QRk8j/iI8ib";
-};
-
-options {
-        ...
-        dnssec-validation yes;
-};
-
- -
-

Note

-

- None of the keys listed in this example are valid. In particular, - the root key is not valid. -

-
- -

- When DNSSEC validation is enabled and properly configured, - the resolver will reject any answers from signed, secure zones - which fail to validate, and will return SERVFAIL to the client. -

- -

- Responses may fail to validate for any of several reasons, - including missing, expired, or invalid signatures, a key which - does not match the DS RRset in the parent zone, or an insecure - response from a zone which, according to its parent, should have - been secure. -

- -
-

Note

-

- When the validator receives a response from an unsigned zone - that has a signed parent, it must confirm with the parent - that the zone was intentionally left unsigned. It does - this by verifying, via signed and validated NSEC/NSEC3 records, - that the parent zone contains no DS records for the child. -

-

- If the validator can prove that the zone - is insecure, then the response is accepted. However, if it - cannot, then it must assume an insecure response to be a - forgery; it rejects the response and logs an error. -

-

- The logged error reads "insecurity proof failed" and - "got insecure response; parent indicates it should be secure". -

-
-
-
- -
-

-DNSSEC, Dynamic Zones, and Automatic Signing

- -
-

-Converting from insecure to secure

- -
-

- Changing a zone from insecure to secure can be done in three - ways: using a dynamic DNS update, use the - auto-dnssec zone option, or set a DNSSEC - policy for the zone with dnssec-policy. -

-

- For either method, you need to configure - named so that it can see the - K* files which contain the public and private - parts of the keys that will be used to sign the zone. These files - will have been generated by - dnssec-keygen (or created when needed by - named if dnssec-policy is - used). Keys should be placed in the key-directory, as specified in - named.conf:

-
-	zone example.net {
-		type master;
-		update-policy local;
-		file "dynamic/example.net/example.net";
-		key-directory "dynamic/example.net";
-	};
-  
-

- If one KSK and one ZSK DNSKEY key have been generated, this - configuration will cause all records in the zone to be signed - with the ZSK, and the DNSKEY RRset to be signed with the KSK as - well. An NSEC chain will be generated as part of the initial - signing process. -

-

- With dnssec-policy you specify what keys should - be KSK and/or ZSK. If you want a key to sign all records with a key - you will need to specify a CSK: -

-
-	dnssec-policy csk {
-		keys {
-			csk key-directory lifetime P5Y algorithm 13;
-		};
-	};
-  
- -
-

-Dynamic DNS update method

- -
-

To insert the keys via dynamic update:

-
-	% nsupdate
-	> ttl 3600
-	> update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8=
-	> update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk=
-	> send
-
-

- While the update request will complete almost immediately, - the zone will not be completely signed until - named has had time to walk the zone and - generate the NSEC and RRSIG records. The NSEC record at the apex - will be added last, to signal that there is a complete NSEC - chain. -

-

- If you wish to sign using NSEC3 instead of NSEC, you should - add an NSEC3PARAM record to the initial update request. If you - wish the NSEC3 chain to have the OPTOUT bit set, set it in the - flags field of the NSEC3PARAM record. -

-
-	% nsupdate
-	> ttl 3600
-	> update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8=
-	> update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk=
-	> update add example.net NSEC3PARAM 1 1 100 1234567890
-	> send
-
-

- Again, this update request will complete almost - immediately; however, the record won't show up until - named has had a chance to build/remove the - relevant chain. A private type record will be created to record - the state of the operation (see below for more details), and will - be removed once the operation completes. -

-

- While the initial signing and NSEC/NSEC3 chain generation - is happening, other updates are possible as well. -

- -
-

-Fully automatic zone signing

- -
-

- To enable automatic signing, you can set a - dnssec-policy, or add the - auto-dnssec option to the zone statement in - named.conf. - auto-dnssec has two possible arguments: - allow or - maintain. -

-

- With auto-dnssec allow, - named can search the key directory for keys - matching the zone, insert them into the zone, and use them to - sign the zone. It will do so only when it receives an - rndc sign <zonename>. -

-

- - auto-dnssec maintain includes the above - functionality, but will also automatically adjust the zone's - DNSKEY records on schedule according to the keys' timing metadata. - (See dnssec-keygen(8) and - dnssec-settime(8) for more information.) -

-

- dnssec-policy is like - auto-dnssec maintain, but will also automatically - create new keys when necessary. Also any configuration related - to DNSSEC signing is retrieved from the policy (ignoring existing - DNSSEC named.conf options). -

-

- named will periodically search the key directory - for keys matching the zone, and if the keys' metadata indicates - that any change should be made the zone, such as adding, removing, - or revoking a key, then that action will be carried out. By default, - the key directory is checked for changes every 60 minutes; this period - can be adjusted with the dnssec-loadkeys-interval, up - to a maximum of 24 hours. The rndc loadkeys forces - named to check for key updates immediately. -

-

- If keys are present in the key directory the first time the zone - is loaded, the zone will be signed immediately, without waiting for an - rndc sign or rndc loadkeys - command. (Those commands can still be used when there are unscheduled - key changes, however.) -

-

- When new keys are added to a zone, the TTL is set to match that - of any existing DNSKEY RRset. If there is no existing DNSKEY RRset, - then the TTL will be set to the TTL specified when the key was - created (using the dnssec-keygen -L option), if - any, or to the SOA TTL. -

-

- If you wish the zone to be signed using NSEC3 instead of NSEC, - submit an NSEC3PARAM record via dynamic update prior to the - scheduled publication and activation of the keys. If you wish the - NSEC3 chain to have the OPTOUT bit set, set it in the flags field - of the NSEC3PARAM record. The NSEC3PARAM record will not appear in - the zone immediately, but it will be stored for later reference. When - the zone is signed and the NSEC3 chain is completed, the NSEC3PARAM - record will appear in the zone. -

-

- Using the - auto-dnssec option requires the zone to be - configured to allow dynamic updates, by adding an - allow-update or - update-policy statement to the zone - configuration. If this has not been done, the configuration will - fail. -

- -
-

-Private-type records

- -
-

- The state of the signing process is signaled by - private-type records (with a default type value of 65534). When - signing is complete, these records will have a nonzero value for - the final octet (for those records which have a nonzero initial - octet). -

-

- The private type record format: If the first octet is - non-zero then the record indicates that the zone needs to be - signed with the key matching the record, or that all signatures - that match the record should be removed. -

-

-

-


-
-  algorithm (octet 1)
-  key id in network order (octet 2 and 3)
-  removal flag (octet 4)
-  complete flag (octet 5)
-

-

-

-

- Only records flagged as "complete" can be removed via - dynamic update. Attempts to remove other private type records - will be silently ignored. -

-

- If the first octet is zero (this is a reserved algorithm - number that should never appear in a DNSKEY record) then the - record indicates changes to the NSEC3 chains are in progress. The - rest of the record contains an NSEC3PARAM record. The flag field - tells what operation to perform based on the flag bits. -

-

-

-


-
-  0x01 OPTOUT
-  0x80 CREATE
-  0x40 REMOVE
-  0x20 NONSEC
-

-

-

-
-

-DNSKEY rollovers

- -
-

- As with insecure-to-secure conversions, rolling DNSSEC - keys can be done in two ways: using a dynamic DNS update, or the - auto-dnssec zone option. -

- -
-

-Dynamic DNS update method

- -
-

- To perform key rollovers via dynamic update, you need to add - the K* files for the new keys so that - named can find them. You can then add the new - DNSKEY RRs via dynamic update. - named will then cause the zone to be signed - with the new keys. When the signing is complete the private type - records will be updated so that the last octet is non - zero. -

-

- If this is for a KSK you need to inform the parent and any - trust anchor repositories of the new KSK. -

-

- You should then wait for the maximum TTL in the zone before - removing the old DNSKEY. If it is a KSK that is being updated, - you also need to wait for the DS RRset in the parent to be - updated and its TTL to expire. This ensures that all clients will - be able to verify at least one signature when you remove the old - DNSKEY. -

-

- The old DNSKEY can be removed via UPDATE. Take care to - specify the correct key. - named will clean out any signatures generated - by the old key after the update completes. -

- -
-

-Automatic key rollovers

- -
-

- When a new key reaches its activation date (as set by - dnssec-keygen or dnssec-settime), - if the auto-dnssec zone option is set to - maintain, named will - automatically carry out the key rollover. If the key's algorithm - has not previously been used to sign the zone, then the zone will - be fully signed as quickly as possible. However, if the new key - is replacing an existing key of the same algorithm, then the - zone will be re-signed incrementally, with signatures from the - old key being replaced with signatures from the new key as their - signature validity periods expire. By default, this rollover - completes in 30 days, after which it will be safe to remove the - old key from the DNSKEY RRset. -

- -
-

-NSEC3PARAM rollovers via UPDATE

- -
-

- Add the new NSEC3PARAM record via dynamic update. When the - new NSEC3 chain has been generated, the NSEC3PARAM flag field - will be zero. At this point you can remove the old NSEC3PARAM - record. The old chain will be removed after the update request - completes. -

- -
-

-Converting from NSEC to NSEC3

- -
-

- To do this, you just need to add an NSEC3PARAM record. When - the conversion is complete, the NSEC chain will have been removed - and the NSEC3PARAM record will have a zero flag field. The NSEC3 - chain will be generated before the NSEC chain is - destroyed. -

-

- NSEC3 is not supported yet with dnssec-policy. -

- -
-

-Converting from NSEC3 to NSEC

- -
-

- To do this, use nsupdate to - remove all NSEC3PARAM records with a zero flag - field. The NSEC chain will be generated before the NSEC3 chain is - removed. -

- -
-

-Converting from secure to insecure

- -
-

- To convert a signed zone to unsigned using dynamic DNS, - delete all the DNSKEY records from the zone apex using - nsupdate. All signatures, NSEC or NSEC3 chains, - and associated NSEC3PARAM records will be removed automatically. - This will take place after the update request completes.

-

This requires the - dnssec-secure-to-insecure option to be set to - yes in - named.conf.

-

In addition, if the auto-dnssec maintain - zone statement is used, it should be removed or changed to - allow instead (or it will re-sign). -

- -
-

-Periodic re-signing

- -
-

- In any secure zone which supports dynamic updates, named - will periodically re-sign RRsets which have not been re-signed as - a result of some update action. The signature lifetimes will be - adjusted so as to spread the re-sign load over time rather than - all at once. -

- -
-

-NSEC3 and OPTOUT

- -
-

- named only supports creating new NSEC3 chains - where all the NSEC3 records in the zone have the same OPTOUT - state. - named supports UPDATES to zones where the NSEC3 - records in the chain have mixed OPTOUT state. - named does not support changing the OPTOUT - state of an individual NSEC3 record, the entire chain needs to be - changed if the OPTOUT state of an individual NSEC3 needs to be - changed. -

-
- -
-

-Dynamic Trust Anchor Management

- -

- BIND is able to maintain DNSSEC trust anchors using RFC 5011 key - management. This feature allows named to keep track - of changes to critical DNSSEC keys without any need for the operator to - make changes to configuration files. -

- -
-

-Validating Resolver

- - -

To configure a validating resolver to use RFC 5011 to - maintain a trust anchor, configure the trust anchor using a - trust-anchors statement and the - initial-key or initial-ds - keyword. Information about this can be found in - the section called “trust-anchors Statement Definition - and Usage”.

-
-
-

-Authoritative Server

- -

To set up an authoritative zone for RFC 5011 trust anchor - maintenance, generate two (or more) key signing keys (KSKs) for - the zone. Sign the zone with one of them; this is the "active" - KSK. All KSKs which do not sign the zone are "stand-by" - keys.

-

Any validating resolver which is configured to use the - active KSK as an RFC 5011-managed trust anchor will take note - of the stand-by KSKs in the zone's DNSKEY RRset, and store them - for future reference. The resolver will recheck the zone - periodically, and after 30 days, if the new key is still there, - then the key will be accepted by the resolver as a valid trust - anchor for the zone. Any time after this 30-day acceptance - timer has completed, the active KSK can be revoked, and the - zone can be "rolled over" to the newly accepted key.

-

The easiest way to place a stand-by key in a zone is to - use the "smart signing" features of - dnssec-keygen and - dnssec-signzone. If a key with a publication - date in the past, but an activation date which is unset or in - the future, " - dnssec-signzone -S" will include the DNSKEY - record in the zone, but will not sign with it:

-
-$ dnssec-keygen -K keys -f KSK -P now -A now+2y example.net
-$ dnssec-signzone -S -K keys example.net
-
-

To revoke a key, the new command - dnssec-revoke has been added. This adds the - REVOKED bit to the key flags and re-generates the - K*.key and - K*.private files.

-

After revoking the active key, the zone must be signed - with both the revoked KSK and the new active KSK. (Smart - signing takes care of this automatically.)

-

Once a key has been revoked and used to sign the DNSKEY - RRset in which it appears, that key will never again be - accepted as a valid trust anchor by the resolver. However, - validation can proceed using the new active key (which had been - accepted by the resolver when it was a stand-by key).

-

See RFC 5011 for more details on key rollover - scenarios.

-

When a key has been revoked, its key ID changes, - increasing by 128, and wrapping around at 65535. So, for - example, the key "Kexample.com.+005+10000" becomes - "Kexample.com.+005+10128".

-

If two keys have IDs exactly 128 apart, and one is - revoked, then the two key IDs will collide, causing several - problems. To prevent this, - dnssec-keygen will not generate a new key if - another key is present which may collide. This checking will - only occur if the new keys are written to the same directory - which holds all other keys in use for that zone.

-

Older versions of BIND 9 did not have this precaution. - Exercise caution if using key revocation on keys that were - generated by previous releases, or if using keys stored in - multiple directories or on multiple machines.

-

It is expected that a future release of BIND 9 will - address this problem in a different way, by storing revoked - keys with their original unrevoked key IDs.

-
-
- -
-

-PKCS#11 (Cryptoki) support

- -

- PKCS#11 (Public Key Cryptography Standard #11) defines a - platform-independent API for the control of hardware security - modules (HSMs) and other cryptographic support devices. -

-

- BIND 9 is known to work with three HSMs: The AEP Keyper, which has - been tested with Debian Linux, Solaris x86 and Windows Server 2003; - the Thales nShield, tested with Debian Linux; and the Sun SCA 6000 - cryptographic acceleration board, tested with Solaris x86. In - addition, BIND can be used with all current versions of SoftHSM, - a software-based HSM simulator library produced by the OpenDNSSEC - project. -

-

- PKCS#11 makes use of a "provider library": a dynamically loadable - library which provides a low-level PKCS#11 interface to drive the HSM - hardware. The PKCS#11 provider library comes from the HSM vendor, and - it is specific to the HSM to be controlled. -

-

- There are two available mechanisms for PKCS#11 support in BIND 9: - OpenSSL-based PKCS#11 and native PKCS#11. When using the first - mechanism, BIND uses a modified version of OpenSSL, which loads - the provider library and operates the HSM indirectly; any - cryptographic operations not supported by the HSM can be carried - out by OpenSSL instead. The second mechanism enables BIND to bypass - OpenSSL completely; BIND loads the provider library itself, and uses - the PKCS#11 API to drive the HSM directly. -

-
-

-Prerequisites

- -

- See the documentation provided by your HSM vendor for - information about installing, initializing, testing and - troubleshooting the HSM. -

-
-
-

-Native PKCS#11

- -

- Native PKCS#11 mode will only work with an HSM capable of carrying - out every cryptographic operation BIND 9 may - need. The HSM's provider library must have a complete implementation - of the PKCS#11 API, so that all these functions are accessible. As of - this writing, only the Thales nShield HSM and SoftHSMv2 can be used - in this fashion. For other HSMs, including the AEP Keyper, Sun SCA - 6000 and older versions of SoftHSM, use OpenSSL-based PKCS#11. - (Note: Eventually, when more HSMs become capable of supporting - native PKCS#11, it is expected that OpenSSL-based PKCS#11 will - be deprecated.) -

-

- To build BIND with native PKCS#11, configure as follows: -

-
-$ cd bind9
-$ ./configure --enable-native-pkcs11 \
-    --with-pkcs11=provider-library-path
-    
-

- This will cause all BIND tools, including named - and the dnssec-* and pkcs11-* - tools, to use the PKCS#11 provider library specified in - provider-library-path for cryptography. - (The provider library path can be overridden using the - -E in named and the - dnssec-* tools, or the -m in - the pkcs11-* tools.) -

-
-

-Building SoftHSMv2

- -

- SoftHSMv2, the latest development version of SoftHSM, is available - from - - https://github.com/opendnssec/SoftHSMv2 - . - It is a software library developed by the OpenDNSSEC project - ( - http://www.opendnssec.org - ) - which provides a PKCS#11 interface to a virtual HSM, implemented in - the form of a SQLite3 database on the local filesystem. It provides - less security than a true HSM, but it allows you to experiment with - native PKCS#11 when an HSM is not available. SoftHSMv2 can be - configured to use either OpenSSL or the Botan library to perform - cryptographic functions, but when using it for native PKCS#11 in - BIND, OpenSSL is required. -

-

- By default, the SoftHSMv2 configuration file is - prefix/etc/softhsm2.conf (where - prefix is configured at compile time). - This location can be overridden by the SOFTHSM2_CONF environment - variable. The SoftHSMv2 cryptographic store must be installed and - initialized before using it with BIND. -

-
-$  cd SoftHSMv2 
-$  configure --with-crypto-backend=openssl --prefix=/opt/pkcs11/usr 
-$  make 
-$  make install 
-$  /opt/pkcs11/usr/bin/softhsm-util --init-token 0 --slot 0 --label softhsmv2 
-      
-
-
-
-

-OpenSSL-based PKCS#11

- -

- OpenSSL-based PKCS#11 mode uses a modified version of the - OpenSSL library; stock OpenSSL does not fully support PKCS#11. - ISC provides a patch to OpenSSL to correct this. This patch is - based on work originally done by the OpenSolaris project; it has been - modified by ISC to provide new features such as PIN management and - key-by-reference. -

-

- There are two "flavors" of PKCS#11 support provided by - the patched OpenSSL, one of which must be chosen at - configuration time. The correct choice depends on the HSM - hardware: -

-
    -
  • -

    - Use 'crypto-accelerator' with HSMs that have hardware - cryptographic acceleration features, such as the SCA 6000 - board. This causes OpenSSL to run all supported - cryptographic operations in the HSM. -

    -
  • -
  • -

    - Use 'sign-only' with HSMs that are designed to - function primarily as secure key storage devices, but lack - hardware acceleration. These devices are highly secure, but - are not necessarily any faster at cryptography than the - system CPU — often, they are slower. It is therefore - most efficient to use them only for those cryptographic - functions that require access to the secured private key, - such as zone signing, and to use the system CPU for all - other computationally-intensive operations. The AEP Keyper - is an example of such a device. -

    -
  • -
-

- The modified OpenSSL code is included in the BIND 9 release, - in the form of a context diff against the latest versions of - OpenSSL. OpenSSL 0.9.8, 1.0.0, 1.0.1 and 1.0.2 are supported; - there are separate diffs for each version. In the examples to - follow, we use OpenSSL 0.9.8, but the same methods work with - OpenSSL 1.0.0 through 1.0.2. -

-
-

Note

-

- The OpenSSL patches as of this writing (January 2016) - support versions 0.9.8zh, 1.0.0t, 1.0.1q and 1.0.2f. - ISC will provide updated patches as new versions of OpenSSL - are released. The version number in the following examples - is expected to change. -

-
-

- Before building BIND 9 with PKCS#11 support, it will be - necessary to build OpenSSL with the patch in place, and configure - it with the path to your HSM's PKCS#11 provider library. -

-
-

-Patching OpenSSL

- -
-$ wget http://www.openssl.org/source/openssl-0.9.8zc.tar.gz
-  
-

Extract the tarball:

-
-$ tar zxf openssl-0.9.8zc.tar.gz
-
-

Apply the patch from the BIND 9 release:

-
-$ patch -p1 -d openssl-0.9.8zc \
-	      < bind9/bin/pkcs11/openssl-0.9.8zc-patch
-
-
-

Note

-

- The patch file may not be compatible with the - "patch" utility on all operating systems. You may need to - install GNU patch. -

-
-

- When building OpenSSL, place it in a non-standard - location so that it does not interfere with OpenSSL libraries - elsewhere on the system. In the following examples, we choose - to install into "/opt/pkcs11/usr". We will use this location - when we configure BIND 9. -

-

- Later, when building BIND 9, the location of the custom-built - OpenSSL library will need to be specified via configure. -

-
-
-

-Building OpenSSL for the AEP Keyper on Linux

- - -

- The AEP Keyper is a highly secure key storage device, - but does not provide hardware cryptographic acceleration. It - can carry out cryptographic operations, but it is probably - slower than your system's CPU. Therefore, we choose the - 'sign-only' flavor when building OpenSSL. -

-

- The Keyper-specific PKCS#11 provider library is - delivered with the Keyper software. In this example, we place - it /opt/pkcs11/usr/lib: -

-
-$ cp pkcs11.GCC4.0.2.so.4.05 /opt/pkcs11/usr/lib/libpkcs11.so
-
-
-$ cd openssl-0.9.8zc
-$ ./Configure linux-x86_64 \
-	    --pk11-libname=/opt/pkcs11/usr/lib/libpkcs11.so \
-	    --pk11-flavor=sign-only \
-	    --prefix=/opt/pkcs11/usr
-
-
-
-

-Building OpenSSL for the SCA 6000 on Solaris

- - -

- The SCA-6000 PKCS#11 provider is installed as a system - library, libpkcs11. It is a true crypto accelerator, up to 4 - times faster than any CPU, so the flavor shall be - 'crypto-accelerator'. -

-

- In this example, we are building on Solaris x86 on an - AMD64 system. -

-
-$ cd openssl-0.9.8zc
-$ ./Configure solaris64-x86_64-cc \
-	    --pk11-libname=/usr/lib/64/libpkcs11.so \
-	    --pk11-flavor=crypto-accelerator \
-	    --prefix=/opt/pkcs11/usr
-
-

- (For a 32-bit build, use "solaris-x86-cc" and /usr/lib/libpkcs11.so.) -

-

- After configuring, run - make and - make test. -

-
-
-

-Building OpenSSL for SoftHSM

- - -

- SoftHSM (version 1) is a software library developed by the - OpenDNSSEC project - ( - http://www.opendnssec.org - ) - which provides a - PKCS#11 interface to a virtual HSM, implemented in the form of - a SQLite3 database on the local filesystem. SoftHSM uses - the Botan library to perform cryptographic functions. Though - less secure than a true HSM, it can allow you to experiment - with PKCS#11 when an HSM is not available. -

-

- The SoftHSM cryptographic store must be installed and - initialized before using it with OpenSSL, and the SOFTHSM_CONF - environment variable must always point to the SoftHSM configuration - file: -

-
-$  cd softhsm-1.3.7 
-$  configure --prefix=/opt/pkcs11/usr 
-$  make 
-$  make install 
-$  export SOFTHSM_CONF=/opt/pkcs11/softhsm.conf 
-$  echo "0:/opt/pkcs11/softhsm.db" > $SOFTHSM_CONF 
-$  /opt/pkcs11/usr/bin/softhsm --init-token 0 --slot 0 --label softhsm 
-
-

- SoftHSM can perform all cryptographic operations, but - since it only uses your system CPU, there is no advantage to using - it for anything but signing. Therefore, we choose the 'sign-only' - flavor when building OpenSSL. -

-
-$ cd openssl-0.9.8zc
-$ ./Configure linux-x86_64 \
-	    --pk11-libname=/opt/pkcs11/usr/lib/libsofthsm.so \
-	    --pk11-flavor=sign-only \
-	    --prefix=/opt/pkcs11/usr
-
-

- After configuring, run "make" - and "make test". -

-
-

- Once you have built OpenSSL, run - "apps/openssl engine pkcs11" to confirm - that PKCS#11 support was compiled in correctly. The output - should be one of the following lines, depending on the flavor - selected: -

-
-	(pkcs11) PKCS #11 engine support (sign only)
-
-

Or:

-
-	(pkcs11) PKCS #11 engine support (crypto accelerator)
-
-

- Next, run - "apps/openssl engine pkcs11 -t". This will - attempt to initialize the PKCS#11 engine. If it is able to - do so successfully, it will report - [ available ]. -

-

- If the output is correct, run - "make install" which will install the - modified OpenSSL suite to /opt/pkcs11/usr. -

-
-

-Configuring BIND 9 for Linux with the AEP Keyper

- - -
-$ cd ../bind9
-$ ./configure \
-	   --with-openssl=/opt/pkcs11/usr \
-	   --with-pkcs11=/opt/pkcs11/usr/lib/libpkcs11.so
-
-
-
-

-Configuring BIND 9 for Solaris with the SCA 6000

- - -
-$ cd ../bind9
-$ ./configure CC="cc -xarch=amd64" \
-	    --with-openssl=/opt/pkcs11/usr \
-	    --with-pkcs11=/usr/lib/64/libpkcs11.so
-
-

(For a 32-bit build, omit CC="cc -xarch=amd64".)

-

- If configure complains about OpenSSL not working, you - may have a 32/64-bit architecture mismatch. Or, you may have - incorrectly specified the path to OpenSSL (it should be the - same as the --prefix argument to the OpenSSL - Configure). -

-
-
-

-Configuring BIND 9 for SoftHSM

- - -
-$ cd ../bind9
-$ ./configure \
-	   --with-openssl=/opt/pkcs11/usr \
-	   --with-pkcs11=/opt/pkcs11/usr/lib/libsofthsm.so
-
-
-

- After configuring, run - "make", - "make test" and - "make install". -

-

- (Note: If "make test" fails in the "pkcs11" system test, you may - have forgotten to set the SOFTHSM_CONF environment variable.) -

-
-
-

-PKCS#11 Tools

- -

- BIND 9 includes a minimal set of tools to operate the - HSM, including - pkcs11-keygen to generate a new key pair - within the HSM, - pkcs11-list to list objects currently - available, - pkcs11-destroy to remove objects, and - pkcs11-tokens to list available tokens. -

-

- In UNIX/Linux builds, these tools are built only if BIND - 9 is configured with the --with-pkcs11 option. (Note: If - --with-pkcs11 is set to "yes", rather than to the path of the - PKCS#11 provider, then the tools will be built but the - provider will be left undefined. Use the -m option or the - PKCS11_PROVIDER environment variable to specify the path to the - provider.) -

-
-
-

-Using the HSM

- -

- For OpenSSL-based PKCS#11, we must first set up the runtime - environment so the OpenSSL and PKCS#11 libraries can be loaded: -

-
-$ export LD_LIBRARY_PATH=/opt/pkcs11/usr/lib:${LD_LIBRARY_PATH}
-
-

- This causes named and other binaries to load - the OpenSSL library from /opt/pkcs11/usr/lib - rather than from the default location. This step is not necessary - when using native PKCS#11. -

-

- Some HSMs require other environment variables to be set. - For example, when operating an AEP Keyper, it is necessary to - specify the location of the "machine" file, which stores - information about the Keyper for use by the provider - library. If the machine file is in - /opt/Keyper/PKCS11Provider/machine, - use: -

-
-$ export KEYPER_LIBRARY_PATH=/opt/Keyper/PKCS11Provider
-
-

- Such environment variables must be set whenever running - any tool that uses the HSM, including - pkcs11-keygen, - pkcs11-list, - pkcs11-destroy, - dnssec-keyfromlabel, - dnssec-signzone, - dnssec-keygen, and - named. -

-

- We can now create and use keys in the HSM. In this case, - we will create a 2048 bit key and give it the label - "sample-ksk": -

-
-$ pkcs11-keygen -b 2048 -l sample-ksk
-
-

To confirm that the key exists:

-
-$ pkcs11-list
-Enter PIN:
-object[0]: handle 2147483658 class 3 label[8] 'sample-ksk' id[0]
-object[1]: handle 2147483657 class 2 label[8] 'sample-ksk' id[0]
-
-

- Before using this key to sign a zone, we must create a - pair of BIND 9 key files. The "dnssec-keyfromlabel" utility - does this. In this case, we will be using the HSM key - "sample-ksk" as the key-signing key for "example.net": -

-
-$ dnssec-keyfromlabel -l sample-ksk -f KSK example.net
-
-

- The resulting K*.key and K*.private files can now be used - to sign the zone. Unlike normal K* files, which contain both - public and private key data, these files will contain only the - public key data, plus an identifier for the private key which - remains stored within the HSM. Signing with the private key takes - place inside the HSM. -

-

- If you wish to generate a second key in the HSM for use - as a zone-signing key, follow the same procedure above, using a - different keylabel, a smaller key size, and omitting "-f KSK" - from the dnssec-keyfromlabel arguments: -

-

- (Note: When using OpenSSL-based PKCS#11 the label is an arbitrary - string which identifies the key. With native PKCS#11, the label is - a PKCS#11 URI string which may include other details about the key - and the HSM, including its PIN. See - dnssec-keyfromlabel(8) for details.) -

-
-$ pkcs11-keygen -b 1024 -l sample-zsk
-$ dnssec-keyfromlabel -l sample-zsk example.net
-
-

- Alternatively, you may prefer to generate a conventional - on-disk key, using dnssec-keygen: -

-
-$ dnssec-keygen example.net
-
-

- This provides less security than an HSM key, but since - HSMs can be slow or cumbersome to use for security reasons, it - may be more efficient to reserve HSM keys for use in the less - frequent key-signing operation. The zone-signing key can be - rolled more frequently, if you wish, to compensate for a - reduction in key security. (Note: When using native PKCS#11, - there is no speed advantage to using on-disk keys, as cryptographic - operations will be done by the HSM regardless.) -

-

- Now you can sign the zone. (Note: If not using the -S - option to dnssec-signzone, it will be - necessary to add the contents of both K*.key - files to the zone master file before signing it.) -

-
-$ dnssec-signzone -S example.net
-Enter PIN:
-Verifying the zone using the following algorithms:
-NSEC3RSASHA1.
-Zone signing complete:
-Algorithm: NSEC3RSASHA1: ZSKs: 1, KSKs: 1 active, 0 revoked, 0 stand-by
-example.net.signed
-
-
-
-

-Specifying the engine on the command line

- -

- When using OpenSSL-based PKCS#11, the "engine" to be used by - OpenSSL can be specified in named and all of - the BIND dnssec-* tools by using the "-E - <engine>" command line option. If BIND 9 is built with - the --with-pkcs11 option, this option defaults to "pkcs11". - Specifying the engine will generally not be necessary unless - for some reason you wish to use a different OpenSSL - engine. -

-

- If you wish to disable use of the "pkcs11" engine — - for troubleshooting purposes, or because the HSM is unavailable - — set the engine to the empty string. For example: -

-
-$ dnssec-signzone -E '' -S example.net
-
-

- This causes - dnssec-signzone to run as if it were compiled - without the --with-pkcs11 option. -

-

- When built with native PKCS#11 mode, the "engine" option has a - different meaning: it specifies the path to the PKCS#11 provider - library. This may be useful when testing a new provider library. -

-
-
-

-Running named with automatic zone re-signing

- -

- If you want named to dynamically re-sign zones - using HSM keys, and/or to to sign new records inserted via nsupdate, - then named must have access to the HSM PIN. In OpenSSL-based PKCS#11, - this is accomplished by placing the PIN into the openssl.cnf file - (in the above examples, - /opt/pkcs11/usr/ssl/openssl.cnf). -

-

- The location of the openssl.cnf file can be overridden by - setting the OPENSSL_CONF environment variable before running - named. -

-

Sample openssl.cnf:

-
-	openssl_conf = openssl_def
-	[ openssl_def ]
-	engines = engine_section
-	[ engine_section ]
-	pkcs11 = pkcs11_section
-	[ pkcs11_section ]
-	PIN = <PLACE PIN HERE>
-
-

- This will also allow the dnssec-* tools to access the HSM - without PIN entry. (The pkcs11-* tools access the HSM directly, - not via OpenSSL, so a PIN will still be required to use - them.) -

-

- In native PKCS#11 mode, the PIN can be provided in a file specified - as an attribute of the key's label. For example, if a key had the label - pkcs11:object=local-zsk;pin-source=/etc/hsmpin, - then the PIN would be read from the file - /etc/hsmpin. -

-
-

Warning

-

- Placing the HSM's PIN in a text file in this manner may reduce the - security advantage of using an HSM. Be sure this is what you want to - do before configuring the system in this way. -

-
-
-
- -
-

-DLZ (Dynamically Loadable Zones)

- -

- DLZ (Dynamically Loadable Zones) is an extension to BIND 9 that allows - zone data to be retrieved directly from an external database. There is - no required format or schema. DLZ drivers exist for several different - database backends including PostgreSQL, MySQL, and LDAP and can be - written for any other. -

-

- Historically, DLZ drivers had to be statically linked with the named - binary and were turned on via a configure option at compile time (for - example, "configure --with-dlz-ldap"). - Currently, the drivers provided in the BIND 9 tarball in - contrib/dlz/drivers are still linked this - way. -

-

- In BIND 9.8 and higher, it is possible to link some DLZ modules - dynamically at runtime, via the DLZ "dlopen" driver, which acts as a - generic wrapper around a shared object implementing the DLZ API. The - "dlopen" driver is linked into named by default, so configure options - are no longer necessary when using these dynamically linkable drivers, - but are still needed for the older drivers in - contrib/dlz/drivers. -

- -

- When the DLZ module provides data to named, it does so in text format. - The response is converted to DNS wire format by named. This - conversion, and the lack of any internal caching, places significant - limits on the query performance of DLZ modules. Consequently, DLZ is - not recommended for use on high-volume servers. However, it can be - used in a hidden master configuration, with slaves retrieving zone - updates via AXFR. (Note, however, that DLZ has no built-in support for - DNS notify; slaves are not automatically informed of changes to the - zones in the database.) -

- -
-

-Configuring DLZ

- -

- A DLZ database is configured with a dlz - statement in named.conf: -

-
-    dlz example {
-	database "dlopen driver.so args";
-	search yes;
-    };
-    
-

- This specifies a DLZ module to search when answering queries; the - module is implemented in driver.so and is - loaded at runtime by the dlopen DLZ driver. Multiple - dlz statements can be specified; when - answering a query, all DLZ modules with search - set to yes will be queried to find out if - they contain an answer for the query name; the best available - answer will be returned to the client. -

-

- The search option in the above example can be - omitted, because yes is the default value. -

-

- If search is set to no, then - this DLZ module is not searched for the best - match when a query is received. Instead, zones in this DLZ must be - separately specified in a zone statement. This allows you to - configure a zone normally using standard zone option semantics, - but specify a different database back-end for storage of the - zone's data. For example, to implement NXDOMAIN redirection using - a DLZ module for back-end storage of redirection rules: -

-
-    dlz other {
-	database "dlopen driver.so args";
-	search no;
-    };
-
-    zone "." {
-	type redirect;
-	dlz other;
-    };
-    
-
-
-

-Sample DLZ Driver

- -

- For guidance in implementation of DLZ modules, the directory - contrib/dlz/example contains a basic - dynamically-linkable DLZ module--i.e., one which can be - loaded at runtime by the "dlopen" DLZ driver. - The example sets up a single zone, whose name is passed - to the module as an argument in the dlz - statement: -

-
-    dlz other {
-	database "dlopen driver.so example.nil";
-    };
-    
-

- In the above example, the module is configured to create a zone - "example.nil", which can answer queries and AXFR requests, and - accept DDNS updates. At runtime, prior to any updates, the zone - contains an SOA, NS, and a single A record at the apex: -

-
- example.nil.  3600    IN      SOA     example.nil. hostmaster.example.nil. (
-					       123 900 600 86400 3600
-				       )
- example.nil.  3600    IN      NS      example.nil.
- example.nil.  1800    IN      A       10.53.0.1
-    
-

- The sample driver is capable of retrieving information about the - querying client, and altering its response on the basis of this - information. To demonstrate this feature, the example driver - responds to queries for "source-addr.zonename>/TXT" - with the source address of the query. Note, however, that this - record will *not* be included in AXFR or ANY responses. Normally, - this feature would be used to alter responses in some other fashion, - e.g., by providing different address records for a particular name - depending on the network from which the query arrived. -

-

- Documentation of the DLZ module API can be found in - contrib/dlz/example/README. This directory also - contains the header file dlz_minimal.h, which - defines the API and should be included by any dynamically-linkable - DLZ module. -

-
-
- -
-

-DynDB (Dynamic Database)

- -

- DynDB is an extension to BIND 9 which, like DLZ - (see the section called “DLZ (Dynamically Loadable Zones)”), allows zone data to be - retrieved from an external database. Unlike DLZ, a DynDB module - provides a full-featured BIND zone database interface. Where - DLZ translates DNS queries into real-time database lookups, - resulting in relatively poor query performance, and is unable - to handle DNSSEC-signed data due to its limited API, a DynDB - module can pre-load an in-memory database from the external - data source, providing the same performance and functionality - as zones served natively by BIND. -

-

- A DynDB module supporting LDAP has been created by Red Hat - and is available from - https://fedorahosted.org/bind-dyndb-ldap/. -

-

- A sample DynDB module for testing and developer guidance - is included with the BIND source code, in the directory - bin/tests/system/dyndb/driver. -

- -
-

-Configuring DynDB

- -

- A DynDB database is configured with a dyndb - statement in named.conf: -

-
-    dyndb example "driver.so" {
-        parameters
-    };
-    
-

- The file driver.so is a DynDB module which - implements the full DNS database API. Multiple - dyndb statements can be specified, to load - different drivers or multiple instances of the same driver. - Zones provided by a DynDB module are added to the view's zone - table, and are treated as normal authoritative zones when BIND - is responding to queries. Zone configuration is handled internally - by the DynDB module. -

-

- The parameters are passed as an opaque - string to the DynDB module's initialization routine. Configuration - syntax will differ depending on the driver. -

-
-
-

-Sample DynDB Module

- -

- For guidance in implementation of DynDB modules, the directory - bin/tests/system/dyndb/driver. - contains a basic DynDB module. - The example sets up two zones, whose names are passed - to the module as arguments in the dyndb - statement: -

-
-    dyndb sample "sample.so" { example.nil. arpa. };
-    
-

- In the above example, the module is configured to create a zone - "example.nil", which can answer queries and AXFR requests, and - accept DDNS updates. At runtime, prior to any updates, the zone - contains an SOA, NS, and a single A record at the apex: -

-
- example.nil.  86400    IN      SOA     example.nil. example.nil. (
-                                               0 28800 7200 604800 86400
-                                       )
- example.nil.  86400    IN      NS      example.nil.
- example.nil.  86400    IN      A       127.0.0.1
-    
-

- When the zone is updated dynamically, the DynDB module will determine - whether the updated RR is an address (i.e., type A or AAAA) and if - so, it will automatically update the corresponding PTR record in a - reverse zone. (Updates are not stored permanently; all updates are - lost when the server is restarted.) -

-
-
- -
-

-Catalog Zones

- -

- A "catalog zone" is a special DNS zone that contains a list of - other zones to be served, along with their configuration parameters. - Zones listed in a catalog zone are called "member zones". - When a catalog zone is loaded or transferred to a slave server - which supports this functionality, the slave server will create - the member zones automatically. When the catalog zone is updated - (for example, to add or delete member zones, or change - their configuration parameters) those changes are immediately put - into effect. Because the catalog zone is a normal DNS zone, these - configuration changes can be propagated using the standard AXFR/IXFR - zone transfer mechanism. -

-

- Catalog zones' format and behavior are specified as an internet draft - for interoperability among DNS implementations. As of this release, the - latest revision of the DNS catalog zones draft can be found here: - https://datatracker.ietf.org/doc/draft-muks-dnsop-dns-catalog-zones/ -

- -
-

-Principle of Operation

-

- Normally, if a zone is to be served by a slave server, the - named.conf file on the server must list the - zone, or the zone must be added using rndc addzone. - In environments with a large number of slave servers and/or where - the zones being served are changing frequently, the overhead involved - in maintaining consistent zone configuration on all the slave - servers can be significant. -

-

- A catalog zone is a way to ease this administrative burden. It is a - DNS zone that lists member zones that should be served by slave servers. - When a slave server receives an update to the catalog zone, it adds, - removes, or reconfigures member zones based on the data received. -

-

- To use a catalog zone, it must first be set up as a normal zone on - the master and the on slave servers that will be configured to use - it. It must also be added to a catalog-zones list - in the options or view statement - in named.conf. (This is comparable to the way - a policy zone is configured as a normal zone and also listed in - a response-policy statement.) -

-

- To use the catalog zone feature to serve a new member zone: -

-
    -
  • -

    - Set up the the member zone to be served on the master as normal. - This could be done by editing named.conf, - or by running rndc addzone. -

    -
  • -
  • -

    - Add an entry to the catalog zone for the new member zone. - This could be done by editing the catalog zone's master file - and running rndc reload, or by updating - the zone using nsupdate. -

    -
  • -
-

- The change to the catalog zone will be propagated from the master to all - slaves using the normal AXFR/IXFR mechanism. When the slave receives the - update to the catalog zone, it will detect the entry for the new member - zone, create an instance of of that zone on the slave server, and point - that instance to the masters specified in the catalog - zone data. The newly created member zone is a normal slave zone, so - BIND will immediately initiate a transfer of zone contents from the - master. Once complete, the slave will start serving the member zone. -

-

- Removing a member zone from a slave server requires nothing more than - deleting the member zone's entry in the catalog zone. The change to the - catalog zone is propagated to the slave server using the normal AXFR/IXFR - transfer mechanism. The slave server, on processing the update, will - notice that the member zone has been removed. It will stop serving the - zone and remove it from its list of configured zones. (Removing the - member zone from the master server has to be done in the normal way, - by editing the configuration file or running - rndc delzone.) -

-
- -
-

-Configuring Catalog Zones

-

- Catalog zones are configured with a catalog-zones - statement in the options or view - section of named.conf. For example, -

-
-catalog-zones {
-	zone "catalog.example"
-	     default-masters { 10.53.0.1; }
-	     in-memory no
-	     zone-directory "catzones"
-	     min-update-interval 10;
-};
-
-

- This statement specifies that the zone - catalog.example is a catalog zone. This zone must be - properly configured in the same view. In most configurations, it would - be a slave zone. -

-

- The options following the zone name are not required, and may be - specified in any order: -

-

- The default-masters option defines the default masters - for member zones listed in a catalog zone. This can be overridden by - options within a catalog zone. If no such options are included, then - member zones will transfer their contents from the servers listed in - this option. -

-

- The in-memory option, if set to yes, - causes member zones to be stored only in memory. This is functionally - equivalent to configuring a slave zone without a file. - option. The default is no; member zones' content - will be stored locally in a file whose name is automatically generated - from the view name, catalog zone name, and member zone name. -

-

- The zone-directory option causes local copies of - member zones' master files (if in-memory is not set - to yes) to be stored in the specified directory. - The default is to store zone files in the server's working directory. - A non-absolute pathname in zone-directory is - assumed to be relative to the working directory. -

-

- The min-update-interval option sets the minimum - interval between processing of updates to catalog zones, in seconds. - If an update to a catalog zone (for example, via IXFR) happens less - than min-update-interval seconds after the most - recent update, then the changes will not be carried out until this - interval has elapsed. The default is 5 seconds. -

-

- Catalog zones are defined on a per-view basis. Configuring a non-empty - catalog-zones statement in a view will automatically - turn on allow-new-zones for that view. (Note: this - means rndc addzone and rndc delzone - will also work in any view that supports catalog zones.) -

-
- -
-

-Catalog Zone format

-

- A catalog zone is a regular DNS zone; therefore, it has to have a - single SOA and at least one NS - record. -

-

- A record stating the version of the catalog zone format is - also required. If the version number listed is not supported by - the server, then a catalog zone may not be used by that server. -

-
-catalog.example.    IN SOA . . 2016022901 900 600 86400 1
-catalog.example.    IN NS nsexample.
-version.catalog.example.    IN TXT "1"
-
-

- Note that this record must have the domain name - version.catalog-zone-name. This illustrates - how the meaning of data stored in a catalog zone is indicated by the - the domain name label immediately before the catalog zone domain. -

-

- Catalog zone options can be set either globally for the whole catalog - zone or for a single member zone. Global options override the settings - in the configuration file and member zone options override global - options. -

-

- Global options are set at the apex of the catalog zone, e.g.: -

-
- masters.catalog.example.    IN AAAA 2001:db8::1
-
-

BIND currently supports the following options:

-
    -
  • -

    A simple masters definition:

    -
    -	 masters.catalog.example.    IN A 192.0.2.1
    -	
    -

    - This option defines a master server for the member zones - it - can be either an A or AAAA record. If multiple masters are set the - order in which they are used is random. -

    -
  • -
  • -

    A masters with a TSIG key defined:

    -
    -         label.masters.catalog.example.     IN A 192.0.2.2
    -         label.masters.catalog.example.	    IN TXT "tsig_key_name"
    -        
    -

    - This option defines a master server for the member zone with a TSIG - key set. The TSIG key must be configured in the configuration file. - label can be any valid DNS label. -

    -
  • -
  • -

    allow-query and - allow-transfer ACLs:

    -
    -         allow-query.catalog.example.	IN APL 1:10.0.0.1/24
    -         allow-transfer.catalog.example.	IN APL !1:10.0.0.1/32 1:10.0.0.0/24
    -        
    -

    - These options are the equivalents of allow-query - and allow-transfer in a zone declaration in the - named.conf configuration file. The ACL is - processed in order - if there's no match to any rule the default - policy is to deny access. For the syntax of the APL RR see RFC - 3123 -

    -
  • -
-

- A member zone is added by including a PTR - resource record in the zones sub-domain of the - catalog zone. The record label is a SHA-1 hash - of the member zone name in wire format. The target of the PTR - record is the member zone name. For example, to add the member - zone domain.example: -

-
-5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN PTR domain.example.
-
-

- The hash is necessary to identify options for a specific member - zone. The member zone-specific options are defined the same way as - global options, but in the member zone subdomain: -

-
-masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN A 192.0.2.2
-label.masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN AAAA 2001:db8::2
-label.masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN TXT "tsig_key"
-allow-query.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN APL 1:10.0.0.0/24
-
-

- As would be expected, options defined for a specific zone override - the global options defined in the catalog zone. These in turn override - the global options defined in the catalog-zones - statement in the configuration file. -

-

- (Note that none of the global records an option will be inherited if - any records are defined for that option for the specific zone. For - example, if the zone had a masters record of type - A but not AAAA, then it would not inherit the - type AAAA record from the global option.) -

-
-
- -
-

-IPv6 Support in BIND 9

-

- BIND 9 fully supports all currently - defined forms of IPv6 name to address and address to name - lookups. It will also use IPv6 addresses to make queries when - running on an IPv6 capable system. -

- -

- For forward lookups, BIND 9 supports - only AAAA records. RFC 3363 deprecated the use of A6 records, - and client-side support for A6 records was accordingly removed - from BIND 9. - However, authoritative BIND 9 name servers still - load zone files containing A6 records correctly, answer queries - for A6 records, and accept zone transfer for a zone containing A6 - records. -

- -

- For IPv6 reverse lookups, BIND 9 supports - the traditional "nibble" format used in the - ip6.arpa domain, as well as the older, deprecated - ip6.int domain. - Older versions of BIND 9 - supported the "binary label" (also known as "bitstring") format, - but support of binary labels has been completely removed per - RFC 3363. - Many applications in BIND 9 do not understand - the binary label format at all any more, and will return an - error if given. - In particular, an authoritative BIND 9 - name server will not load a zone file containing binary labels. -

- -

- For an overview of the format and structure of IPv6 addresses, - see the section called “IPv6 addresses (AAAA)”. -

- -
-

-Address Lookups Using AAAA Records

- -

- The IPv6 AAAA record is a parallel to the IPv4 A record, - and, unlike the deprecated A6 record, specifies the entire - IPv6 address in a single record. For example, -

- -
-$ORIGIN example.com.
-host            3600    IN      AAAA    2001:db8::1
-
- -

- Use of IPv4-in-IPv6 mapped addresses is not recommended. - If a host has an IPv4 address, use an A record, not - a AAAA, with ::ffff:192.168.42.1 as - the address. -

-
-
-

-Address to Name Lookups Using Nibble Format

- -

- When looking up an address in nibble format, the address - components are simply reversed, just as in IPv4, and - ip6.arpa. is appended to the - resulting name. - For example, the following would provide reverse name lookup for - a host with address - 2001:db8::1. -

- -
-$ORIGIN 0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa.
-1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0  14400   IN    PTR    (
-                                    host.example.com. )
-
- -
-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch05.html b/doc/arm/Bv9ARM.ch05.html deleted file mode 100644 index 1db7d40676..0000000000 --- a/doc/arm/Bv9ARM.ch05.html +++ /dev/null @@ -1,15350 +0,0 @@ - - - - - -Chapter 5. BIND 9 Configuration Reference - - - - - - - - -
-

-Chapter 5. BIND 9 Configuration Reference

- - -

- BIND 9 configuration is broadly similar - to BIND 8; however, there are a few new - areas - of configuration, such as views. BIND - 8 configuration files should work with few alterations in BIND - 9, although more complex configurations should be reviewed to check - if they can be more efficiently implemented using the new features - found in BIND 9. -

- -

- BIND 4 configuration files can be - converted to the new format - using the shell script - contrib/named-bootconf/named-bootconf.sh. -

-
-

-Configuration File Elements

- -

- Following is a list of elements used throughout the BIND configuration - file documentation: -

-
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- acl_name -

-
-

- The name of an address_match_list as - defined by the acl statement. -

-
-

- address_match_list -

-
-

- A list of one or more - ip_addr, - ip_prefix, key_id, - or acl_name elements, see - the section called “Address Match Lists”. -

-
-

- masters_list -

-
-

- A named list of one or more ip_addr - with optional key_id and/or - ip_port. - A masters_list may include other - masters_lists. -

-
-

- domain_name -

-
-

- A quoted string which will be used as - a DNS name, for example "my.test.domain". -

-
-

- namelist -

-
-

- A list of one or more domain_name - elements. -

-
-

- dotted_decimal -

-
-

- One to four integers valued 0 through - 255 separated by dots (`.'), such as 123, - 45.67 or 89.123.45.67. -

-
-

- ip4_addr -

-
-

- An IPv4 address with exactly four elements - in dotted_decimal notation. -

-
-

- ip6_addr -

-
-

- An IPv6 address, such as 2001:db8::1234. - IPv6 scoped addresses that have ambiguity on their - scope zones must be disambiguated by an appropriate - zone ID with the percent character (`%') as - delimiter. It is strongly recommended to use - string zone names rather than numeric identifiers, - in order to be robust against system configuration - changes. However, since there is no standard - mapping for such names and identifier values, - currently only interface names as link identifiers - are supported, assuming one-to-one mapping between - interfaces and links. For example, a link-local - address fe80::1 on the link - attached to the interface ne0 - can be specified as fe80::1%ne0. - Note that on most systems link-local addresses - always have the ambiguity, and need to be - disambiguated. -

-
-

- ip_addr -

-
-

- An ip4_addr or ip6_addr. -

-
-

- ip_dscp -

-
-

- A number between 0 and 63, used - to select a differentiated services code point (DSCP) - value for use with outgoing traffic on operating systems - that support DSCP. -

-
-

- ip_port -

-
-

- An IP port number. - The number is limited to 0 - through 65535, with values - below 1024 typically restricted to use by processes running - as root. - In some cases, an asterisk (`*') character can be used as a - placeholder to - select a random high-numbered port. -

-
-

- ip_prefix -

-
-

- An IP network specified as an ip_addr, - followed by a slash (`/') and then the number of bits in the - netmask. - Trailing zeros in a ip_addr - may omitted. - For example, 127/8 is the - network 127.0.0.0 with - netmask 255.0.0.0 and 1.2.3.0/28 is - network 1.2.3.0 with netmask 255.255.255.240. -

-

- When specifying a prefix involving a IPv6 scoped address - the scope may be omitted. In that case the prefix will - match packets from any scope. -

-
-

- key_id -

-
-

- A domain_name representing - the name of a shared key, to be used for transaction - security. -

-
-

- key_list -

-
-

- A list of one or more - key_ids, - separated by semicolons and ending with a semicolon. -

-
-

- number -

-
-

- A non-negative 32-bit integer - (i.e., a number between 0 and 4294967295, inclusive). - Its acceptable value might be further - limited by the context in which it is used. -

-
-

- fixedpoint -

-
-

- A non-negative real number that can be specified to - the nearest one hundredth. Up to five digits can be - specified before a decimal point, and up to two - digits after, so the maximum value is 99999.99. - Acceptable values might be further limited by the - context in which it is used. -

-
-

- path_name -

-
-

- A quoted string which will be used as - a pathname, such as zones/master/my.test.domain. -

-
-

- port_list -

-
-

- A list of an ip_port or a port - range. - A port range is specified in the form of - range followed by - two ip_ports, - port_low and - port_high, which represents - port numbers from port_low through - port_high, inclusive. - port_low must not be larger than - port_high. - For example, - range 1024 65535 represents - ports from 1024 through 65535. - In either case an asterisk (`*') character is not - allowed as a valid ip_port. -

-
-

- size_spec -

-
-

- A 64-bit unsigned integer, or the keywords - unlimited or - default. -

-

- Integers may take values - 0 <= value <= 18446744073709551615, though - certain parameters - (such as max-journal-size) may - use a more limited range within these extremes. - In most cases, setting a value to 0 does not - literally mean zero; it means "undefined" or - "as big as possible", depending on the context. - See the explanations of particular parameters - that use size_spec - for details on how they interpret its use. -

-

- Numeric values can optionally be followed by a - scaling factor: - K or k - for kilobytes, - M or m - for megabytes, and - G or g - for gigabytes, which scale by 1024, 1024*1024, and - 1024*1024*1024 respectively. -

-

- unlimited generally means - "as big as possible", and is usually the best - way to safely set a very large number. -

-

- default - uses the limit that was in force when the server was started. -

-
-

- size_or_percent -

-
-

- size_spec or integer value - followed by '%' to represent percents. -

-

- The behavior is exactly the same as - size_spec, but - size_or_percent allows also - to specify a positive integer value followed by - '%' sign to represent percents. -

-
-

- yes_or_no -

-
-

- Either yes or no. - The words true and false are - also accepted, as are the numbers 1 - and 0. -

-
-

- dialup_option -

-
-

- One of yes, - no, notify, - notify-passive, refresh or - passive. - When used in a zone, notify-passive, - refresh, and passive - are restricted to slave and stub zones. -

-
-
-
-

-Address Match Lists

- -
-

-Syntax

- -
address_match_list = address_match_list_element ; ...
-
-address_match_list_element = [ ! ] ( ip_address | ip_prefix |
-     key key_id | acl_name | { address_match_list } )
-
- -
-
-

-Definition and Usage

- -

- Address match lists are primarily used to determine access - control for various server operations. They are also used in - the listen-on and sortlist - statements. The elements which constitute an address match - list can be any of the following: -

-
    -
  • - an IP address (IPv4 or IPv6) -
  • -
  • - an IP prefix (in `/' notation) -
  • -
  • - - a key ID, as defined by the key - statement - -
  • -
  • - the name of an address match list defined with - the acl statement - -
  • -
  • - a nested address match list enclosed in braces -
  • -
- -

- Elements can be negated with a leading exclamation mark (`!'), - and the match list names "any", "none", "localhost", and - "localnets" are predefined. More information on those names - can be found in the description of the acl statement. -

- -

- The addition of the key clause made the name of this syntactic - element something of a misnomer, since security keys can be used - to validate access without regard to a host or network address. - Nonetheless, the term "address match list" is still used - throughout the documentation. -

- -

- When a given IP address or prefix is compared to an address - match list, the comparison takes place in approximately O(1) - time. However, key comparisons require that the list of keys - be traversed until a matching key is found, and therefore may - be somewhat slower. -

- -

- The interpretation of a match depends on whether the list is being - used for access control, defining listen-on ports, or in a - sortlist, and whether the element was negated. -

- -

- When used as an access control list, a non-negated match - allows access and a negated match denies access. If - there is no match, access is denied. The clauses - allow-notify, - allow-recursion, - allow-recursion-on, - allow-query, - allow-query-on, - allow-query-cache, - allow-query-cache-on, - allow-transfer, - allow-update, - allow-update-forwarding, - blackhole, and - keep-response-order all use address match - lists. Similarly, the listen-on option will cause the - server to refuse queries on any of the machine's - addresses which do not match the list. -

- -

- Order of insertion is significant. If more than one element - in an ACL is found to match a given IP address or prefix, - preference will be given to the one that came - first in the ACL definition. - Because of this first-match behavior, an element that - defines a subset of another element in the list should - come before the broader element, regardless of whether - either is negated. For example, in - 1.2.3/24; ! 1.2.3.13; - the 1.2.3.13 element is completely useless because the - algorithm will match any lookup for 1.2.3.13 to the 1.2.3/24 - element. Using ! 1.2.3.13; 1.2.3/24 fixes - that problem by having 1.2.3.13 blocked by the negation, but - all other 1.2.3.* hosts fall through. -

-
-
- -
-

-Comment Syntax

- -

- The BIND 9 comment syntax allows for - comments to appear - anywhere that whitespace may appear in a BIND configuration - file. To appeal to programmers of all kinds, they can be written - in the C, C++, or shell/perl style. -

- -
-

-Syntax

- -

-

-
/* This is a BIND comment as in C */
-

-

-
// This is a BIND comment as in C++
-

-

-
# This is a BIND comment as in common UNIX shells
-# and perl
-

-

-
-
-

-Definition and Usage

- -

- Comments may appear anywhere that whitespace may appear in - a BIND configuration file. -

-

- C-style comments start with the two characters /* (slash, - star) and end with */ (star, slash). Because they are completely - delimited with these characters, they can be used to comment only - a portion of a line or to span multiple lines. -

-

- C-style comments cannot be nested. For example, the following - is not valid because the entire comment ends with the first */: -

-

- -

-
/* This is the start of a comment.
-   This is still part of the comment.
-/* This is an incorrect attempt at nesting a comment. */
-   This is no longer in any comment. */
-
-

- -

- -

- C++-style comments start with the two characters // (slash, - slash) and continue to the end of the physical line. They cannot - be continued across multiple physical lines; to have one logical - comment span multiple lines, each line must use the // pair. - For example: -

-

- -

-
// This is the start of a comment.  The next line
-// is a new comment, even though it is logically
-// part of the previous comment.
-
-

- -

-

- Shell-style (or perl-style, if you prefer) comments start - with the character # (number sign) - and continue to the end of the - physical line, as in C++ comments. - For example: -

- -

- -

-
# This is the start of a comment.  The next line
-# is a new comment, even though it is logically
-# part of the previous comment.
-
-

- -

- -
-

Warning

-

- You cannot use the semicolon (`;') character - to start a comment such as you would in a zone file. The - semicolon indicates the end of a configuration - statement. -

-
-
-
-
- -
-

-Configuration File Grammar

- -

- A BIND 9 configuration consists of - statements and comments. - Statements end with a semicolon. Statements and comments are the - only elements that can appear without enclosing braces. Many - statements contain a block of sub-statements, which are also - terminated with a semicolon. -

- -

- The following statements are supported: -

- -
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

acl

-
-

- defines a named IP address - matching list, for access control and other uses. -

-
-

controls

-
-

- declares control channels to be used - by the rndc utility. -

-
-

dnssec-policy

-
-

- describes a DNSSEC key and signing policy for zones. - See the section called “dnssec-policy Statement Grammar” for details. -

-
-

include

-
-

- includes a file. -

-
-

key

-
-

- specifies key information for use in - authentication and authorization using TSIG. -

-
-

logging

-
-

- specifies what the server logs, and where - the log messages are sent. -

-
-

masters

-
-

- defines a named masters list for - inclusion in stub and slave zones' - masters or - also-notify lists. -

-
-

options

-
-

- controls global server configuration - options and sets defaults for other statements. -

-
-

server

-
-

- sets certain configuration options on - a per-server basis. -

-
-

statistics-channels

-
-

- declares communication channels to get access to - named statistics. -

-
-

trust-anchors

-
-

- defines DNSSEC trust anchors: if used with - the initial-key or - initial-ds keyword, - trust anchors are kept up to date using RFC - 5011 trust anchor maintenance, and if used with - static-key or - static-ds, trust anchors - are permanent. -

-
-

managed-keys

-
-

- is identical to trust-anchors; - this option is deprecated in favor - of trust-anchors with - the initial-key keyword, - and may be removed in a future release. -

-
-

trusted-keys

-
-

- defines permanent trusted DNSSEC keys; - this option is deprecated in favor - of trust-anchors with - the static-key keyword, - and may be removed in a future release. -

-
-

view

-
-

- defines a view. -

-
-

zone

-
-

- defines a zone. -

-
-
- -

- The logging and - options statements may only occur once - per - configuration. -

- -
-

-acl Statement Grammar

-
-acl string { address_match_element; ... };
-
-
-
-

-acl Statement Definition and - Usage

- -

- The acl statement assigns a symbolic - name to an address match list. It gets its name from a primary - use of address match lists: Access Control Lists (ACLs). -

- -

- The following ACLs are built-in: -

- -
- ---- - - - - - - - - - - - - - - - - - - -
-

any

-
-

- Matches all hosts. -

-
-

none

-
-

- Matches no hosts. -

-
-

localhost

-
-

- Matches the IPv4 and IPv6 addresses of all network - interfaces on the system. When addresses are - added or removed, the localhost - ACL element is updated to reflect the changes. -

-
-

localnets

-
-

- Matches any host on an IPv4 or IPv6 network - for which the system has an interface. - When addresses are added or removed, - the localnets - ACL element is updated to reflect the changes. - Some systems do not provide a way to determine the prefix - lengths of - local IPv6 addresses. - In such a case, localnets - only matches the local - IPv6 addresses, just like localhost. -

-
-
-
-
-

-controls Statement Grammar

-
-controls {
-	inet ( ipv4_address | ipv6_address |
-	    * ) [ port ( integer | * ) ] allow
-	    { address_match_element; ... } [
-	    keys { string; ... } ] [ read-only
-	    boolean ];
-	unix quoted_string perm integer
-	    owner integer group integer [
-	    keys { string; ... } ] [ read-only
-	    boolean ];
-};
-
-
- -
-

-controls Statement Definition and - Usage

- -

- The controls statement declares control - channels to be used by system administrators to control the - operation of the name server. These control channels are - used by the rndc utility to send - commands to and retrieve non-DNS results from a name server. -

- -

- An inet control channel is a TCP socket - listening at the specified ip_port on the - specified ip_addr, which can be an IPv4 or IPv6 - address. An ip_addr of * (asterisk) is - interpreted as the IPv4 wildcard address; connections will be - accepted on any of the system's IPv4 addresses. - To listen on the IPv6 wildcard address, - use an ip_addr of ::. - If you will only use rndc on the local host, - using the loopback address (127.0.0.1 - or ::1) is recommended for maximum security. -

- -

- If no port is specified, port 953 is used. The asterisk - "*" cannot be used for ip_port. -

- -

- The ability to issue commands over the control channel is - restricted by the allow and - keys clauses. - Connections to the control channel are permitted based on the - address_match_list. This is for simple - IP address based filtering only; any key_id - elements of the address_match_list - are ignored. -

- -

- A unix control channel is a UNIX domain - socket listening at the specified path in the file system. - Access to the socket is specified by the perm, - owner and group clauses. - Note on some platforms (SunOS and Solaris) the permissions - (perm) are applied to the parent directory - as the permissions on the socket itself are ignored. -

- -

- The primary authorization mechanism of the command - channel is the key_list, which - contains a list of key_ids. - Each key_id in the key_list - is authorized to execute commands over the control channel. - See Remote Name Daemon Control application in the section called “Administrative Tools”) - for information about configuring keys in rndc. -

- -

- If the read-only clause is enabled, the - control channel is limited to the following set of read-only - commands: nta -dump, - null, status, - showzone, testgen, and - zonestatus. By default, - read-only is not enabled and the control - channel allows read-write access. -

- -

- If no controls statement is present, - named will set up a default - control channel listening on the loopback address 127.0.0.1 - and its IPv6 counterpart ::1. - In this case, and also when the controls statement - is present but does not have a keys clause, - named will attempt to load the command channel key - from the file rndc.key in - /etc (or whatever sysconfdir - was specified as when BIND was built). - To create a rndc.key file, run - rndc-confgen -a. -

- -

- The rndc.key feature was created to - ease the transition of systems from BIND 8, - which did not have digital signatures on its command channel - messages and thus did not have a keys clause. - - It makes it possible to use an existing BIND 8 - configuration file in BIND 9 unchanged, - and still have rndc work the same way - ndc worked in BIND 8, simply by executing the - command rndc-confgen -a after BIND 9 is - installed. -

- -

- Since the rndc.key feature - is only intended to allow the backward-compatible usage of - BIND 8 configuration files, this - feature does not - have a high degree of configurability. You cannot easily change - the key name or the size of the secret, so you should make a - rndc.conf with your own key if you - wish to change - those things. The rndc.key file - also has its - permissions set such that only the owner of the file (the user that - named is running as) can access it. - If you - desire greater flexibility in allowing other users to access - rndc commands, then you need to create - a - rndc.conf file and make it group - readable by a group - that contains the users who should have access. -

- -

- To disable the command channel, use an empty - controls statement: - controls { };. -

- -
-
-

-include Statement Grammar

- -
include filename;
-
-
-

-include Statement Definition and Usage

- -

- The include statement inserts the - specified file (or files if a valid glob expression is detected) - at the point where the include - statement is encountered. The include - statement facilitates the administration of configuration - files - by permitting the reading or writing of some things but not - others. For example, the statement could include private keys - that are readable only by the name server. -

- -
-
-

-key Statement Grammar

-
-key string {
-	algorithm string;
-	secret string;
-};
-
-
- -
-

-key Statement Definition and Usage

- -

- The key statement defines a shared - secret key for use with TSIG (see the section called “TSIG”) - or the command channel - (see the section called “controls Statement Definition and - Usage”). -

- -

- The key statement can occur at the - top level - of the configuration file or inside a view - statement. Keys defined in top-level key - statements can be used in all views. Keys intended for use in - a controls statement - (see the section called “controls Statement Definition and - Usage”) - must be defined at the top level. -

- -

- The key_id, also known as the - key name, is a domain name uniquely identifying the key. It can - be used in a server - statement to cause requests sent to that - server to be signed with this key, or in address match lists to - verify that incoming requests have been signed with a key - matching this name, algorithm, and secret. -

- -

- The algorithm_id is a string - that specifies a security/authentication algorithm. The - named server supports hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384 - and hmac-sha512 TSIG authentication. - Truncated hashes are supported by appending the minimum - number of required bits preceded by a dash, e.g. - hmac-sha1-80. The - secret_string is the secret - to be used by the algorithm, and is treated as a Base64 - encoded string. -

- -
-
-

-logging Statement Grammar

-
-logging {
-	category string { string; ... };
-	channel string {
-		buffered boolean;
-		file quoted_string [ versions ( unlimited | integer ) ]
-		    [ size size ] [ suffix ( increment | timestamp ) ];
-		null;
-		print-category boolean;
-		print-severity boolean;
-		print-time ( iso8601 | iso8601-utc | local | boolean );
-		severity log_severity;
-		stderr;
-		syslog [ syslog_facility ];
-	};
-};
-
-
- -
-

-logging Statement Definition and Usage

- -

- The logging statement configures a - wide - variety of logging options for the name server. Its channel phrase - associates output methods, format options and severity levels with - a name that can then be used with the category phrase - to select how various classes of messages are logged. -

-

- Only one logging statement is used to - define - as many channels and categories as are wanted. If there is no logging statement, - the logging configuration will be: -

- -
logging {
-     category default { default_syslog; default_debug; };
-     category unmatched { null; };
-};
-
- -

- If named is started with the - -L option, it logs to the specified file - at startup, instead of using syslog. In this case the logging - configuration will be: -

- -
logging {
-     category default { default_logfile; default_debug; };
-     category unmatched { null; };
-};
-
- -

- The logging configuration is only established when - the entire configuration file has been parsed. - When the server is starting up, all logging messages - regarding syntax errors in the configuration file go to the default - channels, or to standard error if the -g option - was specified. -

- -
-

-The channel Phrase

- -

- All log output goes to one or more channels; - you can make as many of them as you want. -

- -

- Every channel definition must include a destination clause that - says whether messages selected for the channel go to a file, to a - particular syslog facility, to the standard error stream, or are - discarded. It can optionally also limit the message severity level - that will be accepted by the channel (the default is - info), and whether to include a - named-generated time stamp, the - category name - and/or severity level (the default is not to include any). -

- -

- The null destination clause - causes all messages sent to the channel to be discarded; - in that case, other options for the channel are meaningless. -

- -

- The file destination clause directs - the channel to a disk file. It can include additional - arguments to specify how large the file is allowed to - become before it is rolled to a backup file - (size), how many backup versions of - the file will be saved each time this happens - (versions), and the format to use - for naming backup versions (suffix). -

- -

- The size option is used to limit - log file growth. If the file ever exceeds the specified - size, then named will stop writing to the - file unless it has a versions option - associated with it. If backup versions are kept, the files - are rolled as described below. If there is no - versions option, no more data will - be written to the log until some out-of-band mechanism - removes or truncates the log to less than the maximum size. - The default behavior is not to limit the size of the file. -

-

- File rolling only occurs when the file exceeds the size - specified with the size option. No - backup versions are kept by default; any existing - log file is simply appended. The - versions option specifies - how many backup versions of the file should be kept. - If set to unlimited, there is no limit. -

-

- The suffix option can be set to - either increment or - timestamp. If set to - timestamp, then when a log file is - rolled, it is saved with the current timestamp as a - file suffix. If set to increment, - then backup files are saved with incrementing numbers - as suffixes; older files are renamed when rolling. - For example, if versions - is set to 3 and suffix to - increment, then when - filename.log reaches the size - specified by size, - filename.log.1 is renamed to - filename.log.2, - filename.log.0 is renamed - to filename.log.1, - and filename.log is - renamed to filename.log.0, - whereupon a new filename.log is - opened. -

- -

- Example usage of the size, - versions, and suffix - options: -

- -
channel an_example_channel {
-    file "example.log" versions 3 size 20m suffix increment;
-    print-time yes;
-    print-category yes;
-};
-
- -

- The syslog destination clause - directs the - channel to the system log. Its argument is a - syslog facility as described in the syslog man - page. Known facilities are kern, user, - mail, daemon, auth, - syslog, lpr, news, - uucp, cron, authpriv, - ftp, local0, local1, - local2, local3, local4, - local5, local6 and - local7, however not all facilities - are supported on - all operating systems. - How syslog will handle messages - sent to - this facility is described in the syslog.conf man - page. If you have a system which uses a very old version of syslog that - only uses two arguments to the openlog() function, - then this clause is silently ignored. -

-

- On Windows machines syslog messages are directed to the EventViewer. -

-

- The severity clause works like syslog's - "priorities", except that they can also be used if you are writing - straight to a file rather than using syslog. - Messages which are not at least of the severity level given will - not be selected for the channel; messages of higher severity - levels - will be accepted. -

-

- If you are using syslog, then the syslog.conf priorities - will also determine what eventually passes through. For example, - defining a channel facility and severity as daemon and debug but - only logging daemon.warning via syslog.conf will - cause messages of severity info and - notice to - be dropped. If the situation were reversed, with named writing - messages of only warning or higher, - then syslogd would - print all messages it received from the channel. -

- -

- The stderr destination clause - directs the - channel to the server's standard error stream. This is intended - for - use when the server is running as a foreground process, for - example - when debugging a configuration. -

- -

- The server can supply extensive debugging information when - it is in debugging mode. If the server's global debug level is - greater - than zero, then debugging mode will be active. The global debug - level is set either by starting the named server - with the -d flag followed by a positive integer, - or by running rndc trace. - The global debug level - can be set to zero, and debugging mode turned off, by running rndc -notrace. All debugging messages in the server have a debug - level, and higher debug levels give more detailed output. Channels - that specify a specific debug severity, for example: -

- -
channel specific_debug_level {
-    file "foo";
-    severity debug 3;
-};
-
- -

- will get debugging output of level 3 or less any time the - server is in debugging mode, regardless of the global debugging - level. Channels with dynamic - severity use the - server's global debug level to determine what messages to print. -

-

- print-time can be set to - yes, no, - or a time format specifier, which may be one of - local, iso8601 or - iso8601-utc. If set to - no, then the date and time will - not be logged. If set to yes - or local, the date and time are logged - in a human readable format, using the local time zone. - If set to iso8601 the local time is - logged in ISO8601 format. If set to - iso8601-utc, then the date and time - are logged in ISO8601 format, with time zone set to - UTC. The default is no. -

-

- print-time may - be specified for a syslog channel, - but it is usually - pointless since syslog also logs - the date and time. -

-

- If print-category is - requested, then the - category of the message will be logged as well. Finally, if print-severity is - on, then the severity level of the message will be logged. The print- options may - be used in any combination, and will always be printed in the - following - order: time, category, severity. Here is an example where all - three print- options - are on: -

- -

- 28-Feb-2000 15:05:32.863 general: notice: running -

- -

- If buffered has been turned on the output - to files will not be flushed after each log entry. By default - all log messages are flushed. -

- -

- There are four predefined channels that are used for - named's default logging as follows. - If named is started with the - -L then a - fifth channel default_logfile is added. - How they are - used is described in the section called “The category Phrase”. -

- -
channel default_syslog {
-    // send to syslog's daemon facility
-    syslog daemon;
-    // only send priority info and higher
-    severity info;
-};
-
-channel default_debug {
-    // write to named.run in the working directory
-    // Note: stderr is used instead of "named.run" if
-    // the server is started with the '-g' option.
-    file "named.run";
-    // log at the server's current debug level
-    severity dynamic;
-};
-
-channel default_stderr {
-    // writes to stderr
-    stderr;
-    // only send priority info and higher
-    severity info;
-};
-
-channel null {
-   // toss anything sent to this channel
-   null;
-};
-
-channel default_logfile {
-    // this channel is only present if named is
-    // started with the -L option, whose argument
-    // provides the file name
-    file "...";
-    // log at the server's current debug level
-    severity dynamic;
-};
-
- -

- The default_debug channel has the - special - property that it only produces output when the server's debug - level is - nonzero. It normally writes to a file called named.run - in the server's working directory. -

- -

- For security reasons, when the -u - command line option is used, the named.run file - is created only after named has - changed to the - new UID, and any debug output generated while named is - starting up and still running as root is discarded. If you need - to capture this output, you must run the server with the -L - option to specify a default logfile, or the -g - option to log to standard error which you can redirect to a file. -

- -

- Once a channel is defined, it cannot be redefined. Thus you - cannot alter the built-in channels directly, but you can modify - the default logging by pointing categories at channels you have - defined. -

-
- -
-

-The category Phrase

- -

- There are many categories, so you can send the logs you want - to see wherever you want, without seeing logs you don't want. If - you don't specify a list of channels for a category, then log - messages - in that category will be sent to the default category - instead. If you don't specify a default category, the following - "default default" is used: -

- -
category default { default_syslog; default_debug; };
-
- -

- If you start named with the - -L option then the default category is: -

- -
category default { default_logfile; default_debug; };
-
- -

- As an example, let's say you want to log security events to - a file, but you also want keep the default logging behavior. You'd - specify the following: -

- -
channel my_security_channel {
-    file "my_security_file";
-    severity info;
-};
-category security {
-    my_security_channel;
-    default_syslog;
-    default_debug;
-};
- -

- To discard all messages in a category, specify the null channel: -

- -
category xfer-out { null; };
-category notify { null; };
-
- -

- Following are the available categories and brief descriptions - of the types of log information they contain. More - categories may be added in future BIND releases. -

-
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

client

-
-

- Processing of client requests. -

-
-

cname

-
-

- Logs nameservers that are skipped due to them being - a CNAME rather than A / AAAA records. -

-
-

config

-
-

- Configuration file parsing and processing. -

-
-

database

-
-

- Messages relating to the databases used - internally by the name server to store zone and cache - data. -

-
-

default

-
-

- The default category defines the logging - options for those categories where no specific - configuration has been - defined. -

-
-

delegation-only

-
-

- Delegation only. Logs queries that have been - forced to NXDOMAIN as the result of a - delegation-only zone or a - delegation-only in a - forward, hint or stub zone declaration. -

-
-

dispatch

-
-

- Dispatching of incoming packets to the - server modules where they are to be processed. -

-
-

dnssec

-
-

- DNSSEC and TSIG protocol processing. -

-
-

dnstap

-
-

- The "dnstap" DNS traffic capture system. -

-
-

edns-disabled

-
-

- Log queries that have been forced to use plain - DNS due to timeouts. This is often due to - the remote servers not being RFC 1034 compliant - (not always returning FORMERR or similar to - EDNS queries and other extensions to the DNS - when they are not understood). In other words, this is - targeted at servers that fail to respond to - DNS queries that they don't understand. -

-

- Note: the log message can also be due to - packet loss. Before reporting servers for - non-RFC 1034 compliance they should be re-tested - to determine the nature of the non-compliance. - This testing should prevent or reduce the - number of false-positive reports. -

-

- Note: eventually named will have to stop - treating such timeouts as due to RFC 1034 non - compliance and start treating it as plain - packet loss. Falsely classifying packet - loss as due to RFC 1034 non compliance impacts - on DNSSEC validation which requires EDNS for - the DNSSEC records to be returned. -

-
-

general

-
-

- The catch-all. Many things still aren't - classified into categories, and they all end up here. -

-
-

lame-servers

-
-

- Lame servers. These are misconfigurations - in remote servers, discovered by BIND 9 when trying to - query those servers during resolution. -

-
-

network

-
-

- Network operations. -

-
-

notify

-
-

- The NOTIFY protocol. -

-
-

nsid

-
-

- NSID options received from upstream servers. -

-
-

queries

-
-

- Specify where queries should be logged to. -

-

- At startup, specifying the category queries will also - enable query logging unless querylog option has been - specified. -

- -

- The query log entry first reports a client object - identifier in @0x<hexadecimal-number> - format. Next, it reports the client's IP - address and port number, and the query name, - class and type. Next, it reports whether the - Recursion Desired flag was set (+ if set, - - if not set), whether the query was signed (S), - whether EDNS was in use along with the EDNS version - number (E(#)), whether TCP was used (T), whether - DO (DNSSEC Ok) was set (D), whether CD (Checking - Disabled) was set (C), whether a valid DNS Server - COOKIE was received (V), and whether a DNS - COOKIE option without a valid Server COOKIE was - present (K). After this the destination - address the query was sent to is reported. - Finally, if any CLIENT-SUBNET option - was present in the client query, it is - included in square brackets in the format - [ECS address/source/scope]. -

- -

- client 127.0.0.1#62536 (www.example.com): query: www.example.com IN AAAA +SE -

-

- client ::1#62537 (www.example.net): query: www.example.net IN AAAA -SE -

-

- (The first part of this log message, showing the - client address/port number and query name, is - repeated in all subsequent log messages related - to the same query.) -

-
-

query-errors

-
-

- Information about queries that resulted in some - failure. -

-
-

rate-limit

-
-

- The start, periodic, and final notices of the - rate limiting of a stream of responses are logged at - info severity in this category. - These messages include a hash value of the domain name - of the response and the name itself, - except when there is insufficient memory to record - the name for the final notice - The final notice is normally delayed until about one - minute after rate limit stops. - A lack of memory can hurry the final notice, - in which case it starts with an asterisk (*). - Various internal events are logged at debug 1 level - and higher. -

-

- Rate limiting of individual requests - is logged in the query-errors category. -

-
-

resolver

-
-

- DNS resolution, such as the recursive - lookups performed on behalf of clients by a caching name - server. -

-
-

rpz

-
-

- Information about errors in response policy zone files, - rewritten responses, and at the highest - debug levels, mere rewriting - attempts. -

-
-

security

-
-

- Approval and denial of requests. -

-
-

serve-stale

-
-

- Whether or not a stale answer is used - following a resolver failure. -

-
-

spill

-
-

- Logs queries that have been terminated, either by dropping - or responding with SERVFAIL, as a result of a fetchlimit - quota being exceeded. -

-
-

trust-anchor-telemetry

-
-

- Logs trust-anchor-telemetry requests received by named. -

-
-

unmatched

-
-

- Messages that named was unable to determine the - class of or for which there was no matching view. - A one line summary is also logged to the client category. - This category is best sent to a file or stderr, by - default it is sent to - the null channel. -

-
-

update

-
-

- Dynamic updates. -

-
-

update-security

-
-

- Approval and denial of update requests. -

-
-

xfer-in

-
-

- Zone transfers the server is receiving. -

-
-

xfer-out

-
-

- Zone transfers the server is sending. -

-
-

zoneload

-
-

- Loading of zones and creation of automatic empty zones. -

-
-
-
-
-

-The query-errors Category

-

- The query-errors category is - used to indicate why and how specific queries resulted in - responses which indicate an error. Normally, these messages - will be logged at debug logging levels; - note, however, that if query logging is active, some will be - logged at info. The logging levels are - described below: -

- -

- At debug level 1 or higher - or at - info, when query logging is active - each - response with response code SERVFAIL will be logged as follows: -

-

- client 127.0.0.1#61502: query failed (SERVFAIL) for www.example.com/IN/AAAA at query.c:3880 -

-

- This means an error resulting in SERVFAIL was detected at line - 3880 of source file query.c. Log messages - of this level will particularly help identify the cause of - SERVFAIL for an authoritative server. -

-

- At debug level 2 or higher, detailed - context information about recursive resolutions that resulted in - SERVFAIL will be logged. The log message will look like this: -

-

- -

-
-fetch completed at resolver.c:2970 for www.example.com/A
-in 10.000183: timed out/success [domain:example.com,
-referral:2,restart:7,qrysent:8,timeout:5,lame:0,quota:0,neterr:0,
-badresp:1,adberr:0,findfail:0,valfail:0]
-            
-

-

-

- The first part before the colon shows that a recursive - resolution for AAAA records of www.example.com completed - in 10.000183 seconds and the final result that led to the - SERVFAIL was determined at line 2970 of source file - resolver.c. -

-

- The following part shows the detected final result and the - latest result of DNSSEC validation. The latter is always - "success" when no validation attempt was made. In this example, - this query probably resulted in SERVFAIL because all name - servers are down or unreachable, leading to a timeout in 10 - seconds. DNSSEC validation was probably not attempted. -

-

- The last part, enclosed in square brackets, shows statistics - collected for this particular resolution attempt. - The domain field shows the deepest zone that - the resolver reached; it is the zone where the error was - finally detected. The meaning of the other fields is - summarized in the following table. -

- -
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

referral

-
-

- The number of referrals the resolver received - throughout the resolution process. - In the above example this is 2, which are most - likely com and example.com. -

-
-

restart

-
-

- The number of cycles that the resolver tried - remote servers at the domain - zone. - In each cycle the resolver sends one query - (possibly resending it, depending on the response) - to each known name server of - the domain zone. -

-
-

qrysent

-
-

- The number of queries the resolver sent at the - domain zone. -

-
-

timeout

-
-

- The number of timeouts since the resolver - received the last response. -

-
-

lame

-
-

- The number of lame servers the resolver detected - at the domain zone. - A server is detected to be lame either by an - invalid response or as a result of lookup in - BIND9's address database (ADB), where lame - servers are cached. -

-
-

quota

-
-

- The number of times the resolver was unable - to send a query because it had exceeded the - permissible fetch quota for a server. -

-
-

neterr

-
-

- The number of erroneous results that the - resolver encountered in sending queries - at the domain zone. - One common case is the remote server is - unreachable and the resolver receives an ICMP - unreachable error message. -

-
-

badresp

-
-

- The number of unexpected responses (other than - lame) to queries sent by the - resolver at the domain zone. -

-
-

adberr

-
-

- Failures in finding remote server addresses - of the domain zone in the ADB. - One common case of this is that the remote - server's name does not have any address records. -

-
-

findfail

-
-

- Failures of resolving remote server addresses. - This is a total number of failures throughout - the resolution process. -

-
-

valfail

-
-

- Failures of DNSSEC validation. - Validation failures are counted throughout - the resolution process (not limited to - the domain zone), but should - only happen in domain. -

-
-
-

- At debug level 3 or higher, the same - messages as those at debug level 1 will be - logged for other errors than SERVFAIL. Note that negative - responses such as NXDOMAIN are not errors, and are not logged - at this debug level. -

-

- At debug level 4 or higher, the - detailed context information logged at debug - level 2 will be logged for other errors than SERVFAIL and - for negative resonses such as NXDOMAIN. -

-
-
- -
-

-masters Statement Grammar

-
-masters string [ port integer ] [ dscp
-    integer ] { ( masters | ipv4_address [
-    port integer ] | ipv6_address [ port
-    integer ] ) [ key string ]; ... };
-
-
- -
-

-masters Statement Definition and - Usage

- -

masters - lists allow for a common set of masters to be easily used by - multiple stub and slave zones in their masters - or also-notify lists. -

-
- -
-

-options Statement Grammar

- -

- This is the grammar of the options - statement in the named.conf file: -

-
-options {
-	allow-new-zones boolean;
-	allow-notify { address_match_element; ... };
-	allow-query { address_match_element; ... };
-	allow-query-cache { address_match_element; ... };
-	allow-query-cache-on { address_match_element; ... };
-	allow-query-on { address_match_element; ... };
-	allow-recursion { address_match_element; ... };
-	allow-recursion-on { address_match_element; ... };
-	allow-transfer { address_match_element; ... };
-	allow-update { address_match_element; ... };
-	allow-update-forwarding { address_match_element; ... };
-	also-notify [ port integer ] [ dscp integer ] { ( masters |
-	    ipv4_address [ port integer ] | ipv6_address [ port
-	    integer ] ) [ key string ]; ... };
-	alt-transfer-source ( ipv4_address | * ) [ port ( integer | * )
-	    ] [ dscp integer ];
-	alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer |
-	    * ) ] [ dscp integer ];
-	answer-cookie boolean;
-	attach-cache string;
-	auth-nxdomain boolean; // default changed
-	auto-dnssec ( allow | maintain | off );
-	automatic-interface-scan boolean;
-	avoid-v4-udp-ports { portrange; ... };
-	avoid-v6-udp-ports { portrange; ... };
-	bindkeys-file quoted_string;
-	blackhole { address_match_element; ... };
-	cache-file quoted_string;
-	catalog-zones { zone string [ default-masters [ port integer ]
-	    [ dscp integer ] { ( masters | ipv4_address [ port
-	    integer ] | ipv6_address [ port integer ] ) [ key
-	    string ]; ... } ] [ zone-directory quoted_string ] [
-	    in-memory boolean ] [ min-update-interval duration ]; ... };
-	check-dup-records ( fail | warn | ignore );
-	check-integrity boolean;
-	check-mx ( fail | warn | ignore );
-	check-mx-cname ( fail | warn | ignore );
-	check-names ( primary | master |
-	    secondary | slave | response ) (
-	    fail | warn | ignore );
-	check-sibling boolean;
-	check-spf ( warn | ignore );
-	check-srv-cname ( fail | warn | ignore );
-	check-wildcard boolean;
-	clients-per-query integer;
-	cookie-algorithm ( aes | siphash24 );
-	cookie-secret string;
-	coresize ( default | unlimited | sizeval );
-	datasize ( default | unlimited | sizeval );
-	deny-answer-addresses { address_match_element; ... } [
-	    except-from { string; ... } ];
-	deny-answer-aliases { string; ... } [ except-from { string; ...
-	    } ];
-	dialup ( notify | notify-passive | passive | refresh | boolean );
-	directory quoted_string;
-	disable-algorithms string { string;
-	    ... };
-	disable-ds-digests string { string;
-	    ... };
-	disable-empty-zone string;
-	dns64 netprefix {
-		break-dnssec boolean;
-		clients { address_match_element; ... };
-		exclude { address_match_element; ... };
-		mapped { address_match_element; ... };
-		recursive-only boolean;
-		suffix ipv6_address;
-	};
-	dns64-contact string;
-	dns64-server string;
-	dnskey-sig-validity integer;
-	dnsrps-enable boolean;
-	dnsrps-options { unspecified-text };
-	dnssec-accept-expired boolean;
-	dnssec-dnskey-kskonly boolean;
-	dnssec-loadkeys-interval integer;
-	dnssec-must-be-secure string boolean;
-	dnssec-policy string;
-	dnssec-secure-to-insecure boolean;
-	dnssec-update-mode ( maintain | no-resign );
-	dnssec-validation ( yes | no | auto );
-	dnstap { ( all | auth | client | forwarder |
-	    resolver | update ) [ ( query | response ) ];
-	    ... };
-	dnstap-identity ( quoted_string | none |
-	    hostname );
-	dnstap-output ( file | unix ) quoted_string [
-	    size ( unlimited | size ) ] [ versions (
-	    unlimited | integer ) ] [ suffix ( increment
-	    | timestamp ) ];
-	dnstap-version ( quoted_string | none );
-	dscp integer;
-	dual-stack-servers [ port integer ] { ( quoted_string [ port
-	    integer ] [ dscp integer ] | ipv4_address [ port
-	    integer ] [ dscp integer ] | ipv6_address [ port
-	    integer ] [ dscp integer ] ); ... };
-	dump-file quoted_string;
-	edns-udp-size integer;
-	empty-contact string;
-	empty-server string;
-	empty-zones-enable boolean;
-	fetch-quota-params integer fixedpoint fixedpoint fixedpoint;
-	fetches-per-server integer [ ( drop | fail ) ];
-	fetches-per-zone integer [ ( drop | fail ) ];
-	files ( default | unlimited | sizeval );
-	flush-zones-on-shutdown boolean;
-	forward ( first | only );
-	forwarders [ port integer ] [ dscp integer ] { ( ipv4_address
-	    | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
-	fstrm-set-buffer-hint integer;
-	fstrm-set-flush-timeout integer;
-	fstrm-set-input-queue-size integer;
-	fstrm-set-output-notify-threshold integer;
-	fstrm-set-output-queue-model ( mpsc | spsc );
-	fstrm-set-output-queue-size integer;
-	fstrm-set-reopen-interval duration;
-	geoip-directory ( quoted_string | none );
-	glue-cache boolean;
-	heartbeat-interval integer;
-	hostname ( quoted_string | none );
-	inline-signing boolean;
-	interface-interval duration;
-	ixfr-from-differences ( primary | master | secondary | slave |
-	    boolean );
-	keep-response-order { address_match_element; ... };
-	key-directory quoted_string;
-	lame-ttl duration;
-	listen-on [ port integer ] [ dscp
-	    integer ] {
-	    address_match_element; ... };
-	listen-on-v6 [ port integer ] [ dscp
-	    integer ] {
-	    address_match_element; ... };
-	lmdb-mapsize sizeval;
-	lock-file ( quoted_string | none );
-	managed-keys-directory quoted_string;
-	masterfile-format ( map | raw | text );
-	masterfile-style ( full | relative );
-	match-mapped-addresses boolean;
-	max-cache-size ( default | unlimited | sizeval | percentage );
-	max-cache-ttl duration;
-	max-clients-per-query integer;
-	max-journal-size ( default | unlimited | sizeval );
-	max-ncache-ttl duration;
-	max-records integer;
-	max-recursion-depth integer;
-	max-recursion-queries integer;
-	max-refresh-time integer;
-	max-retry-time integer;
-	max-rsa-exponent-size integer;
-	max-stale-ttl duration;
-	max-transfer-idle-in integer;
-	max-transfer-idle-out integer;
-	max-transfer-time-in integer;
-	max-transfer-time-out integer;
-	max-udp-size integer;
-	max-zone-ttl ( unlimited | duration );
-	memstatistics boolean;
-	memstatistics-file quoted_string;
-	message-compression boolean;
-	min-cache-ttl duration;
-	min-ncache-ttl duration;
-	min-refresh-time integer;
-	min-retry-time integer;
-	minimal-any boolean;
-	minimal-responses ( no-auth | no-auth-recursive | boolean );
-	multi-master boolean;
-	new-zones-directory quoted_string;
-	no-case-compress { address_match_element; ... };
-	nocookie-udp-size integer;
-	notify ( explicit | master-only | boolean );
-	notify-delay integer;
-	notify-rate integer;
-	notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-	    dscp integer ];
-	notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-	    [ dscp integer ];
-	notify-to-soa boolean;
-	nta-lifetime duration;
-	nta-recheck duration;
-	nxdomain-redirect string;
-	pid-file ( quoted_string | none );
-	port integer;
-	preferred-glue string;
-	prefetch integer [ integer ];
-	provide-ixfr boolean;
-	qname-minimization ( strict | relaxed | disabled | off );
-	query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-	    integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-	    port ( integer | * ) ) ) [ dscp integer ];
-	query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-	    integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-	    port ( integer | * ) ) ) [ dscp integer ];
-	querylog boolean;
-	random-device ( quoted_string | none );
-	rate-limit {
-		all-per-second integer;
-		errors-per-second integer;
-		exempt-clients { address_match_element; ... };
-		ipv4-prefix-length integer;
-		ipv6-prefix-length integer;
-		log-only boolean;
-		max-table-size integer;
-		min-table-size integer;
-		nodata-per-second integer;
-		nxdomains-per-second integer;
-		qps-scale integer;
-		referrals-per-second integer;
-		responses-per-second integer;
-		slip integer;
-		window integer;
-	};
-	recursing-file quoted_string;
-	recursion boolean;
-	recursive-clients integer;
-	request-expire boolean;
-	request-ixfr boolean;
-	request-nsid boolean;
-	require-server-cookie boolean;
-	reserved-sockets integer;
-	resolver-nonbackoff-tries integer;
-	resolver-query-timeout integer;
-	resolver-retry-interval integer;
-	response-padding { address_match_element; ... } block-size
-	    integer;
-	response-policy { zone string [ add-soa boolean ] [ log
-	    boolean ] [ max-policy-ttl duration ] [ min-update-interval
-	    duration ] [ policy ( cname | disabled | drop | given | no-op
-	    | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [
-	    recursive-only boolean ] [ nsip-enable boolean ] [
-	    nsdname-enable boolean ]; ... } [ add-soa boolean ] [
-	    break-dnssec boolean ] [ max-policy-ttl duration ] [
-	    min-update-interval duration ] [ min-ns-dots integer ] [
-	    nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ]
-	    [ recursive-only boolean ] [ nsip-enable boolean ] [
-	    nsdname-enable boolean ] [ dnsrps-enable boolean ] [
-	    dnsrps-options { unspecified-text } ];
-	root-delegation-only [ exclude { string; ... } ];
-	root-key-sentinel boolean;
-	rrset-order { [ class string ] [ type string ] [ name
-	    quoted_string ] string string; ... };
-	secroots-file quoted_string;
-	send-cookie boolean;
-	serial-query-rate integer;
-	serial-update-method ( date | increment | unixtime );
-	server-id ( quoted_string | none | hostname );
-	servfail-ttl duration;
-	session-keyalg string;
-	session-keyfile ( quoted_string | none );
-	session-keyname string;
-	sig-signing-nodes integer;
-	sig-signing-signatures integer;
-	sig-signing-type integer;
-	sig-validity-interval integer [ integer ];
-	sortlist { address_match_element; ... };
-	stacksize ( default | unlimited | sizeval );
-	stale-answer-enable boolean;
-	stale-answer-ttl duration;
-	startup-notify-rate integer;
-	statistics-file quoted_string;
-	synth-from-dnssec boolean;
-	tcp-advertised-timeout integer;
-	tcp-clients integer;
-	tcp-idle-timeout integer;
-	tcp-initial-timeout integer;
-	tcp-keepalive-timeout integer;
-	tcp-listen-queue integer;
-	tkey-dhkey quoted_string integer;
-	tkey-domain quoted_string;
-	tkey-gssapi-credential quoted_string;
-	tkey-gssapi-keytab quoted_string;
-	transfer-format ( many-answers | one-answer );
-	transfer-message-size integer;
-	transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-	    dscp integer ];
-	transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-	    ] [ dscp integer ];
-	transfers-in integer;
-	transfers-out integer;
-	transfers-per-ns integer;
-	trust-anchor-telemetry boolean; // experimental
-	try-tcp-refresh boolean;
-	update-check-ksk boolean;
-	use-alt-transfer-source boolean;
-	use-v4-udp-ports { portrange; ... };
-	use-v6-udp-ports { portrange; ... };
-	v6-bias integer;
-	validate-except { string; ... };
-	version ( quoted_string | none );
-	zero-no-soa-ttl boolean;
-	zero-no-soa-ttl-cache boolean;
-	zone-statistics ( full | terse | none | boolean );
-};
-
-
- -
-

-options Statement Definition and - Usage

- -

- The options statement sets up global - options - to be used by BIND. This statement - may appear only - once in a configuration file. If there is no options - statement, an options block with each option set to its default will - be used. -

- -
-
attach-cache
-
-

- Allows multiple views to share a single cache - database. - Each view has its own cache database by default, but - if multiple views have the same operational policy - for name resolution and caching, those views can - share a single cache to save memory and possibly - improve resolution efficiency by using this option. -

- -

- The attach-cache option - may also be specified in view - statements, in which case it overrides the - global attach-cache option. -

- -

- The cache_name specifies - the cache to be shared. - When the named server configures - views which are supposed to share a cache, it - creates a cache with the specified name for the - first view of these sharing views. - The rest of the views will simply refer to the - already created cache. -

- -

- One common configuration to share a cache would be to - allow all views to share a single cache. - This can be done by specifying - the attach-cache as a global - option with an arbitrary name. -

- -

- Another possible operation is to allow a subset of - all views to share a cache while the others to - retain their own caches. - For example, if there are three views A, B, and C, - and only A and B should share a cache, specify the - attach-cache option as a view A (or - B)'s option, referring to the other view name: -

- -
-  view "A" {
-    // this view has its own cache
-    ...
-  };
-  view "B" {
-    // this view refers to A's cache
-    attach-cache "A";
-  };
-  view "C" {
-    // this view has its own cache
-    ...
-  };
-
- -

- Views that share a cache must have the same policy - on configurable parameters that may affect caching. - The current implementation requires the following - configurable options be consistent among these - views: - check-names, - dnssec-accept-expired, - dnssec-validation, - max-cache-ttl, - max-ncache-ttl, - max-stale-ttl, - max-cache-size, and - min-cache-ttl, - min-ncache-ttl, - zero-no-soa-ttl. -

- -

- Note that there may be other parameters that may - cause confusion if they are inconsistent for - different views that share a single cache. - For example, if these views define different sets of - forwarders that can return different answers for the - same question, sharing the answer does not make - sense or could even be harmful. - It is administrator's responsibility to ensure - configuration differences in different views do - not cause disruption with a shared cache. -

-
-
directory
-
-

- The working directory of the server. - Any non-absolute pathnames in the configuration file will - be taken as relative to this directory. The default - location for most server output files - (e.g. named.run) is this directory. - If a directory is not specified, the working directory - defaults to `.', the directory from - which the server was started. The directory specified - should be an absolute path, and must - be writable by the effective user ID of the - named process. -

-
-
dnstap
-
-

- dnstap is a fast, flexible method - for capturing and logging DNS traffic. Developed by - Robert Edmonds at Farsight Security, Inc., and supported - by multiple DNS implementations, dnstap - uses - libfstrm (a lightweight high-speed - framing library, see - https://github.com/farsightsec/fstrm) to send - event payloads which are encoded using Protocol Buffers - (libprotobuf-c, a mechanism for - serializing structured data developed - by Google, Inc.; see - https://developers.google.com/protocol-buffers). -

-

- To enable dnstap at compile time, - the fstrm and protobuf-c - libraries must be available, and BIND must be configured with - --enable-dnstap. -

-

- The dnstap option is a bracketed list - of message types to be logged. These may be set differently - for each view. Supported types are client, - auth, resolver, - forwarder, and update. - Specifying type all will cause all - dnstap messages to be logged, regardless of - type. -

-

- Each type may take an additional argument to indicate whether - to log query messages or - response messages; if not specified, - both queries and responses are logged. -

-

- Example: To log all authoritative queries and responses, - recursive client responses, and upstream queries sent by - the resolver, use: -

-
dnstap {
-  auth;
-  client response;
-  resolver query;
-};
-
-

-

-

- Logged dnstap messages can be parsed - using the dnstap-read utility (see - dnstap-read(1) for details). -

-

- For more information on dnstap, see - http://dnstap.info. -

-

- The fstrm library has a number of tunables that are exposed - in named.conf, and can be modified - if necessary to improve performance or prevent loss of data. - These are: -

-
    -
  • - - fstrm-set-buffer-hint: The - threshold number of bytes to accumulate in the output - buffer before forcing a buffer flush. The minimum is - 1024, the maximum is 65536, and the default is 8192. - -
  • -
  • - - fstrm-set-flush-timeout: The number - of seconds to allow unflushed data to remain in the - output buffer. The minimum is 1 second, the maximum is - 600 seconds (10 minutes), and the default is 1 second. - -
  • -
  • - - fstrm-set-output-notify-threshold: - The number of outstanding queue entries to allow on - an input queue before waking the I/O thread. - The minimum is 1 and the default is 32. - -
  • -
  • - - fstrm-set-output-queue-model: - Controls the queuing semantics to use for queue - objects. The default is mpsc - (multiple producer, single consumer); the other - option is spsc (single producer, - single consumer). - -
  • -
  • - - fstrm-set-input-queue-size: The - number of queue entries to allocate for each - input queue. This value must be a power of 2. - The minimum is 2, the maximum is 16384, and - the default is 512. - -
  • -
  • - - fstrm-set-output-queue-size: - The number of queue entries to allocate for each - output queue. The minimum is 2, the maximum is - system-dependent and based on IOV_MAX, - and the default is 64. - -
  • -
  • - - fstrm-set-reopen-interval: - The number of seconds to wait between attempts to - reopen a closed output stream. The minimum is 1 second, - the maximum is 600 seconds (10 minutes), and the default - is 5 seconds. For convenience, TTL-style time unit - suffixes may be used to specify the value. It also - accepts ISO 8601 duration formats. - -
  • -
-

- Note that all of the above minimum, maximum, and default - values are set by the libfstrm library, - and may be subject to change in future versions of the - library. See the libfstrm documentation - for more information. -

-
-
dnstap-output
-
-

- Configures the path to which the dnstap - frame stream will be sent if dnstap - is enabled at compile time and active. -

-

- The first argument is either file or - unix, indicating whether the destination - is a file or a UNIX domain socket. The second argument - is the path of the file or socket. (Note: when using a - socket, dnstap messages will - only be sent if another process such as - fstrm_capture - (provided with libfstrm) is listening on - the socket.) -

-

- If the first argument is file, then - up to three additional options can be added: - size indicates the size to which a - dnstap log file can grow before being - rolled to a new file; versions - specifies the number of rolled log files to retain; and - suffix indicates whether to retain - rolled log files with an incrementing counter as the - suffix (increment) or with the - current timestamp (timestamp). - These are similar to the size, - versions, and suffix - options in a logging channel. - The default is to allow dnstap log - files to grow to any size without rolling. -

-

- dnstap-output can only be set globally - in options. Currently, it can only be - set once while named is running; - once set, it cannot be changed by - rndc reload or - rndc reconfig. -

-
-
dnstap-identity
-
-

- Specifies an identity string to send in - dnstap messages. If set to - hostname, which is the default, the - server's hostname will be sent. If set to - none, no identity string will be sent. -

-
-
dnstap-version
-
-

- Specifies a version string to send in - dnstap messages. The default is the - version number of the BIND release. If set to - none, no version string will be sent. -

-
-
geoip-directory
-
-

- When named is compiled using the - MaxMind GeoIP2 geolocation API, - this specifies the directory containing GeoIP - database files. By default, the option is set based on - the prefix used to build the libmaxminddb - module: for example, if the library is installed in - /usr/local/lib, then the default - geoip-directory will be - /usr/local/share/GeoIP. On Windows, - the default is the named working - directory. See the section called “acl Statement Definition and - Usage” for details about - geoip ACLs. -

-
-
key-directory
-
-

- When performing dynamic update of secure zones, the - directory where the public and private DNSSEC key files - should be found, if different than the current working - directory. (Note that this option has no effect on the - paths for files containing non-DNSSEC keys such as - bind.keys, - rndc.key or - session.key.) -

-
-
lmdb-mapsize
-
-

- When named is built with liblmdb, - this option sets a maximum size for the memory map of - the new-zone database (NZD) in LMDB database format. - This database is used to store configuration information - for zones added using rndc addzone. - Note that this is not the NZD database file size, but - the largest size that the database may grow to. -

-

- Because the database file is memory mapped, its size is - limited by the address space of the named process. The - default of 32 megabytes was chosen to be usable with - 32-bit named builds. The largest - permitted value is 1 terabyte. Given typical zone - configurations without elaborate ACLs, a 32 MB NZD file - ought to be able to hold configurations of about 100,000 - zones. -

-
-
managed-keys-directory
-
-

- Specifies the directory in which to store the files that - track managed DNSSEC keys (i.e., those configured using - the initial-key or - initial-ds keywords in a - trust-anchors statement). By default, - this is the working directory. The directory - must be writable by the effective - user ID of the named process. -

-

- If named is not configured to use views, - then managed keys for the server will be tracked in a single - file called managed-keys.bind. - Otherwise, managed keys will be tracked in separate files, - one file per view; each file name will be the view name - (or, if it contains characters that are incompatible with - use as a file name, the SHA256 hash of the view name), - followed by the extension - .mkeys. -

-

- (Note: in previous releases, file names for views - always used the SHA256 hash of the view name. To ensure - compatibility after upgrade, if a file using the old - name format is found to exist, it will be used instead - of the new format.) -

-
-
max-ixfr-ratio
-
-

- Sets the size threshold (expressed as a percentage - of the size of the full zone) beyond which - named will choose to use an AXFR - response rather than IXFR when answering zone transfer - requests. See the section called “Incremental Zone Transfers (IXFR)”. -

-

- The minimum value is 1%. The keyword - unlimited disables ratio checking and - allows IXFRs of any size. The default is - 100%. -

-
-
new-zones-directory
-
-

- Specifies the directory in which to store the configuration - parameters for zones added via rndc addzone. - By default, this is the working directory. If set to a relative - path, it will be relative to the working directory. The - directory must be writable by the - effective user ID of the named process. -

-
-
qname-minimization
-
-

- This option controls QNAME minimization behaviour - in the BIND resolver. When set to strict, - BIND will follow the QNAME minimization algorithm to - the letter, as specified in RFC 7816. Setting this - option to relaxed will cause BIND - to fall back to normal (non-minimized) query mode - when it receives either NXDOMAIN or other unexpected - responses (e.g. SERVFAIL, improper zone cut, REFUSED) - to a minimized query. disabled disables - QNAME minimization completely. The current default is - relaxed, but it might be changed to - strict in a future release. -

-
-
tkey-gssapi-keytab
-
-

- The KRB5 keytab file to use for GSS-TSIG updates. If - this option is set and tkey-gssapi-credential is not - set, then updates will be allowed with any key - matching a principal in the specified keytab. -

-
-
tkey-gssapi-credential
-
-

- The security credential with which the server should - authenticate keys requested by the GSS-TSIG protocol. - Currently only Kerberos 5 authentication is available - and the credential is a Kerberos principal which the - server can acquire through the default system key - file, normally /etc/krb5.keytab. - The location keytab file can be overridden using the - tkey-gssapi-keytab option. Normally this principal is - of the form "DNS/server.domain". - To use GSS-TSIG, tkey-domain must - also be set if a specific keytab is not set with - tkey-gssapi-keytab. -

-
-
tkey-domain
-
-

- The domain appended to the names of all shared keys - generated with TKEY. When a - client requests a TKEY exchange, - it may or may not specify the desired name for the - key. If present, the name of the shared key will - be client specified part + - tkey-domain. Otherwise, the - name of the shared key will be random hex - digits + tkey-domain. - In most cases, the domainname - should be the server's domain name, or an otherwise - non-existent subdomain like - "_tkey.domainname". If you are - using GSS-TSIG, this variable must be defined, unless - you specify a specific keytab using tkey-gssapi-keytab. -

-
-
tkey-dhkey
-
-

- The Diffie-Hellman key used by the server - to generate shared keys with clients using the Diffie-Hellman - mode - of TKEY. The server must be - able to load the - public and private keys from files in the working directory. - In - most cases, the key_name should be the server's host name. -

-
-
cache-file
-
-

- This is for testing only. Do not use. -

-
-
dump-file
-
-

- The pathname of the file the server dumps - the database to when instructed to do so with - rndc dumpdb. - If not specified, the default is named_dump.db. -

-
-
memstatistics-file
-
-

- The pathname of the file the server writes memory - usage statistics to on exit. If not specified, - the default is named.memstats. -

-
-
lock-file
-
-

- The pathname of a file on which named will - attempt to acquire a file lock when starting up for - the first time; if unsuccessful, the server will - will terminate, under the assumption that another - server is already running. If not specified, the default is - none. -

-

- Specifying lock-file none disables the - use of a lock file. lock-file is - ignored if named was run using the -X - option, which overrides it. Changes to - lock-file are ignored if - named is being reloaded or - reconfigured; it is only effective when the server is - first started up. -

-
-
pid-file
-
-

- The pathname of the file the server writes its process ID - in. If not specified, the default is - /var/run/named/named.pid. - The PID file is used by programs that want to send signals to - the running - name server. Specifying pid-file none disables the - use of a PID file — no file will be written and any - existing one will be removed. Note that none - is a keyword, not a filename, and therefore is not enclosed - in - double quotes. -

-
-
recursing-file
-
-

- The pathname of the file the server dumps - the queries that are currently recursing when instructed - to do so with rndc recursing. - If not specified, the default is named.recursing. -

-
-
statistics-file
-
-

- The pathname of the file the server appends statistics - to when instructed to do so using rndc stats. - If not specified, the default is named.stats in the - server's current directory. The format of the file is - described - in the section called “The Statistics File”. -

-
-
bindkeys-file
-
-

- The pathname of a file to override the built-in trusted - keys provided by named. - See the discussion of dnssec-validation - for details. If not specified, the default is - /etc/bind.keys. -

-
-
secroots-file
-
-

- The pathname of the file the server dumps - security roots to when instructed to do so with - rndc secroots. - If not specified, the default is - named.secroots. -

-
-
session-keyfile
-
-

- The pathname of the file into which to write a TSIG - session key generated by named for use by - nsupdate -l. If not specified, the - default is /var/run/named/session.key. - (See the section called “Dynamic Update Policies”, and in - particular the discussion of the - update-policy statement's - local option for more - information about this feature.) -

-
-
session-keyname
-
-

- The key name to use for the TSIG session key. - If not specified, the default is "local-ddns". -

-
-
session-keyalg
-
-

- The algorithm to use for the TSIG session key. - Valid values are hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384, hmac-sha512 and hmac-md5. If not - specified, the default is hmac-sha256. -

-
-
port
-
-

- The UDP/TCP port number the server uses for - receiving and sending DNS protocol traffic. - The default is 53. This option is mainly intended for server - testing; - a server using a port other than 53 will not be able to - communicate with - the global DNS. -

-
-
dscp
-
-

- The global Differentiated Services Code Point (DSCP) - value to classify outgoing DNS traffic on operating - systems that support DSCP. Valid values are 0 through 63. - It is not configured by default. -

-
-
random-device
-
-

- Specifies a source of entropy to be used by the server. - This is a device or file from which to read entropy. - If it is a file, operations requiring entropy - will fail when the file has been exhausted. -

-

- Entropy is needed for cryptographic operations such as - TKEY transactions, dynamic update of signed zones, and - generation of TSIG session keys. It is also used for - seeding and stirring the pseudo-random number generator, - which is used for less critical functions requiring - randomness such as generation of DNS message transaction - ID's. -

-

- If random-device is not specified, or - if it is set to none, entropy will be - read from the random number generation function supplied - by the cryptographic library with which BIND was linked - (i.e. OpenSSL or a PKCS#11 provider). -

-

- The random-device option takes - effect during the initial configuration load at server - startup time and is ignored on subsequent reloads. -

-
-
preferred-glue
-
-

- If specified, the listed type (A or AAAA) will be emitted - before other glue - in the additional section of a query response. - The default is to prefer A records when responding - to queries that arrived via IPv4 and AAAA when - responding to queries that arrived via IPv6. -

-
-
-root-delegation-only -
-
-

- Turn on enforcement of delegation-only in TLDs - (top level domains) and root zones with an optional - exclude list. -

-

- DS queries are expected to be made to and be answered by - delegation only zones. Such queries and responses are - treated as an exception to delegation-only processing - and are not converted to NXDOMAIN responses provided - a CNAME is not discovered at the query name. -

-

- If a delegation only zone server also serves a child - zone it is not always possible to determine whether - an answer comes from the delegation only zone or the - child zone. SOA NS and DNSKEY records are apex - only records and a matching response that contains - these records or DS is treated as coming from a - child zone. RRSIG records are also examined to see - if they are signed by a child zone or not. The - authority section is also examined to see if there - is evidence that the answer is from the child zone. - Answers that are determined to be from a child zone - are not converted to NXDOMAIN responses. Despite - all these checks there is still a possibility of - false negatives when a child zone is being served. -

-

- Similarly false positives can arise from empty nodes - (no records at the name) in the delegation only zone - when the query type is not ANY. -

-

- Note some TLDs are not delegation only (e.g. "DE", "LV", - "US" and "MUSEUM"). This list is not exhaustive. -

- -
-options {
-        root-delegation-only exclude { "de"; "lv"; "us"; "museum"; };
-};
-
- -
-
disable-algorithms
-
-

- Disable the specified DNSSEC algorithms at and below the - specified name. - Multiple disable-algorithms - statements are allowed. - Only the best match disable-algorithms - clause will be used to determine which algorithms are used. -

-

- If all supported algorithms are disabled, the zones covered - by the disable-algorithms will be treated - as insecure. -

-

- Configured trust anchors in trust-anchors - (or managed-keys or - trusted-keys, both deprecated) - that match a disabled algorithm will be ignored and treated - as if they were not configured at all. -

-
-
disable-ds-digests
-
-

- Disable the specified DS digest types at and below the - specified name. - Multiple disable-ds-digests - statements are allowed. - Only the best match disable-ds-digests - clause will be used to determine which digest types are used. -

-

- If all supported digest types are disabled, the zones covered - by the disable-ds-digests will be treated - as insecure. -

-
-
dnssec-must-be-secure
-
-

- Specify hierarchies which must be or may not be secure - (signed and validated). If yes, - then named will only accept answers if - they are secure. If no, then normal - DNSSEC validation applies allowing for insecure answers to - be accepted. The specified domain must be defined as a - trust anchor, for instance in a trust-anchors - statement, or dnssec-validation auto must - be active. -

-
-
dns64
-
-

- This directive instructs named to - return mapped IPv4 addresses to AAAA queries when - there are no AAAA records. It is intended to be - used in conjunction with a NAT64. Each - dns64 defines one DNS64 prefix. - Multiple DNS64 prefixes can be defined. -

-

- Compatible IPv6 prefixes have lengths of 32, 40, 48, 56, - 64 and 96 as per RFC 6052. Bits 64..71 inclusive must - be zero with the most significate bit of the prefix in - position 0. -

-

- Additionally a reverse IP6.ARPA zone will be created for - the prefix to provide a mapping from the IP6.ARPA names - to the corresponding IN-ADDR.ARPA names using synthesized - CNAMEs. dns64-server and - dns64-contact can be used to specify - the name of the server and contact for the zones. These - are settable at the view / options level. These are - not settable on a per-prefix basis. -

-

- Each dns64 supports an optional - clients ACL that determines which - clients are affected by this directive. If not defined, - it defaults to any;. -

-

- Each dns64 supports an optional - mapped ACL that selects which - IPv4 addresses are to be mapped in the corresponding - A RRset. If not defined it defaults to - any;. -

-

- Normally, DNS64 won't apply to a domain name that - owns one or more AAAA records; these records will - simply be returned. The optional - exclude ACL allows specification - of a list of IPv6 addresses that will be ignored - if they appear in a domain name's AAAA records, and - DNS64 will be applied to any A records the domain - name owns. If not defined, exclude - defaults to ::ffff:0.0.0.0/96. -

-

- A optional suffix can also - be defined to set the bits trailing the mapped - IPv4 address bits. By default these bits are - set to ::. The bits - matching the prefix and mapped IPv4 address - must be zero. -

-

- If recursive-only is set to - yes the DNS64 synthesis will - only happen for recursive queries. The default - is no. -

-

- If break-dnssec is set to - yes the DNS64 synthesis will - happen even if the result, if validated, would - cause a DNSSEC validation failure. If this option - is set to no (the default), the DO - is set on the incoming query, and there are RRSIGs on - the applicable records, then synthesis will not happen. -

-
-        acl rfc1918 { 10/8; 192.168/16; 172.16/12; };
-
-        dns64 64:FF9B::/96 {
-                clients { any; };
-                mapped { !rfc1918; any; };
-                exclude { 64:FF9B::/96; ::ffff:0000:0000/96; };
-                suffix ::;
-        };
-
-
-
dnssec-loadkeys-interval
-
-

- When a zone is configured with auto-dnssec - maintain; its key repository must be checked - periodically to see if any new keys have been added - or any existing keys' timing metadata has been updated - (see dnssec-keygen(8) and - dnssec-settime(8)). The - dnssec-loadkeys-interval option - sets the frequency of automatic repository checks, in - minutes. The default is 60 (1 hour), - the minimum is 1 (1 minute), and the - maximum is 1440 (24 hours); any higher - value is silently reduced. -

-
-
dnssec-update-mode
-
-

- If this option is set to its default value of - maintain in a zone of type - master which is DNSSEC-signed - and configured to allow dynamic updates (see - the section called “Dynamic Update Policies”), and - if named has access to the - private signing key(s) for the zone, then - named will automatically sign all new - or changed records and maintain signatures for the zone - by regenerating RRSIG records whenever they approach - their expiration date. -

-

- If the option is changed to no-resign, - then named will sign all new or - changed records, but scheduled maintenance of - signatures is disabled. -

-

- With either of these settings, named - will reject updates to a DNSSEC-signed zone when the - signing keys are inactive or unavailable to - named. (A planned third option, - external, will disable all automatic - signing and allow DNSSEC data to be submitted into a zone - via dynamic update; this is not yet implemented.) -

-
-
nta-lifetime
-
-

- Species the default lifetime, in seconds, - that will be used for negative trust anchors added - via rndc nta. -

-

- A negative trust anchor selectively disables - DNSSEC validation for zones that are known to be - failing because of misconfiguration rather than - an attack. When data to be validated is - at or below an active NTA (and above any other - configured trust anchors), named will - abort the DNSSEC validation process and treat the data as - insecure rather than bogus. This continues until the - NTA's lifetime is elapsed. NTAs persist - across named restarts. -

-

- For convenience, TTL-style time unit suffixes can be - used to specify the NTA lifetime in seconds, minutes - or hours. It also accepts ISO 8601 duration formats. -

-

- nta-lifetime defaults to one hour. It - cannot exceed one week. -

-
-
nta-recheck
-
-

- Species how often to check whether negative - trust anchors added via rndc nta - are still necessary. -

-

- A negative trust anchor is normally used when a - domain has stopped validating due to operator error; - it temporarily disables DNSSEC validation for that - domain. In the interest of ensuring that DNSSEC - validation is turned back on as soon as possible, - named will periodically send a - query to the domain, ignoring negative trust anchors, - to find out whether it can now be validated. If so, - the negative trust anchor is allowed to expire early. -

-

- Validity checks can be disabled for an individual - NTA by using rndc nta -f, or - for all NTAs by setting nta-recheck - to zero. -

-

- For convenience, TTL-style time unit suffixes can be - used to specify the NTA recheck interval in seconds, - minutes or hours. It also accepts ISO 8601 duration - formats. -

-

- The default is five minutes. It cannot be longer than - nta-lifetime (which cannot be longer - than a week). -

-
-
max-zone-ttl
-
-

- Specifies a maximum permissible TTL value in seconds. - For convenience, TTL-style time unit suffixes may be - used to specify the maximum value. It also - accepts ISO 8601 duration formats. -

-

- When loading a zone file using a - masterfile-format of - text or raw, - any record encountered with a TTL higher than - max-zone-ttl will cause the zone to - be rejected. -

-

- This is useful in DNSSEC-signed zones because when - rolling to a new DNSKEY, the old key needs to remain - available until RRSIG records have expired from - caches. The max-zone-ttl option guarantees - that the largest TTL in the zone will be no higher - than the set value. -

-

- (NOTE: Because map-format files - load directly into memory, this option cannot be - used with them.) -

-

- The default value is unlimited. - A max-zone-ttl of zero is treated as - unlimited. -

-
-
stale-answer-ttl
-
-

- Specifies the TTL to be returned on stale answers. - The default is 1 second. The minimum allowed is - also 1 second; a value of 0 will be updated silently - to 1 second. -

-

- For stale answers to be returned, they must be enabled, - either in the configuration file using - stale-answer-enable or via - rndc serve-stale on. -

-
-
serial-update-method
-
-

- Zones configured for dynamic DNS may use this - option to set the update method that will be used for - the zone serial number in the SOA record. -

-

- With the default setting of - serial-update-method increment;, the - SOA serial number will be incremented by one each time - the zone is updated. -

-

- When set to - serial-update-method unixtime;, the - SOA serial number will be set to the number of seconds - since the UNIX epoch, unless the serial number is - already greater than or equal to that value, in which - case it is simply incremented by one. -

-

- When set to - serial-update-method date;, the - new SOA serial number will be the current date - in the form "YYYYMMDD", followed by two zeroes, - unless the existing serial number is already greater - than or equal to that value, in which case it is - incremented by one. -

-
-
zone-statistics
-
-

- If full, the server will collect - statistical data on all zones (unless specifically - turned off on a per-zone basis by specifying - zone-statistics terse or - zone-statistics none - in the zone statement). - These include, for example, DNSSEC signing operations - and the number of authoritative answers per query type. - The default is terse, providing - minimal statistics on zones (including name and - current serial number, but not query type - counters). -

-

- These statistics may be accessed via the - statistics-channel or - using rndc stats, which - will dump them to the file listed - in the statistics-file. See - also the section called “The Statistics File”. -

-

- For backward compatibility with earlier versions - of BIND 9, the zone-statistics - option can also accept yes - or no; yes - has the same meaning as full. - As of BIND 9.10, - no has the same meaning - as none; previously, it - was the same as terse. -

-
-
- -
-

-Boolean Options

- -
-
automatic-interface-scan
-
-

- If yes and supported by the operating - system, automatically rescan network interfaces when the - interface addresses are added or removed. The default is - yes. This configuration option does - not affect time based interface-interval - option, and it is recommended to set the time based - interface-interval to 0 when the operator - confirms that automatic interface scanning is supported by the - operating system. -

-

- The automatic-interface-scan implementation - uses routing sockets for the network interface discovery, - and therefore the operating system has to support the routing - sockets for this feature to work. -

-
-
allow-new-zones
-
-

- If yes, then zones can be - added at runtime via rndc addzone. - The default is no. -

-

- Newly added zones' configuration parameters - are stored so that they can persist after the - server is restarted. The configuration information - is saved in a file called - viewname.nzf - (or, if named is compiled with - liblmdb, in an LMDB database file called - viewname.nzd). - viewname is the name of the - view, unless the view name contains characters that are - incompatible with use as a file name, in which case a - cryptographic hash of the view name is used instead. -

-

- Zones added at runtime will have their configuration - stored either in a new-zone file (NZF) or a new-zone - database (NZD) depending on whether - named was linked with - liblmdb at compile time. - See rndc(8) for further details - about rndc addzone. -

-
-
auth-nxdomain
-
-

- If yes, then the - AA bit is always set on NXDOMAIN - responses, even if the server is not actually - authoritative. The default is no. - If you are using very old DNS software, you - may need to set it to yes. -

-
-
deallocate-on-exit
-
-

- This option was used in BIND - 8 to enable checking - for memory leaks on exit. BIND 9 ignores the option and always performs - the checks. -

-
-
memstatistics
-
-

- Write memory statistics to the file specified by - memstatistics-file at exit. - The default is no unless - '-m record' is specified on the command line in - which case it is yes. -

-
-
dialup
-
-

- If yes, then the - server treats all zones as if they are doing zone transfers - across - a dial-on-demand dialup link, which can be brought up by - traffic - originating from this server. This has different effects - according - to zone type and concentrates the zone maintenance so that - it all - happens in a short interval, once every heartbeat-interval and - hopefully during the one call. It also suppresses some of - the normal - zone maintenance traffic. The default is no. -

-

- The dialup option - may also be specified in the view and - zone statements, - in which case it overrides the global dialup - option. -

-

- If the zone is a master zone, then the server will send out a - NOTIFY - request to all the slaves (default). This should trigger the - zone serial - number check in the slave (providing it supports NOTIFY) - allowing the slave - to verify the zone while the connection is active. - The set of servers to which NOTIFY is sent can be controlled - by - notify and also-notify. -

-

- If the - zone is a slave or stub zone, then the server will suppress - the regular - "zone up to date" (refresh) queries and only perform them - when the - heartbeat-interval expires in - addition to sending - NOTIFY requests. -

-

- Finer control can be achieved by using - notify which only sends NOTIFY - messages, - notify-passive which sends NOTIFY - messages and - suppresses the normal refresh queries, refresh - which suppresses normal refresh processing and sends refresh - queries - when the heartbeat-interval - expires, and - passive which just disables normal - refresh - processing. -

- -
- ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- dialup mode -

-
-

- normal refresh -

-
-

- heart-beat refresh -

-
-

- heart-beat notify -

-
-

no (default)

-
-

- yes -

-
-

- no -

-
-

- no -

-
-

yes

-
-

- no -

-
-

- yes -

-
-

- yes -

-
-

notify

-
-

- yes -

-
-

- no -

-
-

- yes -

-
-

refresh

-
-

- no -

-
-

- yes -

-
-

- no -

-
-

passive

-
-

- no -

-
-

- no -

-
-

- no -

-
-

notify-passive

-
-

- no -

-
-

- no -

-
-

- yes -

-
-
- -

- Note that normal NOTIFY processing is not affected by - dialup. -

- -
-
flush-zones-on-shutdown
-
-

- When the nameserver exits due receiving SIGTERM, - flush or do not flush any pending zone writes. The default - is - flush-zones-on-shutdown no. -

-
-
geoip-use-ecs
-
-

- This option was part of an experimental implementation - of the EDNS CLIENT-SUBNET for authoritative servers, - but is now obsolete. -

-
-
root-key-sentinel
-
-

- Respond to root key sentinel probes as described in - draft-ietf-dnsop-kskroll-sentinel-08. The default is - yes. -

-
-
message-compression
-
-

- If yes, DNS name compression is - used in responses to regular queries (not including - AXFR or IXFR, which always uses compression). Setting - this option to no reduces CPU - usage on servers and may improve throughput. However, - it increases response size, which may cause more queries - to be processed using TCP; a server with compression - disabled is out of compliance with RFC 1123 Section - 6.1.3.2. The default is yes. -

-
-
minimal-responses
-
-

- This option controls the addition of records to the - authority and additional sections of responses. Such - records may be included in responses to be helpful - to clients; for example, NS or MX records may - have associated address records included in the additional - section, obviating the need for a separate address lookup. - However, adding these records to responses is not mandatory - and requires additional database lookups, causing extra - latency when marshalling responses. - minimal-responses takes one of - four values: -

-
    -
  • - no: the server will be - as complete as possible when generating responses. -
  • -
  • - yes: the server will only add - records to the authority and additional sections when - such records are required by the DNS protocol (for - example, when returning delegations or negative - responses). This provides the best server performance - but may result in more client queries. -
  • -
  • - no-auth: the server - will omit records from the authority section except - when they are required, but it may still add records - to the additional section. -
  • -
  • - no-auth-recursive: the same - as no-auth when recursion is - requested in the query (RD=1), or the same as - no if recursion is not - requested. -
  • -
-

- no-auth and - no-auth-recursive are useful when - answering stub clients, which usually ignore the - authority section. no-auth-recursive - is meant for use in mixed-mode servers that handle both - authoritative and recursive queries. -

-

- The default is no-auth-recursive. -

-
-
glue-cache
-
-

- When set to yes, a cache is - used to improve query performance when adding - address-type (A and AAAA) glue records to the - additional section of DNS response messages that - delegate to a child zone. -

-

- The glue cache uses memory proportional to the number - of delegations in the zone. The default setting is - yes, which improves performance - at the cost of increased memory usage for the zone. If - you don't want this, set it to no. -

-
-
minimal-any
-
-

- If set to yes, then when - generating a positive response to a query of type - ANY over UDP, the server will reply with only one - of the RRsets for the query name, and its covering - RRSIGs if any, instead of replying with all known - RRsets for the name. Similarly, a query for type - RRSIG will be answered with the RRSIG records covering - only one type. This can reduce the impact of some kinds - of attack traffic, without harming legitimate - clients. (Note, however, that the RRset returned is the - first one found in the database; it is not necessarily - the smallest available RRset.) - Additionally, minimal-responses is - turned on for these queries, so no unnecessary records - will be added to the authority or additional sections. - The default is no. -

-
-
notify
-
-

- If yes (the default), - DNS NOTIFY messages are sent when a zone the server is - authoritative for - changes, see the section called “Notify”. The messages are - sent to the - servers listed in the zone's NS records (except the master - server identified - in the SOA MNAME field), and to any servers listed in the - also-notify option. -

-

- If master-only, notifies are only - sent - for master zones. - If explicit, notifies are sent only - to - servers explicitly listed using also-notify. - If no, no notifies are sent. -

-

- The notify option may also be - specified in the zone - statement, - in which case it overrides the options notify statement. - It would only be necessary to turn off this option if it - caused slaves - to crash. -

-
-
notify-to-soa
-
-

- If yes do not check the nameservers - in the NS RRset against the SOA MNAME. Normally a NOTIFY - message is not sent to the SOA MNAME (SOA ORIGIN) as it is - supposed to contain the name of the ultimate master. - Sometimes, however, a slave is listed as the SOA MNAME in - hidden master configurations and in that case you would - want the ultimate master to still send NOTIFY messages to - all the nameservers listed in the NS RRset. -

-
-
recursion
-
-

- If yes, and a - DNS query requests recursion, then the server will attempt - to do - all the work required to answer the query. If recursion is - off - and the server does not already know the answer, it will - return a - referral response. The default is - yes. - Note that setting recursion no does not prevent - clients from getting data from the server's cache; it only - prevents new data from being cached as an effect of client - queries. - Caching may still occur as an effect the server's internal - operation, such as NOTIFY address lookups. -

-
-
request-nsid
-
-

- If yes, then an empty EDNS(0) - NSID (Name Server Identifier) option is sent with all - queries to authoritative name servers during iterative - resolution. If the authoritative server returns an NSID - option in its response, then its contents are logged in - the nsid category at level - info. - The default is no. -

-
-
request-sit
-
-

- This experimental option is obsolete. -

-
-
require-server-cookie
-
-

- Require a valid server cookie before sending a full - response to a UDP request from a cookie aware client. - BADCOOKIE is sent if there is a bad or no existent - server cookie. - The default is no. -

-

- Set this to yes to test that DNS - COOKIE clients correctly handle BADCOOKIE or if you are - getting a lot of forged DNS requests with DNS COOKIES - present. Setting this to yes will - result in reduced amplification effect in a reflection - attack, as the BADCOOKIE response will be smaller than - a full response, while also requiring a legitimate client - to follow up with a second query with the new, valid, cookie. -

-
-
answer-cookie
-
-

- When set to the default value of yes, - COOKIE EDNS options will be sent when applicable in - replies to client queries. If set to - no, COOKIE EDNS options will not - be sent in replies. This can only be set at the global - options level, not per-view. -

-

- answer-cookie no is intended as a - temporary measure, for use when named - shares an IP address with other servers that do not yet - support DNS COOKIE. A mismatch between servers on the same - address is not expected to cause operational problems, but - the option to disable COOKIE responses so that all servers - have the same behavior is provided out of an abundance of - caution. DNS COOKIE is an important security mechanism, - and should not be disabled unless absolutely necessary. -

-
-
send-cookie
-
-

- If yes, then a COOKIE EDNS - option is sent along with the query. If the - resolver has previously talked to the server, the - COOKIE returned in the previous transaction is sent. - This is used by the server to determine whether - the resolver has talked to it before. A resolver - sending the correct COOKIE is assumed not to be an - off-path attacker sending a spoofed-source query; - the query is therefore unlikely to be part of a - reflection/amplification attack, so resolvers - sending a correct COOKIE option are not subject to - response rate limiting (RRL). Resolvers which - do not send a correct COOKIE option may be limited - to receiving smaller responses via the - nocookie-udp-size option. - The default is yes. -

-
-
stale-answer-enable
-
-

- Enable the returning of "stale" cached answers when - the nameservers for a zone are not answering. The - default is not to return stale answers. -

-

- Stale answers can also be enabled or disabled at - runtime via rndc serve-stale on or - rndc serve-stale off; these - override the configured setting. - rndc serve-stale reset - restores the setting to the one specified in - named.conf. Note that if - stale answers have been disabled by rndc, - then they cannot be re-enabled by reloading or - reconfiguring named; - they must be re-enabled with - rndc serve-stale on, - or the server must be restarted. -

-

- Information about stale answers is logged under - the serve-stale log category. -

-
-
nocookie-udp-size
-
-

- Sets the maximum size of UDP responses that will be - sent to queries without a valid server COOKIE. A value - below 128 will be silently raised to 128. The default - value is 4096, but the max-udp-size - option may further limit the response size. -

-
-
sit-secret
-
-

- This experimental option is obsolete. -

-
-
cookie-algorithm
-
-

- Set the algorithm to be used when generating the - server cookie. One of "aes", "sha1" or "sha256". - The default is "aes" if supported by the cryptographic - library or otherwise "sha256". -

-
-
cookie-secret
-
-

- If set, this is a shared secret used for generating - and verifying EDNS COOKIE options - within an anycast cluster. If not set, the system - will generate a random secret at startup. The - shared secret is encoded as a hex string and needs - to be 128 bits for AES128, 160 bits for SHA1 and - 256 bits for SHA256. -

-

- If there are multiple secrets specified, the first - one listed in named.conf is - used to generate new server cookies. The others - will only be used to verify returned cookies. -

-
-
response-padding
-
-

- The EDNS Padding option is intended to improve - confidentiality when DNS queries are sent over an - encrypted channel by reducing the variability in - packet sizes. If a query: -

-
    -
  1. - contains an EDNS Padding option, -
  2. -
  3. - includes a valid server cookie or uses TCP, -
  4. -
  5. - is not signed using TSIG or - SIG(0), and -
  6. -
  7. - is from a client whose address matches the specified ACL, -
  8. -
-

- then the response is padded with an EDNS Padding option - to a multiple of block-size bytes. - If these conditions are not met, the response is not - padded. -

-

- If block-size is 0 or the ACL is - none;, then this feature is - disabled and no padding will occur; this is the - default. If block-size is greater - than 512, a warning is logged and the value is truncated - to 512. Block sizes are ordinarily expected to be powers - of two (for instance, 128), but this is not mandatory. -

-
-
trust-anchor-telemetry
-
-

- Causes named to send specially-formed - queries once per day to domains for which trust anchors - have been configured via, e.g., - trust-anchors or - dnssec-validation auto. -

-

- The query name used for these queries has the - form "_ta-xxxx(-xxxx)(...)".<domain>, where - each "xxxx" is a group of four hexadecimal digits - representing the key ID of a trusted DNSSEC key. - The key IDs for each domain are sorted smallest - to largest prior to encoding. The query type is NULL. -

-

- By monitoring these queries, zone operators will - be able to see which resolvers have been updated to - trust a new key; this may help them decide when it - is safe to remove an old one. -

-

- The default is yes. -

-
-
use-ixfr
-
-

- This option is obsolete. - If you need to disable IXFR to a particular server or - servers, see - the information on the provide-ixfr option - in the section called “server Statement Definition and - Usage”. - See also - the section called “Incremental Zone Transfers (IXFR)”. -

-
-
provide-ixfr
-
-

- See the description of - provide-ixfr in - the section called “server Statement Definition and - Usage”. -

-
-
request-ixfr
-
-

- See the description of - request-ixfr in - the section called “server Statement Definition and - Usage”. -

-
-
request-expire
-
-

- See the description of - request-expire in - the section called “server Statement Definition and - Usage”. -

-
-
match-mapped-addresses
-
-

- If yes, then an - IPv4-mapped IPv6 address will match any address match - list entries that match the corresponding IPv4 address. -

-

- This option was introduced to work around a kernel quirk - in some operating systems that causes IPv4 TCP - connections, such as zone transfers, to be accepted on an - IPv6 socket using mapped addresses. This caused address - match lists designed for IPv4 to fail to match. However, - named now solves this problem - internally. The use of this option is discouraged. -

-
-
ixfr-from-differences
-
-

- When yes and the server loads a new - version of a master zone from its zone file or receives a - new version of a slave file via zone transfer, it will - compare the new version to the previous one and calculate - a set of differences. The differences are then logged in - the zone's journal file such that the changes can be - transmitted to downstream slaves as an incremental zone - transfer. -

-

- By allowing incremental zone transfers to be used for - non-dynamic zones, this option saves bandwidth at the - expense of increased CPU and memory consumption at the - master. - In particular, if the new version of a zone is completely - different from the previous one, the set of differences - will be of a size comparable to the combined size of the - old and new zone version, and the server will need to - temporarily allocate memory to hold this complete - difference set. -

-

ixfr-from-differences - also accepts master (or - primary) and - slave (or secondary) - at the view and options levels, which causes - ixfr-from-differences to be enabled for - all primary or secondary zones, respectively. - It is off for all zones by default. -

-

- Note: if inline signing is enabled for a zone, the - user-provided ixfr-from-differences - setting is ignored for that zone. -

-
-
multi-master
-
-

- This should be set when you have multiple masters for a zone - and the - addresses refer to different machines. If yes, named will - not log - when the serial number on the master is less than what named - currently - has. The default is no. -

-
-
auto-dnssec
-
-

- Zones configured for dynamic DNS may use this - option to allow varying levels of automatic DNSSEC key - management. There are three possible settings: -

-

- auto-dnssec allow; permits - keys to be updated and the zone fully re-signed - whenever the user issues the command rndc sign - zonename. -

-

- auto-dnssec maintain; includes the - above, but also automatically adjusts the zone's DNSSEC - keys on schedule, according to the keys' timing metadata - (see dnssec-keygen(8) and - dnssec-settime(8)). The command - rndc sign - zonename causes - named to load keys from the key - repository and sign the zone with all keys that are - active. - rndc loadkeys - zonename causes - named to load keys from the key - repository and schedule key maintenance events to occur - in the future, but it does not sign the full zone - immediately. Note: once keys have been loaded for a - zone the first time, the repository will be searched - for changes periodically, regardless of whether - rndc loadkeys is used. The recheck - interval is defined by - dnssec-loadkeys-interval.) -

-

- The default setting is auto-dnssec off. -

-
-
dnssec-enable
-
-

- This option is obsolete and has no effect. -

-
-
-dnssec-validation -
-
-

- This option enables DNSSEC validation in - named. -

-

- If set to auto, - DNSSEC validation is enabled, and a default trust anchor - for the DNS root zone is used. -

-

- If set to yes, DNSSEC validation is - enabled, but a trust anchor must be manually configured - using a trust-anchors statement (or - the managed-keys or the - trusted-keys statements, both deprecated). - If there is no configured trust anchor, validation will - not take place. -

-

- If set to no, DNSSEC validation - is disabled. -

-

- The default is auto, unless - BIND is built with - configure --disable-auto-validation, - in which case the default is yes. -

-

- The default root trust anchor is stored in the file - bind.keys. - named will load that key at - startup if dnssec-validation is - set to auto. A copy of the file is - installed along with BIND 9, and is current as of the - release date. If the root key expires, a new copy of - bind.keys can be downloaded - from https://www.isc.org/bind-keys. -

-

- (To prevent problems if bind.keys is - not found, the current trust anchor is also compiled in - to named. Relying on this is not - recommended, however, as it requires named - to be recompiled with a new key when the root key expires.) -

-
-

Note

-

- named loads only - the root key from bind.keys. - The file cannot be used to store keys for other zones. - The root key in bind.keys is ignored - if dnssec-validation auto is not in - use. -

-

- Whenever the resolver sends out queries to an - EDNS-compliant server, it always sets the DO bit - indicating it can support DNSSEC responses even if - dnssec-validation is off. -

-
-
-
validate-except
-
-

- Specifies a list of domain names at and beneath which DNSSEC - validation should not be performed, - regardless of the presence of a trust anchor at or above - those names. This may be used, for example, when configuring - a top-level domain intended only for local use, so that the - lack of a secure delegation for that domain in the root zone - will not cause validation failures. (This is similar - to setting a negative trust anchor, except that it is a - permanent configuration, whereas negative trust anchors - expire and are removed after a set period of time.) -

-
-
dnssec-accept-expired
-
-

- Accept expired signatures when verifying DNSSEC signatures. - The default is no. - Setting this option to yes - leaves named vulnerable to - replay attacks. -

-
-
querylog
-
-

- Query logging provides a complete log of all incoming - queries and all query errors. This provides more insight - into the server's activity, but with a cost to - performance which may be significant on heavily-loaded - servers. -

-

- The querylog option specifies - whether query logging should be active when - named first starts. - If querylog is not specified, then - query logging is determined by the presence of the - logging category queries. - Query logging can also be activated at runtime using the - command rndc querylog on, or - deactivated with rndc querylog off. -

-
-
check-names
-
-

- This option is used to restrict the character set and syntax - of - certain domain names in master files and/or DNS responses - received - from the network. The default varies according to usage - area. For - master zones the default is fail. - For slave zones the default - is warn. - For answers received from the network (response) - the default is ignore. -

-

- The rules for legal hostnames and mail domains are derived - from RFC 952 and RFC 821 as modified by RFC 1123. -

-

check-names - applies to the owner names of A, AAAA and MX records. - It also applies to the domain names in the RDATA of NS, SOA, - MX, and SRV records. - It also applies to the RDATA of PTR records where the owner - name indicated that it is a reverse lookup of a hostname - (the owner name ends in IN-ADDR.ARPA, IP6.ARPA, or IP6.INT). -

-
-
check-dup-records
-
-

- Check master zones for records that are treated as different - by DNSSEC but are semantically equal in plain DNS. The - default is to warn. Other possible - values are fail and - ignore. -

-
-
check-mx
-
-

- Check whether the MX record appears to refer to a IP address. - The default is to warn. Other possible - values are fail and - ignore. -

-
-
check-wildcard
-
-

- This option is used to check for non-terminal wildcards. - The use of non-terminal wildcards is almost always as a - result of a failure - to understand the wildcard matching algorithm (RFC 1034). - This option - affects master zones. The default (yes) is to check - for non-terminal wildcards and issue a warning. -

-
-
check-integrity
-
-

- Perform post load zone integrity checks on master - zones. This checks that MX and SRV records refer - to address (A or AAAA) records and that glue - address records exist for delegated zones. For - MX and SRV records only in-zone hostnames are - checked (for out-of-zone hostnames use - named-checkzone). - For NS records only names below top of zone are - checked (for out-of-zone names and glue consistency - checks use named-checkzone). - The default is yes. -

-

- The use of the SPF record for publishing Sender - Policy Framework is deprecated as the migration - from using TXT records to SPF records was abandoned. - Enabling this option also checks that a TXT Sender - Policy Framework record exists (starts with "v=spf1") - if there is an SPF record. Warnings are emitted if the - TXT record does not exist and can be suppressed with - check-spf. -

-
-
check-mx-cname
-
-

- If check-integrity is set then - fail, warn or ignore MX records that refer - to CNAMES. The default is to warn. -

-
-
check-srv-cname
-
-

- If check-integrity is set then - fail, warn or ignore SRV records that refer - to CNAMES. The default is to warn. -

-
-
check-sibling
-
-

- When performing integrity checks, also check that - sibling glue exists. The default is yes. -

-
-
check-spf
-
-

- If check-integrity is set then - check that there is a TXT Sender Policy Framework - record present (starts with "v=spf1") if there is an - SPF record present. The default is - warn. -

-
-
zero-no-soa-ttl
-
-

- When returning authoritative negative responses to - SOA queries set the TTL of the SOA record returned in - the authority section to zero. - The default is yes. -

-
-
zero-no-soa-ttl-cache
-
-

- When caching a negative response to a SOA query - set the TTL to zero. - The default is no. -

-
-
update-check-ksk
-
-

- When set to the default value of yes, - check the KSK bit in each key to determine how the key - should be used when generating RRSIGs for a secure zone. -

-

- Ordinarily, zone-signing keys (that is, keys without the - KSK bit set) are used to sign the entire zone, while - key-signing keys (keys with the KSK bit set) are only - used to sign the DNSKEY RRset at the zone apex. - However, if this option is set to no, - then the KSK bit is ignored; KSKs are treated as if they - were ZSKs and are used to sign the entire zone. This is - similar to the dnssec-signzone -z - command line option. -

-

- When this option is set to yes, there - must be at least two active keys for every algorithm - represented in the DNSKEY RRset: at least one KSK and one - ZSK per algorithm. If there is any algorithm for which - this requirement is not met, this option will be ignored - for that algorithm. -

-
-
dnssec-dnskey-kskonly
-
-

- When this option and update-check-ksk - are both set to yes, only key-signing - keys (that is, keys with the KSK bit set) will be used - to sign the DNSKEY, CDNSKEY, and CDS RRsets at the zone apex. - Zone-signing keys (keys without the KSK bit set) will be used - to sign the remainder of the zone, but not the DNSKEY RRset. - This is similar to the - dnssec-signzone -x command line option. -

-

- The default is no. If - update-check-ksk is set to - no, this option is ignored. -

-
-
try-tcp-refresh
-
-

- Try to refresh the zone using TCP if UDP queries fail. - The default is yes. -

-
-
dnssec-secure-to-insecure
-
-

- Allow a dynamic zone to transition from secure to - insecure (i.e., signed to unsigned) by deleting all - of the DNSKEY records. The default is no. - If set to yes, and if the DNSKEY RRset - at the zone apex is deleted, all RRSIG and NSEC records - will be removed from the zone as well. -

-

- If the zone uses NSEC3, then it is also necessary to - delete the NSEC3PARAM RRset from the zone apex; this will - cause the removal of all corresponding NSEC3 records. - (It is expected that this requirement will be eliminated - in a future release.) -

-

- Note that if a zone has been configured with - auto-dnssec maintain and the - private keys remain accessible in the key repository, - then the zone will be automatically signed again the - next time named is started. -

-
-
synth-from-dnssec
-
-

- Synthesize answers from cached NSEC, NSEC3 and - other RRsets that have been proved to be correct - using DNSSEC. The default is no, - but it will become yes again - in the future releases. -

-

- Note: -

-
  • -

    - DNSSEC validation must be enabled for this - option to be effective. -

    -

    - This initial implementation only covers synthesis - of answers from NSEC records. Synthesis from NSEC3 - is planned for the future. This will also be - controlled by synth-from-dnssec. -

    -
-

-

-
-
- -
- -
-

-Forwarding

- -

- The forwarding facility can be used to create a large site-wide - cache on a few servers, reducing traffic over links to external - name servers. It can also be used to allow queries by servers that - do not have direct access to the Internet, but wish to look up - exterior - names anyway. Forwarding occurs only on those queries for which - the server is not authoritative and does not have the answer in - its cache. -

- -
-
forward
-
-

- This option is only meaningful if the - forwarders list is not empty. A value of first, - the default, causes the server to query the forwarders - first — and - if that doesn't answer the question, the server will then - look for - the answer itself. If only is - specified, the - server will only query the forwarders. -

-
-
forwarders
-
-

- Specifies a list of IP addresses to which queries shall be - forwarded. The default is the empty list (no forwarding). - Each address in the list can be associated with an optional - port number and/or DSCP value, and a default port number and - DSCP value can be set for the entire list. -

-
-
- -

- Forwarding can also be configured on a per-domain basis, allowing - for the global forwarding options to be overridden in a variety - of ways. You can set particular domains to use different - forwarders, - or have a different forward only/first behavior, - or not forward at all, see the section called “zone - Statement Grammar”. -

-
- -
-

-Dual-stack Servers

- -

- Dual-stack servers are used as servers of last resort to work - around - problems in reachability due the lack of support for either IPv4 - or IPv6 - on the host machine. -

- -
-
dual-stack-servers
-
-

- Specifies host names or addresses of machines with access to - both IPv4 and IPv6 transports. If a hostname is used, the - server must be able - to resolve the name using only the transport it has. If the - machine is dual - stacked, then the dual-stack-servers have no effect unless - access to a transport has been disabled on the command line - (e.g. named -4). -

-
-
-
- -
-

-Access Control

- - -

- Access to the server can be restricted based on the IP address - of the requesting system. See the section called “Address Match Lists” for - details on how to specify IP address lists. -

- -
-
allow-notify
-
-

- This ACL specifies which hosts may send NOTIFY messages - to inform this server of changes to zones for which it - is acting as a secondary server. This is only - applicable for secondary zones (i.e., type - secondary or slave). -

-

- If this option is set in view or - options, it is globally applied to - all secondary zones. If set in the zone - statement, the global value is overridden. -

-

- If not specified, the default is to process NOTIFY - messages only from the configured - masters for the zone. - allow-notify can be used to expand the - list of permitted hosts, not to reduce it. -

-
-
allow-query
-
-

- Specifies which hosts are allowed to ask ordinary - DNS questions. allow-query may - also be specified in the zone - statement, in which case it overrides the - options allow-query statement. - If not specified, the default is to allow queries - from all hosts. -

-
-

Note

-

- allow-query-cache is now - used to specify access to the cache. -

-
-
-
allow-query-on
-
-

- Specifies which local addresses can accept ordinary - DNS questions. This makes it possible, for instance, - to allow queries on internal-facing interfaces but - disallow them on external-facing ones, without - necessarily knowing the internal network's addresses. -

-

- Note that allow-query-on is only - checked for queries that are permitted by - allow-query. A query must be - allowed by both ACLs, or it will be refused. -

-

- allow-query-on may - also be specified in the zone - statement, in which case it overrides the - options allow-query-on statement. -

-

- If not specified, the default is to allow queries - on all addresses. -

-
-

Note

-

- allow-query-cache is - used to specify access to the cache. -

-
-
-
allow-query-cache
-
-

- Specifies which hosts are allowed to get answers - from the cache. If allow-query-cache - is not set then allow-recursion - is used if set, otherwise allow-query - is used if set unless recursion no; is - set in which case none; is used, - otherwise the default (localnets; - localhost;) is used. -

-
-
allow-query-cache-on
-
-

- Specifies which local addresses can send answers - from the cache. If allow-query-cache-on - is not set, then allow-recursion-on is - used if set. Otherwise, the default is - to allow cache responses to be sent from any address. - Note: Both allow-query-cache and - allow-query-cache-on must be - satisfied before a cache response can be sent; - a client that is blocked by one cannot be allowed - by the other. -

-
-
allow-recursion
-
-

- Specifies which hosts are allowed to make recursive - queries through this server. If - allow-recursion is not set - then allow-query-cache is - used if set, otherwise allow-query - is used if set, otherwise the default - (localnets; - localhost;) is used. -

-
-
allow-recursion-on
-
-

- Specifies which local addresses can accept recursive - queries. If allow-recursion-on - is not set, then allow-query-cache-on - is used if set; otherwise, the default is to allow - recursive queries on all addresses: Any client permitted - to send recursive queries can send them to any address - on which named is listening. - Note: Both allow-recursion and - allow-recursion-on must be - satisfied before recursion is allowed; - a client that is blocked by one cannot be allowed - by the other. -

-
-
allow-update
-
-

- When set in the zone statement for - a master zone, specifies which hosts are allowed to - submit Dynamic DNS updates to that zone. The default - is to deny updates from all hosts. -

-

- Note that allowing updates based on the - requestor's IP address is insecure; see - the section called “Dynamic Update Security” for details. -

-

- In general this option should only be set at the - zone level. While a default - value can be set at the options or - view level and inherited by zones, - this could lead to some zones unintentionally allowing - updates. -

-
-
allow-update-forwarding
-
-

- When set in the zone statement for - a slave zone, specifies which hosts are allowed to - submit Dynamic DNS updates and have them be forwarded - to the master. The default is - { none; }, which means that no - update forwarding will be performed. -

-

- To enable update forwarding, specify - allow-update-forwarding { any; };. - in the zone statement. - Specifying values other than { none; } - or { any; } is usually - counterproductive; the responsibility for update - access control should rest with the master server, not - the slave. -

-

- Note that enabling the update forwarding feature on a slave - server may expose master servers to attacks if they rely - on insecure IP-address-based access control; see - the section called “Dynamic Update Security” for more details. -

-

- In general this option should only be set at the - zone level. While a default - value can be set at the options or - view level and inherited by zones, - this can lead to some zones unintentionally forwarding - updates. -

-
-
allow-v6-synthesis
-
-

- This option was introduced for the smooth transition from - AAAA - to A6 and from "nibble labels" to binary labels. - However, since both A6 and binary labels were then - deprecated, - this option was also deprecated. - It is now ignored with some warning messages. -

-
-
-allow-transfer -
-
-

- Specifies which hosts are allowed to receive zone - transfers from the server. allow-transfer - may also be specified in the zone - statement, in which case it overrides the - allow-transfer statement set in - options or view. - If not specified, the default is to allow transfers to - all hosts. -

-
-
blackhole
-
-

- Specifies a list of addresses that the - server will not accept queries from or use to resolve a - query. Queries - from these addresses will not be responded to. The default - is none. -

-
-
keep-response-order
-
-

- Specifies a list of addresses to which the server - will send responses to TCP queries in the same order - in which they were received. This disables the - processing of TCP queries in parallel. The default - is none. -

-
-
no-case-compress
-
-

- Specifies a list of addresses which require responses - to use case-insensitive compression. This ACL can be - used when named needs to work with - clients that do not comply with the requirement in RFC - 1034 to use case-insensitive name comparisons when - checking for matching domain names. -

-

- If left undefined, the ACL defaults to - none: case-insensitive compression - will be used for all clients. If the ACL is defined and - matches a client, then case will be ignored when - compressing domain names in DNS responses sent to that - client. -

-

- This can result in slightly smaller responses: if - a response contains the names "example.com" and - "example.COM", case-insensitive compression would treat - the second one as a duplicate. It also ensures - that the case of the query name exactly matches the - case of the owner names of returned records, rather - than matching the case of the records entered in - the zone file. This allows responses to exactly - match the query, which is required by some clients - due to incorrect use of case-sensitive comparisons. -

-

- Case-insensitive compression is always - used in AXFR and IXFR responses, regardless of whether - the client matches this ACL. -

-

- There are circumstances in which named - will not preserve the case of owner names of records: - if a zone file defines records of different types with - the same name, but the capitalization of the name is - different (e.g., "www.example.com/A" and - "WWW.EXAMPLE.COM/AAAA"), then all responses for that - name will use the first version - of the name that was used in the zone file. This - limitation may be addressed in a future release. However, - domain names specified in the rdata of resource records - (i.e., records of type NS, MX, CNAME, etc) will always - have their case preserved unless the client matches this - ACL. -

-
-
resolver-query-timeout
-
-

- The amount of time in milliseconds that the resolver - will spend attempting to resolve a recursive - query before failing. The default and minimum - is 10000 and the maximum is - 30000. Setting it to - 0 will result in the default - being used. -

-

- This value was originally specified in seconds. - Values less than or equal to 300 will be be treated - as seconds and converted to milliseconds before - applying the above limits. -

-
-
- -
- -
-

-Interfaces

- -

- The interfaces and ports that the server will answer queries - from may be specified using the listen-on option. listen-on takes - an optional port and an address_match_list - of IPv4 addresses. (IPv6 addresses are ignored, with a - logged warning.) - The server will listen on all interfaces allowed by the address - match list. If a port is not specified, port 53 will be used. -

-

- Multiple listen-on statements are - allowed. - For example, -

- -
listen-on { 5.6.7.8; };
-listen-on port 1234 { !1.2.3.4; 1.2/16; };
-
- -

- will enable the name server on port 53 for the IP address - 5.6.7.8, and on port 1234 of an address on the machine in net - 1.2 that is not 1.2.3.4. -

- -

- If no listen-on is specified, the - server will listen on port 53 on all IPv4 interfaces. -

- -

- The listen-on-v6 option is used to - specify the interfaces and the ports on which the server will - listen for incoming queries sent using IPv6. If not specified, - the server will listen on port 53 on all IPv6 interfaces. -

- -

- When

-
{ any; }
-

is - specified - as the address_match_list for the - listen-on-v6 option, - the server does not bind a separate socket to each IPv6 interface - address as it does for IPv4 if the operating system has enough API - support for IPv6 (specifically if it conforms to RFC 3493 and RFC - 3542). - Instead, it listens on the IPv6 wildcard address. - If the system only has incomplete API support for IPv6, however, - the behavior is the same as that for IPv4. -

- -

- A list of particular IPv6 addresses can also be specified, in - which case - the server listens on a separate socket for each specified - address, - regardless of whether the desired API is supported by the system. - IPv4 addresses specified in listen-on-v6 - will be ignored, with a logged warning. -

- -

- Multiple listen-on-v6 options can - be used. - For example, -

- -
listen-on-v6 { any; };
-listen-on-v6 port 1234 { !2001:db8::/32; any; };
-
- -

- will enable the name server on port 53 for any IPv6 addresses - (with a single wildcard socket), - and on port 1234 of IPv6 addresses that is not in the prefix - 2001:db8::/32 (with separate sockets for each matched address.) -

- -

- To make the server not listen on any IPv6 address, use -

- -
listen-on-v6 { none; };
-
- -
- -
-

-Query Address

- -

- If the server doesn't know the answer to a question, it will - query other name servers. query-source specifies - the address and port used for such queries. For queries sent over - IPv6, there is a separate query-source-v6 option. - If address is * (asterisk) or is omitted, - a wildcard IP address (INADDR_ANY) - will be used. -

- -

- If port is * or is omitted, - a random port number from a pre-configured - range is picked up and will be used for each query. - The port range(s) is that specified in - the use-v4-udp-ports (for IPv4) - and use-v6-udp-ports (for IPv6) - options, excluding the ranges specified in - the avoid-v4-udp-ports - and avoid-v6-udp-ports options, respectively. -

- -

- The defaults of the query-source and - query-source-v6 options - are: -

- -
query-source address * port *;
-query-source-v6 address * port *;
-
- -

- If use-v4-udp-ports or - use-v6-udp-ports is unspecified, - named will check if the operating - system provides a programming interface to retrieve the - system's default range for ephemeral ports. - If such an interface is available, - named will use the corresponding system - default range; otherwise, it will use its own defaults: -

- -
use-v4-udp-ports { range 1024 65535; };
-use-v6-udp-ports { range 1024 65535; };
-
- -

- Note: make sure the ranges be sufficiently large for - security. A desirable size depends on various parameters, - but we generally recommend it contain at least 16384 ports - (14 bits of entropy). - Note also that the system's default range when used may be - too small for this purpose, and that the range may even be - changed while named is running; the new - range will automatically be applied when named - is reloaded. - It is encouraged to - configure use-v4-udp-ports and - use-v6-udp-ports explicitly so that the - ranges are sufficiently large and are reasonably - independent from the ranges used by other applications. -

- -

- Note: the operational configuration - where named runs may prohibit the use - of some ports. For example, UNIX systems will not allow - named running without a root privilege - to use ports less than 1024. - If such ports are included in the specified (or detected) - set of query ports, the corresponding query attempts will - fail, resulting in resolution failures or delay. - It is therefore important to configure the set of ports - that can be safely used in the expected operational environment. -

- -

- The defaults of the avoid-v4-udp-ports and - avoid-v6-udp-ports options - are: -

- -
avoid-v4-udp-ports {};
-avoid-v6-udp-ports {};
-
- -

- Note: BIND 9.5.0 introduced - the use-queryport-pool - option to support a pool of such random ports, but this - option is now obsolete because reusing the same ports in - the pool may not be sufficiently secure. - For the same reason, it is generally strongly discouraged to - specify a particular port for the - query-source or - query-source-v6 options; - it implicitly disables the use of randomized port numbers. -

- -
-
use-queryport-pool
-
-

- This option is obsolete. -

-
-
queryport-pool-ports
-
-

- This option is obsolete. -

-
-
queryport-pool-updateinterval
-
-

- This option is obsolete. -

-
-
-
-

Note

-

- The address specified in the query-source option - is used for both UDP and TCP queries, but the port applies only - to UDP queries. TCP queries always use a random - unprivileged port. -

-
-
-

Note

-

- Solaris 2.5.1 and earlier does not support setting the source - address for TCP sockets. -

-
-
-

Note

-

- See also transfer-source and - notify-source. -

-
-
- -
-

-Zone Transfers

- -

- BIND has mechanisms in place to - facilitate zone transfers - and set limits on the amount of load that transfers place on the - system. The following options apply to zone transfers. -

- -
-
also-notify
-
-

- Defines a global list of IP addresses of name servers - that are also sent NOTIFY messages whenever a fresh copy of - the - zone is loaded, in addition to the servers listed in the - zone's NS records. - This helps to ensure that copies of the zones will - quickly converge on stealth servers. - Optionally, a port may be specified with each - also-notify address to send - the notify messages to a port other than the - default of 53. - An optional TSIG key can also be specified with each - address to cause the notify messages to be signed; this - can be useful when sending notifies to multiple views. - In place of explicit addresses, one or more named - masters lists can be used. -

-

- If an also-notify list - is given in a zone statement, - it will override - the options also-notify - statement. When a zone notify - statement - is set to no, the IP - addresses in the global also-notify list will - not be sent NOTIFY messages for that zone. The default is - the empty - list (no global notification list). -

-
-
max-transfer-time-in
-
-

- Inbound zone transfers running longer than - this many minutes will be terminated. The default is 120 - minutes - (2 hours). The maximum value is 28 days (40320 minutes). -

-
-
max-transfer-idle-in
-
-

- Inbound zone transfers making no progress - in this many minutes will be terminated. The default is 60 - minutes - (1 hour). The maximum value is 28 days (40320 minutes). -

-
-
max-transfer-time-out
-
-

- Outbound zone transfers running longer than - this many minutes will be terminated. The default is 120 - minutes - (2 hours). The maximum value is 28 days (40320 minutes). -

-
-
max-transfer-idle-out
-
-

- Outbound zone transfers making no progress - in this many minutes will be terminated. The default is 60 - minutes (1 - hour). The maximum value is 28 days (40320 minutes). -

-
-
notify-rate
-
-

- The rate at which NOTIFY requests will be sent - during normal zone maintenance operations. (NOTIFY - requests due to initial zone loading are subject - to a separate rate limit; see below.) The default is - 20 per second. - The lowest possible rate is one per second; when set - to zero, it will be silently raised to one. -

-
-
startup-notify-rate
-
-

- The rate at which NOTIFY requests will be sent - when the name server is first starting up, or when - zones have been newly added to the nameserver. - The default is 20 per second. - The lowest possible rate is one per second; when set - to zero, it will be silently raised to one. -

-
-
serial-query-rate
-
-

- Slave servers will periodically query master - servers to find out if zone serial numbers have - changed. Each such query uses a minute amount of - the slave server's network bandwidth. To limit - the amount of bandwidth used, BIND 9 limits the - rate at which queries are sent. The value of the - serial-query-rate option, an - integer, is the maximum number of queries sent - per second. The default is 20 per second. - The lowest possible rate is one per second; when set - to zero, it will be silently raised to one. -

-
-
transfer-format
-
- -

- Zone transfers can be sent using two different formats, - one-answer and - many-answers. - The transfer-format option is used - on the master server to determine which format it sends. - one-answer uses one DNS message per - resource record transferred. - many-answers packs as many resource - records as possible into a message. - many-answers is more efficient, but is - only supported by relatively new slave servers, - such as BIND 9, BIND - 8.x and BIND 4.9.5 onwards. - The many-answers format is also supported by - recent Microsoft Windows nameservers. - The default is many-answers. - transfer-format may be overridden on a - per-server basis by using the server - statement. -

- -
-
transfer-message-size
-
-

- This is an upper bound on the uncompressed size of DNS - messages used in zone transfers over TCP. If a message - grows larger than this size, additional messages will be - used to complete the zone transfer. (Note, however, - that this is a hint, not a hard limit; if a message - contains a single resource record whose RDATA does not - fit within the size limit, a larger message will be - permitted so the record can be transferred.) -

-

- Valid values are between 512 and 65535 octets, and any - values outside that range will be adjusted to the nearest - value within it. The default is 20480, - which was selected to improve message compression: - most DNS messages of this size will compress to less - than 16536 bytes. Larger messages cannot be compressed - as effectively, because 16536 is the largest permissible - compression offset pointer in a DNS message. -

-

- This option is mainly intended for server testing; - there is rarely any benefit in setting a value other - than the default. -

-
-
transfers-in
-
-

- The maximum number of inbound zone transfers - that can be running concurrently. The default value is 10. - Increasing transfers-in may - speed up the convergence - of slave zones, but it also may increase the load on the - local system. -

-
-
transfers-out
-
-

- The maximum number of outbound zone transfers - that can be running concurrently. Zone transfer requests in - excess - of the limit will be refused. The default value is 10. -

-
-
transfers-per-ns
-
-

- The maximum number of inbound zone transfers - that can be concurrently transferring from a given remote - name server. - The default value is 2. - Increasing transfers-per-ns - may - speed up the convergence of slave zones, but it also may - increase - the load on the remote name server. transfers-per-ns may - be overridden on a per-server basis by using the transfers phrase - of the server statement. -

-
-
transfer-source
-
-

transfer-source - determines which local address will be bound to IPv4 - TCP connections used to fetch zones transferred - inbound by the server. It also determines the - source IPv4 address, and optionally the UDP port, - used for the refresh queries and forwarded dynamic - updates. If not set, it defaults to a system - controlled value which will usually be the address - of the interface "closest to" the remote end. This - address must appear in the remote end's - allow-transfer option for the - zone being transferred, if one is specified. This - statement sets the - transfer-source for all zones, - but can be overridden on a per-view or per-zone - basis by including a - transfer-source statement within - the view or - zone block in the configuration - file. -

-
-

Note

-

- Solaris 2.5.1 and earlier does not support setting the - source address for TCP sockets. -

-
-
-
transfer-source-v6
-
-

- The same as transfer-source, - except zone transfers are performed using IPv6. -

-
-
alt-transfer-source
-
-

- An alternate transfer source if the one listed in - transfer-source fails and - use-alt-transfer-source is - set. -

-
-

Note

-

- If you do not wish the alternate transfer source - to be used, you should set - use-alt-transfer-source - appropriately and you should not depend upon - getting an answer back to the first refresh - query. -

-
-
-
alt-transfer-source-v6
-
-

- An alternate transfer source if the one listed in - transfer-source-v6 fails and - use-alt-transfer-source is - set. -

-
-
use-alt-transfer-source
-
-

- Use the alternate transfer sources or not. If views are - specified this defaults to no, - otherwise it defaults to - yes. -

-
-
notify-source
-
-

notify-source - determines which local source address, and - optionally UDP port, will be used to send NOTIFY - messages. This address must appear in the slave - server's masters zone clause or - in an allow-notify clause. This - statement sets the notify-source - for all zones, but can be overridden on a per-zone or - per-view basis by including a - notify-source statement within - the zone or - view block in the configuration - file. -

-
-

Note

-

- Solaris 2.5.1 and earlier does not support setting the - source address for TCP sockets. -

-
-
-
notify-source-v6
-
-

- Like notify-source, - but applies to notify messages sent to IPv6 addresses. -

-
-
- -
- -
-

-UDP Port Lists

- -

- use-v4-udp-ports, - avoid-v4-udp-ports, - use-v6-udp-ports, and - avoid-v6-udp-ports - specify a list of IPv4 and IPv6 UDP ports that will be - used or not used as source ports for UDP messages. - See the section called “Query Address” about how the - available ports are determined. - For example, with the following configuration -

- -
-use-v6-udp-ports { range 32768 65535; };
-avoid-v6-udp-ports { 40000; range 50000 60000; };
-
- -

- UDP ports of IPv6 messages sent - from named will be in one - of the following ranges: 32768 to 39999, 40001 to 49999, - and 60001 to 65535. -

- -

- avoid-v4-udp-ports and - avoid-v6-udp-ports can be used - to prevent named from choosing as its random source port a - port that is blocked by your firewall or a port that is - used by other applications; - if a query went out with a source port blocked by a - firewall, the - answer would not get by the firewall and the name server would - have to query again. - Note: the desired range can also be represented only with - use-v4-udp-ports and - use-v6-udp-ports, and the - avoid- options are redundant in that - sense; they are provided for backward compatibility and - to possibly simplify the port specification. -

-
- -
-

-Operating System Resource Limits

- -

- The server's usage of many system resources can be limited. - Scaled values are allowed when specifying resource limits. For - example, 1G can be used instead of - 1073741824 to specify a limit of - one - gigabyte. unlimited requests - unlimited use, or the - maximum available amount. default - uses the limit - that was in force when the server was started. See the description - of size_spec in the section called “Configuration File Elements”. -

- -

- The following options set operating system resource limits for - the name server process. Some operating systems don't support - some or - any of the limits. On such systems, a warning will be issued if - the - unsupported limit is used. -

- -
-
coresize
-
-

- The maximum size of a core dump. The default - is default. -

-
-
datasize
-
-

- The maximum amount of data memory the server - may use. The default is default. - This is a hard limit on server memory usage. - If the server attempts to allocate memory in excess of this - limit, the allocation will fail, which may in turn leave - the server unable to perform DNS service. Therefore, - this option is rarely useful as a way of limiting the - amount of memory used by the server, but it can be used - to raise an operating system data size limit that is - too small by default. If you wish to limit the amount - of memory used by the server, use the - max-cache-size and - recursive-clients - options instead. -

-
-
files
-
-

- The maximum number of files the server - may have open concurrently. The default is unlimited. -

-
-
stacksize
-
-

- The maximum amount of stack memory the server - may use. The default is default. -

-
-
- -
- -
-

-Server Resource Limits

- -

- The following options set limits on the server's - resource consumption that are enforced internally by the - server rather than the operating system. -

- -
-
max-journal-size
-
-

- Sets a maximum size for each journal file (see - the section called “The journal file”), expressed in bytes - or, if followed by an optional unit suffix ('k', - 'm', or 'g'), in kilobytes, megabytes, or gigabytes. - When the journal file approaches the specified size, - some of the oldest transactions in the journal - will be automatically removed. The largest - permitted value is 2 gigabytes. Very small - values are rounded up to 4096 bytes. You - can specify unlimited, which - also means 2 gigabytes. If you set the limit to - default or leave it unset, the - journal is allowed to grow up to twice as large as - the zone. (There is little benefit in storing - larger journals.) -

-

- This option may also be set on a per-zone basis. -

-
-
max-records
-
-

- The maximum number of records permitted in a zone. - The default is zero which means unlimited. -

-
-
recursive-clients
-
-

- The maximum number ("hard quota") of simultaneous - recursive lookups the server will perform on behalf - of clients. The default is - 1000. Because each recursing - client uses a fair - bit of memory (on the order of 20 kilobytes), the - value of the - recursive-clients option may - have to be decreased on hosts with limited memory. -

-

- recursive-clients defines a "hard - quota" limit for pending recursive clients: when more - clients than this are pending, new incoming requests - will not be accepted, and for each incoming request - a previous pending request will also be dropped. -

-

- A "soft quota" is also set. When this lower - quota is exceeded, incoming requests are accepted, but - for each one, a pending request will be dropped. - If recursive-clients is greater than - 1000, the soft quota is set to - recursive-clients minus 100; - otherwise it is set to 90% of - recursive-clients. -

-
-
tcp-clients
-
-

- The maximum number of simultaneous client TCP - connections that the server will accept. - The default is 150. -

-
-
-clients-per-query, max-clients-per-query -
-
-

These set the - initial value (minimum) and maximum number of recursive - simultaneous clients for any given query - (<qname,qtype,qclass>) that the server will accept - before dropping additional clients. named will attempt to - self tune this value and changes will be logged. The - default values are 10 and 100. -

-

- This value should reflect how many queries come in for - a given name in the time it takes to resolve that name. - If the number of queries exceed this value, named will - assume that it is dealing with a non-responsive zone - and will drop additional queries. If it gets a response - after dropping queries, it will raise the estimate. The - estimate will then be lowered in 20 minutes if it has - remained unchanged. -

-

- If clients-per-query is set to zero, - then there is no limit on the number of clients per query - and no queries will be dropped. -

-

- If max-clients-per-query is set to zero, - then there is no upper bound other than imposed by - recursive-clients. -

-
-
-fetches-per-zone -
-
-

- The maximum number of simultaneous iterative - queries to any one domain that the server will - permit before blocking new queries for data - in or beneath that zone. - This value should reflect how many fetches would - normally be sent to any one zone in the time it - would take to resolve them. It should be smaller - than recursive-clients. -

-

- When many clients simultaneously query for the - same name and type, the clients will all be attached - to the same fetch, up to the - max-clients-per-query limit, - and only one iterative query will be sent. - However, when clients are simultaneously - querying for different names - or types, multiple queries will be sent and - max-clients-per-query is not - effective as a limit. -

-

- Optionally, this value may be followed by the keyword - drop or fail, - indicating whether queries which exceed the fetch - quota for a zone will be dropped with no response, - or answered with SERVFAIL. The default is - drop. -

-

- If fetches-per-zone is set to zero, - then there is no limit on the number of fetches per query - and no queries will be dropped. The default is zero. -

-

- The current list of active fetches can be dumped by - running rndc recursing. The list - includes the number of active fetches for each - domain and the number of queries that have been - passed or dropped as a result of the - fetches-per-zone limit. (Note: - these counters are not cumulative over time; whenever - the number of active fetches for a domain drops to - zero, the counter for that domain is deleted, and the - next time a fetch is sent to that domain, it is - recreated with the counters set to zero.) -

-
-
-fetches-per-server -
-
-

- The maximum number of simultaneous iterative - queries that the server will allow to be sent to - a single upstream name server before blocking - additional queries. - This value should reflect how many fetches would - normally be sent to any one server in the time it - would take to resolve them. It should be smaller - than recursive-clients. -

-

- Optionally, this value may be followed by the keyword - drop or fail, - indicating whether queries will be dropped with no - response, or answered with SERVFAIL, when all of the - servers authoritative for a zone are found to have - exceeded the per-server quota. The default is - fail. -

-

- If fetches-per-server is set to zero, - then there is no limit on the number of fetches per query - and no queries will be dropped. The default is zero. -

-

- The fetches-per-server quota is - dynamically adjusted in response to detected - congestion. As queries are sent to a server - and are either answered or time out, an - exponentially weighted moving average is calculated - of the ratio of timeouts to responses. If the - current average timeout ratio rises above a "high" - threshold, then fetches-per-server - is reduced for that server. If the timeout ratio - drops below a "low" threshold, then - fetches-per-server is increased. - The fetch-quota-params options - can be used to adjust the parameters for this - calculation. -

-
-
fetch-quota-params
-
-

- Sets the parameters to use for dynamic resizing of - the fetches-per-server quota in - response to detected congestion. -

-

- The first argument is an integer value indicating - how frequently to recalculate the moving average - of the ratio of timeouts to responses for each - server. The default is 100, meaning we recalculate - the average ratio after every 100 queries have either - been answered or timed out. -

-

- The remaining three arguments represent the "low" - threshold (defaulting to a timeout ratio of 0.1), - the "high" threshold (defaulting to a timeout - ratio of 0.3), and the discount rate for - the moving average (defaulting to 0.7). - A higher discount rate causes recent events to - weigh more heavily when calculating the moving - average; a lower discount rate causes past - events to weigh more heavily, smoothing out - short-term blips in the timeout ratio. - These arguments are all fixed-point numbers with - precision of 1/100: at most two places after - the decimal point are significant. -

-
-
reserved-sockets
-
-

- The number of file descriptors reserved for TCP, stdio, - etc. This needs to be big enough to cover the number of - interfaces named listens on plus - tcp-clients, as well as - to provide room for outgoing TCP queries and incoming zone - transfers. The default is 512. - The minimum value is 128 and the - maximum value is 128 less than - maxsockets (-S). This option may be removed in the future. -

-

- This option has little effect on Windows. -

-
-
max-cache-size
-
-

- The maximum amount of memory to use for the - server's cache, in bytes or % of total physical memory. - When the amount of data in the cache - reaches this limit, the server will cause records to - expire prematurely based on an LRU based strategy so - that the limit is not exceeded. - The keyword unlimited, - or the value 0, will place no limit on cache size; - records will be purged from the cache only when their - TTLs expire. - Any positive values less than 2MB will be ignored - and reset to 2MB. - In a server with multiple views, the limit applies - separately to the cache of each view. - The default is 90%. - On systems where detection of amount of physical - memory is not supported values represented as % - fall back to unlimited. - Note that the detection of physical memory is done only - once at startup, so named will not - adjust the cache size if the amount of physical memory - is changed during runtime. -

-
-
tcp-listen-queue
-
-

- The listen queue depth. The default and minimum is 10. - If the kernel supports the accept filter "dataready" this - also controls how - many TCP connections that will be queued in kernel space - waiting for - some data before being passed to accept. Nonzero values - less than 10 will be silently raised. A value of 0 may also - be used; on most platforms this sets the listen queue - length to a system-defined default value. -

-
-
tcp-initial-timeout
-
-

- The amount of time (in units of 100 milliseconds) the - server waits on a new TCP connection for the first message - from the client. The default is 300 (30 seconds), - the minimum is 25 (2.5 seconds), and the maximum is - 1200 (two minutes). Values above the maximum or below - the minimum will be adjusted with a logged warning. - (Note: This value must be greater than the expected - round trip delay time; otherwise no client will ever - have enough time to submit a message.) - This value can be updated at runtime by using - rndc tcp-timeouts. -

-
-
tcp-idle-timeout
-
-

- The amount of time (in units of 100 milliseconds) the - server waits on an idle TCP connection before closing - it when the client is not using the EDNS TCP keepalive - option. The default is 300 (30 seconds), the maximum - is 1200 (two minutes), and the minimum is 1 (one tenth - of a second). Values above the maximum or below the minimum - will be adjusted with a logged warning. - See tcp-keepalive-timeout - for clients using the EDNS TCP keepalive option. - This value can be updated at runtime by using - rndc tcp-timeouts. -

-
-
tcp-keepalive-timeout
-
-

- The amount of time (in units of 100 milliseconds) the - server waits on an idle TCP connection before closing - it when the client is using the EDNS TCP keepalive - option. The default is 300 (30 seconds), the maximum - is 65535 (about 1.8 hours), and the minimum is 1 (one tenth - of a second). Values above the maximum or below the minimum - will be adjusted with a logged warning. - This value may be greater than - tcp-idle-timeout, because - clients using the EDNS TCP keepalive option are expected - to use TCP connections for more than one message. - This value can be updated at runtime by using - rndc tcp-timeouts. -

-
-
tcp-advertised-timeout
-
-

- The timeout value (in units of 100 milliseconds) the - server will send in respones containing the EDNS TCP - keepalive option. This informs a client of the - amount of time it may keep the session open. - The default is 300 (30 seconds), the maximum is - 65535 (about 1.8 hours), and the minimum is 0, which - signals that the clients must close TCP connections - immediately. Ordinarily this should be set to the - same value as tcp-keepalive-timeout. - This value can be updated at runtime by using - rndc tcp-timeouts. -

-
-
- -
- -
-

-Periodic Task Intervals

- -
-
cleaning-interval
-
-

- This option is obsolete. -

-
-
heartbeat-interval
-
-

- The server will perform zone maintenance tasks - for all zones marked as dialup whenever this - interval expires. The default is 60 minutes. Reasonable - values are up - to 1 day (1440 minutes). The maximum value is 28 days - (40320 minutes). - If set to 0, no zone maintenance for these zones will occur. -

-
-
interface-interval
-
-

- The server will scan the network interface list - every interface-interval - minutes. The default - is 60 minutes. The maximum value is 28 days (40320 minutes). - If set to 0, interface scanning will only occur when - the configuration file is loaded, or when - automatic-interface-scan is enabled - and supported by the operating system. After the scan, the - server will begin listening for queries on any newly - discovered interfaces (provided they are allowed by the - listen-on configuration), and - will stop listening on interfaces that have gone away. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 - duration formats. -

-
-
- -
- -
-

-The sortlist Statement

- -

- The response to a DNS query may consist of multiple resource - records (RRs) forming a resource record set (RRset). The name - server will normally return the RRs within the RRset in an - indeterminate order (but see the rrset-order - statement in the section called “RRset Ordering”). The client - resolver code should rearrange the RRs as appropriate, that is, - using any addresses on the local net in preference to other - addresses. However, not all resolvers can do this or are - correctly configured. When a client is using a local server, - the sorting can be performed in the server, based on the - client's address. This only requires configuring the name - servers, not all the clients. -

- -

- The sortlist statement (see below) takes an - address_match_list and interprets it in a - special way. Each top level statement in the - sortlist must itself be an explicit - address_match_list with one or two elements. - The first element (which may be an IP address, an IP prefix, an - ACL name or a nested address_match_list) of - each top level list is checked against the source address of - the query until a match is found. When the addresses in the - first element overlap, the first rule to match gets selected. -

-

- Once the source address of the query has been matched, if the - top level statement contains only one element, the actual - primitive element that matched the source address is used to - select the address in the response to move to the beginning of - the response. If the statement is a list of two elements, then - the second element is interpreted as a topology preference - list. Each top level element is assigned a distance and the - address in the response with the minimum distance is moved to - the beginning of the response. -

-

- In the following example, any queries received from any of the - addresses of the host itself will get responses preferring - addresses on any of the locally connected networks. Next most - preferred are addresses on the 192.168.1/24 network, and after - that either the 192.168.2/24 or 192.168.3/24 network with no - preference shown between these two networks. Queries received - from a host on the 192.168.1/24 network will prefer other - addresses on that network to the 192.168.2/24 and 192.168.3/24 - networks. Queries received from a host on the 192.168.4/24 or - the 192.168.5/24 network will only prefer other addresses on - their directly connected networks. -

- -
sortlist {
-    // IF the local host
-    // THEN first fit on the following nets
-    { localhost;
-        { localnets;
-            192.168.1/24;
-            { 192.168.2/24; 192.168.3/24; }; }; };
-    // IF on class C 192.168.1 THEN use .1, or .2 or .3
-    { 192.168.1/24;
-        { 192.168.1/24;
-            { 192.168.2/24; 192.168.3/24; }; }; };
-    // IF on class C 192.168.2 THEN use .2, or .1 or .3
-    { 192.168.2/24;
-        { 192.168.2/24;
-            { 192.168.1/24; 192.168.3/24; }; }; };
-    // IF on class C 192.168.3 THEN use .3, or .1 or .2
-    { 192.168.3/24;
-        { 192.168.3/24;
-            { 192.168.1/24; 192.168.2/24; }; }; };
-    // IF .4 or .5 THEN prefer that net
-    { { 192.168.4/24; 192.168.5/24; };
-    };
-};
- -

- The following example will give reasonable behavior for the - local host and hosts on directly connected networks. It is - similar to the behavior of the address sort in - BIND 4.9.x. Responses sent to queries from - the local host will favor any of the directly connected - networks. Responses sent to queries from any other hosts on a - directly connected network will prefer addresses on that same - network. Responses to other queries will not be sorted. -

- -
sortlist {
-           { localhost; localnets; };
-           { localnets; };
-};
-
- -
-
-

-RRset Ordering

- -

- When multiple records are returned in an answer it may be - useful to configure the order of the records placed into the - response. The rrset-order statement permits - configuration of the ordering of the records in a - multiple-record response. - See also the sortlist statement, - the section called “The sortlist Statement”. -

-

- An order_spec is defined as follows: -

-

- [class class_name] - [type type_name] - [name "domain_name"] - order ordering -

-

- If no class is specified, the default is ANY. - If no type is specified, the default is ANY. - If no name is specified, the default is "*" (asterisk). -

-

- The legal values for ordering are: -

-
- ---- - - - - - - - - - - - - - - - - - - -
-

fixed

-
-

- Records are returned in the order they - are defined in the zone file. This option - is only available if BIND - is configured with "--enable-fixed-rrset" at - compile time. -

-
-

random

-
-

- Records are returned in some random order. -

-
-

cyclic

-
-

- Records are returned in a cyclic round-robin order, - rotating by one record per query. -

-

- If BIND is configured with - "--enable-fixed-rrset" at compile time, then - the initial ordering of the RRset will match the - one specified in the zone file; otherwise the - initial ordering is indeterminate. -

-
-

none

-
-

- Records are returned in whatever order they were - retrieved from the database. This order is - indeterminate, but will be consistent as long as the - database is not modified. When no ordering is - specified, this is the default. -

-
-
-

-

-

- For example: -

-
rrset-order {
-   class IN type A name "host.example.com" order random;
-   order cyclic;
-};
-
-

- will cause any responses for type A records in class IN that - have "host.example.com" as a - suffix, to always be returned - in random order. All other records are returned in cyclic order. -

-

- If multiple rrset-order statements - appear, they are not combined — the last one applies. -

-

- By default, records are returned in random order. -

- -
-

Note

-

- In this release of BIND 9, the - rrset-order statement does not support - "fixed" ordering by default. Fixed ordering can be enabled - at compile time by specifying "--enable-fixed-rrset" on - the "configure" command line. -

-
-
- -
-

-Tuning

- -
-
lame-ttl
-
-

- Sets the number of seconds to cache a - lame server indication. 0 disables caching. (This is - NOT recommended.) - The default is 600 (10 minutes) and the - maximum value is - 1800 (30 minutes). -

- -
-
servfail-ttl
-
-

- Sets the number of seconds to cache a - SERVFAIL response due to DNSSEC validation failure or - other general server failure. If set to - 0, SERVFAIL caching is disabled. - The SERVFAIL cache is not consulted if a query has - the CD (Checking Disabled) bit set; this allows a - query that failed due to DNSSEC validation to be retried - without waiting for the SERVFAIL TTL to expire. -

-

- The maximum value is 30 - seconds; any higher value will be silently - reduced. The default is 1 - second. -

-
-
min-ncache-ttl
-
-

- To reduce network traffic and increase performance, the server - stores negative answers. min-ncache-ttl is - used to set a minimum retention time for these answers in the - server in seconds. For convenience, TTL-style time unit - suffixes may be used to specify the value. It also - accepts ISO 8601 duration formats. -

-

- The default min-ncache-ttl is - 0 seconds. - min-ncache-ttl cannot exceed 90 - seconds and will be truncated to 90 seconds if set to a - greater value. -

-
-
min-cache-ttl
-
-

- Sets the minimum time for which the server will cache ordinary - (positive) answers in seconds. For convenience, TTL-style - time unit suffixes may be used to specify the value. It also - accepts ISO 8601 duration formats. -

-

- The default min-cache-ttl is - 0 seconds. - min-cache-ttl cannot exceed 90 - seconds and will be truncated to 90 seconds if set to a - greater value. -

-
-
max-ncache-ttl
-
-

- To reduce network traffic and increase performance, - the server stores negative answers. - max-ncache-ttl is - used to set a maximum retention time for these answers in - the server in seconds. For convenience, TTL-style time unit - suffixes may be used to specify the value. It also accepts - ISO 8601 duration formats. -

-

- The default max-ncache-ttl is - 10800 seconds (3 hours). - max-ncache-ttl cannot exceed 7 days and - will be silently truncated to 7 days if set to a greater - value. -

-
-
max-cache-ttl
-
-

- Sets the maximum time for which the server will - cache ordinary (positive) answers in seconds. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 - duration formats. -

-

- The default is 604800 (one week). - A value of zero may cause all queries to return - SERVFAIL, because of lost caches of intermediate - RRsets (such as NS and glue AAAA/A records) in the - resolution process. -

-
-
max-stale-ttl
-
-

- If stale answers are enabled, - max-stale-ttl - sets the maximum time for which the server will - retain records past their normal expiry to - return them as stale records when the servers - for those records are not reachable. - The default is 1 week. The minimum allowed is - 1 second; a value of 0 will be updated silently - to 1 second. -

-

- For stale answers to be returned, they must be enabled, - either in the configuration file using - stale-answer-enable or via - rndc serve-stale on. -

-
-
resolver-nonbackoff-tries
-
-

- Specifies how many retries occur before exponential - backoff kicks in. The default is 3. -

-
-
resolver-retry-interval
-
-

- The base retry interval in milliseconds. - The default is 800. -

-
-
sig-validity-interval
-
-

- Specifies the number of days into the future when - DNSSEC signatures automatically generated as a - result of dynamic updates (the section called “Dynamic Update”) will expire. There - is an optional second field which specifies how - long before expiry that the signatures will be - regenerated. If not specified, the signatures will - be regenerated at 1/4 of base interval. The second - field is specified in days if the base interval is - greater than 7 days otherwise it is specified in hours. - The default base interval is 30 days - giving a re-signing interval of 7 1/2 days. The maximum - values are 10 years (3660 days). -

-

- The signature inception time is unconditionally - set to one hour before the current time to allow - for a limited amount of clock skew. -

-

- The sig-validity-interval can be - overridden for DNSKEY records by setting - dnskey-sig-validity. -

-

- The sig-validity-interval - should be, at least, several multiples of the SOA - expire interval to allow for reasonable interaction - between the various timer and expiry dates. -

-
-
dnskey-sig-validity
-
-

- Specifies the number of days into the future when - DNSSEC signatures that are automatically generated - for DNSKEY RRsets as a result of dynamic updates - (the section called “Dynamic Update”) will expire. - If set to a non-zero value, this overrides the - value set by sig-validity-interval. - The default is zero, meaning - sig-validity-interval is used. - The maximum value is 3660 days (10 years), and - higher values will be rejected. -

-
-
sig-signing-nodes
-
-

- Specify the maximum number of nodes to be - examined in each quantum when signing a zone with - a new DNSKEY. The default is - 100. -

-
-
sig-signing-signatures
-
-

- Specify a threshold number of signatures that - will terminate processing a quantum when signing - a zone with a new DNSKEY. The default is - 10. -

-
-
sig-signing-type
-
-

- Specify a private RDATA type to be used when generating - signing state records. The default is - 65534. -

-

- It is expected that this parameter may be removed - in a future version once there is a standard type. -

-

- Signing state records are used to internally by - named to track the current state of - a zone-signing process, i.e., whether it is still active - or has been completed. The records can be inspected - using the command - rndc signing -list zone. - Once named has finished signing - a zone with a particular key, the signing state - record associated with that key can be removed from - the zone by running - rndc signing -clear keyid/algorithm zone. - To clear all of the completed signing state - records for a zone, use - rndc signing -clear all zone. -

-
-
-min-refresh-time, max-refresh-time, min-retry-time, max-retry-time -
-
-

- These options control the server's behavior on refreshing a - zone (querying for SOA changes) or retrying failed - transfers. Usually the SOA values for the zone are used, - up to a hard-coded maximum expiry of 24 weeks. However, - these values are set by the master, giving slave server - administrators little control over their contents. -

-

- These options allow the administrator to set a minimum and - maximum refresh and retry time in seconds per-zone, - per-view, or globally. These options are valid for - slave and stub zones, and clamp the SOA refresh and - retry times to the specified values. -

-

- The following defaults apply. - min-refresh-time 300 seconds, - max-refresh-time 2419200 seconds - (4 weeks), min-retry-time 500 seconds, - and max-retry-time 1209600 seconds - (2 weeks). -

-
-
edns-udp-size
-
-

- Sets the maximum advertised EDNS UDP buffer size in - bytes, to control the size of packets received from - authoritative servers in response to recursive queries. - Valid values are 512 to 4096 (values outside this range - will be silently adjusted to the nearest value within - it). The default value is 4096. -

-

- The usual reason for setting - edns-udp-size to a non-default value - is to get UDP answers to pass through broken firewalls - that block fragmented packets and/or block UDP DNS - packets that are greater than 512 bytes. -

-

- When named first queries a remote - server, it will advertise a UDP buffer size of 512, as - this has the greatest chance of success on the first try. -

-

- If the initial query is successful with - EDNS advertising a buffer size of 512, then - named will advertise progressively - larger buffer sizes on successive queries, until - responses begin timing out or - edns-udp-size is reached. -

-

- The default buffer sizes used by named - are 512, 1232, 1432, and 4096, but never exceeding - edns-udp-size. (The values 1232 and - 1432 are chosen to allow for an IPv4/IPv6 encapsulated - UDP message to be sent without fragmentation at the - minimum MTU sizes for Ethernet and IPv6 networks.) -

-
-
max-udp-size
-
-

- Sets the maximum EDNS UDP message size - named will send in bytes. - Valid values are 512 to 4096 (values outside this - range will be silently adjusted to the nearest - value within it). The default value is 4096. -

-

- This value applies to responses sent by a server; to - set the advertised buffer size in queries, see - edns-udp-size. -

-

- The usual reason for setting - max-udp-size to a non-default - value is to get UDP answers to pass through broken - firewalls that block fragmented packets and/or - block UDP packets that are greater than 512 bytes. - This is independent of the advertised receive - buffer (edns-udp-size). -

-

- Setting this to a low value will encourage additional - TCP traffic to the nameserver. -

-
-
masterfile-format
-
-

Specifies - the file format of zone files (see - the section called “Additional File Formats”). - The default value is text, which is the - standard textual representation, except for slave zones, - in which the default value is raw. - Files in other formats than text are - typically expected to be generated by the - named-compilezone tool, or dumped by - named. -

-

- Note that when a zone file in a different format than - text is loaded, named - may omit some of the checks which would be performed for a - file in the text format. In particular, - check-names checks do not apply - for the raw format. This means - a zone file in the raw format - must be generated with the same check level as that - specified in the named configuration - file. Also, map format files are - loaded directly into memory via memory mapping, with only - minimal checking. -

-

- This statement sets the - masterfile-format for all zones, - but can be overridden on a per-zone or per-view basis - by including a masterfile-format - statement within the zone or - view block in the configuration - file. -

-
-
masterfile-style
-
-

- Specifies the formatting of zone files during dump - when the masterfile-format is - text. (This option is ignored - with any other masterfile-format.) -

-

- When set to relative, - records are printed in a multi-line format with owner - names expressed relative to a shared origin. When set - to full, records are printed in - a single-line format with absolute owner names. - The full format is most suitable - when a zone file needs to be processed automatically - by a script. The relative format - is more human-readable, and is thus suitable when a - zone is to be edited by hand. The default is - relative. -

-
-
-max-recursion-depth -
-
-

- Sets the maximum number of levels of recursion - that are permitted at any one time while servicing - a recursive query. Resolving a name may require - looking up a name server address, which in turn - requires resolving another name, etc; if the number - of indirections exceeds this value, the recursive - query is terminated and returns SERVFAIL. The - default is 7. -

-
-
-max-recursion-queries -
-
-

- Sets the maximum number of iterative queries that - may be sent while servicing a recursive query. - If more queries are sent, the recursive query - is terminated and returns SERVFAIL. Queries to - look up top level domains such as "com" and "net" - and the DNS root zone are exempt from this limitation. - The default is 75. -

-
-
notify-delay
-
-

- The delay, in seconds, between sending sets of notify - messages for a zone. The default is five (5) seconds. -

-

- The overall rate that NOTIFY messages are sent for all - zones is controlled by serial-query-rate. -

-
-
max-rsa-exponent-size
-
-

- The maximum RSA exponent size, in bits, that will - be accepted when validating. Valid values are 35 - to 4096 bits. The default zero (0) is also accepted - and is equivalent to 4096. -

-
-
prefetch
-
-

- When a query is received for cached data which - is to expire shortly, named can - refresh the data from the authoritative server - immediately, ensuring that the cache always has an - answer available. -

-

- The prefetch specifies the - "trigger" TTL value at which prefetch of the current - query will take place: when a cache record with a - lower TTL value is encountered during query processing, - it will be refreshed. Valid trigger TTL values are 1 to - 10 seconds. Values larger than 10 seconds will be silently - reduced to 10. - Setting a trigger TTL to zero (0) causes - prefetch to be disabled. - The default trigger TTL is 2. -

-

- An optional second argument specifies the "eligibility" - TTL: the smallest original - TTL value that will be accepted for a record to be - eligible for prefetching. The eligibility TTL must - be at least six seconds longer than the trigger TTL; - if it isn't, named will silently - adjust it upward. - The default eligibility TTL is 9. -

-
-
v6-bias
-
-

- When determining the next nameserver to try - preference IPv6 nameservers by this many milliseconds. - The default is 50 milliseconds. -

-
-
- -
- -
-

-Built-in server information zones

- -

- The server provides some helpful diagnostic information - through a number of built-in zones under the - pseudo-top-level-domain bind in the - CHAOS class. These zones are part - of a - built-in view (see the section called “view Statement Grammar”) of - class - CHAOS which is separate from the - default view of class IN. Most global - configuration options (allow-query, - etc) will apply to this view, but some are locally - overridden: notify, - recursion and - allow-new-zones are - always set to no, and - rate-limit is set to allow - three responses per second. -

-

- If you need to disable these zones, use the options - below, or hide the built-in CHAOS - view by - defining an explicit view of class CHAOS - that matches all clients. -

- -
-
version
-
-

- The version the server should report - via a query of the name version.bind - with type TXT, class CHAOS. - The default is the real version number of this server. - Specifying version none - disables processing of the queries. -

-

- Setting version to any value - (including none) will also - disable queries for authors.bind TXT CH. -

-
-
hostname
-
-

- The hostname the server should report via a query of - the name hostname.bind - with type TXT, class CHAOS. - This defaults to the hostname of the machine hosting the - name server as - found by the gethostname() function. The primary purpose of such queries - is to - identify which of a group of anycast servers is actually - answering your queries. Specifying hostname none; - disables processing of the queries. -

-
-
server-id
-
-

- The ID the server should report when receiving a Name - Server Identifier (NSID) query, or a query of the name - ID.SERVER with type - TXT, class CHAOS. - The primary purpose of such queries is to - identify which of a group of anycast servers is actually - answering your queries. Specifying server-id none; - disables processing of the queries. - Specifying server-id hostname; will cause named to - use the hostname as found by the gethostname() function. - The default server-id is none. -

-
-
- -
- -
-

-Built-in Empty Zones

- -

- The named server has some built-in - empty zones (SOA and NS records only). - These are for zones that should normally be answered locally - and which queries should not be sent to the Internet's root - servers. The official servers which cover these namespaces - return NXDOMAIN responses to these queries. In particular, - these cover the reverse namespaces for addresses from - RFC 1918, RFC 4193, RFC 5737 and RFC 6598. They also include the - reverse namespace for IPv6 local address (locally assigned), - IPv6 link local addresses, the IPv6 loopback address and the - IPv6 unknown address. -

-

- The server will attempt to determine if a built-in zone - already exists or is active (covered by a forward-only - forwarding declaration) and will not create an empty - zone in that case. -

-

- The current list of empty zones is: -

-
    -
  • 10.IN-ADDR.ARPA
  • -
  • 16.172.IN-ADDR.ARPA
  • -
  • 17.172.IN-ADDR.ARPA
  • -
  • 18.172.IN-ADDR.ARPA
  • -
  • 19.172.IN-ADDR.ARPA
  • -
  • 20.172.IN-ADDR.ARPA
  • -
  • 21.172.IN-ADDR.ARPA
  • -
  • 22.172.IN-ADDR.ARPA
  • -
  • 23.172.IN-ADDR.ARPA
  • -
  • 24.172.IN-ADDR.ARPA
  • -
  • 25.172.IN-ADDR.ARPA
  • -
  • 26.172.IN-ADDR.ARPA
  • -
  • 27.172.IN-ADDR.ARPA
  • -
  • 28.172.IN-ADDR.ARPA
  • -
  • 29.172.IN-ADDR.ARPA
  • -
  • 30.172.IN-ADDR.ARPA
  • -
  • 31.172.IN-ADDR.ARPA
  • -
  • 168.192.IN-ADDR.ARPA
  • -
  • 64.100.IN-ADDR.ARPA
  • -
  • 65.100.IN-ADDR.ARPA
  • -
  • 66.100.IN-ADDR.ARPA
  • -
  • 67.100.IN-ADDR.ARPA
  • -
  • 68.100.IN-ADDR.ARPA
  • -
  • 69.100.IN-ADDR.ARPA
  • -
  • 70.100.IN-ADDR.ARPA
  • -
  • 71.100.IN-ADDR.ARPA
  • -
  • 72.100.IN-ADDR.ARPA
  • -
  • 73.100.IN-ADDR.ARPA
  • -
  • 74.100.IN-ADDR.ARPA
  • -
  • 75.100.IN-ADDR.ARPA
  • -
  • 76.100.IN-ADDR.ARPA
  • -
  • 77.100.IN-ADDR.ARPA
  • -
  • 78.100.IN-ADDR.ARPA
  • -
  • 79.100.IN-ADDR.ARPA
  • -
  • 80.100.IN-ADDR.ARPA
  • -
  • 81.100.IN-ADDR.ARPA
  • -
  • 82.100.IN-ADDR.ARPA
  • -
  • 83.100.IN-ADDR.ARPA
  • -
  • 84.100.IN-ADDR.ARPA
  • -
  • 85.100.IN-ADDR.ARPA
  • -
  • 86.100.IN-ADDR.ARPA
  • -
  • 87.100.IN-ADDR.ARPA
  • -
  • 88.100.IN-ADDR.ARPA
  • -
  • 89.100.IN-ADDR.ARPA
  • -
  • 90.100.IN-ADDR.ARPA
  • -
  • 91.100.IN-ADDR.ARPA
  • -
  • 92.100.IN-ADDR.ARPA
  • -
  • 93.100.IN-ADDR.ARPA
  • -
  • 94.100.IN-ADDR.ARPA
  • -
  • 95.100.IN-ADDR.ARPA
  • -
  • 96.100.IN-ADDR.ARPA
  • -
  • 97.100.IN-ADDR.ARPA
  • -
  • 98.100.IN-ADDR.ARPA
  • -
  • 99.100.IN-ADDR.ARPA
  • -
  • 100.100.IN-ADDR.ARPA
  • -
  • 101.100.IN-ADDR.ARPA
  • -
  • 102.100.IN-ADDR.ARPA
  • -
  • 103.100.IN-ADDR.ARPA
  • -
  • 104.100.IN-ADDR.ARPA
  • -
  • 105.100.IN-ADDR.ARPA
  • -
  • 106.100.IN-ADDR.ARPA
  • -
  • 107.100.IN-ADDR.ARPA
  • -
  • 108.100.IN-ADDR.ARPA
  • -
  • 109.100.IN-ADDR.ARPA
  • -
  • 110.100.IN-ADDR.ARPA
  • -
  • 111.100.IN-ADDR.ARPA
  • -
  • 112.100.IN-ADDR.ARPA
  • -
  • 113.100.IN-ADDR.ARPA
  • -
  • 114.100.IN-ADDR.ARPA
  • -
  • 115.100.IN-ADDR.ARPA
  • -
  • 116.100.IN-ADDR.ARPA
  • -
  • 117.100.IN-ADDR.ARPA
  • -
  • 118.100.IN-ADDR.ARPA
  • -
  • 119.100.IN-ADDR.ARPA
  • -
  • 120.100.IN-ADDR.ARPA
  • -
  • 121.100.IN-ADDR.ARPA
  • -
  • 122.100.IN-ADDR.ARPA
  • -
  • 123.100.IN-ADDR.ARPA
  • -
  • 124.100.IN-ADDR.ARPA
  • -
  • 125.100.IN-ADDR.ARPA
  • -
  • 126.100.IN-ADDR.ARPA
  • -
  • 127.100.IN-ADDR.ARPA
  • -
  • 0.IN-ADDR.ARPA
  • -
  • 127.IN-ADDR.ARPA
  • -
  • 254.169.IN-ADDR.ARPA
  • -
  • 2.0.192.IN-ADDR.ARPA
  • -
  • 100.51.198.IN-ADDR.ARPA
  • -
  • 113.0.203.IN-ADDR.ARPA
  • -
  • 255.255.255.255.IN-ADDR.ARPA
  • -
  • 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
  • -
  • 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
  • -
  • 8.B.D.0.1.0.0.2.IP6.ARPA
  • -
  • D.F.IP6.ARPA
  • -
  • 8.E.F.IP6.ARPA
  • -
  • 9.E.F.IP6.ARPA
  • -
  • A.E.F.IP6.ARPA
  • -
  • B.E.F.IP6.ARPA
  • -
  • EMPTY.AS112.ARPA
  • -
  • HOME.ARPA
  • -
-

-

-

- Empty zones are settable at the view level and only apply to - views of class IN. Disabled empty zones are only inherited - from options if there are no disabled empty zones specified - at the view level. To override the options list of disabled - zones, you can disable the root zone at the view level, for example: -

-
-            disable-empty-zone ".";
-
-

-

-

- If you are using the address ranges covered here, you should - already have reverse zones covering the addresses you use. - In practice this appears to not be the case with many queries - being made to the infrastructure servers for names in these - spaces. So many in fact that sacrificial servers were needed - to be deployed to channel the query load away from the - infrastructure servers. -

-
-

Note

-

- The real parent servers for these zones should disable all - empty zone under the parent zone they serve. For the real - root servers, this is all built-in empty zones. This will - enable them to return referrals to deeper in the tree. -

-
-
-
empty-server
-
-

- Specify what server name will appear in the returned - SOA record for empty zones. If none is specified, then - the zone's name will be used. -

-
-
empty-contact
-
-

- Specify what contact name will appear in the returned - SOA record for empty zones. If none is specified, then - "." will be used. -

-
-
empty-zones-enable
-
-

- Enable or disable all empty zones. By default, they - are enabled. -

-
-
disable-empty-zone
-
-

- Disable individual empty zones. By default, none are - disabled. This option can be specified multiple times. -

-
-
-
- -
-

-Content Filtering

- -

- BIND 9 provides the ability to filter - out DNS responses from external DNS servers containing - certain types of data in the answer section. - Specifically, it can reject address (A or AAAA) records if - the corresponding IPv4 or IPv6 addresses match the given - address_match_list of the - deny-answer-addresses option. - It can also reject CNAME or DNAME records if the "alias" - name (i.e., the CNAME alias or the substituted query name - due to DNAME) matches the - given namelist of the - deny-answer-aliases option, where - "match" means the alias name is a subdomain of one of - the name_list elements. - If the optional namelist is specified - with except-from, records whose query name - matches the list will be accepted regardless of the filter - setting. - Likewise, if the alias name is a subdomain of the - corresponding zone, the deny-answer-aliases - filter will not apply; - for example, even if "example.com" is specified for - deny-answer-aliases, -

-
www.example.com. CNAME xxx.example.com.
- -

- returned by an "example.com" server will be accepted. -

- -

- In the address_match_list of the - deny-answer-addresses option, only - ip_addr - and ip_prefix - are meaningful; - any key_id will be silently ignored. -

- -

- If a response message is rejected due to the filtering, - the entire message is discarded without being cached, and - a SERVFAIL error will be returned to the client. -

- -

- This filtering is intended to prevent "DNS rebinding attacks," in - which an attacker, in response to a query for a domain name the - attacker controls, returns an IP address within your own network or - an alias name within your own domain. - A naive web browser or script could then serve as an - unintended proxy, allowing the attacker - to get access to an internal node of your local network - that couldn't be externally accessed otherwise. - See the paper available at - - http://portal.acm.org/citation.cfm?id=1315245.1315298 - - for more details about the attacks. -

- -

- For example, if you own a domain named "example.net" and - your internal network uses an IPv4 prefix 192.0.2.0/24, - you might specify the following rules: -

- -
deny-answer-addresses { 192.0.2.0/24; } except-from { "example.net"; };
-deny-answer-aliases { "example.net"; };
-
- -

- If an external attacker lets a web browser in your local - network look up an IPv4 address of "attacker.example.com", - the attacker's DNS server would return a response like this: -

- -
attacker.example.com. A 192.0.2.1
- -

- in the answer section. - Since the rdata of this record (the IPv4 address) matches - the specified prefix 192.0.2.0/24, this response will be - ignored. -

- -

- On the other hand, if the browser looks up a legitimate - internal web server "www.example.net" and the - following response is returned to - the BIND 9 server -

- -
www.example.net. A 192.0.2.2
- -

- it will be accepted since the owner name "www.example.net" - matches the except-from element, - "example.net". -

- -

- Note that this is not really an attack on the DNS per se. - In fact, there is nothing wrong for an "external" name to - be mapped to your "internal" IP address or domain name - from the DNS point of view. - It might actually be provided for a legitimate purpose, - such as for debugging. - As long as the mapping is provided by the correct owner, - it is not possible or does not make sense to detect - whether the intent of the mapping is legitimate or not - within the DNS. - The "rebinding" attack must primarily be protected at the - application that uses the DNS. - For a large site, however, it may be difficult to protect - all possible applications at once. - This filtering feature is provided only to help such an - operational environment; - it is generally discouraged to turn it on unless you are - very sure you have no other choice and the attack is a - real threat for your applications. -

- -

- Care should be particularly taken if you want to use this - option for addresses within 127.0.0.0/8. - These addresses are obviously "internal", but many - applications conventionally rely on a DNS mapping from - some name to such an address. - Filtering out DNS records containing this address - spuriously can break such applications. -

-
- -
-

-Response Policy Zone (RPZ) Rewriting

- -

- BIND 9 includes a limited - mechanism to modify DNS responses for requests - analogous to email anti-spam DNS blacklists. - Responses can be changed to deny the existence of domains (NXDOMAIN), - deny the existence of IP addresses for domains (NODATA), - or contain other IP addresses or data. -

- -

- Response policy zones are named in the - response-policy option for the view or among the - global options if there is no response-policy option for the view. - Response policy zones are ordinary DNS zones containing RRsets - that can be queried normally if allowed. - It is usually best to restrict those queries with something like - allow-query { localhost; };. - Note that zones using masterfile-format map - cannot be used as policy zones. -

- -

- A response-policy option can support - multiple policy zones. To maximize performance, a radix - tree is used to quickly identify response policy zones - containing triggers that match the current query. This - imposes an upper limit of 64 on the number of policy zones - in a single response-policy option; more - than that is a configuration error. -

- -

- Rules encoded in response policy zones are processed after - Access Control Lists - (ACLs). All queries from clients which are not - permitted access to the resolver will be answered with a - status code of REFUSED, regardless of configured RPZ rules. -

- -

- Five policy triggers can be encoded in RPZ records. -

-
-
RPZ-CLIENT-IP
-
-

- IP records are triggered by the IP address of the - DNS client. - Client IP address triggers are encoded in records that have - owner names that are subdomains of - rpz-client-ip relativized to the - policy zone origin name - and encode an address or address block. - IPv4 addresses are represented as - prefixlength.B4.B3.B2.B1.rpz-client-ip. - The IPv4 prefix length must be between 1 and 32. - All four bytes, B4, B3, B2, and B1, must be present. - B4 is the decimal value of the least significant byte of the - IPv4 address as in IN-ADDR.ARPA. -

- -

- IPv6 addresses are encoded in a format similar - to the standard IPv6 text representation, - prefixlength.W8.W7.W6.W5.W4.W3.W2.W1.rpz-client-ip. - Each of W8,...,W1 is a one to four digit hexadecimal number - representing 16 bits of the IPv6 address as in the standard - text representation of IPv6 addresses, but reversed as in - IP6.ARPA. (Note that this representation of IPv6 - address is different from IP6.ARPA where each hex - digit occupies a label.) - All 8 words must be present except when one set of consecutive - zero words is replaced with .zz. - analogous to double colons (::) in standard IPv6 text - encodings. - The IPv6 prefix length must be between 1 and 128. -

-
-
QNAME
-
-

- QNAME policy records are triggered by query names of - requests and targets of CNAME records resolved to generate - the response. - The owner name of a QNAME policy record is - the query name relativized to the policy zone. -

-
-
RPZ-IP
-
-

- IP triggers are IP addresses in an - A or AAAA record in the ANSWER section of a response. - They are encoded like client-IP triggers except as - subdomains of rpz-ip. -

-
-
RPZ-NSDNAME
-
-

- NSDNAME triggers match names of authoritative servers - for the query name, a parent of the query name, a CNAME - for query name, or a parent of a CNAME. They are - encoded as subdomains of rpz-nsdname - relativized to the RPZ origin name. NSIP triggers match - IP addresses in A and AAAA RRsets for domains that can - be checked against NSDNAME policy records. The - nsdname-enable phrase turns NSDNAME - triggers off or on for a single policy zone or all - zones. -

-

- If authoritative nameservers for the query name are not - yet known, named will recursively - look up the authoritative servers for the query name - before applying an RPZ-NSDNAME rule. - This can cause a processing delay. To speed up - processing at the cost of precision, the - nsdname-wait-recurse option - can be used: when set to no, - RPZ-NSDNAME rules will only be applied when authoritative - servers for the query name have already been looked up and - cached. If authoritative servers for the query name - are not in the cache, then the RPZ-NSDNAME rule will be - ignored, but the authoritative servers for the query name - will be looked up in the background, and the rule will be - applied to subsequent queries. The default is - yes, meaning RPZ-NSDNAME - rules should always be applied even if authoritative - servers for the query name need to be looked up first. -

-
-
RPZ-NSIP
-
-

- NSIP triggers match the IP addresses of authoritative - servers. They are enncoded like IP triggers, except as - subdomains of rpz-nsip. - NSDNAME and NSIP triggers are checked only for names with at - least min-ns-dots dots. - The default value of min-ns-dots is - 1, to exclude top level domains. - The nsip-enable phrase turns NSIP - triggers off or on for a single policy zone or all - zones. -

-

- If a name server's IP address is not yet known, - named will recursively look up - the IP address before applying an RPZ-NSIP rule. - This can cause a processing delay. To speed up - processing at the cost of precision, the - nsip-wait-recurse option - can be used: when set to no, - RPZ-NSIP rules will only be applied when a name - servers's IP address has already been looked up and - cached. If a server's IP address is not in the - cache, then the RPZ-NSIP rule will be ignored, - but the address will be looked up in the - background, and the rule will be applied - to subsequent queries. The default is - yes, meaning RPZ-NSIP - rules should always be applied even if an - address needs to be looked up first. -

-
-
-

-

- -

- The query response is checked against all response policy zones, - so two or more policy records can be triggered by a response. - Because DNS responses are rewritten according to at most one - policy record, a single record encoding an action (other than - DISABLED actions) must be chosen. - Triggers or the records that encode them are chosen for the - rewriting in the following order: -

-
    -
  1. Choose the triggered record in the zone that appears - first in the response-policy option. -
  2. -
  3. Prefer CLIENT-IP to QNAME to IP to NSDNAME to NSIP - triggers in a single zone. -
  4. -
  5. Among NSDNAME triggers, prefer the - trigger that matches the smallest name under the DNSSEC ordering. -
  6. -
  7. Among IP or NSIP triggers, prefer the trigger - with the longest prefix. -
  8. -
  9. Among triggers with the same prefix length, - prefer the IP or NSIP trigger that matches - the smallest IP address. -
  10. -
-

-

- -

- When the processing of a response is restarted to resolve - DNAME or CNAME records and a policy record set has - not been triggered, - all response policy zones are again consulted for the - DNAME or CNAME names and addresses. -

- -

- RPZ record sets are any types of DNS record except - DNAME or DNSSEC that encode actions or responses to - individual queries. - Any of the policies can be used with any of the triggers. - For example, while the TCP-only policy is - commonly used with client-IP triggers, - it can be used with any type of trigger to force the use of - TCP for responses with owner names in a zone. -

-
-
PASSTHRU
-
-

- The whitelist policy is specified - by a CNAME whose target is rpz-passthru. - It causes the response to not be rewritten - and is most often used to "poke holes" in policies for - CIDR blocks. -

-
-
DROP
-
-

- The blacklist policy is specified - by a CNAME whose target is rpz-drop. - It causes the response to be discarded. - Nothing is sent to the DNS client. -

-
-
TCP-Only
-
-

- The "slip" policy is specified - by a CNAME whose target is rpz-tcp-only. - It changes UDP responses to short, truncated DNS responses - that require the DNS client to try again with TCP. - It is used to mitigate distributed DNS reflection attacks. -

-
-
NXDOMAIN
-
-

- The domain undefined response is encoded - by a CNAME whose target is the root domain (.) -

-
-
NODATA
-
-

- The empty set of resource records is specified by - CNAME whose target is the wildcard top-level - domain (*.). - It rewrites the response to NODATA or ANCOUNT=0. -

-
-
Local Data
-
-

- A set of ordinary DNS records can be used to answer queries. - Queries for record types not the set are answered with - NODATA. -

- -

- A special form of local data is a CNAME whose target is a - wildcard such as *.example.com. - It is used as if were an ordinary CNAME after the asterisk (*) - has been replaced with the query name. - The purpose for this special form is query logging in the - walled garden's authority DNS server. -

-
-
-

-

- -

- All of the actions specified in all of the individual records - in a policy zone - can be overridden with a policy clause in the - response-policy option. - An organization using a policy zone provided by another - organization might use this mechanism to redirect domains - to its own walled garden. -

-
-
GIVEN
-
-

The placeholder policy says "do not override but - perform the action specified in the zone." -

-
-
DISABLED
-
-

- The testing override policy causes policy zone records to do - nothing but log what they would have done if the - policy zone were not disabled. - The response to the DNS query will be written (or not) - according to any triggered policy records that are not - disabled. - Disabled policy zones should appear first, - because they will often not be logged - if a higher precedence trigger is found first. -

-
-
-PASSTHRU, DROP, TCP-Only, NXDOMAIN, NODATA -
-
-

- override with the corresponding per-record policy. -

-
-
CNAME domain
-
-

- causes all RPZ policy records to act as if they were - "cname domain" records. -

-
-
-

-

- -

- By default, the actions encoded in a response policy zone - are applied only to queries that ask for recursion (RD=1). - That default can be changed for a single policy zone or - all response policy zones in a view - with a recursive-only no clause. - This feature is useful for serving the same zone files - both inside and outside an RFC 1918 cloud and using RPZ to - delete answers that would otherwise contain RFC 1918 values - on the externally visible name server or view. -

- -

- Also by default, RPZ actions are applied only to DNS requests - that either do not request DNSSEC metadata (DO=0) or when no - DNSSEC records are available for request name in the original - zone (not the response policy zone). This default can be - changed for all response policy zones in a view with a - break-dnssec yes clause. In that case, RPZ - actions are applied regardless of DNSSEC. The name of the - clause option reflects the fact that results rewritten by RPZ - actions cannot verify. -

- -

- No DNS records are needed for a QNAME or Client-IP trigger. - The name or IP address itself is sufficient, - so in principle the query name need not be recursively resolved. - However, not resolving the requested - name can leak the fact that response policy rewriting is in use - and that the name is listed in a policy zone to operators of - servers for listed names. To prevent that information leak, by - default any recursion needed for a request is done before any - policy triggers are considered. Because listed domains often - have slow authoritative servers, this behavior can cost - significant time. - The qname-wait-recurse yes option - overrides the default and enables that behavior - when recursion cannot change a non-error response. - The option does not affect QNAME or client-IP triggers - in policy zones listed - after other zones containing IP, NSIP and NSDNAME triggers, because - those may depend on the A, AAAA, and NS records that would be - found during recursive resolution. It also does not affect - DNSSEC requests (DO=1) unless break-dnssec yes - is in use, because the response would depend on whether or not - RRSIG records were found during resolution. - Using this option can cause error responses such as SERVFAIL to - appear to be rewritten, since no recursion is being done to - discover problems at the authoritative server. -

- -

- The dnsrps-enable yes option turns on - the DNS Rsponse Policy Service (DNSRPS) interface, if it has been - compiled in to named using - configure --enable-dnsrps. -

- -

- The dnsrps-options block provides additional - RPZ configuration settings, which are passed through to the - DNSRPS provider library. - Multiple DNSRPS settings in an dnsrps-options - string should be separated with semi-colons. - The DNSRPS provider, librpz, is passed a configuration string - consisting of the dnsrps-options text, - concatenated with settings derived from the - response-policy statement. -

- -

- Note: The dnsrps-options text should only include - configuration settings that are specific to the DNSRPS - provider. For example, the DNSRPS provider from - Farsight Security takes options such as - dnsrpzd-conf, - dnsrpzd-sock, and - dnzrpzd-args (for details of these options, - see the librpz documentation). - Other RPZ configuration settings could be included in - dnsrps-options - as well, but if named were switched - back to traditional RPZ by setting - dnsrps-enable to "no", those options would - be ignored. -

- -

- The TTL of a record modified by RPZ policies is set from the - TTL of the relevant record in policy zone. It is then limited - to a maximum value. - The max-policy-ttl clause changes the - maximum seconds from its default of 5. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 duration - formats. - -

- -

- For example, you might use this option statement -

-
    response-policy { zone "badlist"; };
-

- and this zone statement -

-
    zone "badlist" {type master; file "master/badlist"; allow-query {none;}; };
-

- with this zone file -

-
$TTL 1H
-@                       SOA LOCALHOST. named-mgr.example.com (1 1h 15m 30d 2h)
-                        NS  LOCALHOST.
-
-; QNAME policy records.  There are no periods (.) after the owner names.
-nxdomain.domain.com     CNAME   .               ; NXDOMAIN policy
-*.nxdomain.domain.com   CNAME   .               ; NXDOMAIN policy
-nodata.domain.com       CNAME   *.              ; NODATA policy
-*.nodata.domain.com     CNAME   *.              ; NODATA policy
-bad.domain.com          A       10.0.0.1        ; redirect to a walled garden
-                        AAAA    2001:2::1
-bzone.domain.com        CNAME   garden.example.com.
-
-; do not rewrite (PASSTHRU) OK.DOMAIN.COM
-ok.domain.com           CNAME   rpz-passthru.
-
-; redirect x.bzone.domain.com to x.bzone.domain.com.garden.example.com
-*.bzone.domain.com      CNAME   *.garden.example.com.
-
-
-; IP policy records that rewrite all responses containing A records in 127/8
-;       except 127.0.0.1
-8.0.0.0.127.rpz-ip      CNAME   .
-32.1.0.0.127.rpz-ip     CNAME   rpz-passthru.
-
-; NSDNAME and NSIP policy records
-ns.domain.com.rpz-nsdname   CNAME   .
-48.zz.2.2001.rpz-nsip       CNAME   .
-
-; blacklist and whitelist some DNS clients
-112.zz.2001.rpz-client-ip    CNAME   rpz-drop.
-8.0.0.0.127.rpz-client-ip    CNAME   rpz-drop.
-
-; force some DNS clients and responses in the example.com zone to TCP
-16.0.0.1.10.rpz-client-ip   CNAME   rpz-tcp-only.
-example.com                 CNAME   rpz-tcp-only.
-*.example.com               CNAME   rpz-tcp-only.
-
-
-

- RPZ can affect server performance. - Each configured response policy zone requires the server to - perform one to four additional database lookups before a - query can be answered. - For example, a DNS server with four policy zones, each with all - four kinds of response triggers, QNAME, IP, NSIP, and - NSDNAME, requires a total of 17 times as many database - lookups as a similar DNS server with no response policy zones. - A BIND9 server with adequate memory and one - response policy zone with QNAME and IP triggers might achieve a - maximum queries-per-second rate about 20% lower. - A server with four response policy zones with QNAME and IP - triggers might have a maximum QPS rate about 50% lower. -

- -

- Responses rewritten by RPZ are counted in the - RPZRewrites statistics. -

- -

- The log clause can be used to optionally - turn off rewrite logging for a particular response policy - zone. By default, all rewrites are logged. -

- -

- The add-soa option controls whether the RPZ's - SOA record is added to the additional section for traceback - of changes from this zone or not. This can be set at the - individual policy zone level or at the response-policy level. - The default is yes. -

- -

- Updates to RPZ zones are processed asynchronously; if there - is more than one update pending they are bundled together. - If an update to a RPZ zone (for example, via IXFR) happens less - than min-update-interval seconds after the most - recent update, then the changes will not be carried out until this - interval has elapsed. The default is 60 seconds. - For convenience, TTL-style time unit suffixes may be - used to specify the value. It also accepts ISO 8601 duration - formats. -

-
- -
-

-Response Rate Limiting

- -

- Excessive almost identical UDP responses - can be controlled by configuring a - rate-limit clause in an - options or view statement. - This mechanism keeps authoritative BIND 9 from being used - in amplifying reflection denial of service (DoS) attacks. - Short truncated (TC=1) responses can be sent to provide - rate-limited responses to legitimate clients within - a range of forged, attacked IP addresses. - Legitimate clients react to dropped or truncated response - by retrying with UDP or with TCP respectively. -

- -

- This mechanism is intended for authoritative DNS servers. - It can be used on recursive servers but can slow - applications such as SMTP servers (mail receivers) and - HTTP clients (web browsers) that repeatedly request the - same domains. - When possible, closing "open" recursive servers is better. -

- -

- Response rate limiting uses a "credit" or "token bucket" scheme. - Each combination of identical response and client - has a conceptual account that earns a specified number - of credits every second. - A prospective response debits its account by one. - Responses are dropped or truncated - while the account is negative. - Responses are tracked within a rolling window of time - which defaults to 15 seconds, but can be configured with - the window option to any value from - 1 to 3600 seconds (1 hour). - The account cannot become more positive than - the per-second limit - or more negative than window - times the per-second limit. - When the specified number of credits for a class of - responses is set to 0, those responses are not rate limited. -

- -

- The notions of "identical response" and "DNS client" - for rate limiting are not simplistic. - All responses to an address block are counted as if to a - single client. - The prefix lengths of addresses blocks are - specified with ipv4-prefix-length (default 24) - and ipv6-prefix-length (default 56). -

- -

- All non-empty responses for a valid domain name (qname) - and record type (qtype) are identical and have a limit specified - with responses-per-second - (default 0 or no limit). - All empty (NODATA) responses for a valid domain, - regardless of query type, are identical. - Responses in the NODATA class are limited by - nodata-per-second - (default responses-per-second). - Requests for any and all undefined subdomains of a given - valid domain result in NXDOMAIN errors, and are identical - regardless of query type. - They are limited by nxdomains-per-second - (default responses-per-second). - This controls some attacks using random names, but - can be relaxed or turned off (set to 0) - on servers that expect many legitimate - NXDOMAIN responses, such as from anti-spam blacklists. - Referrals or delegations to the server of a given - domain are identical and are limited by - referrals-per-second - (default responses-per-second). -

- -

- Responses generated from local wildcards are counted and limited - as if they were for the parent domain name. - This controls flooding using random.wild.example.com. -

- -

- All requests that result in DNS errors other - than NXDOMAIN, such as SERVFAIL and FORMERR, are identical - regardless of requested name (qname) or record type (qtype). - This controls attacks using invalid requests or distant, - broken authoritative servers. - By default the limit on errors is the same as the - responses-per-second value, - but it can be set separately with - errors-per-second. -

- -

- Many attacks using DNS involve UDP requests with forged source - addresses. - Rate limiting prevents the use of BIND 9 to flood a network - with responses to requests with forged source addresses, - but could let a third party block responses to legitimate requests. - There is a mechanism that can answer some legitimate - requests from a client whose address is being forged in a flood. - Setting slip to 2 (its default) causes every - other UDP request to be answered with a small truncated (TC=1) - response. - The small size and reduced frequency, and so lack of - amplification, of "slipped" responses make them unattractive - for reflection DoS attacks. - slip must be between 0 and 10. - A value of 0 does not "slip": - no truncated responses are sent due to rate limiting, - all responses are dropped. - A value of 1 causes every response to slip; - values between 2 and 10 cause every n'th response to slip. - Some error responses including REFUSED and SERVFAIL - cannot be replaced with truncated responses and are instead - leaked at the slip rate. -

- -

- (NOTE: Dropped responses from an authoritative server may - reduce the difficulty of a third party successfully forging - a response to a recursive resolver. The best security - against forged responses is for authoritative operators - to sign their zones using DNSSEC and for resolver operators - to validate the responses. When this is not an option, - operators who are more concerned with response integrity - than with flood mitigation may consider setting - slip to 1, causing all rate-limited - responses to be truncated rather than dropped. This reduces - the effectiveness of rate-limiting against reflection attacks.) -

- -

- When the approximate query per second rate exceeds - the qps-scale value, - then the responses-per-second, - errors-per-second, - nxdomains-per-second and - all-per-second values are reduced by the - ratio of the current rate to the qps-scale value. - This feature can tighten defenses during attacks. - For example, with - qps-scale 250; responses-per-second 20; and - a total query rate of 1000 queries/second for all queries from - all DNS clients including via TCP, - then the effective responses/second limit changes to - (250/1000)*20 or 5. - Responses sent via TCP are not limited - but are counted to compute the query per second rate. -

- -

- Communities of DNS clients can be given their own parameters or no - rate limiting by putting - rate-limit statements in view - statements instead of the global option - statement. - A rate-limit statement in a view replaces, - rather than supplementing, a rate-limit - statement among the main options. - DNS clients within a view can be exempted from rate limits - with the exempt-clients clause. -

- -

- UDP responses of all kinds can be limited with the - all-per-second phrase. This rate - limiting is unlike the rate limiting provided by - responses-per-second, - errors-per-second, and - nxdomains-per-second on a DNS server - which are often invisible to the victim of a DNS - reflection attack. Unless the forged requests of the - attack are the same as the legitimate requests of the - victim, the victim's requests are not affected. Responses - affected by an all-per-second limit - are always dropped; the slip value - has no effect. An all-per-second - limit should be at least 4 times as large as the other - limits, because single DNS clients often send bursts - of legitimate requests. For example, the receipt of a - single mail message can prompt requests from an SMTP - server for NS, PTR, A, and AAAA records as the incoming - SMTP/TCP/IP connection is considered. The SMTP server - can need additional NS, A, AAAA, MX, TXT, and SPF records - as it considers the STMP Mail From - command. Web browsers often repeatedly resolve the - same names that are repeated in HTML <IMG> tags - in a page. all-per-second is similar - to the rate limiting offered by firewalls but often - inferior. Attacks that justify ignoring the contents - of DNS responses are likely to be attacks on the DNS - server itself. They usually should be discarded before - the DNS server spends resources make TCP connections - or parsing DNS requests, but that rate limiting must - be done before the DNS server sees the requests. -

- -

- The maximum size of the table used to track requests and - rate limit responses is set with max-table-size. - Each entry in the table is between 40 and 80 bytes. - The table needs approximately as many entries as the number - of requests received per second. - The default is 20,000. - To reduce the cold start of growing the table, - min-table-size (default 500) - can set the minimum table size. - Enable rate-limit category logging to monitor - expansions of the table and inform - choices for the initial and maximum table size. -

- -

- Use log-only yes to test rate limiting parameters - without actually dropping any requests. -

- -

- Responses dropped by rate limits are included in the - RateDropped and QryDropped - statistics. - Responses that truncated by rate limits are included in - RateSlipped and RespTruncated. -

-
- -
-
-

- Named supports NXDOMAIN redirection via two methods: -

-
-

-

-

- With both methods when named gets a NXDOMAIN response - it examines a separate namespace to see if the NXDOMAIN - response should be replaced with an alternative response. -

-

- With a redirect zone (zone "." { type redirect; };), the - data used to replace the NXDOMAIN is held in a single - zone which is not part of the normal namespace. All the - redirect information is contained in the zone; there are - no delegations. -

-

- With a redirect namespace (option { nxdomain-redirect - <suffix> };) the data used to replace the - NXDOMAIN is part of the normal namespace and is looked up by - appending the specified suffix to the original query name. - This roughly doubles the cache required to process NXDOMAIN - responses as you have the original NXDOMAIN response and - the replacement data or a NXDOMAIN indicating that there - is no replacement. -

-

- If both a redirect zone and a redirect namespace are configured, - the redirect zone is tried first. -

-
-
- -
-

-server Statement Grammar

-
-server netprefix {
-	bogus boolean;
-	edns boolean;
-	edns-udp-size integer;
-	edns-version integer;
-	keys server_key;
-	max-udp-size integer;
-	notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-	    dscp integer ];
-	notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-	    [ dscp integer ];
-	padding integer;
-	provide-ixfr boolean;
-	query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-	    integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-	    port ( integer | * ) ) ) [ dscp integer ];
-	query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-	    integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-	    port ( integer | * ) ) ) [ dscp integer ];
-	request-expire boolean;
-	request-ixfr boolean;
-	request-nsid boolean;
-	send-cookie boolean;
-	tcp-keepalive boolean;
-	tcp-only boolean;
-	transfer-format ( many-answers | one-answer );
-	transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-	    dscp integer ];
-	transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-	    ] [ dscp integer ];
-	transfers integer;
-};
-
-
- -
-

-server Statement Definition and - Usage

- -

- The server statement defines - characteristics - to be associated with a remote name server. If a prefix length is - specified, then a range of servers is covered. Only the most - specific - server clause applies regardless of the order in - named.conf. -

- -

- The server statement can occur at - the top level of the - configuration file or inside a view - statement. - If a view statement contains - one or more server statements, only - those - apply to the view and any top-level ones are ignored. - If a view contains no server - statements, - any top-level server statements are - used as - defaults. -

- -

- If you discover that a remote server is giving out bad data, - marking it as bogus will prevent further queries to it. The - default - value of bogus is no. -

-

- The provide-ixfr clause determines - whether - the local server, acting as master, will respond with an - incremental - zone transfer when the given remote server, a slave, requests it. - If set to yes, incremental transfer - will be provided - whenever possible. If set to no, - all transfers - to the remote server will be non-incremental. If not set, the - value - of the provide-ixfr option in the - view or - global options block is used as a default. -

- -

- The request-ixfr clause determines - whether - the local server, acting as a slave, will request incremental zone - transfers from the given remote server, a master. If not set, the - value of the request-ixfr option in - the view or global options block is used as a default. It may - also be set in the zone block and, if set there, it will - override the global or view setting for that zone. -

- -

- IXFR requests to servers that do not support IXFR will - automatically - fall back to AXFR. Therefore, there is no need to manually list - which servers support IXFR and which ones do not; the global - default - of yes should always work. - The purpose of the provide-ixfr and - request-ixfr clauses is - to make it possible to disable the use of IXFR even when both - master - and slave claim to support it, for example if one of the servers - is buggy and crashes or corrupts data when IXFR is used. -

- -

- The request-expire clause determines - whether the local server, when acting as a slave, will - request the EDNS EXPIRE value. The EDNS EXPIRE value - indicates the remaining time before the zone data will - expire and need to be be refreshed. This is used - when a secondary server transfers a zone from another - secondary server; when transferring from the primary, the - expiration timer is set from the EXPIRE field of the SOA - record instead. - The default is yes. -

- -

- The edns clause determines whether - the local server will attempt to use EDNS when communicating - with the remote server. The default is yes. -

- -

- The edns-udp-size option sets the - EDNS UDP size that is advertised by named - when querying the remote server. Valid values are 512 - to 4096 bytes (values outside this range will be silently - adjusted to the nearest value within it). This option - is useful when you wish to advertise a different value - to this server than the value you advertise globally, - for example, when there is a firewall at the remote - site that is blocking large replies. (Note: Currently, - this sets a single UDP size for all packets sent to the - server; named will not deviate from - this value. This differs from the behavior of - edns-udp-size in options - or view statements, where it specifies - a maximum value. The server statement - behavior may be brought into conformance with the - options/view behavior in future releases.) -

- -

- The edns-version option sets the - maximum EDNS VERSION that will be sent to the server(s) - by the resolver. The actual EDNS version sent is still - subject to normal EDNS version negotiation rules (see - RFC 6891), the maximum EDNS version supported by the - server, and any other heuristics that indicate that a - lower version should be sent. This option is intended - to be used when a remote server reacts badly to a given - EDNS version or higher; it should be set to the highest - version the remote server is known to support. Valid - values are 0 to 255; higher values will be silently - adjusted. This option will not be needed until higher - EDNS versions than 0 are in use. -

- -

- The max-udp-size option sets the - maximum EDNS UDP message size named - will send. Valid values are 512 to 4096 bytes (values - outside this range will be silently adjusted). This - option is useful when you know that there is a firewall - that is blocking large replies from named. -

- -

- The padding option adds EDNS Padding - options to outgoing messages, increasing the packet size to - a multiple of the specified block size. Valid block sizes - range from 0 (the default, which disables the use of - EDNS Padding) to 512 bytes. Larger values will be reduced - to 512, with a logged warning. - Note: This option is not currently compatible with no TSIG - or SIG(0), as the EDNS OPT record containing the padding - would have to be added to the packet after it had already - been signed. -

- -

- The tcp-only option sets the transport - protocol to TCP. The default is to use the UDP transport - and to fallback on TCP only when a truncated response - is received. -

- -

- The tcp-keepalive option adds EDNS - TCP keepalive to messages sent over TCP. Note currently - idle timeouts in responses are ignored. -

- -

- The server supports two zone transfer methods. The first, one-answer, - uses one DNS message per resource record transferred. many-answers packs - as many resource records as possible into a message. many-answers is - more efficient, but is only known to be understood by BIND 9, BIND - 8.x, and patched versions of BIND - 4.9.5. You can specify which method - to use for a server with the transfer-format option. - If transfer-format is not - specified, the transfer-format - specified - by the options statement will be - used. -

- -

transfers - is used to limit the number of concurrent inbound zone - transfers from the specified server. If no - transfers clause is specified, the - limit is set according to the - transfers-per-ns option. -

- -

- The keys clause identifies a - key_id defined by the key statement, - to be used for transaction security (TSIG, the section called “TSIG”) - when talking to the remote server. - When a request is sent to the remote server, a request signature - will be generated using the key specified here and appended to the - message. A request originating from the remote server is not - required - to be signed by this key. -

- -

- Only a single key per server is currently supported. -

- -

- The transfer-source and - transfer-source-v6 clauses specify - the IPv4 and IPv6 source - address to be used for zone transfer with the remote server, - respectively. - For an IPv4 remote server, only transfer-source can - be specified. - Similarly, for an IPv6 remote server, only - transfer-source-v6 can be - specified. - For more details, see the description of - transfer-source and - transfer-source-v6 in - the section called “Zone Transfers”. -

- -

- The notify-source and - notify-source-v6 clauses specify the - IPv4 and IPv6 source address to be used for notify - messages sent to remote servers, respectively. For an - IPv4 remote server, only notify-source - can be specified. Similarly, for an IPv6 remote server, - only notify-source-v6 can be specified. -

- -

- The query-source and - query-source-v6 clauses specify the - IPv4 and IPv6 source address to be used for queries - sent to remote servers, respectively. For an IPv4 - remote server, only query-source can - be specified. Similarly, for an IPv6 remote server, - only query-source-v6 can be specified. -

- -

- The request-nsid clause determines - whether the local server will add a NSID EDNS option - to requests sent to the server. This overrides - request-nsid set at the view or - option level. -

- -

- The send-cookie clause determines - whether the local server will add a COOKIE EDNS option - to requests sent to the server. This overrides - send-cookie set at the view or - option level. The named server may - determine that COOKIE is not supported by the remote server - and not add a COOKIE EDNS option to requests. -

-
- -
-

-statistics-channels Statement Grammar

-
-statistics-channels {
-	inet ( ipv4_address | ipv6_address |
-	    * ) [ port ( integer | * ) ] [
-	    allow { address_match_element; ...
-	    } ];
-};
-
-
- -
-

-statistics-channels Statement Definition and - Usage

- -

- The statistics-channels statement - declares communication channels to be used by system - administrators to get access to statistics information of - the name server. -

- -

- This statement intends to be flexible to support multiple - communication protocols in the future, but currently only - HTTP access is supported. - It requires that BIND 9 be compiled with libxml2 and/or - json-c (also known as libjson0); the - statistics-channels statement is - still accepted even if it is built without the library, - but any HTTP access will fail with an error. -

- -

- An inet control channel is a TCP socket - listening at the specified ip_port on the - specified ip_addr, which can be an IPv4 or IPv6 - address. An ip_addr of * - (asterisk) is - interpreted as the IPv4 wildcard address; connections will be - accepted on any of the system's IPv4 addresses. - To listen on the IPv6 wildcard address, - use an ip_addr of ::. -

- -

- If no port is specified, port 80 is used for HTTP channels. - The asterisk "*" cannot be used for - ip_port. -

- -

- The attempt of opening a statistics channel is - restricted by the optional allow clause. - Connections to the statistics channel are permitted based on the - address_match_list. - If no allow clause is present, - named accepts connection - attempts from any address; since the statistics may - contain sensitive internal information, it is highly - recommended to restrict the source of connection requests - appropriately. -

- -

- If no statistics-channels statement is present, - named will not open any communication channels. -

- -

- The statistics are available in various formats and views - depending on the URI used to access them. For example, if - the statistics channel is configured to listen on 127.0.0.1 - port 8888, then the statistics are accessible in XML format at - http://127.0.0.1:8888/ or - http://127.0.0.1:8888/xml. A CSS file is - included which can format the XML statistics into tables - when viewed with a stylesheet-capable browser, and into - charts and graphs using the Google Charts API when using a - javascript-capable browser. -

- -

- Broken-out subsets of the statistics can be viewed at - http://127.0.0.1:8888/xml/v3/status - (server uptime and last reconfiguration time), - http://127.0.0.1:8888/xml/v3/server - (server and resolver statistics), - http://127.0.0.1:8888/xml/v3/zones - (zone statistics), - http://127.0.0.1:8888/xml/v3/net - (network status and socket statistics), - http://127.0.0.1:8888/xml/v3/mem - (memory manager statistics), - http://127.0.0.1:8888/xml/v3/tasks - (task manager statistics), and - http://127.0.0.1:8888/xml/v3/traffic - (traffic sizes). -

- -

- The full set of statistics can also be read in JSON format at - http://127.0.0.1:8888/json, - with the broken-out subsets at - http://127.0.0.1:8888/json/v1/status - (server uptime and last reconfiguration time), - http://127.0.0.1:8888/json/v1/server - (server and resolver statistics), - http://127.0.0.1:8888/json/v1/zones - (zone statistics), - http://127.0.0.1:8888/json/v1/net - (network status and socket statistics), - http://127.0.0.1:8888/json/v1/mem - (memory manager statistics), - http://127.0.0.1:8888/json/v1/tasks - (task manager statistics), and - http://127.0.0.1:8888/json/v1/traffic - (traffic sizes). -

-
- -
-

-trust-anchors Statement Grammar

-
-trust-anchors { string ( static-key |
-    initial-key | static-ds | initial-ds )
-    integer integer integer
-    quoted_string; ... };
-
-
-
-

-trust-anchors Statement Definition - and Usage

- -

- The trust-anchors statement defines DNSSEC - trust anchors. DNSSEC is described in the section called “DNSSEC”. -

-

- A trust anchor is defined when the public key or public key - digest for a non-authoritative zone is known, but cannot be - securely obtained through DNS, either because it is the DNS - root zone or because its parent zone is unsigned. Once a key - or digest has been configured as a trust anchor, it is treated - as if it had been validated and proven secure. -

-

- The resolver attempts DNSSEC validation on all DNS data - in subdomains of configured trust anchors. (Validation below - specified names can be temporarily disabled by using - rndc nta, or permanently disabled with - the validate-except option). -

-

- All keys listed in trust-anchors, and - their corresponding zones, are deemed to exist regardless - of what parent zones say. Only keys configured as trust anchors - are used to validate the DNSKEY RRset for the corresponding - name. The parent's DS RRset will not be used. -

-

- trust-anchors may be set at the top level - of named.conf or within a view. If it is - set in both places, the configurations are additive: keys - defined at the top level are inherited by all views, but keys - defined in a view are only used within that view. -

-

- The trust-anchors statement can contain - multiple trust anchor entries, each consisting of a - domain name, followed by an "anchor type" keyword indicating - the trust anchor's format, followed by the key or digest data. -

-

- If the anchor type is static-key or - initial-key, then it is followed with the - key's flags, protocol, algorithm, and the Base64 representation - of the public key data. This is identical to the text - representation of a DNSKEY record. Spaces, tabs, newlines and - carriage returns are ignored in the key data, so the - configuration may be split up into multiple lines. -

-

- If the anchor type is static-ds or - initial-ds, then it is followed with the - key tag, algorithm, digest type, and the hexadecimal - representation of the key digest. This is identical to the - text representation of a DS record. Spaces, tabs, newlines - and carriage returns are ignored. -

-

- Trust anchors configured with the - static-key or static-ds - anchor types are immutable, while keys configured with - initial-key or initial-ds - can be kept up to date automatically, without intervention - from the resolver operator. (static-key - keys are identical to keys configured using the deprecated - trusted-keys statement.) -

-

- Suppose, for example, that a zone's key-signing - key was compromised, and the zone owner had to revoke and - replace the key. A resolver which had the original key - configured using static-key or - static-ds would be unable to validate - this zone any longer; it would reply with a SERVFAIL response - code. This would continue until the resolver operator had - updated the trust-anchors statement with - the new key. -

-

- If, however, the trust anchor had been configured with - initial-key or initial-ds - instead, then the zone owner could add a "stand-by" key to - their zone in advance. named would store - the stand-by key, and when the original key was revoked, - named would be able to transition smoothly - to the new key. It would also recognize that the old key had - been revoked, and cease using that key to validate answers, - minimizing the damage that the compromised key could do. - This is the process used to keep the ICANN root DNSSEC key - up to date. -

-

- Whereas static-key and - static-ds trust anchors continue - to be trusted until they are removed from - named.conf, an - initial-key or initial-ds - is only trusted once: for as long as it - takes to load the managed key database and start the RFC 5011 - key maintenance process. -

-

- It is not possible to mix static with initial trust anchors - for the same domain name. -

-

- The first time named runs with an - initial-key or initial-ds - configured in named.conf, it fetches the - DNSKEY RRset directly from the zone apex, and validates it - using the trust anchor specified in trust-anchors. - If the DNSKEY RRset is validly signed by a key matching - the trust anchor, then it is used as the basis for a new - managed keys database. -

-

- From that point on, whenever named runs, it - sees the initial-key or - initial-ds listed in - trust-anchors, checks to - make sure RFC 5011 key maintenance has already been initialized - for the specified domain, and if so, it simply moves on. The - key specified in the trust-anchors - statement is not used to validate answers; it is - superseded by the key or keys stored in the managed keys - database. -

-

- The next time named runs after an - initial-key or initial-ds - trust anchor has been removed from the - trust-anchors statement (or changed to - a static-key or static-ds), - the corresponding keys will be removed from the managed keys - database, and RFC 5011 key maintenance will no longer be used - for that domain. -

-

- In the current implementation, the managed keys database - is stored as a master-format zone file. -

-

- On servers which do not use views, this file is named - managed-keys.bind. When views are in - use, there will be a separate managed keys database for each - view; the filename will be the view name (or, if a view name - contains characters which would make it illegal as a filename, - a hash of the view name), followed by - the suffix .mkeys. -

-

- When the key database is changed, the zone is updated. - As with any other dynamic zone, changes will be written - into a journal file, e.g., - managed-keys.bind.jnl or - internal.mkeys.jnl. - Changes are committed to the master file as soon as - possible afterward; this will usually occur within 30 - seconds. So, whenever named is using - automatic key maintenance, the zone file and journal file - can be expected to exist in the working directory. - (For this reason among others, the working directory - should be always be writable by named.) -

-

- If the dnssec-validation option is - set to auto, named - will automatically initialize an initial-key - for the root zone. The key that is used to initialize the key - maintenance process is stored in bind.keys; - the location of this file can be overridden with the - bindkeys-file option. As a fallback - in the event no bind.keys can be - found, the initializing key is also compiled directly - into named. -

-
- -
-

-dnssec-policy Statement Grammar

-
-dnssec-policy string {
-    dnskey-ttl duration;
-    keys { ( csk | ksk | zsk ) key-directory lifetime ( duration | unlimited ) algorithm integer [ integer ] ; ... };
-    max-zone-ttl duration;
-    parent-ds-ttl duration;
-    parent-propagation-delay duration;
-    parent-registration-delay duration;
-    publish-safety duration;
-    retire-safety duration;
-    signatures-refresh duration;
-    signatures-validity duration;
-    signatures-validity-dnskey duration;
-    zone-propagation-delay duration;
-};
-
-
- -
-

-dnssec-policy Statement Definition and Usage

- -

- The dnssec-policy statement defines a key and - signing policy (KASP) for zones. -

-

- A KASP determines how one or more zones will be signed - with DNSSEC. For example, it specifies how often keys should - roll, which cryptographic algorithms to use, and how often RRSIG - records need to be refreshed. -

-

- Keys are not shared among zones, which means that one set of keys - per zone will be generated even if they have the same policy. - If multiple views are configured with different versions of the - same zone, each separate version will use the same set of signing - keys. -

-

- Multiple key and signing policies can be configured. To - attach a policy to a zone, add a dnssec-policy - option to the zone statement, specifying he - name of the policy that should be used. -

-

- Key rollover timing is computed for each key according to - the key lifetime defined in the KASP. The lifetime may be - modified by zone TTLs and propagation delays, in order to - prevent validation failures. When a key reaches the end of its - lifetime, - named will generate and publish a new key - automatically, then deactivate the old key and activate the - new one, and finally retire the old key according to a computed - schedule. -

-

- Zone-signing key (ZSK) rollovers require no operator input. - Key-signing key (KSK) and combined signing key (CSK) rollovers - require action to be taken to submit a DS record to the parent. - Rollover timing for KSKs and CSKs is adjusted to take into account - delays in processing and propagating DS updates. -

-

- There are two predefined dnssec-policy names: - none and default. - Setting a zone's policy to - none is the same as not setting - dnssec-policy at all; the zone will not - be signed. Policy default causes the - zone to be signed with a single combined signing key (CSK) - using algorithm ECDSAP256SHA256; this key will have an - unlimited lifetime. (A verbose copy of this policy - may be found in the source tree, in the file - doc/misc/dnssec-policy.default.conf.) -

-
-

Note

- The default signing policy may change in future releases. - This could result in changes to your signing policy - occurring when you upgrade to a new version of BIND. Check - the release notes carefully when upgrading to be informed - of such changes. To prevent policy changes on upgrade, - use an explicitly defined dnssec-policy - rather than default. -
-

-

-

- If a dnssec-policy statement is modified - and the server restarted or reconfigured, named - will attempt to change the policy smoothly from the old one to - the new. For example, if the key algorithm is changed, then - a new key will be generated with the new algorithm, and the old - algorithm will be retired when the existing key's lifetime ends. -

-
-

Note

- Rolling to a new policy while another key rollover is - already in progress is not yet supported, and may result in - unexpected behavior. -
-

-

-

- The following options can be specified in a - dnssec-policy statement: -

- -
-
dnskey-ttl
-
-

- The TTL to use when generating DNSKEY resource records. - The default is 1 hour (3600 seconds). -

-
-
keys
-
-

- A list specifying the algorithms and roles to use when - generating keys and signing the zone. - Entries in this list do not represent specific - DNSSEC keys, which may be changed on a regular basis, - but the roles that keys will play in the signing policy. - For example, configuring a KSK of algorithm RSASHA256 ensures - that the DNSKEY RRset will always include a key-signing key - for that algorithm. -

-

- Here is an example (for illustration purposes only) of - some possible entries in a keys - list: -

- -
keys {
-    ksk key-directory lifetime unlimited algorithm rsasha1 2048;
-    zsk lifetime P30D algorithm 8;
-    csk lifetime P6MT12H3M15S algorithm ecdsa256;
-};
-
- -

- This example specifies that three keys should be used - in the zone. The first token determines which role the - key will play in signing RRsets. If set to - ksk, then this will be - a key-signing key; it will have the KSK flag set and - will only be used to sign DNSKEY, CDS, and CDNSKEY RRsets. - If set to zsk, this will be - a zone-signing key; the KSK flag will be unset, and - the key will sign all RRsets except - DNSKEY, CDS, and CDNSKEY. If set to - csk the key will have the KSK - flag set and will be used to sign all RRsets. -

-

- An optional second token determines where the key will - be stored. Currently, keys can only be stored in the - configured key-directory. This token - may be used in the future to store keys in hardware - service modules or separate directories. -

-

- The lifetime parameter specifies how - long a key may be used before rolling over. In the - example above, the first key will have an unlimited - lifetime, the second key may be used for 30 days, and the - third key has a rather peculiar lifetime of 6 months, - 12 hours, 3 minutes and 15 seconds. A lifetime of 0 - seconds is the same as unlimited. -

-

- Note that the lifetime of a key may be extended if - retiring it too soon would cause validation failures. - For example, if the key were configured to roll more - frequently than its own TTL, its lifetime would - automatically be extended to account for this. -

-

- The algorithm parameter specifies - the key's algorithm, expressed either as a string - ("rsasha256", "ecdsa384", etc) or as a decimal number. - An optional second parameter specifies the key's size - in size in bits. If it is omitted, as shown in the - example for the second and third keys, an appropriate - default size for the algorithm will be used. -

-
-
publish-safety
-
-

- A margin that is added to the pre-publication - interval in rollover timing calculations to give some - extra time to cover unforeseen events. This increases - the time that keys are published before becoming active. - The default is PT1H (1 hour). -

-
-
retire-safety
-
-

- A margin that is added to the post-publication interval - in rollover timing calculations to give some extra time - to cover unforeseen events. This increases the time a key - remains published after it is no longer active. The - default is PT1H (1 hour). -

-
-
signatures-refresh
-
-

- This determines how frequently an RRSIG record needs to be - refreshed. The signature is renewed when the time until - the expiration time is closer than the specified interval. - The default is P5D (5 days), meaning - signatures that will expire in 5 days or sooner will be - refreshed. -

-
-
signatures-validity
-
-

- The validity period of an RRSIG record (subject to - inception offset and jitter). The default is - P2W (2 weeks). -

-
-
signatures-validity-dnskey
-
-

- Similar to signatures-validity but for - DNSKEY records. The default is P2W - (2 weeks). -

-
-
max-zone-ttl
-
-

- Like the max-zone-ttl zone option, - this specifies the maximum permissible TTL value in - seconds for the zone. When loading a zone file using - a masterfile-format of - text or raw, - any record encountered with a TTL higher than - max-zone-ttl will be capped at the - maximum permissible TTL value. -

-

- This is needed in DNSSEC-maintained zones because when - rolling to a new DNSKEY, the old key needs to remain - available until RRSIG records have expired from caches. - The max-zone-ttl option guarantees that - the largest TTL in the zone will be no higher than the - set value. -

-

- (NOTE: Because map-format files - load directly into memory, this option cannot be - used with them.) -

-

- The default value is PT24H (24 hours). - A max-zone-ttl of zero is treated as if - the default value were in use. -

-
-
zone-propagation-delay
-
-

- The expected propagation delay from the time when a zone - is first updated to the time when the new version of the - zone will be served by all secondary servers. The default - is PT5M (5 minutes). -

-
-
parent-ds-ttl
-
-

- The TTL of the DS RRset that the parent zone uses. The - default is P1D (1 day). -

-
-
parent-propagation-delay
-
-

- The expected propagation delay from the time when the - parent zone is updated to the time when the new version - is served by all of the parent zone's name servers. - The default is PT1H (1 hour). -

-
-
parent-registration-delay
-
-

- The expected registration delay from the time when a DS - RRset change is requested to the time when the DS RRset - will be updated in the parent zone. The default is - P1D (1 day). -

-
-
-
- -
-

-managed-keys Statement Grammar

-
-managed-keys { string ( static-key
-    | initial-key | static-ds |
-    initial-ds ) integer integer
-    integer quoted_string; ... }; deprecated
-
-
-
-

-managed-keys Statement Definition - and Usage

- -

- The managed-keys statement has been - deprecated in favor of the section called “trust-anchors Statement Grammar” - with the initial-key keyword. -

-
- -
-

-trusted-keys Statement Grammar

-
-trusted-keys { string integer
-    integer integer
-    quoted_string; ... }; deprecated
-
-
-
-

-trusted-keys Statement Definition - and Usage

- -

- The trusted-keys statement has been - deprecated in favor of the section called “trust-anchors Statement Grammar” - with the static-key keyword. -

-
- -
-

-view Statement Grammar

- -
view view_name [ class ] {
-    match-clients { address_match_list } ;
-    match-destinations { address_match_list } ;
-    match-recursive-only yes_or_no ;
-  [ view_option ; ... ]
-  [ zone_statement ; ... ]
-} ;
-
- -
-
-

-view Statement Definition and Usage

- -

- The view statement is a powerful - feature - of BIND 9 that lets a name server - answer a DNS query differently - depending on who is asking. It is particularly useful for - implementing - split DNS setups without having to run multiple servers. -

- -

- Each view statement defines a view - of the - DNS namespace that will be seen by a subset of clients. A client - matches - a view if its source IP address matches the - address_match_list of the view's - match-clients clause and its - destination IP address matches - the address_match_list of the - view's - match-destinations clause. If not - specified, both - match-clients and match-destinations - default to matching all addresses. In addition to checking IP - addresses - match-clients and match-destinations - can also take keys which provide an - mechanism for the - client to select the view. A view can also be specified - as match-recursive-only, which - means that only recursive - requests from matching clients will match that view. - The order of the view statements is - significant — - a client request will be resolved in the context of the first - view that it matches. -

- -

- Zones defined within a view - statement will - only be accessible to clients that match the view. - By defining a zone of the same name in multiple views, different - zone data can be given to different clients, for example, - "internal" - and "external" clients in a split DNS setup. -

- -

- Many of the options given in the options statement - can also be used within a view - statement, and then - apply only when resolving queries with that view. When no - view-specific - value is given, the value in the options statement - is used as a default. Also, zone options can have default values - specified - in the view statement; these - view-specific defaults - take precedence over those in the options statement. -

- -

- Views are class specific. If no class is given, class IN - is assumed. Note that all non-IN views must contain a hint zone, - since only the IN class has compiled-in default hints. -

- -

- If there are no view statements in - the config - file, a default view that matches any client is automatically - created - in class IN. Any zone statements - specified on - the top level of the configuration file are considered to be part - of - this default view, and the options - statement will - apply to the default view. If any explicit view - statements are present, all zone - statements must - occur inside view statements. -

- -

- Here is an example of a typical split DNS setup implemented - using view statements: -

- -
view "internal" {
-      // This should match our internal networks.
-      match-clients { 10.0.0.0/8; };
-
-      // Provide recursive service to internal
-      // clients only.
-      recursion yes;
-
-      // Provide a complete view of the example.com
-      // zone including addresses of internal hosts.
-      zone "example.com" {
-            type master;
-            file "example-internal.db";
-      };
-};
-
-view "external" {
-      // Match all clients not matched by the
-      // previous view.
-      match-clients { any; };
-
-      // Refuse recursive service to external clients.
-      recursion no;
-
-      // Provide a restricted view of the example.com
-      // zone containing only publicly accessible hosts.
-      zone "example.com" {
-           type master;
-           file "example-external.db";
-      };
-};
-
- -
-
-

-zone - Statement Grammar

- -
-zone string [ class ] {
-	type ( master | primary );
-	allow-query { address_match_element; ... };
-	allow-query-on { address_match_element; ... };
-	allow-transfer { address_match_element; ... };
-	allow-update { address_match_element; ... };
-	also-notify [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... };
-	alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	auto-dnssec ( allow | maintain | off );
-	check-dup-records ( fail | warn | ignore );
-	check-integrity boolean;
-	check-mx ( fail | warn | ignore );
-	check-mx-cname ( fail | warn | ignore );
-	check-names ( fail | warn | ignore );
-	check-sibling boolean;
-	check-spf ( warn | ignore );
-	check-srv-cname ( fail | warn | ignore );
-	check-wildcard boolean;
-	database string;
-	dialup ( notify | notify-passive | passive | refresh | boolean );
-	dlz string;
-	dnskey-sig-validity integer;
-	dnssec-dnskey-kskonly boolean;
-	dnssec-loadkeys-interval integer;
-	dnssec-policy string;
-	dnssec-secure-to-insecure boolean;
-	dnssec-update-mode ( maintain | no-resign );
-	file quoted_string;
-	forward ( first | only );
-	forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
-	inline-signing boolean;
-	ixfr-from-differences boolean;
-	journal quoted_string;
-	key-directory quoted_string;
-	masterfile-format ( map | raw | text );
-	masterfile-style ( full | relative );
-	max-journal-size ( default | unlimited | sizeval );
-	max-records integer;
-	max-transfer-idle-out integer;
-	max-transfer-time-out integer;
-	max-zone-ttl ( unlimited | duration );
-	notify ( explicit | master-only | boolean );
-	notify-delay integer;
-	notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	notify-to-soa boolean;
-	serial-update-method ( date | increment | unixtime );
-	sig-signing-nodes integer;
-	sig-signing-signatures integer;
-	sig-signing-type integer;
-	sig-validity-interval integer [ integer ];
-	update-check-ksk boolean;
-	update-policy ( local | { ( deny | grant ) string ( 6to4-self | external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild | subdomain | tcp-self | wildcard | zonesub ) [ string ] rrtypelist; ... };
-	zero-no-soa-ttl boolean;
-	zone-statistics ( full | terse | none | boolean );
-};
-
-
-zone string [ class ] {
-	type ( slave | secondary );
-	allow-notify { address_match_element; ... };
-	allow-query { address_match_element; ... };
-	allow-query-on { address_match_element; ... };
-	allow-transfer { address_match_element; ... };
-	allow-update-forwarding { address_match_element; ... };
-	also-notify [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... };
-	alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	auto-dnssec ( allow | maintain | off );
-	check-names ( fail | warn | ignore );
-	database string;
-	dialup ( notify | notify-passive | passive | refresh | boolean );
-	dlz string;
-	dnskey-sig-validity integer;
-	dnssec-dnskey-kskonly boolean;
-	dnssec-loadkeys-interval integer;
-	dnssec-policy string;
-	dnssec-update-mode ( maintain | no-resign );
-	file quoted_string;
-	forward ( first | only );
-	forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
-	inline-signing boolean;
-	ixfr-from-differences boolean;
-	journal quoted_string;
-	key-directory quoted_string;
-	masterfile-format ( map | raw | text );
-	masterfile-style ( full | relative );
-	masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... };
-	max-journal-size ( default | unlimited | sizeval );
-	max-records integer;
-	max-refresh-time integer;
-	max-retry-time integer;
-	max-transfer-idle-in integer;
-	max-transfer-idle-out integer;
-	max-transfer-time-in integer;
-	max-transfer-time-out integer;
-	min-refresh-time integer;
-	min-retry-time integer;
-	multi-master boolean;
-	notify ( explicit | master-only | boolean );
-	notify-delay integer;
-	notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	notify-to-soa boolean;
-	request-expire boolean;
-	request-ixfr boolean;
-	sig-signing-nodes integer;
-	sig-signing-signatures integer;
-	sig-signing-type integer;
-	sig-validity-interval integer [ integer ];
-	transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	try-tcp-refresh boolean;
-	update-check-ksk boolean;
-	use-alt-transfer-source boolean;
-	zero-no-soa-ttl boolean;
-	zone-statistics ( full | terse | none | boolean );
-};
-
-
-zone string [ class ] {
-	type mirror;
-	allow-notify { address_match_element; ... };
-	allow-query { address_match_element; ... };
-	allow-query-on { address_match_element; ... };
-	allow-transfer { address_match_element; ... };
-	allow-update-forwarding { address_match_element; ... };
-	also-notify [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... };
-	alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	check-names ( fail | warn | ignore );
-	database string;
-	file quoted_string;
-	ixfr-from-differences boolean;
-	journal quoted_string;
-	masterfile-format ( map | raw | text );
-	masterfile-style ( full | relative );
-	masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... };
-	max-journal-size ( default | unlimited | sizeval );
-	max-records integer;
-	max-refresh-time integer;
-	max-retry-time integer;
-	max-transfer-idle-in integer;
-	max-transfer-idle-out integer;
-	max-transfer-time-in integer;
-	max-transfer-time-out integer;
-	min-refresh-time integer;
-	min-retry-time integer;
-	multi-master boolean;
-	notify ( explicit | master-only | boolean );
-	notify-delay integer;
-	notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	request-expire boolean;
-	request-ixfr boolean;
-	transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	try-tcp-refresh boolean;
-	use-alt-transfer-source boolean;
-	zero-no-soa-ttl boolean;
-	zone-statistics ( full | terse | none | boolean );
-};
-
-
-zone string [ class ] {
-	type hint;
-	check-names ( fail | warn | ignore );
-	delegation-only boolean;
-	file quoted_string;
-};
-
-
-zone string [ class ] {
-	type stub;
-	allow-query { address_match_element; ... };
-	allow-query-on { address_match_element; ... };
-	check-names ( fail | warn | ignore );
-	database string;
-	delegation-only boolean;
-	dialup ( notify | notify-passive | passive | refresh | boolean );
-	file quoted_string;
-	forward ( first | only );
-	forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
-	masterfile-format ( map | raw | text );
-	masterfile-style ( full | relative );
-	masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... };
-	max-records integer;
-	max-refresh-time integer;
-	max-retry-time integer;
-	max-transfer-idle-in integer;
-	max-transfer-time-in integer;
-	min-refresh-time integer;
-	min-retry-time integer;
-	multi-master boolean;
-	transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ];
-	use-alt-transfer-source boolean;
-	zone-statistics ( full | terse | none | boolean );
-};
-
-
-zone string [ class ] {
-	type static-stub;
-	allow-query { address_match_element; ... };
-	allow-query-on { address_match_element; ... };
-	forward ( first | only );
-	forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
-	max-records integer;
-	server-addresses { ( ipv4_address | ipv6_address ); ... };
-	server-names { string; ... };
-	zone-statistics ( full | terse | none | boolean );
-};
-
-
-zone string [ class ] {
-	type forward;
-	delegation-only boolean;
-	forward ( first | only );
-	forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
-};
-
-
-zone string [ class ] {
-	type redirect;
-	allow-query { address_match_element; ... };
-	allow-query-on { address_match_element; ... };
-	dlz string;
-	file quoted_string;
-	masterfile-format ( map | raw | text );
-	masterfile-style ( full | relative );
-	masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... };
-	max-records integer;
-	max-zone-ttl ( unlimited | duration );
-	zone-statistics ( full | terse | none | boolean );
-};
-
-
-zone string [ class ] {
-	type delegation-only;
-};
-
-
-zone string [ class ] {
-	in-view string;
-};
-
- -
-
-

-zone Statement Definition and Usage

- -
-

-Zone Types

-

- The type keyword is required - for the zone configuration unless - it is an in-view configuration. Its - acceptable values include: - master (or primary), - slave (or secondary), - mirror, - delegation-only, - forward, - hint, - redirect, - static-stub, - and stub. -

- -
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- primary -

-
-

- The server has a master copy of the data - for the zone and will be able to provide authoritative - answers for it. Type master is - a synonym for primary. -

-
-

- secondary -

-
-

- A secondary zone is a replica of a master - zone. Type slave is a - synonym for secondary. - The masters list - specifies one or more IP addresses - of master servers that the slave contacts to update - its copy of the zone. Masters list elements can - also be names of other masters lists. By default, - transfers are made from port 53 on the servers; - this can be changed for all servers by specifying - a port number before the list of IP addresses, - or on a per-server basis after the IP address. - Authentication to the master can also be done with - per-server TSIG keys. If a file is specified, then the - replica will be written to this file whenever the zone - is changed, and reloaded from this file on a server - restart. Use of a file is recommended, since it - often speeds server startup and eliminates a - needless waste of bandwidth. Note that for large - numbers (in the tens or hundreds of thousands) of - zones per server, it is best to use a two-level - naming scheme for zone filenames. For example, - a slave server for the zone - example.com might place - the zone contents into a file called - ex/example.com where - ex/ is just the first two - letters of the zone name. (Most operating systems - behave very slowly if you put 100000 files into - a single directory.) -

-
-

- stub -

-
-

- A stub zone is similar to a slave zone, - except that it replicates only the NS records of a - master zone instead - of the entire zone. Stub zones are not a standard part - of the DNS; - they are a feature specific to the BIND implementation. -

- -

- Stub zones can be used to eliminate the need for glue - NS record - in a parent zone at the expense of maintaining a stub - zone entry and - a set of name server addresses in named.conf. - This usage is not recommended for new configurations, - and BIND 9 - supports it only in a limited way. - In BIND 4/8, zone - transfers of a parent zone - included the NS records from stub children of that - zone. This meant - that, in some cases, users could get away with - configuring child stubs - only in the master server for the parent zone. BIND - 9 never mixes together zone data from different zones - in this - way. Therefore, if a BIND 9 master serving a parent - zone has child stub zones configured, all the slave - servers for the - parent zone also need to have the same child stub - zones - configured. -

- -

- Stub zones can also be used as a way of forcing the - resolution - of a given domain to use a particular set of - authoritative servers. - For example, the caching name servers on a private - network using - RFC1918 addressing may be configured with stub zones - for - 10.in-addr.arpa - to use a set of internal name servers as the - authoritative - servers for that domain. -

-
-

- mirror -

-
-

- A mirror zone is similar to a zone of type - secondary, except its data - is subject to DNSSEC validation before being used - in answers. Validation is applied to the entire - zone during the zone transfer process, and again - when the zone file is loaded from disk when - named is restarted. If - validation of a new version of a mirror zone - fails, a retransfer is scheduled and the most - recent correctly validated version of that zone - is used until it either expires or a newer version - validates correctly. If no usable zone data is - available for a mirror zone at all, either due to - transfer failure or expiration, traditional DNS - recursion is used to look up the answers instead. - Mirror zones cannot be used in a view that does - not have recursion enabled. -

-

- Answers coming from a mirror zone look almost - exactly like answers from a zone of type - secondary, with the - notable exceptions that the AA bit - ("authoritative answer") is not set, and the AD - bit ("authenticated data") is. -

-

- Mirror zones are intended to be used to set up a - fast local copy of the root zone, similar to the - one described in RFC 7706. A default list of primary - servers for the IANA root zone is built into - named and thus its mirroring - can be enabled using the following configuration: -

-
zone "." {
-        type mirror;
-};
-

- Other zones can be configured as mirror zones, - but this should be considered - experimental and may cause - performance issues, especially with zones that - are large and/or frequently updated. - Mirroring a zone other than root requires an - explicit list of primary servers to be provided - using the masters option - (see the section called “masters Statement Grammar” - for details), and a key-signing key (KSK) - for the specified zone to be explicitly - configured as a trust anchor. -

-

- To make mirror zone contents persist between - named restarts, use the - file - option. -

-

- When configuring NOTIFY for a mirror zone, only - notify no; and - notify explicit; can be - used at the zone level. Using any other - notify setting at the - options or - view level will cause - that setting to be overridden with - notify explicit; for the - mirror zone. The global default for the - notify option is - yes, so mirror - zones are by default configured with - notify explicit;. -

-

- Outgoing transfers of mirror zones are disabled - by default but may be enabled using - allow-transfer. -

-
-

- static-stub -

-
-

- A static-stub zone is similar to a stub zone - with the following exceptions: - the zone data is statically configured, rather - than transferred from a master server; - when recursion is necessary for a query that - matches a static-stub zone, the locally - configured data (nameserver names and glue addresses) - is always used even if different authoritative - information is cached. -

-

- Zone data is configured via the - server-addresses and - server-names zone options. -

-

- The zone data is maintained in the form of NS - and (if necessary) glue A or AAAA RRs - internally, which can be seen by dumping zone - databases by rndc dumpdb -all. - The configured RRs are considered local configuration - parameters rather than public data. - Non recursive queries (i.e., those with the RD - bit off) to a static-stub zone are therefore - prohibited and will be responded with REFUSED. -

-

- Since the data is statically configured, no - zone maintenance action takes place for a static-stub - zone. - For example, there is no periodic refresh - attempt, and an incoming notify message - will be rejected with an rcode of NOTAUTH. -

-

- Each static-stub zone is configured with - internally generated NS and (if necessary) - glue A or AAAA RRs -

-
-

- forward -

-
-

- A "forward zone" is a way to configure - forwarding on a per-domain basis. A zone statement - of type forward can - contain a forward - and/or forwarders - statement, - which will apply to queries within the domain given by - the zone - name. If no forwarders - statement is present or - an empty list for forwarders is given, then no - forwarding will be done for the domain, canceling the - effects of - any forwarders in the options statement. Thus - if you want to use this type of zone to change the - behavior of the - global forward option - (that is, "forward first" - to, then "forward only", or vice versa, but want to - use the same - servers as set globally) you need to re-specify the - global forwarders. -

-
-

- hint -

-
-

- The initial set of root name servers is - specified using a "hint zone". When the server starts - up, it uses - the root hints to find a root name server and get the - most recent - list of root name servers. If no hint zone is - specified for class - IN, the server uses a compiled-in default set of root - servers hints. - Classes other than IN have no built-in defaults hints. -

-
-

- redirect -

-
-

- Redirect zones are used to provide answers to - queries when normal resolution would result in - NXDOMAIN being returned. - Only one redirect zone is supported - per view. allow-query can be - used to restrict which clients see these answers. -

-

- If the client has requested DNSSEC records (DO=1) and - the NXDOMAIN response is signed then no substitution - will occur. -

-

- To redirect all NXDOMAIN responses to - 100.100.100.2 and - 2001:ffff:ffff::100.100.100.2, one would - configure a type redirect zone named ".", - with the zone file containing wildcard records - that point to the desired addresses: - "*. IN A 100.100.100.2" - and - "*. IN AAAA 2001:ffff:ffff::100.100.100.2". -

-

- To redirect all Spanish names (under .ES) one - would use similar entries but with the names - "*.ES." instead of "*.". To redirect all - commercial Spanish names (under COM.ES) one - would use wildcard entries called "*.COM.ES.". -

-

- Note that the redirect zone supports all - possible types; it is not limited to A and - AAAA records. -

-

- If a redirect zone is configured with a - masters option, then it is - transferred in as if it were a slave zone. - Otherwise, it is loaded from a file as if it - were a master zone. -

-

- Because redirect zones are not referenced - directly by name, they are not kept in the - zone lookup table with normal master and slave - zones. To reload a redirect zone, use - rndc reload -redirect, - and to retransfer a redirect zone configured - as slave, use - rndc retransfer -redirect. - When using rndc reload - without specifying a zone name, redirect zones - will be reloaded along with other zones. -

-
-

- delegation-only -

-
-

- This is used to enforce the delegation-only - status of infrastructure zones (e.g. COM, - NET, ORG). Any answer that is received - without an explicit or implicit delegation - in the authority section will be treated - as NXDOMAIN. This does not apply to the - zone apex. This should not be applied to - leaf zones. -

-

- delegation-only has no - effect on answers received from forwarders. -

-

- See caveats in root-delegation-only. -

-
-
-
- -
-

-Class

- -

- The zone's name may optionally be followed by a class. If - a class is not specified, class IN (for Internet), - is assumed. This is correct for the vast majority of cases. -

-

- The hesiod class is - named for an information service from MIT's Project Athena. It - is - used to share information about various systems databases, such - as users, groups, printers and so on. The keyword - HS is - a synonym for hesiod. -

-

- Another MIT development is Chaosnet, a LAN protocol created - in the mid-1970s. Zone data for it can be specified with the CHAOS class. -

-
- -
-

-Zone Options

- -
-
allow-notify
-
-

- See the description of - allow-notify in the section called “Access Control”. -

-
-
allow-query
-
-

- See the description of - allow-query in the section called “Access Control”. -

-
-
allow-query-on
-
-

- See the description of - allow-query-on in the section called “Access Control”. -

-
-
allow-transfer
-
-

- See the description of allow-transfer - in the section called “Access Control”. -

-
-
allow-update
-
-

- See the description of allow-update - in the section called “Access Control”. -

-
-
update-policy
-
-

- Specifies a "Simple Secure Update" policy. See - the section called “Dynamic Update Policies”. -

-
-
allow-update-forwarding
-
-

- See the description of allow-update-forwarding - in the section called “Access Control”. -

-
-
also-notify
-
-

- Only meaningful if notify - is - active for this zone. The set of machines that will - receive a - DNS NOTIFY message - for this zone is made up of all the listed name servers - (other than - the primary master) for the zone plus any IP addresses - specified - with also-notify. A port - may be specified - with each also-notify - address to send the notify - messages to a port other than the default of 53. - A TSIG key may also be specified to cause the - NOTIFY to be signed by the - given key. - also-notify is not - meaningful for stub zones. - The default is the empty list. -

-
-
check-names
-
-

- This option is used to restrict the character set and - syntax of - certain domain names in master files and/or DNS responses - received from the - network. The default varies according to zone type. For master zones the default is fail. For slave - zones the default is warn. - It is not implemented for hint zones. -

-
-
check-mx
-
-

- See the description of - check-mx in the section called “Boolean Options”. -

-
-
check-spf
-
-

- See the description of - check-spf in the section called “Boolean Options”. -

-
-
check-wildcard
-
-

- See the description of - check-wildcard in the section called “Boolean Options”. -

-
-
check-integrity
-
-

- See the description of - check-integrity in the section called “Boolean Options”. -

-
-
check-sibling
-
-

- See the description of - check-sibling in the section called “Boolean Options”. -

-
-
zero-no-soa-ttl
-
-

- See the description of - zero-no-soa-ttl in the section called “Boolean Options”. -

-
-
update-check-ksk
-
-

- See the description of - update-check-ksk in the section called “Boolean Options”. -

-
-
dnssec-loadkeys-interval
-
-

- See the description of - dnssec-loadkeys-interval in the section called “options Statement Definition and - Usage”. -

-
-
dnssec-policy
-
-

- Specifies which key and signing policy (KASP) should - be used for this zone. This is a string referring to - a dnssec-policy statement. - There are two built-in policies: - default allows you to use the - default policy, and none means - not to use any DNSSEC policy, keeping the zone unsigned. - The default is none. - See the section called “dnssec-policy Statement Grammar” for - more details. -

-
-
dnssec-update-mode
-
-

- See the description of - dnssec-update-mode in the section called “options Statement Definition and - Usage”. -

-
-
dnssec-dnskey-kskonly
-
-

- See the description of - dnssec-dnskey-kskonly in the section called “Boolean Options”. -

-
-
try-tcp-refresh
-
-

- See the description of - try-tcp-refresh in the section called “Boolean Options”. -

-
-
database
-
-

- Specify the type of database to be used for storing the - zone data. The string following the database keyword - is interpreted as a list of whitespace-delimited words. - The first word - identifies the database type, and any subsequent words are - passed - as arguments to the database to be interpreted in a way - specific - to the database type. -

-

- The default is "rbt", BIND 9's - native in-memory - red-black-tree database. This database does not take - arguments. -

-

- Other values are possible if additional database drivers - have been linked into the server. Some sample drivers are - included - with the distribution but none are linked in by default. -

-
-
dialup
-
-

- See the description of - dialup in the section called “Boolean Options”. -

-
-
delegation-only
-
-

- The flag only applies to forward, hint and stub - zones. If set to yes, - then the zone will also be treated as if it is - also a delegation-only type zone. -

-

- See caveats in root-delegation-only. -

-
-
-file -
-
-

- Set the zone's filename. In master, - hint, and redirect - zones which do not have masters - defined, zone data is loaded from this file. In - slave, mirror, - stub, and redirect - zones which do have masters - defined, zone data is retrieved from another server - and saved in this file. This option is not - applicable to other zone types. -

-
-
forward
-
-

- Only meaningful if the zone has a forwarders - list. The only value causes - the lookup to fail - after trying the forwarders and getting no answer, while first would - allow a normal lookup to be tried. -

-
-
forwarders
-
-

- Used to override the list of global forwarders. - If it is not specified in a zone of type forward, - no forwarding is done for the zone and the global options are - not used. -

-
-
journal
-
-

- Allow the default journal's filename to be overridden. - The default is the zone's filename with ".jnl" appended. - This is applicable to master and slave zones. -

-
-
max-ixfr-ratio
-
-

- See the description of - max-ixfr-ratio in - the section called “options Statement Definition and - Usage”. -

-
-
max-journal-size
-
-

- See the description of - max-journal-size in the section called “Server Resource Limits”. -

-
-
max-records
-
-

- See the description of - max-records in the section called “Server Resource Limits”. -

-
-
max-transfer-time-in
-
-

- See the description of - max-transfer-time-in in the section called “Zone Transfers”. -

-
-
max-transfer-idle-in
-
-

- See the description of - max-transfer-idle-in in the section called “Zone Transfers”. -

-
-
max-transfer-time-out
-
-

- See the description of - max-transfer-time-out in the section called “Zone Transfers”. -

-
-
max-transfer-idle-out
-
-

- See the description of - max-transfer-idle-out in the section called “Zone Transfers”. -

-
-
notify
-
-

- See the description of - notify in the section called “Boolean Options”. -

-
-
notify-delay
-
-

- See the description of - notify-delay in the section called “Tuning”. -

-
-
notify-to-soa
-
-

- See the description of - notify-to-soa in - the section called “Boolean Options”. -

-
-
zone-statistics
-
-

- See the description of - zone-statistics in - the section called “options Statement Definition and - Usage”. -

-
-
server-addresses
-
-

- Only meaningful for static-stub zones. - This is a list of IP addresses to which queries - should be sent in recursive resolution for the - zone. - A non empty list for this option will internally - configure the apex NS RR with associated glue A or - AAAA RRs. -

-

- For example, if "example.com" is configured as a - static-stub zone with 192.0.2.1 and 2001:db8::1234 - in a server-addresses option, - the following RRs will be internally configured. -

-
example.com. NS example.com.
-example.com. A 192.0.2.1
-example.com. AAAA 2001:db8::1234
-

- These records are internally used to resolve - names under the static-stub zone. - For instance, if the server receives a query for - "www.example.com" with the RD bit on, the server - will initiate recursive resolution and send - queries to 192.0.2.1 and/or 2001:db8::1234. -

-
-
server-names
-
-

- Only meaningful for static-stub zones. - This is a list of domain names of nameservers that - act as authoritative servers of the static-stub - zone. - These names will be resolved to IP addresses when - named needs to send queries to - these servers. - To make this supplemental resolution successful, - these names must not be a subdomain of the origin - name of static-stub zone. - That is, when "example.net" is the origin of a - static-stub zone, "ns.example" and - "master.example.com" can be specified in the - server-names option, but - "ns.example.net" cannot, and will be rejected by - the configuration parser. -

-

- A non empty list for this option will internally - configure the apex NS RR with the specified names. - For example, if "example.com" is configured as a - static-stub zone with "ns1.example.net" and - "ns2.example.net" - in a server-names option, - the following RRs will be internally configured. -

-
example.com. NS ns1.example.net.
-example.com. NS ns2.example.net.
-
-

- These records are internally used to resolve - names under the static-stub zone. - For instance, if the server receives a query for - "www.example.com" with the RD bit on, the server - initiate recursive resolution, - resolve "ns1.example.net" and/or - "ns2.example.net" to IP addresses, and then send - queries to (one or more of) these addresses. -

-
-
sig-validity-interval
-
-

- See the description of - sig-validity-interval in the section called “Tuning”. -

-
-
sig-signing-nodes
-
-

- See the description of - sig-signing-nodes in the section called “Tuning”. -

-
-
sig-signing-signatures
-
-

- See the description of - sig-signing-signatures in the section called “Tuning”. -

-
-
sig-signing-type
-
-

- See the description of - sig-signing-type in the section called “Tuning”. -

-
-
transfer-source
-
-

- See the description of - transfer-source in the section called “Zone Transfers”. -

-
-
transfer-source-v6
-
-

- See the description of - transfer-source-v6 in the section called “Zone Transfers”. -

-
-
alt-transfer-source
-
-

- See the description of - alt-transfer-source in the section called “Zone Transfers”. -

-
-
alt-transfer-source-v6
-
-

- See the description of - alt-transfer-source-v6 in the section called “Zone Transfers”. -

-
-
use-alt-transfer-source
-
-

- See the description of - use-alt-transfer-source in the section called “Zone Transfers”. -

-
-
notify-source
-
-

- See the description of - notify-source in the section called “Zone Transfers”. -

-
-
notify-source-v6
-
-

- See the description of - notify-source-v6 in the section called “Zone Transfers”. -

-
-
-min-refresh-time, max-refresh-time, min-retry-time, max-retry-time -
-
-

- See the description in the section called “Tuning”. -

-
-
ixfr-from-differences
-
-

- See the description of - ixfr-from-differences in the section called “Boolean Options”. - (Note that the ixfr-from-differences - master and - slave choices are not - available at the zone level.) -

-
-
key-directory
-
-

- See the description of - key-directory in the section called “options Statement Definition and - Usage”. -

-
-
auto-dnssec
-
-

- See the description of - auto-dnssec in - the section called “options Statement Definition and - Usage”. -

-
-
serial-update-method
-
-

- See the description of - serial-update-method in - the section called “options Statement Definition and - Usage”. -

-
-
inline-signing
-
-

- If yes, this enables - "bump in the wire" signing of a zone, where a - unsigned zone is transferred in or loaded from - disk and a signed version of the zone is served, - with possibly, a different serial number. This - behavior is disabled by default. -

-
-
multi-master
-
-

- See the description of multi-master in - the section called “Boolean Options”. -

-
-
masterfile-format
-
-

- See the description of masterfile-format - in the section called “Tuning”. -

-
-
max-zone-ttl
-
-

- See the description of max-zone-ttl - in the section called “options Statement Definition and - Usage”. -

-
-
dnssec-secure-to-insecure
-
-

- See the description of - dnssec-secure-to-insecure in the section called “Boolean Options”. -

-
-
- -
-
-

-Dynamic Update Policies

- -

BIND 9 supports two alternative - methods of granting clients the right to perform - dynamic updates to a zone, configured by the - allow-update and - update-policy option, respectively. -

-

- The allow-update clause is a simple - access control list. Any client that matches - the ACL is granted permission to update any record - in the zone. -

-

- The update-policy clause - allows more fine-grained control over what updates are - allowed. It specifies a set of rules, in which each rule - either grants or denies permission for one or more - names in the zone to be updated by one or more - identities. Identity is determined by the key that - signed the update request using either TSIG or SIG(0). - In most cases, update-policy rules - only apply to key-based identities. There is no way - to specify update permissions based on client source - address. -

-

- update-policy rules are only meaningful - for zones of type master, and are - not allowed in any other zone type. - It is a configuration error to specify both - allow-update and - update-policy at the same time. -

-

- A pre-defined update-policy rule can be - switched on with the command - update-policy local;. - Using this in a zone causes - named to generate a TSIG session key - when starting up and store it in a file; this key can then - be used by local clients to update the zone while - named is running. - By default, the session key is stored in the file - /var/run/named/session.key, the key name - is "local-ddns", and the key algorithm is HMAC-SHA256. - These values are configurable with the - session-keyfile, - session-keyname and - session-keyalg options, respectively. - A client running on the local system, if run with appropriate - permissions, may read the session key from the key file and - use it to sign update requests. The zone's update - policy will be set to allow that key to change any record - within the zone. Assuming the key name is "local-ddns", - this policy is equivalent to: -

- -
update-policy { grant local-ddns zonesub any; };
-            
- -

- ...with the additional restriction that only clients - connecting from the local system will be permitted to send - updates. -

-

- Note that only one session key is generated by - named; all zones configured to use - update-policy local will accept the same key. -

-

- The command nsupdate -l implements this - feature, sending requests to localhost and signing them using - the key retrieved from the session key file. -

- -

- Other rule definitions look like this: -

- -
-( grant | deny ) identity ruletype [ name ] [ types ]
-
- -

- Each rule grants or denies privileges. Rules are checked - in the order in which they are specified in the - update-policy statement. Once a message - has successfully matched a rule, the operation is immediately - granted or denied, and no further rules are examined. There - are 13 types of rules; the rule type is specified by the - ruletype field, and the interpretation - of other fields varies depending on the rule type. -

-

- In general, a rule is matched when the - key that signed an update request matches the - identity field, the name of the record - to be updated matches the name field - (in the manner specified by the ruletype - field), and the type of the record to be updated matches the - types field. Details for each rule type - are described below. -

-

- The identity field must be set to - a fully-qualified domain name. In most cases, this - represensts the name of the TSIG or SIG(0) key that must be - used to sign the update request. If the specified name is a - wildcard, it is subject to DNS wildcard expansion, and the - rule may apply to multiple identities. When a TKEY exchange - has been used to create a shared secret, the identity of - the key used to authenticate the TKEY exchange will be - used as the identity of the shared secret. Some rule types - use identities matching the client's Kerberos principal - (e.g, "host/machine@REALM") or - Windows realm (machine$@REALM). -

-

- The name field also specifies - a fully-qualified domain name. This often - represents the name of the record to be updated. - Interpretation of this field is dependent on rule type. -

-

- If no types are explicitly specified, - then a rule matches all types except RRSIG, NS, SOA, NSEC - and NSEC3. Types may be specified by name, including - "ANY" (ANY matches all types except NSEC and NSEC3, - which can never be updated). Note that when an attempt - is made to delete all records associated with a name, - the rules are checked for each existing record type. -

-

- The ruletype field has 16 - values: - name, subdomain, - wildcard, self, - selfsub, selfwild, - krb5-self, ms-self, - krb5-selfsub, ms-selfsub, - krb5-subdomain, - ms-subdomain, - tcp-self, 6to4-self, - zonesub, and external. -

-
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- name -

-
-

- Exact-match semantics. This rule matches - when the name being updated is identical - to the contents of the - name field. -

-
-

- subdomain -

-
-

- This rule matches when the name being updated - is a subdomain of, or identical to, the - contents of the name - field. -

-
-

- zonesub -

-
-

- This rule is similar to subdomain, except that - it matches when the name being updated is a - subdomain of the zone in which the - update-policy statement - appears. This obviates the need to type the zone - name twice, and enables the use of a standard - update-policy statement in - multiple zones without modification. -

-

- When this rule is used, the - name field is omitted. -

-
-

- wildcard -

-
-

- The name field - is subject to DNS wildcard expansion, and - this rule matches when the name being updated - is a valid expansion of the wildcard. -

-
-

- self -

-
-

- This rule matches when the name of the record - being updated matches the contents of the - identity field. - The name field - is ignored. To avoid confusion, it is recommended - that this field be set to the same value as the - identity field or to - "." -

-

- The self rule type is - most useful when allowing one key per - name to update, where the key has the same - name as the record to be updated. In this case, - the identity field - can be specified as * - (an asterisk). -

-
-

- selfsub -

-
-

- This rule is similar to self - except that subdomains of self - can also be updated. -

-
-

- selfwild -

-
-

- This rule is similar to self - except that only subdomains of - self can be updated. -

-
-

- ms-self -

-
-

- When a client sends an UPDATE using a Windows - machine principal (for example, 'machine$@REALM'), - this rule allows records with the absolute name - of 'machine.REALM' to be updated. -

-

- The realm to be matched is specified in the - identity field. -

-

- The name field has - no effect on this rule; it should be set to "." - as a placeholder. -

-

- For example, - grant EXAMPLE.COM ms-self . A AAAA - allows any machine with a valid principal in - the realm EXAMPLE.COM to update - its own address records. -

-
-

- ms-selfsub -

-
-

- This is similar to ms-self - except it also allows updates to any subdomain of - the name specified in the Windows machine - principal, not just to the name itself. -

-
-

- ms-subdomain -

-
-

- When a client sends an UPDATE using a Windows - machine principal (for example, 'machine$@REALM'), - this rule allows any machine in the specified - realm to update any record in the zone or in a - specified subdomain of the zone. -

-

- The realm to be matched is specified in the - identity field. -

-

- The name field - specifies the subdomain that may be updated. - If set to "." (or any other name at or above - the zone apex), any name in the zone can be - updated. -

-

- For example, if update-policy - for the zone "example.com" includes - grant EXAMPLE.COM ms-subdomain hosts.example.com. A AAAA, - any machine with a valid principal in - the realm EXAMPLE.COM will - be able to update address records at or below - "hosts.example.com". -

-
-

- krb5-self -

-
-

- When a client sends an UPDATE using a - Kerberos machine principal (for example, - 'host/machine@REALM'), this rule allows - records with the absolute name of 'machine' - to be updated provided it has been authenticated - by REALM. This is similar but not identical - to ms-self due to the - 'machine' part of the Kerberos principal - being an absolute name instead of a unqualified - name. -

-

- The realm to be matched is specified in the - identity field. -

-

- The name field has - no effect on this rule; it should be set to "." - as a placeholder. -

-

- For example, - grant EXAMPLE.COM krb5-self . A AAAA - allows any machine with a valid principal in - the realm EXAMPLE.COM to update - its own address records. -

-
-

- krb5-selfsub -

-
-

- This is similar to krb5-self - except it also allows updates to any subdomain of - the name specified in the 'machine' part of the - Kerberos principal, not just to the name itself. -

-
-

- krb5-subdomain -

-
-

- This rule is identical to - ms-subdomain, except that it works - with Kerberos machine principals (i.e., - 'host/machine@REALM') rather than Windows machine - principals. -

-
-

- tcp-self -

-
-

- This rule allows updates that have been sent via - TCP and for which the standard mapping from the - client's IP address into the - in-addr.arpa and - ip6.arpa - namespaces match the name to be updated. - The identity field must match - that name. The name field - should be set to ".". - Note that, since identity is based on the client's - IP address, it is not necessary for update request - messages to be signed. -

-
-

Note

- It is theoretically possible to spoof these TCP - sessions. -
-
-

- 6to4-self -

-
-

- This allows the name matching a 6to4 IPv6 prefix, - as specified in RFC 3056, to be updated by any - TCP connection from either the 6to4 network or - from the corresponding IPv4 address. This is - intended to allow NS or DNAME RRsets to be added - to the ip6.arpa reverse tree. -

-

- The identity field must match - the 6to4 prefix in ip6.arpa. - The name field should - be set to ".". - Note that, since identity is based on the client's - IP address, it is not necessary for update request - messages to be signed. -

-

- In addition, if specified for an - ip6.arpa name outside of the - 2.0.0.2.ip6.arpa namespace, - the corresponding /48 reverse name can be updated. - For example, TCP/IPv6 connections - from 2001:DB8:ED0C::/48 can update records at - C.0.D.E.8.B.D.0.1.0.0.2.ip6.arpa. -

-
-

Note

- It is theoretically possible to spoof these TCP - sessions. -
-
-

- external -

-
-

- This rule allows named - to defer the decision of whether to allow a - given update to an external daemon. -

-

- The method of communicating with the daemon is - specified in the identity - field, the format of which is - "local:path", - where path is the location - of a UNIX-domain socket. (Currently, "local" is the - only supported mechanism.) -

-

- Requests to the external daemon are sent over the - UNIX-domain socket as datagrams with the following - format: -

-
-   Protocol version number (4 bytes, network byte order, currently 1)
-   Request length (4 bytes, network byte order)
-   Signer (null-terminated string)
-   Name (null-terminated string)
-   TCP source address (null-terminated string)
-   Rdata type (null-terminated string)
-   Key (null-terminated string)
-   TKEY token length (4 bytes, network byte order)
-   TKEY token (remainder of packet)
-

- The daemon replies with a four-byte value in - network byte order, containing either 0 or 1; 0 - indicates that the specified update is not - permitted, and 1 indicates that it is. -

-
-
-
- -
-

-Multiple views

- -

- When multiple views are in use, a zone may be - referenced by more than one of them. Often, the views - will contain different zones with the same name, allowing - different clients to receive different answers for the same - queries. At times, however, it is desirable for multiple - views to contain identical zones. The - in-view zone option provides an efficient - way to do this: it allows a view to reference a zone that - was defined in a previously configured view. Example: -

-
-view internal {
-    match-clients { 10/8; };
-
-    zone example.com {
-        type master;
-        file "example-external.db";
-    };
-};
-
-view external {
-    match-clients { any; };
-
-    zone example.com {
-        in-view internal;
-    };
-};
-            
-

- An in-view option cannot refer to a view - that is configured later in the configuration file. -

-

- A zone statement which uses the - in-view option may not use any other - options with the exception of forward - and forwarders. (These options control - the behavior of the containing view, rather than changing - the zone object itself.) -

-

- Zone level acls (e.g. allow-query, allow-transfer) and - other configuration details of the zone are all set - in the view the referenced zone is defined in. Care - need to be taken to ensure that acls are wide enough - for all views referencing the zone. -

-

- An in-view zone cannot be used as a - response policy zone. -

-

- An in-view zone is not intended to reference - a forward zone. -

-
- -
-
-
-

-Zone File

- -
-

-Types of Resource Records and When to Use Them

- -

- This section, largely borrowed from RFC 1034, describes the - concept of a Resource Record (RR) and explains when each is used. - Since the publication of RFC 1034, several new RRs have been - identified - and implemented in the DNS. These are also included. -

-
-

-Resource Records

- -

- A domain name identifies a node. Each node has a set of - resource information, which may be empty. The set of resource - information associated with a particular name is composed of - separate RRs. The order of RRs in a set is not significant and - need not be preserved by name servers, resolvers, or other - parts of the DNS. However, sorting of multiple RRs is - permitted for optimization purposes, for example, to specify - that a particular nearby server be tried first. See the section called “The sortlist Statement” and the section called “RRset Ordering”. -

- -

- The components of a Resource Record are: -

-
- ---- - - - - - - - - - - - - - - - - - - - - - - -
-

- owner name -

-
-

- The domain name where the RR is found. -

-
-

- type -

-
-

- An encoded 16-bit value that specifies - the type of the resource record. -

-
-

- TTL -

-
-

- The time-to-live of the RR. This field - is a 32-bit integer in units of seconds, and is - primarily used by - resolvers when they cache RRs. The TTL describes how - long a RR can - be cached before it should be discarded. -

-
-

- class -

-
-

- An encoded 16-bit value that identifies - a protocol family or instance of a protocol. -

-
-

- RDATA -

-
-

- The resource data. The format of the - data is type (and sometimes class) specific. -

-
-
-

- The following are types of valid RRs: -

-
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- A -

-
-

- A host address. In the IN class, this is a - 32-bit IP address. Described in RFC 1035. -

-
-

- AAAA -

-
-

- IPv6 address. Described in RFC 1886. -

-
-

- A6 -

-
-

- IPv6 address. This can be a partial - address (a suffix) and an indirection to the name - where the rest of the - address (the prefix) can be found. Experimental. - Described in RFC 2874. -

-
-

- AFSDB -

-
-

- Location of AFS database servers. - Experimental. Described in RFC 1183. -

-
-

- AMTRELAY -

-
-

- Automatic Multicast Tunneling Relay - discovery record. - Work in progress draft-ietf-mboned-driad-amt-discovery. -

-
-

- APL -

-
-

- Address prefix list. Experimental. - Described in RFC 3123. -

-
-

- ATMA -

-
-

- ATM Address. -

-
-

- AVC -

-
-

- Application Visibility and Control record. -

-
-

- CAA -

-
-

- Identifies which Certificate Authorities can issue - certificates for this domain and what rules they - need to follow when doing so. Defined in RFC 6844. -

-
-

- CDNSKEY -

-
-

- Identifies which DNSKEY records should be published - as DS records in the parent zone. -

-
-

- CDS -

-
-

- Contains the set of DS records that should be published - by the parent zone. -

-
-

- CERT -

-
-

- Holds a digital certificate. - Described in RFC 2538. -

-
-

- CNAME -

-
-

- Identifies the canonical name of an alias. - Described in RFC 1035. -

-
-

- CSYNC -

-
-

- Child-to-Parent Synchronization in DNS as described - in RFC 7477. -

-
-

- DHCID -

-
-

- Is used for identifying which DHCP client is - associated with this name. Described in RFC 4701. -

-
-

- DLV -

-
-

- A DNS Lookaside Validation record which contains - the records that are used as trust anchors for - zones in a DLV namespace. Described in RFC 4431. -

-
-

- DNAME -

-
-

- Replaces the domain name specified with - another name to be looked up, effectively aliasing an - entire - subtree of the domain name space rather than a single - record - as in the case of the CNAME RR. - Described in RFC 2672. -

-
-

- DNSKEY -

-
-

- Stores a public key associated with a signed - DNS zone. Described in RFC 4034. -

-
-

- DOA -

-
-

- Implements the Digital Object Architecture over - DNS. Experimental. -

-
-

- DS -

-
-

- Stores the hash of a public key associated with a - signed DNS zone. Described in RFC 4034. -

-
-

- EID -

-
-

- End Point Identifier. -

-
-

- EUI48 -

-
-

- A 48-bit EUI address. Described in RFC 7043. -

-
-

- EUI64 -

-
-

- A 64-bit EUI address. Described in RFC 7043. -

-
-

- GID -

-
-

- Reserved. -

-
-

- GPOS -

-
-

- Specifies the global position. Superseded by LOC. -

-
-

- HINFO -

-
-

- Identifies the CPU and OS used by a host. - Described in RFC 1035. -

-
-

- HIP -

-
-

- Host Identity Protocol Address. - Described in RFC 5205. -

-
-

- IPSECKEY -

-
-

- Provides a method for storing IPsec keying material in - DNS. Described in RFC 4025. -

-
-

- ISDN -

-
-

- Representation of ISDN addresses. - Experimental. Described in RFC 1183. -

-
-

- KEY -

-
-

- Stores a public key associated with a - DNS name. Used in original DNSSEC; replaced - by DNSKEY in DNSSECbis, but still used with - SIG(0). Described in RFCs 2535 and 2931. -

-
-

- KX -

-
-

- Identifies a key exchanger for this - DNS name. Described in RFC 2230. -

-
-

- L32 -

-
-

- Holds 32-bit Locator values for - Identifier-Locator Network Protocol. Described - in RFC 6742. -

-
-

- L64 -

-
-

- Holds 64-bit Locator values for - Identifier-Locator Network Protocol. Described - in RFC 6742. -

-
-

- LOC -

-
-

- For storing GPS info. Described in RFC 1876. - Experimental. -

-
-

- LP -

-
-

- Identifier-Locator Network Protocol. - Described in RFC 6742. -

-
-

- MB -

-
-

- Mail Box. Historical. -

-
-

- MD -

-
-

- Mail Destination. Historical. -

-
-

- MF -

-
-

- Mail Forwarder. Historical. -

-
-

- MG -

-
-

- Mail Group. Historical. -

-
-

- MINFO -

-
-

- Mail Information. -

-
-

- MR -

-
-

- Mail Rename. Historical. -

-
-

- MX -

-
-

- Identifies a mail exchange for the domain with - a 16-bit preference value (lower is better) - followed by the host name of the mail exchange. - Described in RFC 974, RFC 1035. -

-
-

- NAPTR -

-
-

- Name authority pointer. Described in RFC 2915. -

-
-

- NID -

-
-

- Holds values for Node Identifiers in - Identifier-Locator Network Protocol. Described - in RFC 6742. -

-
-

- NINFO -

-
-

- Contains zone status information. -

-
-

- NIMLOC -

-
-

- Nimrod Locator. -

-
-

- NSAP -

-
-

- A network service access point. - Described in RFC 1706. -

-
-

- NSAP-PTR -

-
-

- Historical. -

-
-

- NS -

-
-

- The authoritative name server for the - domain. Described in RFC 1035. -

-
-

- NSEC -

-
-

- Used in DNSSECbis to securely indicate that - RRs with an owner name in a certain name interval do - not exist in - a zone and indicate what RR types are present for an - existing name. - Described in RFC 4034. -

-
-

- NSEC3 -

-
-

- Used in DNSSECbis to securely indicate that - RRs with an owner name in a certain name - interval do not exist in a zone and indicate - what RR types are present for an existing - name. NSEC3 differs from NSEC in that it - prevents zone enumeration but is more - computationally expensive on both the server - and the client than NSEC. Described in RFC - 5155. -

-
-

- NSEC3PARAM -

-
-

- Used in DNSSECbis to tell the authoritative - server which NSEC3 chains are available to use. - Described in RFC 5155. -

-
-

- NULL -

-
-

- This is an opaque container. -

-
-

- NXT -

-
-

- Used in DNSSEC to securely indicate that - RRs with an owner name in a certain name interval do - not exist in - a zone and indicate what RR types are present for an - existing name. - Used in original DNSSEC; replaced by NSEC in - DNSSECbis. - Described in RFC 2535. -

-
-

- OPENPGPKEY -

-
-

- Used to hold an OPENPGPKEY. -

-
-

- PTR -

-
-

- A pointer to another part of the domain - name space. Described in RFC 1035. -

-
-

- PX -

-
-

- Provides mappings between RFC 822 and X.400 - addresses. Described in RFC 2163. -

-
-

- RKEY -

-
-

- Resource key. -

-
-

- RP -

-
-

- Information on persons responsible - for the domain. Experimental. Described in RFC 1183. -

-
-

- RRSIG -

-
-

- Contains DNSSECbis signature data. Described - in RFC 4034. -

-
-

- RT -

-
-

- Route-through binding for hosts that - do not have their own direct wide area network - addresses. - Experimental. Described in RFC 1183. -

-
-

- SIG -

-
-

- Contains DNSSEC signature data. Used in - original DNSSEC; replaced by RRSIG in - DNSSECbis, but still used for SIG(0). - Described in RFCs 2535 and 2931. -

-
-

- SINK -

-
-

- The kitchen sink record. -

-
-

- SMIMEA -

-
-

- The S/MIME Security Certificate Association. -

-
-

- SOA -

-
-

- Identifies the start of a zone of authority. - Described in RFC 1035. -

-
-

- SPF -

-
-

- Contains the Sender Policy Framework information - for a given email domain. Described in RFC 4408. -

-
-

- SRV -

-
-

- Information about well known network - services (replaces WKS). Described in RFC 2782. -

-
-

- SSHFP -

-
-

- Provides a way to securely publish a secure shell key's - fingerprint. Described in RFC 4255. -

-
-

- TA -

-
-

- Trust Anchor. Experimental. -

-
-

- TALINK -

-
-

- Trust Anchor Link. Experimental. -

-
-

- TLSA -

-
-

- Transport Layer Security Certificate Association. - Described in RFC 6698. -

-
-

- TXT -

-
-

- Text records. Described in RFC 1035. -

-
-

- UID -

-
-

- Reserved. -

-
-

- UINFO -

-
-

- Reserved. -

-
-

- UNSPEC -

-
-

- Reserved. Historical. -

-
-

- URI -

-
-

- Holds a URI. Described in RFC 7553. -

-
-

- WKS -

-
-

- Information about which well known - network services, such as SMTP, that a domain - supports. Historical. -

-
-

- X25 -

-
-

- Representation of X.25 network addresses. - Experimental. Described in RFC 1183. -

-
-

- ZONEMD -

-
-

- Zone Message Digest. - Work in progress draft-wessels-dns-zone-digest. -

-
-
-

- The following classes of resource records - are currently valid in the DNS: -

-
- ---- - - - - - - - - - - - - - - -
-

- IN -

-
-

- The Internet. -

-
-

- CH -

-
-

- Chaosnet, a LAN protocol created at MIT in the - mid-1970s. - Rarely used for its historical purpose, but reused for - BIND's - built-in server information zones, e.g., - version.bind. -

-
-

- HS -

-
-

- Hesiod, an information service - developed by MIT's Project Athena. It is used to share - information - about various systems databases, such as users, - groups, printers - and so on. -

-
-
- -

- The owner name is often implicit, rather than forming an - integral - part of the RR. For example, many name servers internally form - tree - or hash structures for the name space, and chain RRs off nodes. - The remaining RR parts are the fixed header (type, class, TTL) - which is consistent for all RRs, and a variable part (RDATA) - that - fits the needs of the resource being described. -

-

- The meaning of the TTL field is a time limit on how long an - RR can be kept in a cache. This limit does not apply to - authoritative - data in zones; it is also timed out, but by the refreshing - policies - for the zone. The TTL is assigned by the administrator for the - zone where the data originates. While short TTLs can be used to - minimize caching, and a zero TTL prohibits caching, the - realities - of Internet performance suggest that these times should be on - the - order of days for the typical host. If a change can be - anticipated, - the TTL can be reduced prior to the change to minimize - inconsistency - during the change, and then increased back to its former value - following - the change. -

-

- The data in the RDATA section of RRs is carried as a combination - of binary strings and domain names. The domain names are - frequently - used as "pointers" to other data in the DNS. -

-
-
-

-Textual expression of RRs

- -

- RRs are represented in binary form in the packets of the DNS - protocol, and are usually represented in highly encoded form - when - stored in a name server or resolver. In the examples provided - in - RFC 1034, a style similar to that used in master files was - employed - in order to show the contents of RRs. In this format, most RRs - are shown on a single line, although continuation lines are - possible - using parentheses. -

-

- The start of the line gives the owner of the RR. If a line - begins with a blank, then the owner is assumed to be the same as - that of the previous RR. Blank lines are often included for - readability. -

-

- Following the owner, we list the TTL, type, and class of the - RR. Class and type use the mnemonics defined above, and TTL is - an integer before the type field. In order to avoid ambiguity - in - parsing, type and class mnemonics are disjoint, TTLs are - integers, - and the type mnemonic is always last. The IN class and TTL - values - are often omitted from examples in the interests of clarity. -

-

- The resource data or RDATA section of the RR are given using - knowledge of the typical representation for the data. -

-

- For example, we might show the RRs carried in a message as: -

-
- ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- ISI.EDU. -

-
-

- MX -

-
-

- 10 VENERA.ISI.EDU. -

-
-

-
-

- MX -

-
-

- 10 VAXA.ISI.EDU -

-
-

- VENERA.ISI.EDU -

-
-

- A -

-
-

- 128.9.0.32 -

-
-

-
-

- A -

-
-

- 10.1.0.52 -

-
-

- VAXA.ISI.EDU -

-
-

- A -

-
-

- 10.2.0.27 -

-
-

-
-

- A -

-
-

- 128.9.0.33 -

-
-
-

- The MX RRs have an RDATA section which consists of a 16-bit - number followed by a domain name. The address RRs use a - standard - IP address format to contain a 32-bit internet address. -

-

- The above example shows six RRs, with two RRs at each of three - domain names. -

-

- Similarly we might see: -

-
- ----- - - - - - - - - - - - - -
-

- XX.LCS.MIT.EDU. -

-
-

- IN A -

-
-

- 10.0.0.44 -

-
  -

- CH A -

-
-

- MIT.EDU. 2420 -

-
-
-

- This example shows two addresses for - XX.LCS.MIT.EDU, each of a different class. -

-
-
- -
-

-Discussion of MX Records

- -

- As described above, domain servers store information as a - series of resource records, each of which contains a particular - piece of information about a given domain name (which is usually, - but not always, a host). The simplest way to think of a RR is as - a typed pair of data, a domain name matched with a relevant datum, - and stored with some additional type information to help systems - determine when the RR is relevant. -

- -

- MX records are used to control delivery of email. The data - specified in the record is a priority and a domain name. The - priority - controls the order in which email delivery is attempted, with the - lowest number first. If two priorities are the same, a server is - chosen randomly. If no servers at a given priority are responding, - the mail transport agent will fall back to the next largest - priority. - Priority numbers do not have any absolute meaning — they are - relevant - only respective to other MX records for that domain name. The - domain - name given is the machine to which the mail will be delivered. - It must have an associated address record - (A or AAAA) — CNAME is not sufficient. -

-

- For a given domain, if there is both a CNAME record and an - MX record, the MX record is in error, and will be ignored. - Instead, - the mail will be delivered to the server specified in the MX - record - pointed to by the CNAME. - For example: -

-
- ------- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- example.com. -

-
-

- IN -

-
-

- MX -

-
-

- 10 -

-
-

- mail.example.com. -

-
-

-
-

- IN -

-
-

- MX -

-
-

- 10 -

-
-

- mail2.example.com. -

-
-

-
-

- IN -

-
-

- MX -

-
-

- 20 -

-
-

- mail.backup.org. -

-
-

- mail.example.com. -

-
-

- IN -

-
-

- A -

-
-

- 10.0.0.1 -

-
-

-
-

- mail2.example.com. -

-
-

- IN -

-
-

- A -

-
-

- 10.0.0.2 -

-
-

-
-
-

- Mail delivery will be attempted to mail.example.com and - mail2.example.com (in - any order), and if neither of those succeed, delivery to mail.backup.org will - be attempted. -

-
-
-

-Setting TTLs

- -

- The time-to-live of the RR field is a 32-bit integer represented - in units of seconds, and is primarily used by resolvers when they - cache RRs. The TTL describes how long a RR can be cached before it - should be discarded. The following three types of TTL are - currently - used in a zone file. -

-
- ---- - - - - - - - - - - - - - - -
-

- SOA -

-
-

- The last field in the SOA is the negative - caching TTL. This controls how long other servers will - cache no-such-domain - (NXDOMAIN) responses from you. -

-

- The maximum time for - negative caching is 3 hours (3h). -

-
-

- $TTL -

-
-

- The $TTL directive at the top of the - zone file (before the SOA) gives a default TTL for every - RR without - a specific TTL set. -

-
-

- RR TTLs -

-
-

- Each RR can have a TTL as the second - field in the RR, which will control how long other - servers can cache it. -

-
-
-

- All of these TTLs default to units of seconds, though units - can be explicitly specified, for example, 1h30m. -

-
-
-

-Inverse Mapping in IPv4

- -

- Reverse name resolution (that is, translation from IP address - to name) is achieved by means of the in-addr.arpa domain - and PTR records. Entries in the in-addr.arpa domain are made in - least-to-most significant order, read left to right. This is the - opposite order to the way IP addresses are usually written. Thus, - a machine with an IP address of 10.1.2.3 would have a - corresponding - in-addr.arpa name of - 3.2.1.10.in-addr.arpa. This name should have a PTR resource record - whose data field is the name of the machine or, optionally, - multiple - PTR records if the machine has more than one name. For example, - in the [example.com] domain: -

-
- ---- - - - - - - - - - - -
-

- $ORIGIN -

-
-

- 2.1.10.in-addr.arpa -

-
-

- 3 -

-
-

- IN PTR foo.example.com. -

-
-
-
-

Note

-

- The $ORIGIN lines in the examples - are for providing context to the examples only — they do not - necessarily - appear in the actual usage. They are only used here to indicate - that the example is relative to the listed origin. -

-
-
-
-

-Other Zone File Directives

- -

- The Master File Format was initially defined in RFC 1035 and - has subsequently been extended. While the Master File Format - itself - is class independent all records in a Master File must be of the - same - class. -

-

- Master File Directives include $ORIGIN, $INCLUDE, - and $TTL. -

-
-

-The @ (at-sign)

- -

- When used in the label (or name) field, the asperand or - at-sign (@) symbol represents the current origin. - At the start of the zone file, it is the - <zone_name> (followed by - trailing dot). -

-
-
-

-The $ORIGIN Directive

- -

- Syntax: $ORIGIN - domain-name - [comment] -

-

$ORIGIN - sets the domain name that will be appended to any - unqualified records. When a zone is first read in there - is an implicit $ORIGIN - <zone_name>. - (followed by trailing dot). - The current $ORIGIN is appended to - the domain specified in the $ORIGIN - argument if it is not absolute. -

- -
-$ORIGIN example.com.
-WWW     CNAME   MAIN-SERVER
-
- -

- is equivalent to -

- -
-WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM.
-
- -
-
-

-The $INCLUDE Directive

- -

- Syntax: $INCLUDE - filename - [ -origin ] - [ comment ] -

-

- Read and process the file filename as - if it were included into the file at this point. If origin is - specified the file is processed with $ORIGIN set - to that value, otherwise the current $ORIGIN is - used. -

-

- The origin and the current domain name - revert to the values they had prior to the $INCLUDE once - the file has been read. -

-
-

Note

-

- RFC 1035 specifies that the current origin should be restored - after - an $INCLUDE, but it is silent - on whether the current - domain name should also be restored. BIND 9 restores both of - them. - This could be construed as a deviation from RFC 1035, a - feature, or both. -

-
-
-
-

-The $TTL Directive

- -

- Syntax: $TTL - default-ttl - [ -comment ] -

-

- Set the default Time To Live (TTL) for subsequent records - with undefined TTLs. Valid TTLs are of the range 0-2147483647 - seconds. -

-

$TTL - is defined in RFC 2308. -

-
-
-
-

-BIND Master File Extension: the $GENERATE Directive

- -

- Syntax: $GENERATE - range - lhs - [ttl] - [class] - type - rhs - [comment] -

-

$GENERATE - is used to create a series of resource records that only - differ from each other by an - iterator. $GENERATE can be used to - easily generate the sets of records required to support - sub /24 reverse delegations described in RFC 2317: - Classless IN-ADDR.ARPA delegation. -

- -
$ORIGIN 0.0.192.IN-ADDR.ARPA.
-$GENERATE 1-2 @ NS SERVER$.EXAMPLE.
-$GENERATE 1-127 $ CNAME $.0
- -

- is equivalent to -

- -
0.0.0.192.IN-ADDR.ARPA. NS SERVER1.EXAMPLE.
-0.0.0.192.IN-ADDR.ARPA. NS SERVER2.EXAMPLE.
-1.0.0.192.IN-ADDR.ARPA. CNAME 1.0.0.0.192.IN-ADDR.ARPA.
-2.0.0.192.IN-ADDR.ARPA. CNAME 2.0.0.0.192.IN-ADDR.ARPA.
-...
-127.0.0.192.IN-ADDR.ARPA. CNAME 127.0.0.0.192.IN-ADDR.ARPA.
-
- -

- Generate a set of A and MX records. Note the MX's right hand - side is a quoted string. The quotes will be stripped when the - right hand side is processed. -

- -
-$ORIGIN EXAMPLE.
-$GENERATE 1-127 HOST-$ A 1.2.3.$
-$GENERATE 1-127 HOST-$ MX "0 ."
- -

- is equivalent to -

- -
HOST-1.EXAMPLE.   A  1.2.3.1
-HOST-1.EXAMPLE.   MX 0 .
-HOST-2.EXAMPLE.   A  1.2.3.2
-HOST-2.EXAMPLE.   MX 0 .
-HOST-3.EXAMPLE.   A  1.2.3.3
-HOST-3.EXAMPLE.   MX 0 .
-...
-HOST-127.EXAMPLE. A  1.2.3.127
-HOST-127.EXAMPLE. MX 0 .
-
- -
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

range

-
-

- This can be one of two forms: start-stop - or start-stop/step. If the first form is used, then step - is set to 1. start, stop and step must be positive - integers between 0 and (2^31)-1. start must not be - larger than stop. -

-
-

lhs

-
-

This - describes the owner name of the resource records - to be created. Any single $ - (dollar sign) - symbols within the lhs string - are replaced by the iterator value. - - To get a $ in the output, you need to escape the - $ using a backslash - \, - e.g. \$. The - $ may optionally be followed - by modifiers which change the offset from the - iterator, field width and base. - - Modifiers are introduced by a - { (left brace) immediately following the - $ as - ${offset[,width[,base]]}. - For example, ${-20,3,d} - subtracts 20 from the current value, prints the - result as a decimal in a zero-padded field of - width 3. - - Available output forms are decimal - (d), octal - (o), hexadecimal - (x or X - for uppercase) and nibble - (n or N\ - for uppercase). The default modifier is - ${0,0,d}. If the - lhs is not absolute, the - current $ORIGIN is appended - to the name. -

-

- In nibble mode the value will be treated as - if it was a reversed hexadecimal string - with each hexadecimal digit as a separate - label. The width field includes the label - separator. -

-

- For compatibility with earlier versions, - $$ is still recognized as - indicating a literal $ in the output. -

-
-

ttl

-
-

- Specifies the time-to-live of the generated records. If - not specified this will be inherited using the - normal TTL inheritance rules. -

-

class - and ttl can be - entered in either order. -

-
-

class

-
-

- Specifies the class of the generated records. - This must match the zone class if it is - specified. -

-

class - and ttl can be - entered in either order. -

-
-

type

-
-

- Any valid type. -

-
-

rhs

-
-

- rhs, optionally, quoted string. -

-
-
-

- The $GENERATE directive is a BIND extension - and not part of the standard zone file format. -

-
- -
-

-Additional File Formats

- -

- In addition to the standard textual format, BIND 9 - supports the ability to read or dump to zone files in - other formats. -

-

- The raw format is - a binary representation of zone data in a manner similar - to that used in zone transfers. Since it does not require - parsing text, load time is significantly reduced. -

-

- An even faster alternative is the map - format, which is an image of a BIND 9 - in-memory zone database; it is capable of being loaded - directly into memory via the mmap() - function; the zone can begin serving queries almost - immediately. -

-

- For a primary server, a zone file in - raw or map - format is expected to be generated from a textual zone - file by the named-compilezone command. - For a secondary server or for a dynamic zone, it is automatically - generated (if this format is specified by the - masterfile-format option) when - named dumps the zone contents after - zone transfer or when applying prior updates. -

-

- If a zone file in a binary format needs manual modification, - it first must be converted to a textual form by the - named-compilezone command. All - necessary modification should go to the text file, which - should then be converted to the binary form by the - named-compilezone command again. -

-

- Note that map format is extremely - architecture-specific. A map - file cannot be used on a system - with different pointer size, endianness or data alignment - than the system on which it was generated, and should in - general be used only inside a single system. - While raw format uses - network byte order and avoids architecture-dependent - data alignment so that it is as portable as - possible, it is also primarily expected to be used - inside the same single system. To export a - zone file in either raw or - map format, or make a - portable backup of such a file, conversion to - text format is recommended. -

-
-
- -
-

-BIND9 Statistics

- -

- BIND 9 maintains lots of statistics - information and provides several interfaces for users to - get access to the statistics. - The available statistics include all statistics counters - that were available in BIND 8 and - are meaningful in BIND 9, - and other information that is considered useful. -

- -

- The statistics information is categorized into the following - sections. -

- -
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

Incoming Requests

-
-

- The number of incoming DNS requests for each OPCODE. -

-
-

Incoming Queries

-
-

- The number of incoming queries for each RR type. -

-
-

Outgoing Queries

-
-

- The number of outgoing queries for each RR - type sent from the internal resolver. - Maintained per view. -

-
-

Name Server Statistics

-
-

- Statistics counters about incoming request processing. -

-
-

Zone Maintenance Statistics

-
-

- Statistics counters regarding zone maintenance - operations such as zone transfers. -

-
-

Resolver Statistics

-
-

- Statistics counters about name resolution - performed in the internal resolver. - Maintained per view. -

-
-

Cache DB RRsets

-
-

- Statistics counters related to cache contents; - maintained per view. -

-

- The "NXDOMAIN" counter is the number of names - that have been cached as nonexistent. - Counters named for RR types indicate the - number of active RRsets for each type in the cache - database. -

-

- If an RR type name is preceded by an exclamation - mark (!), it represents the number of records in the - cache which indicate that the type does not exist - for a particular name (this is also known as "NXRRSET"). - If an RR type name is preceded by a hash mark (#), it - represents the number of RRsets for this type that are - present in the cache but whose TTLs have expired; these - RRsets may only be used if stale answers are enabled. - If an RR type name is preceded by a tilde (~), it - represents the number of RRsets for this type that are - present in the cache database but are marked for garbage - collection; these RRsets cannot be used. -

-
-

Socket I/O Statistics

-
-

- Statistics counters about network related events. -

-
-
- -

- A subset of Name Server Statistics is collected and shown - per zone for which the server has the authority when - zone-statistics is set to - full (or yes - for backward compatibility. See the description of - zone-statistics in the section called “options Statement Definition and - Usage” - for further details. -

- -

- These statistics counters are shown with their zone and - view names. The view name is omitted when the server is - not configured with explicit views.

- -

- There are currently two user interfaces to get access to the - statistics. - One is in the plain text format dumped to the file specified - by the statistics-file configuration option. - The other is remotely accessible via a statistics channel - when the statistics-channels statement - is specified in the configuration file - (see the section called “statistics-channels Statement Grammar”.) -

- -
-

-The Statistics File

- -

- The text format statistics dump begins with a line, like: -

-

- +++ Statistics Dump +++ (973798949) -

-

- The number in parentheses is a standard - Unix-style timestamp, measured as seconds since January 1, 1970. - - Following - that line is a set of statistics information, which is categorized - as described above. - Each section begins with a line, like: -

- -

- ++ Name Server Statistics ++ -

- -

- Each section consists of lines, each containing the statistics - counter value followed by its textual description. - See below for available counters. - For brevity, counters that have a value of 0 are not shown - in the statistics file. -

- -

- The statistics dump ends with the line where the - number is identical to the number in the beginning line; for example: -

-

- --- Statistics Dump --- (973798949) -

-
- -
-

-Statistics Counters

- -

- The following tables summarize statistics counters that - BIND 9 provides. - For each row of the tables, the leftmost column is the - abbreviated symbol name of that counter. - These symbols are shown in the statistics information - accessed via an HTTP statistics channel. - The rightmost column gives the description of the counter, - which is also shown in the statistics file - (but, in this document, possibly with slight modification - for better readability). - Additional notes may also be provided in this column. - When a middle column exists between these two columns, - it gives the corresponding counter name of the - BIND 8 statistics, if applicable. -

- -

- Note: BIND statistics counters are signed 64-bit values on - all platforms except one: 32-bit Windows, where they are - signed 32-bit values. Given that 32-bit values have a - vastly smaller range than 64-bit values, BIND statistics - counters in 32-bit Windows builds overflow significantly - more quickly than on all other platforms. -

- -
-

-Name Server Statistics Counters

- -
- ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- Symbol -

-
-

- BIND8 Symbol -

-
-

- Description -

-
-

Requestv4

-
-

RQ

-
-

- IPv4 requests received. - Note: this also counts non query requests. -

-
-

Requestv6

-
-

RQ

-
-

- IPv6 requests received. - Note: this also counts non query requests. -

-
-

ReqEdns0

-
-

-
-

- Requests with EDNS(0) received. -

-
-

ReqBadEDNSVer

-
-

-
-

- Requests with unsupported EDNS version received. -

-
-

ReqTSIG

-
-

-
-

- Requests with TSIG received. -

-
-

ReqSIG0

-
-

-
-

- Requests with SIG(0) received. -

-
-

ReqBadSIG

-
-

-
-

- Requests with invalid (TSIG or SIG(0)) signature. -

-
-

ReqTCP

-
-

RTCP

-
-

- TCP requests received. -

-
-

AuthQryRej

-
-

RUQ

-
-

- Authoritative (non recursive) queries rejected. -

-
-

RecQryRej

-
-

RURQ

-
-

- Recursive queries rejected. -

-
-

XfrRej

-
-

RUXFR

-
-

- Zone transfer requests rejected. -

-
-

UpdateRej

-
-

RUUpd

-
-

- Dynamic update requests rejected. -

-
-

Response

-
-

SAns

-
-

- Responses sent. -

-
-

RespTruncated

-
-

-
-

- Truncated responses sent. -

-
-

RespEDNS0

-
-

-
-

- Responses with EDNS(0) sent. -

-
-

RespTSIG

-
-

-
-

- Responses with TSIG sent. -

-
-

RespSIG0

-
-

-
-

- Responses with SIG(0) sent. -

-
-

QrySuccess

-
-

-
-

- Queries resulted in a successful answer. - This means the query which returns a NOERROR response - with at least one answer RR. - This corresponds to the - success counter - of previous versions of - BIND 9. -

-
-

QryAuthAns

-
-

-
-

- Queries resulted in authoritative answer. -

-
-

QryNoauthAns

-
-

SNaAns

-
-

- Queries resulted in non authoritative answer. -

-
-

QryReferral

-
-

-
-

- Queries resulted in referral answer. - This corresponds to the - referral counter - of previous versions of - BIND 9. -

-
-

QryNxrrset

-
-

-
-

- Queries resulted in NOERROR responses with no data. - This corresponds to the - nxrrset counter - of previous versions of - BIND 9. -

-
-

QrySERVFAIL

-
-

SFail

-
-

- Queries resulted in SERVFAIL. -

-
-

QryFORMERR

-
-

SFErr

-
-

- Queries resulted in FORMERR. -

-
-

QryNXDOMAIN

-
-

SNXD

-
-

- Queries resulted in NXDOMAIN. - This corresponds to the - nxdomain counter - of previous versions of - BIND 9. -

-
-

QryRecursion

-
-

RFwdQ

-
-

- Queries which caused the server - to perform recursion in order to find the final answer. - This corresponds to the - recursion counter - of previous versions of - BIND 9. -

-
-

QryDuplicate

-
-

RDupQ

-
-

- Queries which the server attempted to - recurse but discovered an existing query with the same - IP address, port, query ID, name, type and class - already being processed. - This corresponds to the - duplicate counter - of previous versions of - BIND 9. -

-
-

QryDropped

-
-

-
-

- Recursive queries for which the server - discovered an excessive number of existing - recursive queries for the same name, type and - class and were subsequently dropped. - This is the number of dropped queries due to - the reason explained with the - clients-per-query - and - max-clients-per-query - options - (see the description about - clients-per-query.) - This corresponds to the - dropped counter - of previous versions of - BIND 9. -

-
-

QryFailure

-
-

-
-

- Other query failures. - This corresponds to the - failure counter - of previous versions of - BIND 9. - Note: this counter is provided mainly for - backward compatibility with the previous versions. - Normally a more fine-grained counters such as - AuthQryRej and - RecQryRej - that would also fall into this counter are provided, - and so this counter would not be of much - interest in practice. -

-
-

QryNXRedir

-
-

-
-

- Queries resulted in NXDOMAIN that were redirected. -

-
-

QryNXRedirRLookup

-
-

-
-

- Queries resulted in NXDOMAIN that were redirected - and resulted in a successful remote lookup. -

-
-

XfrReqDone

-
-

-
-

- Requested zone transfers completed. -

-
-

UpdateReqFwd

-
-

-
-

- Update requests forwarded. -

-
-

UpdateRespFwd

-
-

-
-

- Update responses forwarded. -

-
-

UpdateFwdFail

-
-

-
-

- Dynamic update forward failed. -

-
-

UpdateDone

-
-

-
-

- Dynamic updates completed. -

-
-

UpdateFail

-
-

-
-

- Dynamic updates failed. -

-
-

UpdateBadPrereq

-
-

-
-

- Dynamic updates rejected due to prerequisite failure. -

-
-

RateDropped

-
-

-
-

- Responses dropped by rate limits. -

-
-

RateSlipped

-
-

-
-

- Responses truncated by rate limits. -

-
-

RPZRewrites

-
-

-
-

- Response policy zone rewrites. -

-
-
-
- -
-

-Zone Maintenance Statistics Counters

- -
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- Symbol -

-
-

- Description -

-
-

NotifyOutv4

-
-

- IPv4 notifies sent. -

-
-

NotifyOutv6

-
-

- IPv6 notifies sent. -

-
-

NotifyInv4

-
-

- IPv4 notifies received. -

-
-

NotifyInv6

-
-

- IPv6 notifies received. -

-
-

NotifyRej

-
-

- Incoming notifies rejected. -

-
-

SOAOutv4

-
-

- IPv4 SOA queries sent. -

-
-

SOAOutv6

-
-

- IPv6 SOA queries sent. -

-
-

AXFRReqv4

-
-

- IPv4 AXFR requested. -

-
-

AXFRReqv6

-
-

- IPv6 AXFR requested. -

-
-

IXFRReqv4

-
-

- IPv4 IXFR requested. -

-
-

IXFRReqv6

-
-

- IPv6 IXFR requested. -

-
-

XfrSuccess

-
-

- Zone transfer requests succeeded. -

-
-

XfrFail

-
-

- Zone transfer requests failed. -

-
-
-
- -
-

-Resolver Statistics Counters

- -
- ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- Symbol -

-
-

- BIND8 Symbol -

-
-

- Description -

-
-

Queryv4

-
-

SFwdQ

-
-

- IPv4 queries sent. -

-
-

Queryv6

-
-

SFwdQ

-
-

- IPv6 queries sent. -

-
-

Responsev4

-
-

RR

-
-

- IPv4 responses received. -

-
-

Responsev6

-
-

RR

-
-

- IPv6 responses received. -

-
-

NXDOMAIN

-
-

RNXD

-
-

- NXDOMAIN received. -

-
-

SERVFAIL

-
-

RFail

-
-

- SERVFAIL received. -

-
-

FORMERR

-
-

RFErr

-
-

- FORMERR received. -

-
-

OtherError

-
-

RErr

-
-

- Other errors received. -

-
-

EDNS0Fail

-
-

-
-

- EDNS(0) query failures. -

-
-

Mismatch

-
-

RDupR

-
-

- Mismatch responses received. - The DNS ID, response's source address, - and/or the response's source port does not - match what was expected. - (The port must be 53 or as defined by - the port option.) - This may be an indication of a cache - poisoning attempt. -

-
-

Truncated

-
-

-
-

- Truncated responses received. -

-
-

Lame

-
-

RLame

-
-

- Lame delegations received. -

-
-

Retry

-
-

SDupQ

-
-

- Query retries performed. -

-
-

QueryAbort

-
-

-
-

- Queries aborted due to quota control. -

-
-

QuerySockFail

-
-

-
-

- Failures in opening query sockets. - One common reason for such failures is a - failure of opening a new socket due to a - limitation on file descriptors. -

-
-

QueryTimeout

-
-

-
-

- Query timeouts. -

-
-

GlueFetchv4

-
-

SSysQ

-
-

- IPv4 NS address fetches invoked. -

-
-

GlueFetchv6

-
-

SSysQ

-
-

- IPv6 NS address fetches invoked. -

-
-

GlueFetchv4Fail

-
-

-
-

- IPv4 NS address fetch failed. -

-
-

GlueFetchv6Fail

-
-

-
-

- IPv6 NS address fetch failed. -

-
-

ValAttempt

-
-

-
-

- DNSSEC validation attempted. -

-
-

ValOk

-
-

-
-

- DNSSEC validation succeeded. -

-
-

ValNegOk

-
-

-
-

- DNSSEC validation on negative information succeeded. -

-
-

ValFail

-
-

-
-

- DNSSEC validation failed. -

-
-

QryRTTnn

-
-

-
-

- Frequency table on round trip times (RTTs) of - queries. - Each nn specifies the corresponding - frequency. - In the sequence of - nn_1, - nn_2, - ..., - nn_m, - the value of nn_i is the - number of queries whose RTTs are between - nn_(i-1) (inclusive) and - nn_i (exclusive) milliseconds. - For the sake of convenience we define - nn_0 to be 0. - The last entry should be represented as - nn_m+, which means the - number of queries whose RTTs are equal to or over - nn_m milliseconds. -

-
-
- -
- -
-

-Socket I/O Statistics Counters

- -

- Socket I/O statistics counters are defined per socket - types, which are - UDP4 (UDP/IPv4), - UDP6 (UDP/IPv6), - TCP4 (TCP/IPv4), - TCP6 (TCP/IPv6), - Unix (Unix Domain), and - FDwatch (sockets opened outside the - socket module). - In the following table <TYPE> - represents a socket type. - Not all counters are available for all socket types; - exceptions are noted in the description field. -

- -
- ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-

- Symbol -

-
-

- Description -

-
-

<TYPE>Open

-
-

- Sockets opened successfully. - This counter is not applicable to the - FDwatch type. -

-
-

<TYPE>OpenFail

-
-

- Failures of opening sockets. - This counter is not applicable to the - FDwatch type. -

-
-

<TYPE>Close

-
-

- Sockets closed. -

-
-

<TYPE>BindFail

-
-

- Failures of binding sockets. -

-
-

<TYPE>ConnFail

-
-

- Failures of connecting sockets. -

-
-

<TYPE>Conn

-
-

- Connections established successfully. -

-
-

<TYPE>AcceptFail

-
-

- Failures of accepting incoming connection requests. - This counter is not applicable to the - UDP and - FDwatch types. -

-
-

<TYPE>Accept

-
-

- Incoming connections successfully accepted. - This counter is not applicable to the - UDP and - FDwatch types. -

-
-

<TYPE>SendErr

-
-

- Errors in socket send operations. - This counter corresponds - to SErr counter of - BIND 8. -

-
-

<TYPE>RecvErr

-
-

- Errors in socket receive operations. - This includes errors of send operations on a - connected UDP socket notified by an ICMP error - message. -

-
-
-
- -
-

-Compatibility with BIND 8 Counters

- -

- Most statistics counters that were available - in BIND 8 are also supported in - BIND 9 as shown in the above tables. - Here are notes about other counters that do not appear - in these tables. -

- -
-
RFwdR,SFwdR
-
-

- These counters are not supported - because BIND 9 does not adopt - the notion of forwarding - as BIND 8 did. -

-
-
RAXFR
-
-

- This counter is accessible in the Incoming Queries section. -

-
-
RIQ
-
-

- This counter is accessible in the Incoming Requests section. -

-
-
ROpts
-
-

- This counter is not supported - because BIND 9 does not care - about IP options in the first place. -

-
-
-
-
-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch06.html b/doc/arm/Bv9ARM.ch06.html deleted file mode 100644 index dae6762274..0000000000 --- a/doc/arm/Bv9ARM.ch06.html +++ /dev/null @@ -1,365 +0,0 @@ - - - - - -Chapter 6. BIND 9 Security Considerations - - - - - - - - -
-

-Chapter 6. BIND 9 Security Considerations

- - -
-

-Access Control Lists

- -

- Access Control Lists (ACLs) are address match lists that - you can set up and nickname for future use in - allow-notify, allow-query, - allow-query-on, allow-recursion, - blackhole, allow-transfer, - match-clients, etc. -

-

- Using ACLs allows you to have finer control over who can access - your name server, without cluttering up your config files with huge - lists of IP addresses. -

-

- It is a good idea to use ACLs, and to - control access to your server. Limiting access to your server by - outside parties can help prevent spoofing and denial of service - (DoS) attacks against your server. -

-

- ACLs match clients on the basis of up to three characteristics: - 1) The client's IP address; 2) the TSIG or SIG(0) key that was - used to sign the request, if any; and 3) an address prefix - encoded in an EDNS Client Subnet option, if any. -

-

- Here is an example of ACLs based on client addresses: -

- -
-// Set up an ACL named "bogusnets" that will block
-// RFC1918 space and some reserved space, which is
-// commonly used in spoofing attacks.
-acl bogusnets {
-        0.0.0.0/8;  192.0.2.0/24; 224.0.0.0/3;
-        10.0.0.0/8; 172.16.0.0/12; 192.168.0.0/16;
-};
-
-// Set up an ACL called our-nets. Replace this with the
-// real IP numbers.
-acl our-nets { x.x.x.x/24; x.x.x.x/21; };
-options {
-  ...
-  ...
-  allow-query { our-nets; };
-  allow-recursion { our-nets; };
-  ...
-  blackhole { bogusnets; };
-  ...
-};
-
-zone "example.com" {
-  type master;
-  file "m/example.com";
-  allow-query { any; };
-};
-
- -

- This allows authoritative queries for "example.com" from any - address, but recursive queries only from the networks specified - in "our-nets", and no queries at all from the networks - specified in "bogusnets". -

-

- In addition to network addresses and prefixes, which are - matched against the source address of the DNS request, ACLs - may include key elements, which specify the - name of a TSIG or SIG(0) key. -

-

- When BIND 9 is built with GeoIP support, - ACLs can also be used for geographic access restrictions. - This is done by specifying an ACL element of the form: - geoip [db database] field value -

-

- The field indicates which field - to search for a match. Available fields are "country", - "region", "city", "continent", "postal" (postal code), - "metro" (metro code), "area" (area code), "tz" (timezone), - "isp", "asnum", and "domain". -

-

- value is the value to search - for within the database. A string may be quoted if it - contains spaces or other special characters. An "asnum" - search for autonomous system number can be specified using - the string "ASNNNN" or the integer NNNN. - When "country" search is specified with a string is two - characters long, then it must be a standard ISO-3166-1 - two-letter country code; otherwise it is interpreted as - the full name of the country. Similarly, if this is a - "region" search and the string is two characters long, - then it treated as a standard two-letter state or province - abbreviation; otherwise it treated as the full name of the - state or province. -

-

- The database field indicates which - GeoIP database to search for a match. In most cases this is - unnecessary, because most search fields can only be found in - a single database. However, searches for "continent" or "country" - can be answered from either the "city" or "country" databases, - so for these search types, specifying a - database - will force the query to be answered from that database and no - other. If database is not - specified, then these queries will be answered from the "city", - database if it is installed, or the "country" database if it - is installed, in that order. Valid database names are - "country", "city", "asnum", "isp", and "domain". -

-

- Some example GeoIP ACLs: -

-
geoip country US;
-geoip country JP;
-geoip db country country Canada;
-geoip region WA;
-geoip city "San Francisco";
-geoip region Oklahoma;
-geoip postal 95062;
-geoip tz "America/Los_Angeles";
-geoip org "Internet Systems Consortium";
-
- -

- ACLs use a "first-match" logic rather than "best-match": - if an address prefix matches an ACL element, then that ACL - is considered to have matched even if a later element would - have matched more specifically. For example, the ACL - { 10/8; !10.0.0.1; } would actually - match a query from 10.0.0.1, because the first element - indicated that the query should be accepted, and the second - element is ignored. -

-

- When using "nested" ACLs (that is, ACLs included or referenced - within other ACLs), a negative match of a nested ACL will - the containing ACL to continue looking for matches. This - enables complex ACLs to be constructed, in which multiple - client characteristics can be checked at the same time. For - example, to construct an ACL which allows queries only when - it originates from a particular network and - only when it is signed with a particular key, use: -

-
-allow-query { !{ !10/8; any; }; key example; };
-
-

- Within the nested ACL, any address that is - not in the 10/8 network prefix will - be rejected, and this will terminate processing of the - ACL. Any address that is in the 10/8 - network prefix will be accepted, but this causes a negative - match of the nested ACL, so the containing ACL continues - processing. The query will then be accepted if it is signed - by the key "example", and rejected otherwise. The ACL, then, - will only matches when both conditions - are true. -

-
- -
-

-Chroot and Setuid -

- -

- On UNIX servers, it is possible to run BIND - in a chrooted environment (using - the chroot() function) by specifying - the -t option for named. - This can help improve system security by placing - BIND in a "sandbox", which will limit - the damage done if a server is compromised. -

-

- Another useful feature in the UNIX version of BIND is the - ability to run the daemon as an unprivileged user ( -u user ). - We suggest running as an unprivileged user when using the chroot feature. -

-

- Here is an example command line to load BIND in a chroot sandbox, - /var/named, and to run named setuid to - user 202: -

-

- /usr/local/sbin/named -u 202 -t /var/named -

- -
-

-The chroot Environment

- -

- In order for a chroot environment - to work properly in a particular directory (for example, - /var/named), you will need to set - up an environment that includes everything - BIND needs to run. From - BIND's point of view, - /var/named is the root of the - filesystem. You will need to adjust the values of - options like directory and - pid-file to account for this. -

-

- Unlike with earlier versions of BIND, you typically will - not need to compile named - statically nor install shared libraries under the new root. - However, depending on your operating system, you may need - to set up things like - /dev/zero, - /dev/random, - /dev/log, and - /etc/localtime. -

-
- -
-

-Using the setuid Function

- -

- Prior to running the named daemon, - use - the touch utility (to change file - access and - modification times) or the chown - utility (to - set the user id and/or group id) on files - to which you want BIND - to write. -

-
-

Note

-

- If the named daemon is running as an - unprivileged user, it will not be able to bind to new restricted - ports if the server is reloaded. -

-
-
-
- -
-

-Dynamic Update Security

- -

- Access to the dynamic - update facility should be strictly limited. In earlier versions of - BIND, the only way to do this was - based on the IP - address of the host requesting the update, by listing an IP address - or - network prefix in the allow-update - zone option. - This method is insecure since the source address of the update UDP - packet - is easily forged. Also note that if the IP addresses allowed by the - allow-update option include the - address of a slave - server which performs forwarding of dynamic updates, the master can - be - trivially attacked by sending the update to the slave, which will - forward it to the master with its own source IP address causing the - master to approve it without question. -

- -

- For these reasons, we strongly recommend that updates be - cryptographically authenticated by means of transaction signatures - (TSIG). That is, the allow-update - option should - list only TSIG key names, not IP addresses or network - prefixes. Alternatively, the new update-policy - option can be used. -

- -

- Some sites choose to keep all dynamically-updated DNS data - in a subdomain and delegate that subdomain to a separate zone. This - way, the top-level zone containing critical data such as the IP - addresses - of public web and mail servers need not allow dynamic update at - all. -

- -
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch07.html b/doc/arm/Bv9ARM.ch07.html deleted file mode 100644 index 8b48966a04..0000000000 --- a/doc/arm/Bv9ARM.ch07.html +++ /dev/null @@ -1,196 +0,0 @@ - - - - - -Chapter 7. Troubleshooting - - - - - - - - -
-

-Chapter 7. Troubleshooting

- - -
-

-Common Problems

- -
-

-It's not working; how can I figure out what's wrong?

- -

- The best solution to solving installation and - configuration issues is to take preventative measures by setting - up logging files beforehand. The log files provide a - source of hints and information that can be used to figure out - what went wrong and how to fix the problem. -

-
- -
-

-EDNS compliance issues

-

- EDNS (Extended DNS) is a standard that was first specified - in 1999. It is required for DNSSEC validation, DNS COOKIE - options, and other features. There are broken and outdated - DNS servers and firewalls still in use which misbehave when - queried with EDNS; for example, they may drop EDNS queries - rather than replying with FORMERR. BIND and other recursive - name servers have traditionally employed workarounds in this - situation, retrying queries in different ways and eventually - falling back to plain DNS queries without EDNS. -

-

- Such workarounds cause unnecessary resolution delays, - increase code complexity, and prevent deployment of new DNS - features. As of February 2019, all major DNS software vendors - have agreed to remove these workarounds; see - https://dnsflagday.net - for further details. This change was implemented in BIND - as of release 9.14.0. -

-

- As a result, some domains may be non-resolvable without manual - intervention. In these cases, resolution can be restored by - adding server clauses for the offending - servers, specifying edns no or - send-cookie no, depending on the specific - noncompliance. -

-

- To determine which server clause to use, - run the following commands to send queries to the authoritative - servers for the broken domain: -

-


-            dig soa <zone> @<server> +dnssec
-            dig soa <zone> @<server> +dnssec +nocookie
-            dig soa <zone> @<server> +noedns
-  

-

- If the first command fails but the second succeeds, the - server most likely needs send-cookie no. - If the first two fail but the third succeeds, then the server - needs EDNS to be fully disabled with edns no. -

-

- Please contact the administrators of noncompliant domains - and encourage them to upgrade their broken DNS servers. -

-
-
-
-

-Incrementing and Changing the Serial Number

- -

- Zone serial numbers are just numbers — they aren't - date related. A lot of people set them to a number that - represents a date, usually of the form YYYYMMDDRR. - Occasionally they will make a mistake and set them to a - "date in the future" then try to correct them by setting - them to the "current date". This causes problems because - serial numbers are used to indicate that a zone has been - updated. If the serial number on the slave server is - lower than the serial number on the master, the slave - server will attempt to update its copy of the zone. -

- -

- Setting the serial number to a lower number on the master - server than the slave server means that the slave will not perform - updates to its copy of the zone. -

- -

- The solution to this is to add 2147483647 (2^31-1) to the - number, reload the zone and make sure all slaves have updated to - the new zone serial number, then reset the number to what you want - it to be, and reload the zone again. -

- -
-
-

-Where Can I Get Help?

- -

- The Internet Systems Consortium - (ISC) offers a wide range - of support and service agreements for BIND and DHCP servers. Four - levels of premium support are available and each level includes - support for all ISC programs, - significant discounts on products - and training, and a recognized priority on bug fixes and - non-funded feature requests. In addition, ISC offers a standard - support agreement package which includes services ranging from bug - fix announcements to remote support. It also includes training in - BIND and DHCP. -

- -

- To discuss arrangements for support, contact - info@isc.org or visit the - ISC web page at - http://www.isc.org/services/support/ - to read more. -

-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch08.html b/doc/arm/Bv9ARM.ch08.html deleted file mode 100644 index cfc28d5ab6..0000000000 --- a/doc/arm/Bv9ARM.ch08.html +++ /dev/null @@ -1,379 +0,0 @@ - - - - - -Appendix A. Release Notes - - - - - - - - -
-

-Release Notes

- -
-

-Release Notes for BIND Version 9.17.1

- -
-

-Introduction

-

- BIND 9.17 is an unstable development release of BIND. - This document summarizes new features and functional changes that - have been introduced on this branch. With each development release - leading up to the stable BIND 9.18 release, this document will be - updated with additional features added and bugs fixed. -

-

- Please see the file CHANGES for a more - detailed list of changes and bug fixes. -

-
-
-

-Supported Platforms

-

- To build on UNIX-like systems, BIND requires support for POSIX.1c - threads (IEEE Std 1003.1c-1995), the Advanced Sockets API for - IPv6 (RFC 3542), and standard atomic operations provided by the - C compiler. -

-

- The libuv asynchronous I/O library and the - OpenSSL cryptography library must be available for the target - platform. A PKCS#11 provider can be used instead of OpenSSL for - Public Key cryptography (i.e., DNSSEC signing and validation), - but OpenSSL is still required for general cryptography operations - such as hashing and random number generation. -

-

- More information can be found in the PLATFORMS.md - file that is included in the source distribution of BIND 9. If your - compiler and system libraries provide the above features, BIND 9 - should compile and run. If that isn't the case, the BIND - development team will generally accept patches that add support - for systems that are still supported by their respective vendors. -

-
-
-

-Download

-

- The latest versions of BIND 9 software can always be found at - https://www.isc.org/download/. - There you will find additional information about each release, - source code, and pre-compiled versions for Microsoft Windows - operating systems. -

-
- -
-

-Notes for BIND 9.17.1

- -
-

-Security Fixes

-
  • -

    - DNS rebinding protection was ineffective when BIND 9 is configured as - a forwarding DNS server. Found and responsibly reported by Tobias - Klein. [GL #1574] -

    -
-
- -
-

-Known Issues

-
  • -

    - We have received reports that in some circumstances, receipt of an - IXFR can cause the processing of queries to slow significantly. Some - of these were related to RPZ processing, which has been fixed in this - release (see below). Others appear to occur where there are - NSEC3-related changes (such as an operator changing the NSEC3 salt - used in the hash calculation). These are being investigated. - [GL #1685] -

    -
-
- -
-

-New Features

-
  • -

    - A new option, nsdname-wait-recurse, has been added - to the response-policy clause in the configuration - file. When set to no, RPZ NSDNAME rules are only - applied if the authoritative nameservers for the query name have been - looked up and are present in the cache. If this information is not - present, the RPZ NSDNAME rules are ignored, but the information is - looked up in the background and applied to subsequent queries. The - default is yes, meaning that RPZ NSDNAME rules - should always be applied, even if the information needs to be looked - up first. [GL #1138] -

    -
-
- -
-

-Feature Changes

-
  • -

    - The previous DNSSEC sign statistics used lots of memory. The number of - keys to track is reduced to four per zone, which should be enough for - 99% of all signed zones. [GL #1179] -

    -
-
- -
-

-Bug Fixes

-
    -
  • -

    - When an RPZ policy zone was updated via zone transfer and a large - number of records was deleted, named could become - nonresponsive for a short period while deleted names were removed from - the RPZ summary database. This database cleanup is now done - incrementally over a longer period of time, reducing such delays. - [GL #1447] -

    -
  • -
  • -

    - When trying to migrate an already-signed zone from - auto-dnssec maintain to one based on - dnssec-policy, the existing keys were immediately - deleted and replaced with new ones. As the key rollover timing - constraints were not being followed, it was possible that some clients - would not have been able to validate responses until all old DNSSEC - information had timed out from caches. BIND now looks at the time - metadata of the existing keys and incorporates it into its DNSSEC - policy operation. [GL #1706] -

    -
  • -
-
- -
-
-

-Notes for BIND 9.17.0

- -
-

-Known Issues

-
  • -

    - UDP network ports used for listening can no longer simultaneously be - used for sending traffic. An example configuration which triggers - this issue would be one which uses the same - address:port pair for - listen-on(-v6) statements as for - notify-source(-v6) or - transfer-source(-v6). While this issue affects all - operating systems, it only triggers log messages (e.g. "unable to - create dispatch for reserved port") on some of them. There are - currently no plans to make such a combination of settings work again. -

    -
-
- -
-

-New Features

-
    -
  • -

    - When a secondary server receives a large incremental zone - transfer (IXFR), it can have a negative impact on query - performance while the incremental changes are applied to - the zone. To address this, named can now - limit the size of IXFR responses it sends in response to zone - transfer requests. If an IXFR response would be larger than an - AXFR of the entire zone, it will send an AXFR response instead. -

    -

    - This behavior is controlled by the max-ixfr-ratio - option - a percentage value representing the ratio of IXFR size - to the size of a full zone transfer. The default is - 100%. [GL #1515] -

    -
  • -
  • -

    - A new RPZ option nsdname-wait-recurse - controls whether RPZ-NSDNAME rules should always be applied - even if the names of authoritative name servers for the query - name need to be looked up recurively first. The default is - yes. Setting it to - no speeds up initial responses by skipping - RPZ-NSDNAME rules when name server domain names are not yet - in the cache. The names will be looked up in the background and - the rule will be applied for subsequent queries. [GL #1138] -

    -
  • -
-
- -
-

-Feature Changes

-
    -
  • -

    - The system-provided POSIX Threads read-write lock implementation is - now used by default instead of the native BIND 9 implementation. - Please be aware that glibc versions 2.26 through 2.29 had a - bug - that could cause BIND 9 to deadlock. A fix was released in glibc 2.30, - and most current Linux distributions have patched or updated glibc, - with the notable exception of Ubuntu 18.04 (Bionic) which is a work in - progress. If you are running on an affected operating system, compile - BIND 9 with --disable-pthread-rwlock until a fixed - version of glibc is available. [GL !3125] -

    -
  • -
  • -

    - The rndc nta -dump and - rndc secroots commands now both include - validate-except entries when listing negative - trust anchors. These are indicated by the keyword - permanent in place of the expiry - date. [GL #1532] -

    -
  • -
-
- -
-

-Bug Fixes

-
  • -

    - Fixed re-signing issues with inline zones which resulted in - records being re-signed late or not at all. -

    -
-
- -
- -
-

-License

-

- BIND 9 is open source software licensed under the terms of the Mozilla - Public License, version 2.0 (see the LICENSE - file for the full text). -

-

- The license requires that if you make changes to BIND and distribute - them outside your organization, those changes must be published under - the same license. It does not require that you publish or disclose - anything other than the changes you have made to our software. This - requirement does not affect anyone who is using BIND, with or without - modifications, without redistributing it, nor anyone redistributing - BIND without changes. -

-

- Those wishing to discuss license compliance may contact ISC at - - https://www.isc.org/contact/. -

-
-
-

-End of Life

-

- BIND 9.17 is an unstable development branch. When its development - is complete, it will be renamed to BIND 9.18, which will be a - stable branch. -

-

- The end of life date for BIND 9.18 has not yet been determined. - For those needing long term support, the current Extended Support - Version (ESV) is BIND 9.11, which will be supported until at - least December 2021. -

-

- See - https://kb.isc.org/docs/aa-00896 - for details of ISC's software support policy. -

-
-
-

-Thank You

-

- Thank you to everyone who assisted us in making this release possible. -

-
-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch09.html b/doc/arm/Bv9ARM.ch09.html deleted file mode 100644 index 41e3557d5e..0000000000 --- a/doc/arm/Bv9ARM.ch09.html +++ /dev/null @@ -1,153 +0,0 @@ - - - - - -Appendix B. A Brief History of the DNS and BIND - - - - - - - - -
-

-A Brief History of the DNS and BIND -

-

- Although the "official" beginning of the Domain Name - System occurred in 1984 with the publication of RFC 920, the - core of the new system was described in 1983 in RFCs 882 and - 883. From 1984 to 1987, the ARPAnet (the precursor to today's - Internet) became a testbed of experimentation for developing the - new naming/addressing scheme in a rapidly expanding, - operational network environment. New RFCs were written and - published in 1987 that modified the original documents to - incorporate improvements based on the working model. RFC 1034, - "Domain Names-Concepts and Facilities", and RFC 1035, "Domain - Names-Implementation and Specification" were published and - became the standards upon which all DNS implementations are - built. -

- -

- The first working domain name server, called "Jeeves", was - written in 1983-84 by Paul Mockapetris for operation on DEC - Tops-20 - machines located at the University of Southern California's - Information - Sciences Institute (USC-ISI) and SRI International's Network - Information - Center (SRI-NIC). A DNS server for - Unix machines, the Berkeley Internet - Name Domain (BIND) package, was - written soon after by a group of - graduate students at the University of California at Berkeley - under - a grant from the US Defense Advanced Research Projects - Administration - (DARPA). -

-

- Versions of BIND through - 4.8.3 were maintained by the Computer - Systems Research Group (CSRG) at UC Berkeley. Douglas Terry, Mark - Painter, David Riggle and Songnian Zhou made up the initial BIND - project team. After that, additional work on the software package - was done by Ralph Campbell. Kevin Dunlap, a Digital Equipment - Corporation - employee on loan to the CSRG, worked on BIND for 2 years, from 1985 - to 1987. Many other people also contributed to BIND development - during that time: Doug Kingston, Craig Partridge, Smoot - Carl-Mitchell, - Mike Muuss, Jim Bloom and Mike Schwartz. BIND maintenance was subsequently - handled by Mike Karels and Øivind Kure. -

-

- BIND versions 4.9 and 4.9.1 were - released by Digital Equipment - Corporation (now Compaq Computer Corporation). Paul Vixie, then - a DEC employee, became BIND's - primary caretaker. He was assisted - by Phil Almquist, Robert Elz, Alan Barrett, Paul Albitz, Bryan - Beecher, Andrew - Partan, Andy Cherenson, Tom Limoncelli, Berthold Paffrath, Fuat - Baran, Anant Kumar, Art Harkin, Win Treese, Don Lewis, Christophe - Wolfhugel, and others. -

-

- In 1994, BIND version 4.9.2 was sponsored by - Vixie Enterprises. Paul - Vixie became BIND's principal - architect/programmer. -

-

- BIND versions from 4.9.3 onward - have been developed and maintained - by the Internet Systems Consortium and its predecessor, - the Internet Software Consortium, with support being provided - by ISC's sponsors. -

-

- As co-architects/programmers, Bob Halley and - Paul Vixie released the first production-ready version of - BIND version 8 in May 1997. -

-

- BIND version 9 was released in September 2000 and is a - major rewrite of nearly all aspects of the underlying - BIND architecture. -

-

- BIND versions 4 and 8 are officially deprecated. - No additional development is done - on BIND version 4 or BIND version 8. -

-

- BIND development work is made - possible today by the sponsorship - of several corporations, and by the tireless work efforts of - numerous individuals. -

-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch10.html b/doc/arm/Bv9ARM.ch10.html deleted file mode 100644 index 9be6a0cfca..0000000000 --- a/doc/arm/Bv9ARM.ch10.html +++ /dev/null @@ -1,940 +0,0 @@ - - - - - -Appendix C. General DNS Reference Information - - - - - - - - -
-

-General DNS Reference Information

- - -
-

-IPv6 addresses (AAAA)

- -

- IPv6 addresses are 128-bit identifiers for interfaces and - sets of interfaces which were introduced in the DNS to facilitate - scalable Internet routing. There are three types of addresses: Unicast, - an identifier for a single interface; - Anycast, - an identifier for a set of interfaces; and Multicast, - an identifier for a set of interfaces. Here we describe the global - Unicast address scheme. For more information, see RFC 3587, - "Global Unicast Address Format." -

-

- IPv6 unicast addresses consist of a - global routing prefix, a - subnet identifier, and an - interface identifier. -

-

- The global routing prefix is provided by the - upstream provider or ISP, and (roughly) corresponds to the - IPv4 network section - of the address range. - - The subnet identifier is for local subnetting, much the - same as subnetting an - IPv4 /16 network into /24 subnets. - - The interface identifier is the address of an individual - interface on a given network; in IPv6, addresses belong to - interfaces rather than to machines. -

-

- The subnetting capability of IPv6 is much more flexible than - that of IPv4: subnetting can be carried out on bit boundaries, - in much the same way as Classless InterDomain Routing - (CIDR), and the DNS PTR representation ("nibble" format) - makes setting up reverse zones easier. -

-

- The Interface Identifier must be unique on the local link, - and is usually generated automatically by the IPv6 - implementation, although it is usually possible to - override the default setting if necessary. A typical IPv6 - address might look like: - 2001:db8:201:9:a00:20ff:fe81:2b32 -

-

- IPv6 address specifications often contain long strings - of zeros, so the architects have included a shorthand for - specifying - them. The double colon (`::') indicates the longest possible - string - of zeros that can fit, and can be used only once in an address. -

-
-
-

-Bibliography (and Suggested Reading)

- -
-

-Request for Comments (RFCs)

- -

- Specification documents for the Internet protocol suite, including - the DNS, are published as part of - the Request for Comments (RFCs) - series of technical notes. The standards themselves are defined - by the Internet Engineering Task Force (IETF) and the Internet - Engineering Steering Group (IESG). RFCs can be obtained online via FTP at: -

-

- - ftp://www.isi.edu/in-notes/RFCxxxx.txt - -

-

- (where xxxx is - the number of the RFC). RFCs are also available via the Web at: -

-

- http://www.ietf.org/rfc/. -

-
-

-
-

-Standards

- - -
-

[RFC974] - - C. Partridge. - Mail Routing and the Domain System. - January 1986. -

-
-
-

[RFC1034] - - P.V. Mockapetris. - Domain Names — Concepts and Facilities. - November 1987. -

-
-
-

[RFC1035] - - P. V. Mockapetris. Domain Names — Implementation and - Specification. - November 1987. -

-
-
-
-

-Proposed Standards

- - -
-

[RFC2181] - - R., R. Bush Elz. - Clarifications to the DNS - Specification. - July 1997. -

-
-
-

[RFC2308] - - M. Andrews. - Negative Caching of DNS - Queries. - March 1998. -

-
-
-

[RFC1995] - - M. Ohta. - Incremental Zone Transfer in DNS. - August 1996. -

-
-
-

[RFC1996] - - P. Vixie. - A Mechanism for Prompt Notification of Zone Changes. - August 1996. -

-
-
-

[RFC2136] - - P. Vixie, S. Thomson, Y. Rekhter, and J. Bound. - Dynamic Updates in the Domain Name System. - April 1997. -

-
-
-

[RFC2671] - - P. Vixie. - Extension Mechanisms for DNS (EDNS0). - August 1997. -

-
-
-

[RFC2672] - - M. Crawford. - Non-Terminal DNS Name Redirection. - August 1999. -

-
-
-

[RFC2845] - - P. Vixie, O. Gudmundsson, D. Eastlake, 3rd, and B. Wellington. - Secret Key Transaction Authentication for DNS (TSIG). - May 2000. -

-
-
-

[RFC2930] - - D. Eastlake, 3rd. - Secret Key Establishment for DNS (TKEY RR). - September 2000. -

-
-
-

[RFC2931] - - D. Eastlake, 3rd. - DNS Request and Transaction Signatures (SIG(0)s). - September 2000. -

-
-
-

[RFC3007] - - B. Wellington. - Secure Domain Name System (DNS) Dynamic Update. - November 2000. -

-
-
-

[RFC3645] - - S. Kwan, P. Garg, J. Gilroy, L. Esibov, J. Westhead, and R. Hall. - Generic Security Service Algorithm for Secret - Key Transaction Authentication for DNS - (GSS-TSIG). - October 2003. -

-
-
-
-

-DNS Security Proposed Standards

- -
-

[RFC3225] - - D. Conrad. - Indicating Resolver Support of DNSSEC. - December 2001. -

-
-
-

[RFC3833] - - D. Atkins and R. Austein. - Threat Analysis of the Domain Name System (DNS). - August 2004. -

-
-
-

[RFC4033] - - R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. - DNS Security Introduction and Requirements. - March 2005. -

-
-
-

[RFC4034] - - R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. - Resource Records for the DNS Security Extensions. - March 2005. -

-
-
-

[RFC4035] - - R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. - Protocol Modifications for the DNS - Security Extensions. - March 2005. -

-
-
-
-

-Other Important RFCs About DNS - Implementation

- -
-

[RFC1535] - - E. Gavron. - A Security Problem and Proposed Correction With Widely - Deployed DNS Software. - October 1993. -

-
-
-

[RFC1536] - - A. Kumar, J. Postel, C. Neuman, P. Danzig, and S. Miller. - Common DNS Implementation - Errors and Suggested Fixes. - October 1993. -

-
-
-

[RFC1982] - - R. Elz and R. Bush. - Serial Number Arithmetic. - August 1996. -

-
-
-

[RFC4074] - - Y. Morishita and T. Jinmei. - Common Misbehaviour Against DNS - Queries for IPv6 Addresses. - May 2005. -

-
-
-
-

-Resource Record Types

- -
-

[RFC1183] - - C.F. Everhart, L. A. Mamakos, R. Ullmann, and P. Mockapetris. - New DNS RR Definitions. - October 1990. -

-
-
-

[RFC1706] - - B. Manning and R. Colella. - DNS NSAP Resource Records. - October 1994. -

-
-
-

[RFC2168] - - R. Daniel and M. Mealling. - Resolution of Uniform Resource Identifiers using - the Domain Name System. - June 1997. -

-
-
-

[RFC1876] - - C. Davis, P. Vixie, T., and I. Dickinson. - A Means for Expressing Location Information in the - Domain - Name System. - January 1996. -

-
-
-

[RFC2052] - - A. Gulbrandsen and P. Vixie. - A DNS RR for Specifying the - Location of - Services. - October 1996. -

-
-
-

[RFC2163] - - A. Allocchio. - Using the Internet DNS to - Distribute MIXER - Conformant Global Address Mapping. - January 1998. -

-
-
-

[RFC2230] - - R. Atkinson. - Key Exchange Delegation Record for the DNS. - October 1997. -

-
-
-

[RFC2536] - - D. Eastlake, 3rd. - DSA KEYs and SIGs in the Domain Name System (DNS). - March 1999. -

-
-
-

[RFC2537] - - D. Eastlake, 3rd. - RSA/MD5 KEYs and SIGs in the Domain Name System (DNS). - March 1999. -

-
-
-

[RFC2538] - - D. Eastlake, 3rd and O. Gudmundsson. - Storing Certificates in the Domain Name System (DNS). - March 1999. -

-
-
-

[RFC2539] - - D. Eastlake, 3rd. - Storage of Diffie-Hellman Keys in the Domain Name System (DNS). - March 1999. -

-
-
-

[RFC2540] - - D. Eastlake, 3rd. - Detached Domain Name System (DNS) Information. - March 1999. -

-
-
-

[RFC2782] - - A. Gulbrandsen. - P. Vixie. - L. Esibov. - A DNS RR for specifying the location of services (DNS SRV). - February 2000. -

-
-
-

[RFC2915] - - M. Mealling. - R. Daniel. - The Naming Authority Pointer (NAPTR) DNS Resource Record. - September 2000. -

-
-
-

[RFC3110] - - D. Eastlake, 3rd. - RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS). - May 2001. -

-
-
-

[RFC3123] - - P. Koch. - A DNS RR Type for Lists of Address Prefixes (APL RR). - June 2001. -

-
-
-

[RFC3596] - - S. Thomson, C. Huitema, V. Ksinant, and M. Souissi. - DNS Extensions to support IP - version 6. - October 2003. -

-
-
-

[RFC3597] - - A. Gustafsson. - Handling of Unknown DNS Resource Record (RR) Types. - September 2003. -

-
-
-
-

-DNS and the Internet

- -
-

[RFC1101] - - P. V. Mockapetris. - DNS Encoding of Network Names - and Other Types. - April 1989. -

-
-
-

[RFC1123] - - Braden. - Requirements for Internet Hosts - Application and - Support. - October 1989. -

-
-
-

[RFC1591] - - J. Postel. - Domain Name System Structure and Delegation. - March 1994. -

-
-
-

[RFC2317] - - H. Eidnes, G. de Groot, and P. Vixie. - Classless IN-ADDR.ARPA Delegation. - March 1998. -

-
-
-

[RFC2826] - - Internet Architecture Board. - IAB Technical Comment on the Unique DNS Root. - May 2000. -

-
-
-

[RFC2929] - - D. Eastlake, 3rd, E. Brunner-Williams, and B. Manning. - Domain Name System (DNS) IANA Considerations. - September 2000. -

-
-
-
-

-DNS Operations

- -
-

[RFC1033] - - M. Lottor. - Domain administrators operations guide. - November 1987. -

-
-
-

[RFC1537] - - P. Beertema. - Common DNS Data File - Configuration Errors. - October 1993. -

-
-
-

[RFC1912] - - D. Barr. - Common DNS Operational and - Configuration Errors. - February 1996. -

-
-
-

[RFC2010] - - B. Manning and P. Vixie. - Operational Criteria for Root Name Servers. - October 1996. -

-
-
-

[RFC2219] - - M. Hamilton and R. Wright. - Use of DNS Aliases for - Network Services. - October 1997. -

-
-
-
-

-Internationalized Domain Names

- -
-

[RFC2825] - - IAB and R. Daigle. - A Tangled Web: Issues of I18N, Domain Names, - and the Other Internet protocols. - May 2000. -

-
-
-

[RFC3490] - - P. Faltstrom, P. Hoffman, and A. Costello. - Internationalizing Domain Names in Applications (IDNA). - March 2003. -

-
-
-

[RFC3491] - - P. Hoffman and M. Blanchet. - Nameprep: A Stringprep Profile for Internationalized Domain Names. - March 2003. -

-
-
-

[RFC3492] - - A. Costello. - Punycode: A Bootstring encoding of Unicode - for Internationalized Domain Names in - Applications (IDNA). - March 2003. -

-
-
-
-

-Other DNS-related RFCs

- -
-

Note

-

- Note: the following list of RFCs, although - DNS-related, are not - concerned with implementing software. -

-
-
-

[RFC1464] - - R. Rosenbaum. - Using the Domain Name System To Store Arbitrary String - Attributes. - May 1993. -

-
-
-

[RFC1713] - - A. Romao. - Tools for DNS Debugging. - November 1994. -

-
-
-

[RFC1794] - - T. Brisco. - DNS Support for Load - Balancing. - April 1995. -

-
-
-

[RFC2240] - - O. Vaughan. - A Legal Basis for Domain Name Allocation. - November 1997. -

-
-
-

[RFC2345] - - J. Klensin, T. Wolf, and G. Oglesby. - Domain Names and Company Name Retrieval. - May 1998. -

-
-
-

[RFC2352] - - O. Vaughan. - A Convention For Using Legal Names as Domain Names. - May 1998. -

-
-
-

[RFC3071] - - J. Klensin. - Reflections on the DNS, RFC 1591, and Categories of Domains. - February 2001. -

-
-
-

[RFC3258] - - T. Hardie. - Distributing Authoritative Name Servers via - Shared Unicast Addresses. - April 2002. -

-
-
-

[RFC3901] - - A. Durand and J. Ihren. - DNS IPv6 Transport Operational Guidelines. - September 2004. -

-
-
-
-

-Obsolete and Unimplemented Experimental RFC

- -
-

[RFC1712] - - C. Farrell, M. Schulze, S. Pleitner, and D. Baldoni. - DNS Encoding of Geographical - Location. - November 1994. -

-
-
-

[RFC2673] - - M. Crawford. - Binary Labels in the Domain Name System. - August 1999. -

-
-
-

[RFC2874] - - M. Crawford and C. Huitema. - DNS Extensions to Support IPv6 Address Aggregation - and Renumbering. - July 2000. -

-
-
-
-

-Obsoleted DNS Security RFCs

- -
-

Note

-

- Most of these have been consolidated into RFC4033, - RFC4034 and RFC4035 which collectively describe DNSSECbis. -

-
-
-

[RFC2065] - - D. Eastlake, 3rd and C. Kaufman. - Domain Name System Security Extensions. - January 1997. -

-
-
-

[RFC2137] - - D. Eastlake, 3rd. - Secure Domain Name System Dynamic Update. - April 1997. -

-
-
-

[RFC2535] - - D. Eastlake, 3rd. - Domain Name System Security Extensions. - March 1999. -

-
-
-

[RFC3008] - - B. Wellington. - Domain Name System Security (DNSSEC) - Signing Authority. - November 2000. -

-
-
-

[RFC3090] - - E. Lewis. - DNS Security Extension Clarification on Zone Status. - March 2001. -

-
-
-

[RFC3445] - - D. Massey and S. Rose. - Limiting the Scope of the KEY Resource Record (RR). - December 2002. -

-
-
-

[RFC3655] - - B. Wellington and O. Gudmundsson. - Redefinition of DNS Authenticated Data (AD) bit. - November 2003. -

-
-
-

[RFC3658] - - O. Gudmundsson. - Delegation Signer (DS) Resource Record (RR). - December 2003. -

-
-
-

[RFC3755] - - S. Weiler. - Legacy Resolver Compatibility for Delegation Signer (DS). - May 2004. -

-
-
-

[RFC3757] - - O. Kolkman, J. Schlyter, and E. Lewis. - Domain Name System KEY (DNSKEY) Resource Record - (RR) Secure Entry Point (SEP) Flag. - April 2004. -

-
-
-

[RFC3845] - - J. Schlyter. - DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format. - August 2004. -

-
-
-
-
-
-

-Internet Drafts

- -

- Internet Drafts (IDs) are rough-draft working documents of - the Internet Engineering Task Force. They are, in essence, RFCs - in the preliminary stages of development. Implementors are - cautioned not - to regard IDs as archival, and they should not be quoted or cited - in any formal documents unless accompanied by the disclaimer that - they are "works in progress." IDs have a lifespan of six months - after which they are deleted unless updated by their authors. -

-
-
-

-Other Documents About BIND -

- -

-
-

-
-

- Paul Albitz and Cricket Liu. - DNS and BIND. - Copyright © 1998 Sebastopol, CA: O'Reilly and Associates. -

-
-
-
-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch11.html b/doc/arm/Bv9ARM.ch11.html deleted file mode 100644 index 3a681e51d0..0000000000 --- a/doc/arm/Bv9ARM.ch11.html +++ /dev/null @@ -1,543 +0,0 @@ - - - - - -Appendix D. BIND 9 DNS Library Support - - - - - - - - -
-

-BIND 9 DNS Library Support

- -
-

-BIND 9 DNS Library Support

- -

- This version of BIND 9 "exports" its internal libraries so - that they can be used by third-party applications more easily (we - call them "export" libraries in this document). Certain library - functions are altered from specific BIND-only behavior to more generic - behavior when used by other applications; to enable this generic behavior, - the calling program initializes the libraries by calling - isc_lib_register(). -

-

- In addition to DNS-related APIs that are used within BIND 9, the - libraries provide the following features: -

-
    -
  • -

    - The "DNS client" module. This is a higher level API that - provides an interface to name resolution, single DNS transaction - with a particular server, and dynamic update. Regarding name - resolution, it supports advanced features such as DNSSEC validation - and caching. This module supports both synchronous and asynchronous - mode. -

    -
  • -
  • -

    - The "IRS" (Information Retrieval System) library. It provides an - interface to parse the traditional resolv.conf - file and more advanced, DNS-specific configuration file for the - rest of this package (see the description for the - dns.conf file below). -

    -
  • -
  • -

    - As part of the IRS library, the standard address-name - mapping functions, getaddrinfo() and - getnameinfo(), are provided. They use the - DNSSEC-aware validating resolver backend, and could use other - advanced features of the BIND 9 libraries such as caching. The - getaddrinfo() function resolves both A - and AAAA RRs concurrently when the address family is - unspecified. -

    -
  • -
  • -

    - An experimental framework to support other event - libraries than BIND 9's internal event task system. -

    -
  • -
-
-

-Installation

- -
-$ make install
-    
-

- Normal installation of BIND will also install library object - and header files. Root privilege is normally required. -

-

- To see how to build your own application after the installation, see - lib/samples/Makefile-postinstall.in. -

-
-
-

-Known Defects/Restrictions

- -
    -
  • -

    - The "fixed" RRset order is not (currently) supported in the export - library. If you want to use "fixed" RRset order for, e.g. - named while still building the export library - even without the fixed order support, build them separately: -

    -
    -$ ./configure --enable-fixed-rrset [other flags, but not --enable-exportlib]
    -$ make
    -$ ./configure --enable-exportlib [other flags, but not --enable-fixed-rrset]
    -$ cd lib/export
    -$ make
    -
    -

    -

    -
  • -
  • -

    - RFC 5011 is not supported in the validating stub resolver of the - export library. In fact, it is not clear whether it should: trust - anchors would be a system-wide configuration which would be managed - by an administrator, while the stub resolver will be used by - ordinary applications run by a normal user. -

    -
  • -
  • -

    - Not all common /etc/resolv.conf options are - supported in the IRS library. The only available options in this - version are debug and ndots. -

    -
  • -
-
-
-

-The dns.conf File

- -

- The IRS library supports an "advanced" configuration file related to - the DNS library for configuration parameters that would be beyond the - capability of the resolv.conf file. - Specifically, it is intended to provide DNSSEC related configuration - parameters. By default the path to this configuration file is - /etc/dns.conf. This module is very experimental - and the configuration syntax or library interfaces may change in - future versions. Currently, only static key configuration is supported. - managed-keys and trusted-keys - statements are parsed exactly as they are in - named.conf, except that all - managed-keys entries will be treated as - if they were configured with the static-key - or static-ds keywords, even if they are configured - with initial-key or iniital-ds. - (See the section called “managed-keys Statement Grammar” for syntax details.) -

-
-
-

-Sample Applications

- -

- Some sample application programs using this API are provided for - reference. The following is a brief description of these - applications. -

-
-

-sample: a simple stub resolver utility

- -

- Sends a query of a given name (of a given optional RR type) to a - specified recursive server and prints the result as a list of RRs. - It can also act as a validating stub resolver if a trust anchor is - given via a set of command line options. -

-

- Usage: sample [options] server_address hostname -

-

- Options and Arguments: -

-
-
-t RRtype
-
-

- specify the RR type of the query. The default is the A RR. -

-
-
[-a algorithm] [-e] -k keyname -K keystring
-
-

- specify a command-line DNS key to validate the answer. For - example, to specify the following DNSKEY of example.com: -

-


-               example.com. 3600 IN DNSKEY 257 3 5 xxx
-       

-

- specify the options as follows: -

-
--e -k example.com -K "xxx"
-	      
-

- -e means that this key is a zone's "key signing key" (also known - as "secure entry point"). - When -a is omitted rsasha1 will be used by default. -

-
-
-s domain:alt_server_address
-
-

- specify a separate recursive server address for the specific - "domain". Example: -s example.com:2001:db8::1234 -

-
-
server_address
-
-

- an IP(v4/v6) address of the recursive server to which queries - are sent. -

-
-
hostname
-
-

- the domain name for the query -

-
-
-
-
-

-sample-async: a simple stub resolver, working asynchronously

- -

- Similar to "sample", but accepts a list - of (query) domain names as a separate file and resolves the names - asynchronously.

-

- Usage: sample-async [-s server_address] [-t RR_type] input_file

-

- Options and Arguments: -

-
-
-s server_address
-
- an IPv4 address of the recursive server to which queries are sent. - (IPv6 addresses are not supported in this implementation) -
-
-t RR_type
-
- specify the RR type of the queries. The default is the A - RR. -
-
input_file
-
- a list of domain names to be resolved. each line consists of a - single domain name. Example: -


-      www.example.com
-      mx.example.net
-      ns.xxx.example
-      

-
-
-
-
-

-sample-request: a simple DNS transaction client

- -

- Sends a query to a specified server, and prints the response with - minimal processing. It doesn't act as a "stub resolver": it stops - the processing once it gets any response from the server, whether - it's a referral or an alias (CNAME or DNAME) that would require - further queries to get the ultimate answer. In other words, this - utility acts as a very simplified dig. -

-

- Usage: sample-request [-t RRtype] server_address hostname -

-

- Options and Arguments: -

-
-
-t RRtype
-
-

- specify the RR type of the queries. The default is the A RR. -

-
-
server_address
-
-

- an IP(v4/v6) address of the recursive server to which - the query is sent. -

-
-
hostname
-
-

- the domain name for the query -

-
-
-
-
-

-sample-gai: getaddrinfo() and getnameinfo() test code

- -

- This is a test program to check getaddrinfo() and - getnameinfo() behavior. It takes a host name as an - argument, calls getaddrinfo() with the given host - name, and calls getnameinfo() with the resulting - IP addresses returned by getaddrinfo(). If the - dns.conf file exists and defines a trust anchor, the underlying - resolver will act as a validating resolver, and - getaddrinfo()/getnameinfo() - will fail with an EAI_INSECUREDATA error when DNSSEC validation - fails. -

-

- Usage: sample-gai hostname -

-
-
-

-sample-update: a simple dynamic update client program

- -

- Accepts a single update command as a command-line argument, sends - an update request message to the authoritative server, and shows - the response from the server. In other words, this is a simplified - nsupdate. -

-

- Usage: sample-update [options] (add|delete) "update data" -

-

- Options and Arguments: -

-
-
-a auth_server
-
-

- An IP address of the authoritative server that has authority - for the zone containing the update name. This should - normally be the primary authoritative server that accepts - dynamic updates. It can also be a secondary server that is - configured to forward update requests to the primary server. -

-
-
-k keyfile
-
-

- A TSIG key file to secure the update transaction. The - keyfile format is the same as that for the nsupdate utility. -

-
-
-p prerequisite
-
-

- A prerequisite for the update (only one prerequisite can be - specified). The prerequisite format is the same as that is - accepted by the nsupdate utility. -

-
-
-r recursive_server
-
-

- An IP address of a recursive server that this utility will - use. A recursive server may be necessary to identify the - authoritative server address to which the update request is - sent. -

-
-
-z zonename
-
-

- The domain name of the zone that contains -

-
-
(add|delete)
-
-

- Specify the type of update operation. Either "add" or - "delete" must be specified. -

-
-
"update data"
-
-

- Specify the data to be updated. A typical example of the - data would look like "name TTL RRtype RDATA". -

-
-
-
-

Note

-

- In practice, either -a or -r must be specified. Others can be - optional; the underlying library routine tries to identify the - appropriate server and the zone name for the update. -

-
-

- Examples: assuming the primary authoritative server of the - dynamic.example.com zone has an IPv6 address 2001:db8::1234, -

-
-$ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add "foo.dynamic.example.com 30 IN A 192.168.2.1"
-

- adds an A RR for foo.dynamic.example.com using the given key. -

-
-$ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com 30 IN A"
-

- removes all A RRs for foo.dynamic.example.com using the given key. -

-
-$ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com"
-

- removes all RRs for foo.dynamic.example.com using the given key. -

-
-
-

-nsprobe: domain/name server checker in terms of RFC 4074

- -

- Checks a set of domains to see the name servers of the domains - behave correctly in terms of RFC 4074. This is included in the set - of sample programs to show how the export library can be used in a - DNS-related application. -

-

- Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file] -

-

- Options -

-
-
-d
-
-

- Run in "debug" mode. With this option nsprobe will dump - every RRs it receives. -

-
-
-v
-
-

- Increase verbosity of other normal log messages. This can be - specified multiple times. -

-
-
-c cache_address
-
-

- Specify an IP address of a recursive (caching) name server. - nsprobe uses this server to get the NS RRset of each domain - and the A and/or AAAA RRsets for the name servers. The - default value is 127.0.0.1. -

-
-
input_file
-
-

- A file name containing a list of domain (zone) names to be - probed. when omitted the standard input will be used. Each - line of the input file specifies a single domain name such as - "example.com". In general this domain name must be the apex - name of some DNS zone (unlike normal "host names" such as - "www.example.com"). nsprobe first identifies the NS RRsets - for the given domain name, and sends A and AAAA queries to - these servers for some "widely used" names under the zone; - specifically, adding "www" and "ftp" to the zone name. -

-
-
-
-
-
-

-Library References

- -

- As of this writing, there is no formal "manual" for the libraries, - except this document, header files (some of which provide pretty - detailed explanations), and sample application programs. -

-
-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.ch12.html b/doc/arm/Bv9ARM.ch12.html deleted file mode 100644 index 8c82dd9da1..0000000000 --- a/doc/arm/Bv9ARM.ch12.html +++ /dev/null @@ -1,215 +0,0 @@ - - - - - -Manual pages - - - - - - - - -
-
-

-Manual pages

-
-
-
-

Table of Contents

-
-
-arpaname — translate IP addresses to the corresponding ARPA names -
-
-ddns-confgen — ddns key generation tool -
-
-delv — DNS lookup and validation utility -
-
-dig — DNS lookup utility -
-
-dnssec-cds — change DS records for a child zone based on CDS/CDNSKEY -
-
-dnssec-checkds — DNSSEC delegation consistency checking tool -
-
-dnssec-coverage — checks future DNSKEY coverage for a zone -
-
-dnssec-dsfromkey — DNSSEC DS RR generation tool -
-
-dnssec-importkey — import DNSKEY records from external systems so they can be managed -
-
-dnssec-keyfromlabel — DNSSEC key generation tool -
-
-dnssec-keygen — DNSSEC key generation tool -
-
-dnssec-keymgr — Ensures correct DNSKEY coverage for a zone based on a defined policy -
-
-dnssec-revoke — set the REVOKED bit on a DNSSEC key -
-
-dnssec-settime — set the key timing metadata for a DNSSEC key -
-
-dnssec-signzone — DNSSEC zone signing tool -
-
-dnssec-verify — DNSSEC zone verification tool -
-
-dnstap-read — print dnstap data in human-readable form -
-
-filter-aaaa.so — filter AAAA in DNS responses when A is present -
-
-host — DNS lookup utility -
-
-mdig — DNS pipelined lookup utility -
-
-named-checkconf — named configuration file syntax checking tool -
-
-named-checkzone — zone file validity checking or converting tool -
-
-named-journalprint — print zone journal in human-readable form -
-
-named-nzd2nzf — - Convert an NZD database to NZF text format - -
-
-named-rrchecker — syntax checker for individual DNS resource records -
-
-named.conf — configuration file for named -
-
-named — Internet domain name server -
-
-nsec3hash — generate NSEC3 hash -
-
-nslookup — query Internet name servers interactively -
-
-nsupdate — Dynamic DNS update utility -
-
-pkcs11-destroy — destroy PKCS#11 objects -
-
-pkcs11-keygen — generate keys on a PKCS#11 device -
-
-pkcs11-list — list PKCS#11 objects -
-
-pkcs11-tokens — list PKCS#11 available tokens -
-
-rndc-confgen — rndc key generation tool -
-
-rndc.conf — rndc configuration file -
-
-rndc — name server control utility -
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.conf b/doc/arm/Bv9ARM.conf deleted file mode 100644 index cf095caa92..0000000000 --- a/doc/arm/Bv9ARM.conf +++ /dev/null @@ -1,3 +0,0 @@ -TexInputs: ../tex// -TexStyle: armstyle -XslParam: ../xsl/arm-param.xsl diff --git a/doc/arm/Bv9ARM.html b/doc/arm/Bv9ARM.html deleted file mode 100644 index 9ffb10deca..0000000000 --- a/doc/arm/Bv9ARM.html +++ /dev/null @@ -1,446 +0,0 @@ - - - - - -BIND 9 Administrator Reference Manual - - - - - - -
-
-
-

-BIND 9 Administrator Reference Manual

-

BIND Version 9.17.1

-
-
-
-
-
-

Table of Contents

-
-
1. Introduction
-
-
Scope of Document
-
Organization of This Document
-
Conventions Used in This Document
-
The Domain Name System (DNS)
-
-
DNS Fundamentals
-
Domains and Domain Names
-
Zones
-
Authoritative Name Servers
-
Caching Name Servers
-
Name Servers in Multiple Roles
-
-
-
2. BIND Resource Requirements
-
-
Hardware requirements
-
CPU Requirements
-
Memory Requirements
-
Name Server Intensive Environment Issues
-
Supported Operating Systems
-
-
3. Name Server Configuration
-
-
Sample Configurations
-
-
A Caching-only Name Server
-
An Authoritative-only Name Server
-
-
Load Balancing
-
Name Server Operations
-
-
Tools for Use With the Name Server Daemon
-
Signals
-
-
Plugins
-
-
Configuring Plugins
-
Developing Plugins
-
-
-
4. Advanced DNS Features
-
-
Notify
-
Dynamic Update
-
The journal file
-
Incremental Zone Transfers (IXFR)
-
Split DNS
-
Example split DNS setup
-
TSIG
-
-
Generating a Shared Key
-
Loading A New Key
-
Instructing the Server to Use a Key
-
TSIG-Based Access Control
-
Errors
-
-
TKEY
-
SIG(0)
-
DNSSEC
-
-
Generating Keys
-
Signing the Zone
-
Configuring Servers for DNSSEC
-
-
DNSSEC, Dynamic Zones, and Automatic Signing
-
-
Converting from insecure to secure
-
Dynamic DNS update method
-
Fully automatic zone signing
-
Private-type records
-
DNSKEY rollovers
-
Dynamic DNS update method
-
Automatic key rollovers
-
NSEC3PARAM rollovers via UPDATE
-
Converting from NSEC to NSEC3
-
Converting from NSEC3 to NSEC
-
Converting from secure to insecure
-
Periodic re-signing
-
NSEC3 and OPTOUT
-
-
Dynamic Trust Anchor Management
-
-
Validating Resolver
-
Authoritative Server
-
-
PKCS#11 (Cryptoki) support
-
-
Prerequisites
-
Native PKCS#11
-
OpenSSL-based PKCS#11
-
PKCS#11 Tools
-
Using the HSM
-
Specifying the engine on the command line
-
Running named with automatic zone re-signing
-
-
DLZ (Dynamically Loadable Zones)
-
-
Configuring DLZ
-
Sample DLZ Driver
-
-
DynDB (Dynamic Database)
-
-
Configuring DynDB
-
Sample DynDB Module
-
-
Catalog Zones
-
-
Principle of Operation
-
Configuring Catalog Zones
-
Catalog Zone format
-
-
IPv6 Support in BIND 9
-
-
Address Lookups Using AAAA Records
-
Address to Name Lookups Using Nibble Format
-
-
-
5. BIND 9 Configuration Reference
-
-
Configuration File Elements
-
-
Address Match Lists
-
Comment Syntax
-
-
Configuration File Grammar
-
-
acl Statement Grammar
-
acl Statement Definition and - Usage
-
controls Statement Grammar
-
controls Statement Definition and - Usage
-
include Statement Grammar
-
include Statement Definition and Usage
-
key Statement Grammar
-
key Statement Definition and Usage
-
logging Statement Grammar
-
logging Statement Definition and Usage
-
masters Statement Grammar
-
masters Statement Definition and - Usage
-
options Statement Grammar
-
options Statement Definition and - Usage
-
server Statement Grammar
-
server Statement Definition and - Usage
-
statistics-channels Statement Grammar
-
statistics-channels Statement Definition and - Usage
-
trust-anchors Statement Grammar
-
trust-anchors Statement Definition - and Usage
-
dnssec-policy Statement Grammar
-
dnssec-policy Statement Definition and Usage
-
managed-keys Statement Grammar
-
managed-keys Statement Definition - and Usage
-
trusted-keys Statement Grammar
-
trusted-keys Statement Definition - and Usage
-
view Statement Grammar
-
view Statement Definition and Usage
-
zone - Statement Grammar
-
zone Statement Definition and Usage
-
-
Zone File
-
-
Types of Resource Records and When to Use Them
-
Discussion of MX Records
-
Setting TTLs
-
Inverse Mapping in IPv4
-
Other Zone File Directives
-
BIND Master File Extension: the $GENERATE Directive
-
Additional File Formats
-
-
BIND9 Statistics
-
-
The Statistics File
-
Statistics Counters
-
-
-
6. BIND 9 Security Considerations
-
-
Access Control Lists
-
Chroot and Setuid
-
-
The chroot Environment
-
Using the setuid Function
-
-
Dynamic Update Security
-
-
7. Troubleshooting
-
-
Common Problems
-
-
It's not working; how can I figure out what's wrong?
-
EDNS compliance issues
-
-
Incrementing and Changing the Serial Number
-
Where Can I Get Help?
-
-
A. Release Notes
-
-
Release Notes for BIND Version 9.17.1
-
-
Introduction
-
Supported Platforms
-
Download
-
Notes for BIND 9.17.1
-
Notes for BIND 9.17.0
-
License
-
End of Life
-
Thank You
-
-
-
B. A Brief History of the DNS and BIND
-
C. General DNS Reference Information
-
-
IPv6 addresses (AAAA)
-
Bibliography (and Suggested Reading)
-
-
Request for Comments (RFCs)
-
Internet Drafts
-
Other Documents About BIND
-
-
-
D. BIND 9 DNS Library Support
-
-
BIND 9 DNS Library Support
-
-
Installation
-
Known Defects/Restrictions
-
The dns.conf File
-
Sample Applications
-
Library References
-
-
-
I. Manual pages
-
-
-arpaname — translate IP addresses to the corresponding ARPA names -
-
-ddns-confgen — ddns key generation tool -
-
-delv — DNS lookup and validation utility -
-
-dig — DNS lookup utility -
-
-dnssec-cds — change DS records for a child zone based on CDS/CDNSKEY -
-
-dnssec-checkds — DNSSEC delegation consistency checking tool -
-
-dnssec-coverage — checks future DNSKEY coverage for a zone -
-
-dnssec-dsfromkey — DNSSEC DS RR generation tool -
-
-dnssec-importkey — import DNSKEY records from external systems so they can be managed -
-
-dnssec-keyfromlabel — DNSSEC key generation tool -
-
-dnssec-keygen — DNSSEC key generation tool -
-
-dnssec-keymgr — Ensures correct DNSKEY coverage for a zone based on a defined policy -
-
-dnssec-revoke — set the REVOKED bit on a DNSSEC key -
-
-dnssec-settime — set the key timing metadata for a DNSSEC key -
-
-dnssec-signzone — DNSSEC zone signing tool -
-
-dnssec-verify — DNSSEC zone verification tool -
-
-dnstap-read — print dnstap data in human-readable form -
-
-filter-aaaa.so — filter AAAA in DNS responses when A is present -
-
-host — DNS lookup utility -
-
-mdig — DNS pipelined lookup utility -
-
-named-checkconf — named configuration file syntax checking tool -
-
-named-checkzone — zone file validity checking or converting tool -
-
-named-journalprint — print zone journal in human-readable form -
-
-named-nzd2nzf — - Convert an NZD database to NZF text format - -
-
-named-rrchecker — syntax checker for individual DNS resource records -
-
-named.conf — configuration file for named -
-
-named — Internet domain name server -
-
-nsec3hash — generate NSEC3 hash -
-
-nslookup — query Internet name servers interactively -
-
-nsupdate — Dynamic DNS update utility -
-
-pkcs11-destroy — destroy PKCS#11 objects -
-
-pkcs11-keygen — generate keys on a PKCS#11 device -
-
-pkcs11-list — list PKCS#11 objects -
-
-pkcs11-tokens — list PKCS#11 available tokens -
-
-rndc-confgen — rndc key generation tool -
-
-rndc.conf — rndc configuration file -
-
-rndc — name server control utility -
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/Bv9ARM.pdf b/doc/arm/Bv9ARM.pdf deleted file mode 100644 index ea200533b3..0000000000 Binary files a/doc/arm/Bv9ARM.pdf and /dev/null differ diff --git a/doc/arm/Makefile.am b/doc/arm/Makefile.am new file mode 100644 index 0000000000..67e7057c95 --- /dev/null +++ b/doc/arm/Makefile.am @@ -0,0 +1,85 @@ +include $(top_srcdir)/Makefile.top +include $(top_srcdir)/Makefile.docs + +EXTRA_DIST = \ + conf.py \ + acl.grammar.rst \ + advanced.rst \ + catz.rst \ + configuration.rst \ + controls.grammar.rst \ + delegation-only.zoneopt.rst \ + dlz.rst \ + dnssec-keys.grammar.rst \ + dnssec.rst \ + dyndb.rst \ + forward.zoneopt.rst \ + general.rst \ + hint.zoneopt.rst \ + history.rst \ + in-view.zoneopt.rst \ + index.rst \ + introduction.rst \ + key.grammar.rst \ + libdns.rst \ + logging-categories.rst \ + logging.grammar.rst \ + managed-keys.grammar.rst \ + managed-keys.rst \ + manpages.rst \ + master.zoneopt.rst \ + masters.grammar.rst \ + mirror.zoneopt.rst \ + notes.rst \ + options.grammar.rst \ + pkcs11.rst \ + plugins.rst \ + redirect.zoneopt.rst \ + reference.rst \ + requirements.rst \ + security.rst \ + server.grammar.rst \ + slave.zoneopt.rst \ + static-stub.zoneopt.rst \ + statistics-channels.grammar.rst \ + stub.zoneopt.rst \ + troubleshooting.rst \ + trusted-keys.grammar.rst + +html-local: + $(AM_V_SPHINX)$(SPHINX_BUILD) -b html -d $(SPHINXBUILDDIR)/doctrees $(ALLSPHINXOPTS) $(SPHINXBUILDDIR)/html + +install-html-local: + $(INSTALL) -d $(DESTDIR)/$(docdir) $(DESTDIR)/$(docdir)/_static + $(INSTALL) -D $(SPHINXBUILDDIR)/html/*.html $(DESTDIR)/$(docdir)/ + cp -R $(SPHINXBUILDDIR)/html/_static/ $(DESTDIR)/$(docdir)/_static/ + +singlehtml: + $(AM_V_SPHINX)$(SPHINX_BUILD) -b singlehtml -d $(SPHINXBUILDDIR)/doctrees $(ALLSPHINXOPTS) $(SPHINXBUILDDIR)/singlehtml + +install-singlehtml: singlehtml + $(INSTALL) -d $(DESTDIR)/$(docdir) $(DESTDIR)/$(docdir)/_static + $(INSTALL_DATA) $(SPHINXBUILDDIR)/singlehtml/*.html $(DESTDIR)/$(docdir)/ + cp -R $(SPHINXBUILDDIR)/singlehtml/_static/* $(DESTDIR)/$(docdir)/_static/ + +epub: + $(AM_V_SPHINX)$(SPHINX_BUILD) -b epub -A today=$(RELEASE_DATE) -d $(SPHINXBUILDDIR)/doctrees $(ALLSPHINXOPTS) $(SPHINXBUILDDIR)/epub + +install-epub: + $(INSTALL) -d $(DESTDIR)/$(docdir) + $(INSTALL_DATA) $(SPHINXBUILDDIR)/epub/KnotDNS.epub $(DESTDIR)/$(docdir)/ + +if HAVE_XELATEX +pdf-local: + $(AM_V_SPHINX)$(SPHINX_BUILD) -b latex -d $(SPHINXBUILDDIR)/doctrees $(ALLSPHINXOPTS) $(SPHINXBUILDDIR)/latex + $(MAKE) -C $(SPHINXBUILDDIR)/latex all-pdf + +install-pdf-local: + $(INSTALL) -d $(DESTDIR)/$(docdir) + $(INSTALL_DATA) $(SPHINXBUILDDIR)/latex/*.pdf $(DESTDIR)/$(docdir)/ +endif + +clean-local: + -rm -rf $(SPHINXBUILDDIR) + +doc-local: html singlehtml pdf epub diff --git a/doc/arm/README-SGML b/doc/arm/README-SGML deleted file mode 100644 index 1f2a965356..0000000000 --- a/doc/arm/README-SGML +++ /dev/null @@ -1,55 +0,0 @@ -Copyright (C) Internet Systems Consortium, Inc. ("ISC") - -See COPYRIGHT in the source root or http://isc.org/copyright.html for terms. - -The BIND v9 ARM master document is now kept in DocBook 5 XML format. - -Most of the ARM is in the single file "Bv9ARM-book.xml", with certain -other files included into it: - - - dlz.xml - - dnssec.xml - - libdns.xml - - logging-categories.xml - - managed-keys.xml - - notes.xml - - pkcs11.xml - - BIND man pages - -All of the published ARM formats - HTML, PDF, etc - are generated from -this master source. - -The file "notes.xml" contains the release notes for the current release. In -addition to being included in the ARM as an appendix, it is also built into -a stand-alone document: "notes.pdf" and "notes.html". - -Building these these files requires DocBook 5 and dblatex. These are -available as packages in many OS distributes; in debian, for example: - - $ sudo apt-get install docbook5-xml docbook-xml docbook-xsl-ns \ - docbook-utils dblatex - -To build all documentation, run "make doc". - -When committing changes or submitting patches, it is only necessary to -edit the XML source (i.e., the files with ".docbook" or ".xml" suffixes); -the files in HTML and man page format are built from the XML source by a -cron job. - -If you are familiar with SGML or HTML, editing the DocBook XML is quite -straightforward. You only need to know what the tags are and how to use -them. You can find a good resource either for this either online or in -printed form: - - DocBook: The Definitive Guide - By Norman Walsh and Leonard Muellner - ISBN: 156592-580-7 - 1st Edition, October 1999 - Copyright (C) 1999 by O'Reilly & Associates, Inc. All rights reserved. - -The book is available online in HTML format: - - http://docbook.org/ - -After editing documentation, it is useful to check the correctness of the -XML; this can be done using the "xmllint" utility. diff --git a/doc/arm/acl.grammar.xml b/doc/arm/acl.grammar.xml deleted file mode 100644 index 3d838b13f0..0000000000 --- a/doc/arm/acl.grammar.xml +++ /dev/null @@ -1,16 +0,0 @@ - - - - - -acl string { address_match_element; ... }; - diff --git a/doc/arm/advanced.rst b/doc/arm/advanced.rst new file mode 100644 index 0000000000..7c37328105 --- /dev/null +++ b/doc/arm/advanced.rst @@ -0,0 +1,855 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. Advanced: + +Advanced DNS Features +===================== + +.. _notify: + +Notify +------ + +DNS NOTIFY is a mechanism that allows master servers to notify their +slave servers of changes to a zone's data. In response to a ``NOTIFY`` +from a master server, the slave will check to see that its version of +the zone is the current version and, if not, initiate a zone transfer. + +For more information about DNS ``NOTIFY``, see the description of the +``notify`` option in :ref:`boolean_options` and the +description of the zone option ``also-notify`` in :ref:`zone_transfers`. +The ``NOTIFY`` protocol is specified in :rfc:`1996`. + +.. note:: + + As a slave zone can also be a master to other slaves, ``named``, by + default, sends ``NOTIFY`` messages for every zone it loads. + Specifying ``notify master-only;`` will cause ``named`` to only send + ``NOTIFY`` for master zones that it loads. + +.. _dynamic_update: + +Dynamic Update +-------------- + +Dynamic Update is a method for adding, replacing or deleting records in +a master server by sending it a special form of DNS messages. The format +and meaning of these messages is specified in :rfc:`2136`. + +Dynamic update is enabled by including an ``allow-update`` or an +``update-policy`` clause in the ``zone`` statement. + +If the zone's ``update-policy`` is set to ``local``, updates to the zone +will be permitted for the key ``local-ddns``, which will be generated by +``named`` at startup. See :ref:`dynamic_update_policies` for more details. + +Dynamic updates using Kerberos signed requests can be made using the +TKEY/GSS protocol by setting either the ``tkey-gssapi-keytab`` option, +or alternatively by setting both the ``tkey-gssapi-credential`` and +``tkey-domain`` options. Once enabled, Kerberos signed requests will be +matched against the update policies for the zone, using the Kerberos +principal as the signer for the request. + +Updating of secure zones (zones using DNSSEC) follows :rfc:`3007`: RRSIG, +NSEC and NSEC3 records affected by updates are automatically regenerated +by the server using an online zone key. Update authorization is based on +transaction signatures and an explicit server policy. + +.. _journal: + +The journal file +~~~~~~~~~~~~~~~~ + +All changes made to a zone using dynamic update are stored in the zone's +journal file. This file is automatically created by the server when the +first dynamic update takes place. The name of the journal file is formed +by appending the extension ``.jnl`` to the name of the corresponding +zone file unless specifically overridden. The journal file is in a +binary format and should not be edited manually. + +The server will also occasionally write ("dump") the complete contents +of the updated zone to its zone file. This is not done immediately after +each dynamic update, because that would be too slow when a large zone is +updated frequently. Instead, the dump is delayed by up to 15 minutes, +allowing additional updates to take place. During the dump process, +transient files will be created with the extensions ``.jnw`` and +``.jbk``; under ordinary circumstances, these will be removed when the +dump is complete, and can be safely ignored. + +When a server is restarted after a shutdown or crash, it will replay the +journal file to incorporate into the zone any updates that took place +after the last zone dump. + +Changes that result from incoming incremental zone transfers are also +journaled in a similar way. + +The zone files of dynamic zones cannot normally be edited by hand +because they are not guaranteed to contain the most recent dynamic +changes — those are only in the journal file. The only way to ensure +that the zone file of a dynamic zone is up to date is to run +``rndc stop``. + +If you have to make changes to a dynamic zone manually, the following +procedure will work: Disable dynamic updates to the zone using +``rndc freeze zone``. This will update the zone's master file with the +changes stored in its ``.jnl`` file. Edit the zone file. Run +``rndc thaw zone`` to reload the changed zone and re-enable dynamic +updates. + +``rndc sync zone`` will update the zone file with changes from the +journal file without stopping dynamic updates; this may be useful for +viewing the current zone state. To remove the ``.jnl`` file after +updating the zone file, use ``rndc sync -clean``. + +.. _incremental_zone_transfers: + +Incremental Zone Transfers (IXFR) +--------------------------------- + +The incremental zone transfer (IXFR) protocol is a way for secondary servers +to transfer only changed data, instead of having to transfer the entire +zone. The IXFR protocol is specified in :rfc:`1995`. See :ref:`proposed_standards`. + +When acting as a primary server, BIND 9 supports IXFR for those zones where the +necessary change history information is available. These include primary +zones maintained by dynamic update and secondary zones whose data was +obtained by IXFR. For manually maintained primary zones, and for secondary +zones obtained by performing a full zone transfer (AXFR), IXFR is +supported only if the option ``ixfr-from-differences`` is set to +``yes``. + +When acting as a secondary server, BIND 9 will attempt to use IXFR unless it is +explicitly disabled. For more information about disabling IXFR, see the +description of the ``request-ixfr`` clause of the ``server`` statement. + +When a secondary server receives a zone via AXFR, it creates a new copy of the +zone database and then swaps it into place; during the loading process, queries +continue to be served from the old database with no interference. When receiving +a zone via IXFR, however, changes are applied to the running zone, which may +degrade query performance during the transfer. If a server receiving an IXFR +request determines that the response size would be similar in size to an AXFR +response, it may wish to send AXFR instead. The threshold at which this +determination is made can be configured using the +max-ixfr-ratio option. + +.. _split_dns: + +Split DNS +--------- + +Setting up different views, or visibility, of the DNS space to internal +and external resolvers is usually referred to as a *Split DNS* setup. +There are several reasons an organization would want to set up its DNS +this way. + +One common reason for setting up a DNS system this way is to hide +"internal" DNS information from "external" clients on the Internet. +There is some debate as to whether or not this is actually useful. +Internal DNS information leaks out in many ways (via email headers, for +example) and most savvy "attackers" can find the information they need +using other means. However, since listing addresses of internal servers +that external clients cannot possibly reach can result in connection +delays and other annoyances, an organization may choose to use a Split +DNS to present a consistent view of itself to the outside world. + +Another common reason for setting up a Split DNS system is to allow +internal networks that are behind filters or in :rfc:`1918` space (reserved +IP space, as documented in :rfc:`1918`) to resolve DNS on the Internet. +Split DNS can also be used to allow mail from outside back in to the +internal network. + +.. _split_dns_sample: + +Example split DNS setup +~~~~~~~~~~~~~~~~~~~~~~~ + +Let's say a company named *Example, Inc.* (``example.com``) has several +corporate sites that have an internal network with reserved Internet +Protocol (IP) space and an external demilitarized zone (DMZ), or +"outside" section of a network, that is available to the public. + +*Example, Inc.* wants its internal clients to be able to resolve +external hostnames and to exchange mail with people on the outside. The +company also wants its internal resolvers to have access to certain +internal-only zones that are not available at all outside of the +internal network. + +In order to accomplish this, the company will set up two sets of name +servers. One set will be on the inside network (in the reserved IP +space) and the other set will be on bastion hosts, which are "proxy" +hosts that can talk to both sides of its network, in the DMZ. + +The internal servers will be configured to forward all queries, except +queries for ``site1.internal``, ``site2.internal``, +``site1.example.com``, and ``site2.example.com``, to the servers in the +DMZ. These internal servers will have complete sets of information for +``site1.example.com``, ``site2.example.com``, ``site1.internal``, and +``site2.internal``. + +To protect the ``site1.internal`` and ``site2.internal`` domains, the +internal name servers must be configured to disallow all queries to +these domains from any external hosts, including the bastion hosts. + +The external servers, which are on the bastion hosts, will be configured +to serve the "public" version of the ``site1`` and ``site2.example.com`` +zones. This could include things such as the host records for public +servers (``www.example.com`` and ``ftp.example.com``), and mail exchange +(MX) records (``a.mx.example.com`` and ``b.mx.example.com``). + +In addition, the public ``site1`` and ``site2.example.com`` zones should +have special MX records that contain wildcard (``*``) records pointing to +the bastion hosts. This is needed because external mail servers do not +have any other way of looking up how to deliver mail to those internal +hosts. With the wildcard records, the mail will be delivered to the +bastion host, which can then forward it on to internal hosts. + +Here's an example of a wildcard MX record: + +:: + + * IN MX 10 external1.example.com. + +Now that they accept mail on behalf of anything in the internal network, +the bastion hosts will need to know how to deliver mail to internal +hosts. In order for this to work properly, the resolvers on the bastion +hosts will need to be configured to point to the internal name servers +for DNS resolution. + +Queries for internal hostnames will be answered by the internal servers, +and queries for external hostnames will be forwarded back out to the DNS +servers on the bastion hosts. + +In order for all this to work properly, internal clients will need to be +configured to query *only* the internal name servers for DNS queries. +This could also be enforced via selective filtering on the network. + +If everything has been set properly, *Example, Inc.*'s internal clients +will now be able to: + +- Look up any hostnames in the ``site1`` and ``site2.example.com`` + zones. + +- Look up any hostnames in the ``site1.internal`` and + ``site2.internal`` domains. + +- Look up any hostnames on the Internet. + +- Exchange mail with both internal and external people. + +Hosts on the Internet will be able to: + +- Look up any hostnames in the ``site1`` and ``site2.example.com`` + zones. + +- Exchange mail with anyone in the ``site1`` and ``site2.example.com`` + zones. + +Here is an example configuration for the setup we just described above. +Note that this is only configuration information; for information on how +to configure your zone files, see :ref:`sample_configuration`. + +Internal DNS server config: + +:: + + + acl internals { 172.16.72.0/24; 192.168.1.0/24; }; + + acl externals { bastion-ips-go-here; }; + + options { + ... + ... + forward only; + // forward to external servers + forwarders { + bastion-ips-go-here; + }; + // sample allow-transfer (no one) + allow-transfer { none; }; + // restrict query access + allow-query { internals; externals; }; + // restrict recursion + allow-recursion { internals; }; + ... + ... + }; + + // sample master zone + zone "site1.example.com" { + type master; + file "m/site1.example.com"; + // do normal iterative resolution (do not forward) + forwarders { }; + allow-query { internals; externals; }; + allow-transfer { internals; }; + }; + + // sample slave zone + zone "site2.example.com" { + type slave; + file "s/site2.example.com"; + masters { 172.16.72.3; }; + forwarders { }; + allow-query { internals; externals; }; + allow-transfer { internals; }; + }; + + zone "site1.internal" { + type master; + file "m/site1.internal"; + forwarders { }; + allow-query { internals; }; + allow-transfer { internals; } + }; + + zone "site2.internal" { + type slave; + file "s/site2.internal"; + masters { 172.16.72.3; }; + forwarders { }; + allow-query { internals }; + allow-transfer { internals; } + }; + +External (bastion host) DNS server config: + +:: + + acl internals { 172.16.72.0/24; 192.168.1.0/24; }; + + acl externals { bastion-ips-go-here; }; + + options { + ... + ... + // sample allow-transfer (no one) + allow-transfer { none; }; + // default query access + allow-query { any; }; + // restrict cache access + allow-query-cache { internals; externals; }; + // restrict recursion + allow-recursion { internals; externals; }; + ... + ... + }; + + // sample slave zone + zone "site1.example.com" { + type master; + file "m/site1.foo.com"; + allow-transfer { internals; externals; }; + }; + + zone "site2.example.com" { + type slave; + file "s/site2.foo.com"; + masters { another_bastion_host_maybe; }; + allow-transfer { internals; externals; } + }; + +In the ``resolv.conf`` (or equivalent) on the bastion host(s): + +:: + + search ... + nameserver 172.16.72.2 + nameserver 172.16.72.3 + nameserver 172.16.72.4 + +.. _tsig: + +TSIG +---- + +TSIG (Transaction SIGnatures) is a mechanism for authenticating DNS +messages, originally specified in :rfc:`2845`. It allows DNS messages to be +cryptographically signed using a shared secret. TSIG can be used in any +DNS transaction, as a way to restrict access to certain server functions +(e.g., recursive queries) to authorized clients when IP-based access +control is insufficient or needs to be overridden, or as a way to ensure +message authenticity when it is critical to the integrity of the server, +such as with dynamic UPDATE messages or zone transfers from a master to +a slave server. + +This is a guide to setting up TSIG in BIND. It describes the +configuration syntax and the process of creating TSIG keys. + +``named`` supports TSIG for server-to-server communication, and some of +the tools included with BIND support it for sending messages to +``named``: + + * :ref:`man_nsupdate` supports TSIG via the ``-k``, ``-l`` and ``-y`` command line options, or via the ``key`` command when running interactively. + * :ref:`man_dig` supports TSIG via the ``-k`` and ``-y`` command line options. + +Generating a Shared Key +~~~~~~~~~~~~~~~~~~~~~~~ + +TSIG keys can be generated using the ``tsig-keygen`` command; the output +of the command is a ``key`` directive suitable for inclusion in +``named.conf``. The key name, algorithm and size can be specified by +command line parameters; the defaults are "tsig-key", HMAC-SHA256, and +256 bits, respectively. + +Any string which is a valid DNS name can be used as a key name. For +example, a key to be shared between servers called *host1* and *host2* +could be called "host1-host2.", and this key could be generated using: + +:: + + $ tsig-keygen host1-host2. > host1-host2.key + +This key may then be copied to both hosts. The key name and secret must +be identical on both hosts. (Note: copying a shared secret from one +server to another is beyond the scope of the DNS. A secure transport +mechanism should be used: secure FTP, SSL, ssh, telephone, encrypted +email, etc.) + +``tsig-keygen`` can also be run as ``ddns-confgen``, in which case its +output includes additional configuration text for setting up dynamic DNS +in ``named``. See :ref:`man_ddns-confgen` for details. + +Loading A New Key +~~~~~~~~~~~~~~~~~ + +For a key shared between servers called *host1* and *host2*, the +following could be added to each server's ``named.conf`` file: + +:: + + key "host1-host2." { + algorithm hmac-sha256; + secret "DAopyf1mhCbFVZw7pgmNPBoLUq8wEUT7UuPoLENP2HY="; + }; + +(This is the same key generated above using ``tsig-keygen``.) + +Since this text contains a secret, it is recommended that either +``named.conf`` not be world-readable, or that the ``key`` directive be +stored in a file which is not world-readable, and which is included in +``named.conf`` via the ``include`` directive. + +Once a key has been added to ``named.conf`` and the server has been +restarted or reconfigured, the server can recognize the key. If the +server receives a message signed by the key, it will be able to verify +the signature. If the signature is valid, the response will be signed +using the same key. + +TSIG keys that are known to a server can be listed using the command +``rndc tsig-list``. + +Instructing the Server to Use a Key +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +A server sending a request to another server must be told whether to use +a key, and if so, which key to use. + +For example, a key may be specified for each server in the ``masters`` +statement in the definition of a slave zone; in this case, all SOA QUERY +messages, NOTIFY messages, and zone transfer requests (AXFR or IXFR) +will be signed using the specified key. Keys may also be specified in +the ``also-notify`` statement of a master or slave zone, causing NOTIFY +messages to be signed using the specified key. + +Keys can also be specified in a ``server`` directive. Adding the +following on *host1*, if the IP address of *host2* is 10.1.2.3, would +cause *all* requests from *host1* to *host2*, including normal DNS +queries, to be signed using the ``host1-host2.`` key: + +:: + + server 10.1.2.3 { + keys { host1-host2. ;}; + }; + +Multiple keys may be present in the ``keys`` statement, but only the +first one is used. As this directive does not contain secrets, it can be +used in a world-readable file. + +Requests sent by *host2* to *host1* would *not* be signed, unless a +similar ``server`` directive were in *host2*'s configuration file. + +Whenever any server sends a TSIG-signed DNS request, it will expect the +response to be signed with the same key. If a response is not signed, or +if the signature is not valid, the response will be rejected. + +TSIG-Based Access Control +~~~~~~~~~~~~~~~~~~~~~~~~~ + +TSIG keys may be specified in ACL definitions and ACL directives such as +``allow-query``, ``allow-transfer`` and ``allow-update``. The above key +would be denoted in an ACL element as ``key host1-host2.`` + +An example of an ``allow-update`` directive using a TSIG key: + +:: + + allow-update { !{ !localnets; any; }; key host1-host2. ;}; + +This allows dynamic updates to succeed only if the UPDATE request comes +from an address in ``localnets``, *and* if it is signed using the +``host1-host2.`` key. + +See :ref:`dynamic_update_policies` for a +discussion of the more flexible ``update-policy`` statement. + +Errors +~~~~~~ + +Processing of TSIG-signed messages can result in several errors: + +- If a TSIG-aware server receives a message signed by an unknown key, + the response will be unsigned, with the TSIG extended error code set + to BADKEY. +- If a TSIG-aware server receives a message from a known key but with + an invalid signature, the response will be unsigned, with the TSIG + extended error code set to BADSIG. +- If a TSIG-aware server receives a message with a time outside of the + allowed range, the response will be signed, with the TSIG extended + error code set to BADTIME, and the time values will be adjusted so + that the response can be successfully verified. + +In all of the above cases, the server will return a response code of +NOTAUTH (not authenticated). + +TKEY +---- + +TKEY (Transaction KEY) is a mechanism for automatically negotiating a +shared secret between two hosts, originally specified in :rfc:`2930`. + +There are several TKEY "modes" that specify how a key is to be generated +or assigned. BIND 9 implements only one of these modes: Diffie-Hellman +key exchange. Both hosts are required to have a KEY record with +algorithm DH (though this record is not required to be present in a +zone). + +The TKEY process is initiated by a client or server by sending a query +of type TKEY to a TKEY-aware server. The query must include an +appropriate KEY record in the additional section, and must be signed +using either TSIG or SIG(0) with a previously established key. The +server's response, if successful, will contain a TKEY record in its +answer section. After this transaction, both participants will have +enough information to calculate a shared secret using Diffie-Hellman key +exchange. The shared secret can then be used by to sign subsequent +transactions between the two servers. + +TSIG keys known by the server, including TKEY-negotiated keys, can be +listed using ``rndc tsig-list``. + +TKEY-negotiated keys can be deleted from a server using +``rndc tsig-delete``. This can also be done via the TKEY protocol +itself, by sending an authenticated TKEY query specifying the "key +deletion" mode. + +SIG(0) +------ + +BIND partially supports DNSSEC SIG(0) transaction signatures as +specified in :rfc:`2535` and :rfc:`2931`. SIG(0) uses public/private keys to +authenticate messages. Access control is performed in the same manner as +TSIG keys; privileges can be granted or denied in ACL directives based +on the key name. + +When a SIG(0) signed message is received, it will only be verified if +the key is known and trusted by the server. The server will not attempt +to recursively fetch or validate the key. + +SIG(0) signing of multiple-message TCP streams is not supported. + +The only tool shipped with BIND 9 that generates SIG(0) signed messages +is ``nsupdate``. + +.. _DNSSEC: + +DNSSEC +------ + +Cryptographic authentication of DNS information is possible through the +DNS Security (*DNSSEC-bis*) extensions, defined in :rfc:`4033`, :rfc:`4034`, +and :rfc:`4035`. This section describes the creation and use of DNSSEC +signed zones. + +In order to set up a DNSSEC secure zone, there are a series of steps +which must be followed. BIND 9 ships with several tools that are used in +this process, which are explained in more detail below. In all cases, +the ``-h`` option prints a full list of parameters. Note that the DNSSEC +tools require the keyset files to be in the working directory or the +directory specified by the ``-d`` option, and that the tools shipped +with BIND 9.2.x and earlier are not compatible with the current ones. + +There must also be communication with the administrators of the parent +and/or child zone to transmit keys. A zone's security status must be +indicated by the parent zone for a DNSSEC capable resolver to trust its +data. This is done through the presence or absence of a ``DS`` record at +the delegation point. + +For other servers to trust data in this zone, they must either be +statically configured with this zone's zone key or the zone key of +another zone above this one in the DNS tree. + +.. _generating_dnssec_keys: + +Generating Keys +~~~~~~~~~~~~~~~ + +The ``dnssec-keygen`` program is used to generate keys. + +A secure zone must contain one or more zone keys. The zone keys will +sign all other records in the zone, as well as the zone keys of any +secure delegated zones. Zone keys must have the same name as the zone, a +name type of ``ZONE``, and must be usable for authentication. It is +recommended that zone keys use a cryptographic algorithm designated as +"mandatory to implement" by the IETF; currently the are two algorithms: +RSASHA256 and ECDSAP256SHA256. ECDSAP256SHA256 is recommended for +current and future deployments. + +The following command will generate a ECDSAP256SHA256 key for the +``child.example`` zone: + +``dnssec-keygen -a ECDSAP256SHA256 -n ZONE child.example.`` + +Two output files will be produced: ``Kchild.example.+013+12345.key`` and +``Kchild.example.+013+12345.private`` (where 12345 is an example of a +key tag). The key filenames contain the key name (``child.example.``), +algorithm (5 is RSASHA1, 8 is RSASHA256, 13 is ECDSAP256SHA256, 15 is +ED25519 etc.), and the key tag (12345 in this case). The private key (in +the ``.private`` file) is used to generate signatures, and the public +key (in the ``.key`` file) is used for signature verification. + +To generate another key with the same properties (but with a different +key tag), repeat the above command. + +The ``dnssec-keyfromlabel`` program is used to get a key pair from a +crypto hardware and build the key files. Its usage is similar to +``dnssec-keygen``. + +The public keys should be inserted into the zone file by including the +``.key`` files using ``$INCLUDE`` statements. + +.. _dnssec_signing: + +Signing the Zone +~~~~~~~~~~~~~~~~ + +The ``dnssec-signzone`` program is used to sign a zone. + +Any ``keyset`` files corresponding to secure sub-zones should be +present. The zone signer will generate ``NSEC``, ``NSEC3`` and ``RRSIG`` +records for the zone, as well as ``DS`` for the child zones if ``'-g'`` +is specified. If ``'-g'`` is not specified, then DS RRsets for the +secure child zones need to be added manually. + +The following command signs the zone, assuming it is in a file called +``zone.child.example``. By default, all zone keys which have an +available private key are used to generate signatures. + +``dnssec-signzone -o child.example zone.child.example`` + +One output file is produced: ``zone.child.example.signed``. This file +should be referenced by ``named.conf`` as the input file for the zone. + +``dnssec-signzone`` will also produce a keyset and dsset files. These are used +to provide the parent zone administrators with the ``DNSKEYs`` (or their +corresponding ``DS`` records) that are the secure entry point to the zone. + +.. _dnssec_config: + +Configuring Servers for DNSSEC +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To enable ``named`` to validate answers received from other servers, the +``dnssec-validation`` option must be set to either ``yes`` or ``auto``. + +When ``dnssec-validation`` is set to ``auto``, a trust anchor for the +DNS root zone will automatically be used. This trust anchor is provided +as part of BIND and is kept up to date using :rfc:`5011` key management. + +When ``dnssec-validation`` is set to ``yes``, DNSSEC validation will +only occur if at least one trust anchor has been explicitly configured +in ``named.conf`` using a ``trust-anchors`` statement (or the +``managed-keys`` and ``trusted-keys`` statements, both deprecated). + +When ``dnssec-validation`` is set to ``no``, DNSSEC validation will not +occur. + +The default is ``auto`` unless BIND is built with +``configure --disable-auto-validation``, in which case the default is +``yes``. + +The keys specified in ``trust-anchors`` copies of DNSKEY RRs for zones that are +used to form the first link in the cryptographic chain of trust. Keys configured +with the keyword ``static-key`` or ``static-ds`` are loaded directly into the +table of trust anchors, and can only be changed by altering the +configuration. Keys configured with ``initial-key`` or ``initial-ds`` are used +to initialize :rfc:`5011` trust anchor maintenance, and will be kept up to date +automatically after the first time ``named`` runs. + +``trust-anchors`` is described in more detail later in this document. + +Unlike BIND 8, BIND 9 does not verify signatures on load, so zone keys +for authoritative zones do not need to be specified in the configuration +file. + +After DNSSEC gets established, a typical DNSSEC configuration will look +something like the following. It has one or more public keys for the +root. This allows answers from outside the organization to be validated. +It will also have several keys for parts of the namespace the +organization controls. These are here to ensure that ``named`` is immune +to compromises in the DNSSEC components of the security of parent zones. + +:: + + trust-anchors { + /* Root Key */ + "." initial-key 257 3 3 "BNY4wrWM1nCfJ+CXd0rVXyYmobt7sEEfK3clRbGaTwS + JxrGkxJWoZu6I7PzJu/E9gx4UC1zGAHlXKdE4zYIpRh + aBKnvcC2U9mZhkdUpd1Vso/HAdjNe8LmMlnzY3zy2Xy + 4klWOADTPzSv9eamj8V18PHGjBLaVtYvk/ln5ZApjYg + hf+6fElrmLkdaz MQ2OCnACR817DF4BBa7UR/beDHyp + 5iWTXWSi6XmoJLbG9Scqc7l70KDqlvXR3M/lUUVRbke + g1IPJSidmK3ZyCllh4XSKbje/45SKucHgnwU5jefMtq + 66gKodQj+MiA21AfUVe7u99WzTLzY3qlxDhxYQQ20FQ + 97S+LKUTpQcq27R7AT3/V5hRQxScINqwcz4jYqZD2fQ + dgxbcDTClU0CRBdiieyLMNzXG3"; + /* Key for our organization's forward zone */ + example.com. static-ds 54135 5 2 "8EF922C97F1D07B23134440F19682E7519ADDAE180E20B1B1EC52E7F58B2831D" + + /* Key for our reverse zone. */ + 2.0.192.IN-ADDRPA.NET. static-key 257 3 5 "AQOnS4xn/IgOUpBPJ3bogzwc + xOdNax071L18QqZnQQQAVVr+i + LhGTnNGp3HoWQLUIzKrJVZ3zg + gy3WwNT6kZo6c0tszYqbtvchm + gQC8CzKojM/W16i6MG/eafGU3 + siaOdS0yOI6BgPsw+YZdzlYMa + IJGf4M4dyoKIhzdZyQ2bYQrjy + Q4LB0lC7aOnsMyYKHHYeRvPxj + IQXmdqgOJGq+vsevG06zW+1xg + YJh9rCIfnm1GX/KMgxLPG2vXT + D/RnLX+D3T3UL7HJYHJhAZD5L + 59VvjSPsZJHeDCUyWYrvPZesZ + DIRvhDD52SKvbheeTJUm6Ehkz + ytNN2SN96QRk8j/iI8ib"; + }; + + options { + ... + dnssec-validation yes; + }; + +.. + +.. note:: + + None of the keys listed in this example are valid. In particular, the + root key is not valid. + +When DNSSEC validation is enabled and properly configured, the resolver +will reject any answers from signed, secure zones which fail to +validate, and will return SERVFAIL to the client. + +Responses may fail to validate for any of several reasons, including +missing, expired, or invalid signatures, a key which does not match the +DS RRset in the parent zone, or an insecure response from a zone which, +according to its parent, should have been secure. + +.. note:: + + When the validator receives a response from an unsigned zone that has + a signed parent, it must confirm with the parent that the zone was + intentionally left unsigned. It does this by verifying, via signed + and validated NSEC/NSEC3 records, that the parent zone contains no DS + records for the child. + + If the validator *can* prove that the zone is insecure, then the + response is accepted. However, if it cannot, then it must assume an + insecure response to be a forgery; it rejects the response and logs + an error. + + The logged error reads "insecurity proof failed" and "got insecure + response; parent indicates it should be secure". + + +.. include:: dnssec.rst +.. include:: managed-keys.rst +.. include:: pkcs11.rst +.. include:: dlz.rst +.. include:: dyndb.rst +.. include:: catz.rst + +.. _ipv6: + +IPv6 Support in BIND 9 +---------------------- + +BIND 9 fully supports all currently defined forms of IPv6 name to +address and address to name lookups. It will also use IPv6 addresses to +make queries when running on an IPv6 capable system. + +For forward lookups, BIND 9 supports only AAAA records. :rfc:`3363` +deprecated the use of A6 records, and client-side support for A6 records +was accordingly removed from BIND 9. However, authoritative BIND 9 name +servers still load zone files containing A6 records correctly, answer +queries for A6 records, and accept zone transfer for a zone containing +A6 records. + +For IPv6 reverse lookups, BIND 9 supports the traditional "nibble" +format used in the *ip6.arpa* domain, as well as the older, deprecated +*ip6.int* domain. Older versions of BIND 9 supported the "binary label" +(also known as "bitstring") format, but support of binary labels has +been completely removed per :rfc:`3363`. Many applications in BIND 9 do not +understand the binary label format at all any more, and will return an +error if given. In particular, an authoritative BIND 9 name server will +not load a zone file containing binary labels. + +For an overview of the format and structure of IPv6 addresses, see +:ref:`ipv6addresses`. + +Address Lookups Using AAAA Records +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The IPv6 AAAA record is a parallel to the IPv4 A record, and, unlike the +deprecated A6 record, specifies the entire IPv6 address in a single +record. For example, + +:: + + $ORIGIN example.com. + host 3600 IN AAAA 2001:db8::1 + +Use of IPv4-in-IPv6 mapped addresses is not recommended. If a host has +an IPv4 address, use an A record, not a AAAA, with +``::ffff:192.168.42.1`` as the address. + +Address to Name Lookups Using Nibble Format +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +When looking up an address in nibble format, the address components are +simply reversed, just as in IPv4, and ``ip6.arpa.`` is appended to the +resulting name. For example, the following would provide reverse name +lookup for a host with address ``2001:db8::1``. + +:: + + $ORIGIN 0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa. + 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 14400 IN PTR ( + host.example.com. ) diff --git a/doc/arm/catz.rst b/doc/arm/catz.rst new file mode 100644 index 0000000000..517d490ea1 --- /dev/null +++ b/doc/arm/catz.rst @@ -0,0 +1,247 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _catz-info: + +Catalog Zones +------------- + +A "catalog zone" is a special DNS zone that contains a list of other +zones to be served, along with their configuration parameters. Zones +listed in a catalog zone are called "member zones". When a catalog zone +is loaded or transferred to a slave server which supports this +functionality, the slave server will create the member zones +automatically. When the catalog zone is updated (for example, to add or +delete member zones, or change their configuration parameters) those +changes are immediately put into effect. Because the catalog zone is a +normal DNS zone, these configuration changes can be propagated using the +standard AXFR/IXFR zone transfer mechanism. + +Catalog zones' format and behavior are specified as an internet draft +for interoperability among DNS implementations. As of this release, the +latest revision of the DNS catalog zones draft can be found here: +https://datatracker.ietf.org/doc/draft-muks-dnsop-dns-catalog-zones/ + +Principle of Operation +~~~~~~~~~~~~~~~~~~~~~~ + +Normally, if a zone is to be served by a slave server, the +``named.conf`` file on the server must list the zone, or the zone must +be added using ``rndc addzone``. In environments with a large number of +slave servers and/or where the zones being served are changing +frequently, the overhead involved in maintaining consistent zone +configuration on all the slave servers can be significant. + +A catalog zone is a way to ease this administrative burden. It is a DNS +zone that lists member zones that should be served by slave servers. +When a slave server receives an update to the catalog zone, it adds, +removes, or reconfigures member zones based on the data received. + +To use a catalog zone, it must first be set up as a normal zone on the +master and the on slave servers that will be configured to use it. It +must also be added to a ``catalog-zones`` list in the ``options`` or +``view`` statement in ``named.conf``. (This is comparable to the way a +policy zone is configured as a normal zone and also listed in a +``response-policy`` statement.) + +To use the catalog zone feature to serve a new member zone: + +- Set up the the member zone to be served on the master as normal. This + could be done by editing ``named.conf``, or by running + ``rndc addzone``. + +- Add an entry to the catalog zone for the new member zone. This could + be done by editing the catalog zone's master file and running + ``rndc reload``, or by updating the zone using ``nsupdate``. + +The change to the catalog zone will be propagated from the master to all +slaves using the normal AXFR/IXFR mechanism. When the slave receives the +update to the catalog zone, it will detect the entry for the new member +zone, create an instance of of that zone on the slave server, and point +that instance to the ``masters`` specified in the catalog zone data. The +newly created member zone is a normal slave zone, so BIND will +immediately initiate a transfer of zone contents from the master. Once +complete, the slave will start serving the member zone. + +Removing a member zone from a slave server requires nothing more than +deleting the member zone's entry in the catalog zone. The change to the +catalog zone is propagated to the slave server using the normal +AXFR/IXFR transfer mechanism. The slave server, on processing the +update, will notice that the member zone has been removed. It will stop +serving the zone and remove it from its list of configured zones. +(Removing the member zone from the master server has to be done in the +normal way, by editing the configuration file or running +``rndc delzone``.) + +Configuring Catalog Zones +~~~~~~~~~~~~~~~~~~~~~~~~~ + +Catalog zones are configured with a ``catalog-zones`` statement in the +``options`` or ``view`` section of ``named.conf``. For example, + +:: + + catalog-zones { + zone "catalog.example" + default-masters { 10.53.0.1; } + in-memory no + zone-directory "catzones" + min-update-interval 10; + }; + +This statement specifies that the zone ``catalog.example`` is a catalog +zone. This zone must be properly configured in the same view. In most +configurations, it would be a slave zone. + +The options following the zone name are not required, and may be +specified in any order: + +The ``default-masters`` option defines the default masters for member +zones listed in a catalog zone. This can be overridden by options within +a catalog zone. If no such options are included, then member zones will +transfer their contents from the servers listed in this option. + +The ``in-memory`` option, if set to ``yes``, causes member zones to be +stored only in memory. This is functionally equivalent to configuring a +slave zone without a ``file``. option. The default is ``no``; member +zones' content will be stored locally in a file whose name is +automatically generated from the view name, catalog zone name, and +member zone name. + +The ``zone-directory`` option causes local copies of member zones' +master files (if ``in-memory`` is not set to ``yes``) to be stored in +the specified directory. The default is to store zone files in the +server's working directory. A non-absolute pathname in +``zone-directory`` is assumed to be relative to the working directory. + +The ``min-update-interval`` option sets the minimum interval between +processing of updates to catalog zones, in seconds. If an update to a +catalog zone (for example, via IXFR) happens less than +``min-update-interval`` seconds after the most recent update, then the +changes will not be carried out until this interval has elapsed. The +default is ``5`` seconds. + +Catalog zones are defined on a per-view basis. Configuring a non-empty +``catalog-zones`` statement in a view will automatically turn on +``allow-new-zones`` for that view. (Note: this means ``rndc addzone`` +and ``rndc delzone`` will also work in any view that supports catalog +zones.) + +Catalog Zone format +~~~~~~~~~~~~~~~~~~~ + +A catalog zone is a regular DNS zone; therefore, it has to have a single +``SOA`` and at least one ``NS`` record. + +A record stating the version of the catalog zone format is also +required. If the version number listed is not supported by the server, +then a catalog zone may not be used by that server. + +:: + + catalog.example. IN SOA . . 2016022901 900 600 86400 1 + catalog.example. IN NS nsexample. + version.catalog.example. IN TXT "1" + +Note that this record must have the domain name +version.catalog-zone-name. This illustrates how the meaning of data +stored in a catalog zone is indicated by the the domain name label +immediately before the catalog zone domain. + +Catalog zone options can be set either globally for the whole catalog +zone or for a single member zone. Global options override the settings +in the configuration file and member zone options override global +options. + +Global options are set at the apex of the catalog zone, e.g.: + +:: + + masters.catalog.example. IN AAAA 2001:db8::1 + +BIND currently supports the following options: + +- A simple ``masters`` definition: + + :: + + masters.catalog.example. IN A 192.0.2.1 + + + This option defines a master server for the member zones - it can be + either an A or AAAA record. If multiple masters are set the order in + which they are used is random. + +- A ``masters`` with a TSIG key defined: + + :: + + label.masters.catalog.example. IN A 192.0.2.2 + label.masters.catalog.example. IN TXT "tsig_key_name" + + + This option defines a master server for the member zone with a TSIG + key set. The TSIG key must be configured in the configuration file. + ``label`` can be any valid DNS label. + +- ``allow-query`` and ``allow-transfer`` ACLs: + + :: + + allow-query.catalog.example. IN APL 1:10.0.0.1/24 + allow-transfer.catalog.example. IN APL !1:10.0.0.1/32 1:10.0.0.0/24 + + + These options are the equivalents of ``allow-query`` and + ``allow-transfer`` in a zone declaration in the ``named.conf`` + configuration file. The ACL is processed in order - if there's no + match to any rule the default policy is to deny access. For the + syntax of the APL RR see :rfc:`3123` + +A member zone is added by including a ``PTR`` resource record in the +``zones`` sub-domain of the catalog zone. The record label is a +``SHA-1`` hash of the member zone name in wire format. The target of the +PTR record is the member zone name. For example, to add the member zone +``domain.example``: + +:: + + 5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN PTR domain.example. + +The hash is necessary to identify options for a specific member zone. +The member zone-specific options are defined the same way as global +options, but in the member zone subdomain: + +:: + + masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN A 192.0.2.2 + label.masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN AAAA 2001:db8::2 + label.masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN TXT "tsig_key" + allow-query.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN APL 1:10.0.0.0/24 + +As would be expected, options defined for a specific zone override the +global options defined in the catalog zone. These in turn override the +global options defined in the ``catalog-zones`` statement in the +configuration file. + +(Note that none of the global records an option will be inherited if any +records are defined for that option for the specific zone. For example, +if the zone had a ``masters`` record of type A but not AAAA, then it +would *not* inherit the type AAAA record from the global option.) diff --git a/doc/arm/catz.xml b/doc/arm/catz.xml deleted file mode 100644 index f314b44d9a..0000000000 --- a/doc/arm/catz.xml +++ /dev/null @@ -1,277 +0,0 @@ - - -
Catalog Zones - - - A "catalog zone" is a special DNS zone that contains a list of - other zones to be served, along with their configuration parameters. - Zones listed in a catalog zone are called "member zones". - When a catalog zone is loaded or transferred to a slave server - which supports this functionality, the slave server will create - the member zones automatically. When the catalog zone is updated - (for example, to add or delete member zones, or change - their configuration parameters) those changes are immediately put - into effect. Because the catalog zone is a normal DNS zone, these - configuration changes can be propagated using the standard AXFR/IXFR - zone transfer mechanism. - - - Catalog zones' format and behavior are specified as an internet draft - for interoperability among DNS implementations. As of this release, the - latest revision of the DNS catalog zones draft can be found here: - https://datatracker.ietf.org/doc/draft-muks-dnsop-dns-catalog-zones/ - - -
Principle of Operation - - Normally, if a zone is to be served by a slave server, the - named.conf file on the server must list the - zone, or the zone must be added using rndc addzone. - In environments with a large number of slave servers and/or where - the zones being served are changing frequently, the overhead involved - in maintaining consistent zone configuration on all the slave - servers can be significant. - - - A catalog zone is a way to ease this administrative burden. It is a - DNS zone that lists member zones that should be served by slave servers. - When a slave server receives an update to the catalog zone, it adds, - removes, or reconfigures member zones based on the data received. - - - To use a catalog zone, it must first be set up as a normal zone on - the master and the on slave servers that will be configured to use - it. It must also be added to a list - in the or statement - in named.conf. (This is comparable to the way - a policy zone is configured as a normal zone and also listed in - a statement.) - - - To use the catalog zone feature to serve a new member zone: - - - - Set up the the member zone to be served on the master as normal. - This could be done by editing named.conf, - or by running rndc addzone. - - - - - Add an entry to the catalog zone for the new member zone. - This could be done by editing the catalog zone's master file - and running rndc reload, or by updating - the zone using nsupdate. - - - - The change to the catalog zone will be propagated from the master to all - slaves using the normal AXFR/IXFR mechanism. When the slave receives the - update to the catalog zone, it will detect the entry for the new member - zone, create an instance of of that zone on the slave server, and point - that instance to the specified in the catalog - zone data. The newly created member zone is a normal slave zone, so - BIND will immediately initiate a transfer of zone contents from the - master. Once complete, the slave will start serving the member zone. - - - Removing a member zone from a slave server requires nothing more than - deleting the member zone's entry in the catalog zone. The change to the - catalog zone is propagated to the slave server using the normal AXFR/IXFR - transfer mechanism. The slave server, on processing the update, will - notice that the member zone has been removed. It will stop serving the - zone and remove it from its list of configured zones. (Removing the - member zone from the master server has to be done in the normal way, - by editing the configuration file or running - rndc delzone.) - -
- -
Configuring Catalog Zones - - Catalog zones are configured with a catalog-zones - statement in the options or view - section of named.conf. For example, - - -catalog-zones { - zone "catalog.example" - default-masters { 10.53.0.1; } - in-memory no - zone-directory "catzones" - min-update-interval 10; -}; - - - This statement specifies that the zone - catalog.example is a catalog zone. This zone must be - properly configured in the same view. In most configurations, it would - be a slave zone. - - - The options following the zone name are not required, and may be - specified in any order: - - - The option defines the default masters - for member zones listed in a catalog zone. This can be overridden by - options within a catalog zone. If no such options are included, then - member zones will transfer their contents from the servers listed in - this option. - - - The option, if set to yes, - causes member zones to be stored only in memory. This is functionally - equivalent to configuring a slave zone without a . - option. The default is no; member zones' content - will be stored locally in a file whose name is automatically generated - from the view name, catalog zone name, and member zone name. - - - The option causes local copies of - member zones' master files (if is not set - to yes) to be stored in the specified directory. - The default is to store zone files in the server's working directory. - A non-absolute pathname in is - assumed to be relative to the working directory. - - - The option sets the minimum - interval between processing of updates to catalog zones, in seconds. - If an update to a catalog zone (for example, via IXFR) happens less - than seconds after the most - recent update, then the changes will not be carried out until this - interval has elapsed. The default is 5 seconds. - - - Catalog zones are defined on a per-view basis. Configuring a non-empty - statement in a view will automatically - turn on for that view. (Note: this - means rndc addzone and rndc delzone - will also work in any view that supports catalog zones.) - -
- -
Catalog Zone format - - A catalog zone is a regular DNS zone; therefore, it has to have a - single SOA and at least one NS - record. - - - A record stating the version of the catalog zone format is - also required. If the version number listed is not supported by - the server, then a catalog zone may not be used by that server. - - -catalog.example. IN SOA . . 2016022901 900 600 86400 1 -catalog.example. IN NS nsexample. -version.catalog.example. IN TXT "1" - - - Note that this record must have the domain name - version.catalog-zone-name. This illustrates - how the meaning of data stored in a catalog zone is indicated by the - the domain name label immediately before the catalog zone domain. - - - Catalog zone options can be set either globally for the whole catalog - zone or for a single member zone. Global options override the settings - in the configuration file and member zone options override global - options. - - - Global options are set at the apex of the catalog zone, e.g.: - - - masters.catalog.example. IN AAAA 2001:db8::1 - - BIND currently supports the following options: - - - A simple definition: - - masters.catalog.example. IN A 192.0.2.1 - - - This option defines a master server for the member zones - it - can be either an A or AAAA record. If multiple masters are set the - order in which they are used is random. - - - - A with a TSIG key defined: - - label.masters.catalog.example. IN A 192.0.2.2 - label.masters.catalog.example. IN TXT "tsig_key_name" - - - This option defines a master server for the member zone with a TSIG - key set. The TSIG key must be configured in the configuration file. - can be any valid DNS label. - - - - and - ACLs: - - allow-query.catalog.example. IN APL 1:10.0.0.1/24 - allow-transfer.catalog.example. IN APL !1:10.0.0.1/32 1:10.0.0.0/24 - - - These options are the equivalents of - and in a zone declaration in the - named.conf configuration file. The ACL is - processed in order - if there's no match to any rule the default - policy is to deny access. For the syntax of the APL RR see RFC - 3123 - - - - - A member zone is added by including a PTR - resource record in the zones sub-domain of the - catalog zone. The record label is a SHA-1 hash - of the member zone name in wire format. The target of the PTR - record is the member zone name. For example, to add the member - zone domain.example: - - -5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN PTR domain.example. - - - The hash is necessary to identify options for a specific member - zone. The member zone-specific options are defined the same way as - global options, but in the member zone subdomain: - - -masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN A 192.0.2.2 -label.masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN AAAA 2001:db8::2 -label.masters.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN TXT "tsig_key" -allow-query.5960775ba382e7a4e09263fc06e7c00569b6a05c.zones.catalog.example. IN APL 1:10.0.0.0/24 - - - As would be expected, options defined for a specific zone override - the global options defined in the catalog zone. These in turn override - the global options defined in the catalog-zones - statement in the configuration file. - - - (Note that none of the global records an option will be inherited if - any records are defined for that option for the specific zone. For - example, if the zone had a masters record of type - A but not AAAA, then it would not inherit the - type AAAA record from the global option.) - -
-
diff --git a/doc/arm/conf.py b/doc/arm/conf.py new file mode 100644 index 0000000000..dbf9cd7086 --- /dev/null +++ b/doc/arm/conf.py @@ -0,0 +1,90 @@ +############################################################################ +# Copyright (C) Internet Systems Consortium, Inc. ("ISC") +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# See the COPYRIGHT file distributed with this work for additional +# information regarding copyright ownership. +############################################################################ + +# flake8: noqa: E501 + +# +# Configuration file for the Sphinx documentation builder. +# +# This file only contains a selection of the most common options. For a full +# list see the documentation: +# http://www.sphinx-doc.org/en/master/config + +# -- Path setup -------------------------------------------------------------- + +# If extensions (or modules to document with autodoc) are in another directory, +# add these directories to sys.path here. If the directory is relative to the +# documentation root, use os.path.abspath to make it absolute, like shown here. +# +# import os +# import sys +# sys.path.insert(0, os.path.abspath('.')) + + +# -- Project information ----------------------------------------------------- + +project = u'BIND 9' +# pylint: disable=redefined-builtin +copyright = u'2020, Internet Systems Consortium' +author = u'Internet Systems Consortium' + +# -- General configuration --------------------------------------------------- + +# Add any Sphinx extension module names here, as strings. They can be +# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom +# ones. +extensions = [] + +# Add any paths that contain templates here, relative to this directory. +templates_path = ['_templates'] + +# List of patterns, relative to source directory, that match files and +# directories to ignore when looking for source files. +# This pattern also affects html_static_path and html_extra_path. +exclude_patterns = [ + '_build', + 'Thumbs.db', + '.DS_Store', + '*.grammar.rst', + '*.zoneopts.rst', + 'catz.rst', + 'dlz.rst', + 'dnssec.rst', + 'dyndb.rst', + 'logging-cattegories.rst', + 'managed-keys.rst', + 'pkcs11.rst', + 'plugins.rst' + ] + +# The master toctree document. +master_doc = 'index' + +# Additional documents +notes_doc = 'notes' + +# -- Options for HTML output ------------------------------------------------- + +# The theme to use for HTML and HTML Help pages. See the documentation for +# a list of builtin themes. +# +html_theme = 'sphinx_rtd_theme' + +# -- Options for LaTeX output ------------------------------------------------ +latex_engine = 'xelatex' + +# pylint disable=line-too-long +latex_documents = [ + (master_doc, 'Bv9ARM.tex', u'BIND 9 Administrator Reference Manual', author, 'manual'), + (notes_doc, 'notes.tex', u'BIND 9 Release Notes', author, 'howto'), + ] + +latex_logo = "isc-logo.pdf" diff --git a/doc/arm/configuration.rst b/doc/arm/configuration.rst new file mode 100644 index 0000000000..2530e41297 --- /dev/null +++ b/doc/arm/configuration.rst @@ -0,0 +1,347 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. Configuration: + +Name Server Configuration +========================= + +In this chapter we provide some suggested configurations along with +guidelines for their use. We suggest reasonable values for certain +option settings. + +.. _sample_configuration: + +Sample Configurations +--------------------- + +.. _cache_only_sample: + +A Caching-only Name Server +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The following sample configuration is appropriate for a caching-only +name server for use by clients internal to a corporation. All queries +from outside clients are refused using the ``allow-query`` option. +Alternatively, the same effect could be achieved using suitable firewall +rules. + +:: + + // Two corporate subnets we wish to allow queries from. + acl corpnets { 192.168.4.0/24; 192.168.7.0/24; }; + options { + // Working directory + directory "/etc/namedb"; + + allow-query { corpnets; }; + }; + // Provide a reverse mapping for the loopback + // address 127.0.0.1 + zone "0.0.127.in-addr.arpa" { + type master; + file "localhost.rev"; + notify no; + }; + +.. _auth_only_sample: + +An Authoritative-only Name Server +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +This sample configuration is for an authoritative-only server that is +the master server for "``example.com``" and a slave for the subdomain +"``eng.example.com``". + +:: + + options { + // Working directory + directory "/etc/namedb"; + // Do not allow access to cache + allow-query-cache { none; }; + // This is the default + allow-query { any; }; + // Do not provide recursive service + recursion no; + }; + + // Provide a reverse mapping for the loopback + // address 127.0.0.1 + zone "0.0.127.in-addr.arpa" { + type master; + file "localhost.rev"; + notify no; + }; + // We are the master server for example.com + zone "example.com" { + type master; + file "example.com.db"; + // IP addresses of slave servers allowed to + // transfer example.com + allow-transfer { + 192.168.4.14; + 192.168.5.53; + }; + }; + // We are a slave server for eng.example.com + zone "eng.example.com" { + type slave; + file "eng.example.com.bk"; + // IP address of eng.example.com master server + masters { 192.168.4.12; }; + }; + +.. _load_balancing: + +Load Balancing +-------------- + +A primitive form of load balancing can be achieved in the DNS by using +multiple records (such as multiple A records) for one name. + +For example, if you have three HTTP servers with network addresses of +10.0.0.1, 10.0.0.2 and 10.0.0.3, a set of records such as the following +means that clients will connect to each machine one third of the time: + ++-----------+------+----------+----------+----------------------------+ +| Name | TTL | CLASS | TYPE | Resource Record (RR) Data | ++-----------+------+----------+----------+----------------------------+ +| www | 600 | IN | A | 10.0.0.1 | ++-----------+------+----------+----------+----------------------------+ +| | 600 | IN | A | 10.0.0.2 | ++-----------+------+----------+----------+----------------------------+ +| | 600 | IN | A | 10.0.0.3 | ++-----------+------+----------+----------+----------------------------+ + +When a resolver queries for these records, BIND will rotate them and +respond to the query with the records in a different order. In the +example above, clients will randomly receive records in the order 1, 2, +3; 2, 3, 1; and 3, 1, 2. Most clients will use the first record returned +and discard the rest. + +For more detail on ordering responses, check the ``rrset-order`` +sub-statement in the ``options`` statement, see :ref:`rrset_ordering`. + +.. _ns_operations: + +Name Server Operations +---------------------- + +.. _tools: + +Tools for Use With the Name Server Daemon +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +This section describes several indispensable diagnostic, administrative +and monitoring tools available to the system administrator for +controlling and debugging the name server daemon. + +.. _diagnostic_tools: + +Diagnostic Tools +^^^^^^^^^^^^^^^^ + +The ``dig``, ``host``, and ``nslookup`` programs are all command line +tools for manually querying name servers. They differ in style and +output format. + +``dig`` + ``dig`` is the most versatile and complete of these lookup tools. It + has two modes: simple interactive mode for a single query, and batch + mode which executes a query for each in a list of several query + lines. All query options are accessible from the command line. + + ``dig [@server] domain [query-type][query-class][+query-option][-dig-option][%comment]`` + + The usual simple use of ``dig`` will take the form + + ``dig @server domain query-type query-class`` + + For more information and a list of available commands and options, + see the ``dig`` man page. + +``host`` + The ``host`` utility emphasizes simplicity and ease of use. By + default, it converts between host names and Internet addresses, but + its functionality can be extended with the use of options. + + ``host [-aCdlnrsTwv][-c class][-N ndots][-t type][-W timeout][-R retries][-m flag][-4][-6] hostname [server]`` + + For more information and a list of available commands and options, + see the ``host`` man page. + +``nslookup`` + ``nslookup`` has two modes: interactive and non-interactive. + Interactive mode allows the user to query name servers for + information about various hosts and domains or to print a list of + hosts in a domain. Non-interactive mode is used to print just the + name and requested information for a host or domain. + + ``nslookup [-option][ [host-to-find]|[-[server]] ]`` + + Interactive mode is entered when no arguments are given (the default + name server will be used) or when the first argument is a hyphen + (``-``) and the second argument is the host name or Internet address of + a name server. + + Non-interactive mode is used when the name or Internet address of the + host to be looked up is given as the first argument. The optional + second argument specifies the host name or address of a name server. + + Due to its arcane user interface and frequently inconsistent + behavior, we do not recommend the use of ``nslookup``. Use ``dig`` + instead. + +.. _admin_tools: + +Administrative Tools +^^^^^^^^^^^^^^^^^^^^ + +Administrative tools play an integral part in the management of a +server. + +``named-checkconf`` + The ``named-checkconf`` program checks the syntax of a ``named.conf`` + file. + + ``named-checkconf [-jvz][-t directory][filename]`` + +``named-checkzone`` + The ``named-checkzone`` program checks a master file for syntax and + consistency. + + ``named-checkzone [-djqvD][-c class][-o output][-t directory][-w directory][-k (ignore|warn|fail)][-n (ignore|warn|fail)][-W (ignore|warn)] zone [filename]`` + +``named-compilezone`` + Similar to ``named-checkzone,`` but it always dumps the zone content + to a specified file (typically in a different format). + +``rndc`` + The remote name daemon control (``rndc``) program allows the system + administrator to control the operation of a name server. If you run + ``rndc`` without any options, it will display a usage message as + follows: + + rndc [-c config][-s server][-p port][-y key] command [command...] + + See :ref:`man_rndc` for details of the available ``rndc`` + commands. + + ``rndc`` requires a configuration file, since all communication with + the server is authenticated with digital signatures that rely on a + shared secret, and there is no way to provide that secret other than + with a configuration file. The default location for the ``rndc`` + configuration file is ``/etc/rndc.conf``, but an alternate location + can be specified with the ``-c`` option. If the configuration file is + not found, ``rndc`` will also look in ``/etc/rndc.key`` (or whatever + ``sysconfdir`` was defined when the BIND build was configured). The + ``rndc.key`` file is generated by running ``rndc-confgen -a`` as + described in :ref:`controls_statement_definition_and_usage`. + + The format of the configuration file is similar to that of + ``named.conf``, but limited to only four statements, the ``options``, + ``key``, ``server`` and ``include`` statements. These statements are + what associate the secret keys to the servers with which they are + meant to be shared. The order of statements is not significant. + + The ``options`` statement has three clauses: ``default-server``, + ``default-key``, and ``default-port``. ``default-server`` takes a + host name or address argument and represents the server that will be + contacted if no ``-s`` option is provided on the command line. + ``default-key`` takes the name of a key as its argument, as defined + by a ``key`` statement. ``default-port`` specifies the port to which + ``rndc`` should connect if no port is given on the command line or in + a ``server`` statement. + + The ``key`` statement defines a key to be used by ``rndc`` when + authenticating with ``named``. Its syntax is identical to the ``key`` + statement in ``named.conf``. The keyword ``key`` is followed by a key + name, which must be a valid domain name, though it need not actually + be hierarchical; thus, a string like "``rndc_key``" is a valid name. + The ``key`` statement has two clauses: ``algorithm`` and ``secret``. + While the configuration parser will accept any string as the argument + to algorithm, currently only the strings "``hmac-md5``", + "``hmac-sha1``", "``hmac-sha224``", "``hmac-sha256``", + "``hmac-sha384``" and "``hmac-sha512``" have any meaning. The secret + is a Base64 encoded string as specified in :rfc:`3548`. + + The ``server`` statement associates a key defined using the ``key`` + statement with a server. The keyword ``server`` is followed by a host + name or address. The ``server`` statement has two clauses: ``key`` + and ``port``. The ``key`` clause specifies the name of the key to be + used when communicating with this server, and the ``port`` clause can + be used to specify the port ``rndc`` should connect to on the server. + + A sample minimal configuration file is as follows: + + :: + + key rndc_key { + algorithm "hmac-sha256"; + secret + "c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K"; + }; + options { + default-server 127.0.0.1; + default-key rndc_key; + }; + + This file, if installed as ``/etc/rndc.conf``, would allow the + command: + + ``$ rndc reload`` + + to connect to 127.0.0.1 port 953 and cause the name server to reload, + if a name server on the local machine were running with following + controls statements: + + :: + + controls { + inet 127.0.0.1 + allow { localhost; } keys { rndc_key; }; + }; + + and it had an identical key statement for ``rndc_key``. + + Running the ``rndc-confgen`` program will conveniently create a + ``rndc.conf`` file for you, and also display the corresponding + ``controls`` statement that you need to add to ``named.conf``. + Alternatively, you can run ``rndc-confgen -a`` to set up a + ``rndc.key`` file and not modify ``named.conf`` at all. + +Signals +~~~~~~~ + +Certain UNIX signals cause the name server to take specific actions, as +described in the following table. These signals can be sent using the +``kill`` command. + ++--------------+-------------------------------------------------------+ +| ``SIGHUP`` | Causes the server to read ``named.conf`` and reload | +| | the database. | ++--------------+-------------------------------------------------------+ +| ``SIGTERM`` | Causes the server to clean up and exit. | ++--------------+-------------------------------------------------------+ +| ``SIGINT`` | Causes the server to clean up and exit. | ++--------------+-------------------------------------------------------+ + +.. include:: plugins.rst diff --git a/doc/arm/controls.grammar.xml b/doc/arm/controls.grammar.xml deleted file mode 100644 index df4accfe30..0000000000 --- a/doc/arm/controls.grammar.xml +++ /dev/null @@ -1,26 +0,0 @@ - - - - - -controls { - inet ( ipv4_address | ipv6_address | - * ) [ port ( integer | * ) ] allow - { address_match_element; ... } [ - keys { string; ... } ] [ read-only - boolean ]; - unix quoted_string perm integer - owner integer group integer [ - keys { string; ... } ] [ read-only - boolean ]; -}; - diff --git a/doc/arm/delegation-only.zoneopt.xml b/doc/arm/delegation-only.zoneopt.xml deleted file mode 100644 index a26ce24f45..0000000000 --- a/doc/arm/delegation-only.zoneopt.xml +++ /dev/null @@ -1,17 +0,0 @@ - - - - -zone string [ class ] { - type delegation-only; -}; - diff --git a/doc/arm/dlz.rst b/doc/arm/dlz.rst new file mode 100644 index 0000000000..29c91b4d38 --- /dev/null +++ b/doc/arm/dlz.rst @@ -0,0 +1,140 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _dlz-info: + +DLZ (Dynamically Loadable Zones) +-------------------------------- + +DLZ (Dynamically Loadable Zones) is an extension to BIND 9 that allows +zone data to be retrieved directly from an external database. There is +no required format or schema. DLZ drivers exist for several different +database backends including PostgreSQL, MySQL, and LDAP and can be +written for any other. + +Historically, DLZ drivers had to be statically linked with the ``named`` +binary and were turned on via a configure option at compile time (for +example, ``"configure --with-dlz-ldap"``). Currently, the drivers +provided in the BIND 9 tarball in ``contrib/dlz/drivers`` are still +linked this way. + +In BIND 9.8 and higher, it is possible to link some DLZ modules +dynamically at runtime, via the DLZ "dlopen" driver, which acts as a +generic wrapper around a shared object implementing the DLZ API. The +"dlopen" driver is linked into ``named`` by default, so configure +options are no longer necessary when using these dynamically linkable +drivers, but are still needed for the older drivers in +``contrib/dlz/drivers``. + +When the DLZ module provides data to ``named``, it does so in text +format. The response is converted to DNS wire format by ``named``. This +conversion, and the lack of any internal caching, places significant +limits on the query performance of DLZ modules. Consequently, DLZ is not +recommended for use on high-volume servers. However, it can be used in a +hidden master configuration, with slaves retrieving zone updates via +AXFR. (Note, however, that DLZ has no built-in support for DNS notify; +slaves are not automatically informed of changes to the zones in the +database.) + +Configuring DLZ +~~~~~~~~~~~~~~~ + +A DLZ database is configured with a ``dlz`` statement in ``named.conf``: + +:: + + dlz example { + database "dlopen driver.so args"; + search yes; + }; + + +This specifies a DLZ module to search when answering queries; the module +is implemented in ``driver.so`` and is loaded at runtime by the dlopen +DLZ driver. Multiple ``dlz`` statements can be specified; when answering +a query, all DLZ modules with ``search`` set to ``yes`` will be queried +to find out if they contain an answer for the query name; the best +available answer will be returned to the client. + +The ``search`` option in the above example can be omitted, because +``yes`` is the default value. + +If ``search`` is set to ``no``, then this DLZ module is *not* searched +for the best match when a query is received. Instead, zones in this DLZ +must be separately specified in a zone statement. This allows you to +configure a zone normally using standard zone option semantics, but +specify a different database back-end for storage of the zone's data. +For example, to implement NXDOMAIN redirection using a DLZ module for +back-end storage of redirection rules: + +:: + + dlz other { + database "dlopen driver.so args"; + search no; + }; + + zone "." { + type redirect; + dlz other; + }; + + +Sample DLZ Driver +~~~~~~~~~~~~~~~~~ + +For guidance in implementation of DLZ modules, the directory +``contrib/dlz/example`` contains a basic dynamically-linkable DLZ +module--i.e., one which can be loaded at runtime by the "dlopen" DLZ +driver. The example sets up a single zone, whose name is passed to the +module as an argument in the ``dlz`` statement: + +:: + + dlz other { + database "dlopen driver.so example.nil"; + }; + + +In the above example, the module is configured to create a zone +"example.nil", which can answer queries and AXFR requests, and accept +DDNS updates. At runtime, prior to any updates, the zone contains an +SOA, NS, and a single A record at the apex: + +:: + + example.nil. 3600 IN SOA example.nil. hostmaster.example.nil. ( + 123 900 600 86400 3600 + ) + example.nil. 3600 IN NS example.nil. + example.nil. 1800 IN A 10.53.0.1 + + +The sample driver is capable of retrieving information about the +querying client, and altering its response on the basis of this +information. To demonstrate this feature, the example driver responds to +queries for "source-addr.``zonename``>/TXT" with the source address of +the query. Note, however, that this record will \*not\* be included in +AXFR or ANY responses. Normally, this feature would be used to alter +responses in some other fashion, e.g., by providing different address +records for a particular name depending on the network from which the +query arrived. + +Documentation of the DLZ module API can be found in +``contrib/dlz/example/README``. This directory also contains the header +file ``dlz_minimal.h``, which defines the API and should be included by +any dynamically-linkable DLZ module. diff --git a/doc/arm/dlz.xml b/doc/arm/dlz.xml deleted file mode 100644 index 93ee5db5ec..0000000000 --- a/doc/arm/dlz.xml +++ /dev/null @@ -1,148 +0,0 @@ - - - -
DLZ (Dynamically Loadable Zones) - - - DLZ (Dynamically Loadable Zones) is an extension to BIND 9 that allows - zone data to be retrieved directly from an external database. There is - no required format or schema. DLZ drivers exist for several different - database backends including PostgreSQL, MySQL, and LDAP and can be - written for any other. - - - Historically, DLZ drivers had to be statically linked with the named - binary and were turned on via a configure option at compile time (for - example, "configure --with-dlz-ldap"). - Currently, the drivers provided in the BIND 9 tarball in - contrib/dlz/drivers are still linked this - way. - - - In BIND 9.8 and higher, it is possible to link some DLZ modules - dynamically at runtime, via the DLZ "dlopen" driver, which acts as a - generic wrapper around a shared object implementing the DLZ API. The - "dlopen" driver is linked into named by default, so configure options - are no longer necessary when using these dynamically linkable drivers, - but are still needed for the older drivers in - contrib/dlz/drivers. - - - - When the DLZ module provides data to named, it does so in text format. - The response is converted to DNS wire format by named. This - conversion, and the lack of any internal caching, places significant - limits on the query performance of DLZ modules. Consequently, DLZ is - not recommended for use on high-volume servers. However, it can be - used in a hidden master configuration, with slaves retrieving zone - updates via AXFR. (Note, however, that DLZ has no built-in support for - DNS notify; slaves are not automatically informed of changes to the - zones in the database.) - - -
Configuring DLZ - - - A DLZ database is configured with a dlz - statement in named.conf: - - - dlz example { - database "dlopen driver.so "; - search yes; - }; - - - This specifies a DLZ module to search when answering queries; the - module is implemented in driver.so and is - loaded at runtime by the dlopen DLZ driver. Multiple - dlz statements can be specified; when - answering a query, all DLZ modules with - set to yes will be queried to find out if - they contain an answer for the query name; the best available - answer will be returned to the client. - - - The option in the above example can be - omitted, because yes is the default value. - - - If is set to no, then - this DLZ module is not searched for the best - match when a query is received. Instead, zones in this DLZ must be - separately specified in a zone statement. This allows you to - configure a zone normally using standard zone option semantics, - but specify a different database back-end for storage of the - zone's data. For example, to implement NXDOMAIN redirection using - a DLZ module for back-end storage of redirection rules: - - - dlz other { - database "dlopen driver.so "; - search no; - }; - - zone "." { - type redirect; - dlz other; - }; - -
-
Sample DLZ Driver - - - For guidance in implementation of DLZ modules, the directory - contrib/dlz/example contains a basic - dynamically-linkable DLZ module--i.e., one which can be - loaded at runtime by the "dlopen" DLZ driver. - The example sets up a single zone, whose name is passed - to the module as an argument in the dlz - statement: - - - dlz other { - database "dlopen driver.so example.nil"; - }; - - - In the above example, the module is configured to create a zone - "example.nil", which can answer queries and AXFR requests, and - accept DDNS updates. At runtime, prior to any updates, the zone - contains an SOA, NS, and a single A record at the apex: - - - example.nil. 3600 IN SOA example.nil. hostmaster.example.nil. ( - 123 900 600 86400 3600 - ) - example.nil. 3600 IN NS example.nil. - example.nil. 1800 IN A 10.53.0.1 - - - The sample driver is capable of retrieving information about the - querying client, and altering its response on the basis of this - information. To demonstrate this feature, the example driver - responds to queries for "source-addr.>/TXT" - with the source address of the query. Note, however, that this - record will *not* be included in AXFR or ANY responses. Normally, - this feature would be used to alter responses in some other fashion, - e.g., by providing different address records for a particular name - depending on the network from which the query arrived. - - - Documentation of the DLZ module API can be found in - contrib/dlz/example/README. This directory also - contains the header file dlz_minimal.h, which - defines the API and should be included by any dynamically-linkable - DLZ module. - -
-
diff --git a/doc/arm/dnssec-policy.grammar.xml b/doc/arm/dnssec-policy.grammar.xml deleted file mode 100644 index 08e3890e6b..0000000000 --- a/doc/arm/dnssec-policy.grammar.xml +++ /dev/null @@ -1,30 +0,0 @@ - - - - - -dnssec-policy string { - dnskey-ttl duration; - keys { ( csk | ksk | zsk ) key-directory lifetime ( duration | unlimited ) algorithm integer [ integer ] ; ... }; - max-zone-ttl duration; - parent-ds-ttl duration; - parent-propagation-delay duration; - parent-registration-delay duration; - publish-safety duration; - retire-safety duration; - signatures-refresh duration; - signatures-validity duration; - signatures-validity-dnskey duration; - zone-propagation-delay duration; -}; - - diff --git a/doc/arm/dnssec.rst b/doc/arm/dnssec.rst new file mode 100644 index 0000000000..320e22889b --- /dev/null +++ b/doc/arm/dnssec.rst @@ -0,0 +1,275 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _dnssec.dynamic.zones: + +DNSSEC, Dynamic Zones, and Automatic Signing +-------------------------------------------- + +Converting from insecure to secure +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Changing a zone from insecure to secure can be done in two ways: using a +dynamic DNS update, or the ``auto-dnssec`` zone option. + +For either method, you need to configure ``named`` so that it can see +the ``K*`` files which contain the public and private parts of the keys +that will be used to sign the zone. These files will have been generated +by ``dnssec-keygen``. You can do this by placing them in the +key-directory, as specified in ``named.conf``: + +:: + + zone example.net { + type master; + update-policy local; + file "dynamic/example.net/example.net"; + key-directory "dynamic/example.net"; + }; + +If one KSK and one ZSK DNSKEY key have been generated, this +configuration will cause all records in the zone to be signed with the +ZSK, and the DNSKEY RRset to be signed with the KSK as well. An NSEC +chain will be generated as part of the initial signing process. + +Dynamic DNS update method +~~~~~~~~~~~~~~~~~~~~~~~~~ + +To insert the keys via dynamic update: + +:: + + % nsupdate + > ttl 3600 + > update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8= + > update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk= + > send + +While the update request will complete almost immediately, the zone will +not be completely signed until ``named`` has had time to walk the zone +and generate the NSEC and RRSIG records. The NSEC record at the apex +will be added last, to signal that there is a complete NSEC chain. + +If you wish to sign using NSEC3 instead of NSEC, you should add an +NSEC3PARAM record to the initial update request. If you wish the NSEC3 +chain to have the OPTOUT bit set, set it in the flags field of the +NSEC3PARAM record. + +:: + + % nsupdate + > ttl 3600 + > update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8= + > update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk= + > update add example.net NSEC3PARAM 1 1 100 1234567890 + > send + +Again, this update request will complete almost immediately; however, +the record won't show up until ``named`` has had a chance to +build/remove the relevant chain. A private type record will be created +to record the state of the operation (see below for more details), and +will be removed once the operation completes. + +While the initial signing and NSEC/NSEC3 chain generation is happening, +other updates are possible as well. + +Fully automatic zone signing +~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To enable automatic signing, add the ``auto-dnssec`` option to the zone +statement in ``named.conf``. ``auto-dnssec`` has two possible arguments: +``allow`` or ``maintain``. + +With ``auto-dnssec allow``, ``named`` can search the key directory for +keys matching the zone, insert them into the zone, and use them to sign +the zone. It will do so only when it receives an +``rndc sign ``. + +``auto-dnssec maintain`` includes the above functionality, but will also +automatically adjust the zone's DNSKEY records on schedule according to +the keys' timing metadata. (See :ref:`man_dnssec-keygen` and +:ref:`man_dnssec-settime` for more information.) + +``named`` will periodically search the key directory for keys matching +the zone, and if the keys' metadata indicates that any change should be +made the zone, such as adding, removing, or revoking a key, then that +action will be carried out. By default, the key directory is checked for +changes every 60 minutes; this period can be adjusted with the +``dnssec-loadkeys-interval``, up to a maximum of 24 hours. The +``rndc loadkeys`` forces ``named`` to check for key updates immediately. + +If keys are present in the key directory the first time the zone is +loaded, the zone will be signed immediately, without waiting for an +``rndc sign`` or ``rndc loadkeys`` command. (Those commands can still be +used when there are unscheduled key changes, however.) + +When new keys are added to a zone, the TTL is set to match that of any +existing DNSKEY RRset. If there is no existing DNSKEY RRset, then the +TTL will be set to the TTL specified when the key was created (using the +``dnssec-keygen -L`` option), if any, or to the SOA TTL. + +If you wish the zone to be signed using NSEC3 instead of NSEC, submit an +NSEC3PARAM record via dynamic update prior to the scheduled publication +and activation of the keys. If you wish the NSEC3 chain to have the +OPTOUT bit set, set it in the flags field of the NSEC3PARAM record. The +NSEC3PARAM record will not appear in the zone immediately, but it will +be stored for later reference. When the zone is signed and the NSEC3 +chain is completed, the NSEC3PARAM record will appear in the zone. + +Using the ``auto-dnssec`` option requires the zone to be configured to +allow dynamic updates, by adding an ``allow-update`` or +``update-policy`` statement to the zone configuration. If this has not +been done, the configuration will fail. + +Private-type records +~~~~~~~~~~~~~~~~~~~~ + +The state of the signing process is signaled by private-type records +(with a default type value of 65534). When signing is complete, these +records will have a nonzero value for the final octet (for those records +which have a nonzero initial octet). + +The private type record format: If the first octet is non-zero then the +record indicates that the zone needs to be signed with the key matching +the record, or that all signatures that match the record should be +removed. + + algorithm (octet 1) + + key id in network order (octet 2 and 3) + + removal flag (octet 4) + + complete flag (octet 5) + +Only records flagged as "complete" can be removed via dynamic update. +Attempts to remove other private type records will be silently ignored. + +If the first octet is zero (this is a reserved algorithm number that +should never appear in a DNSKEY record) then the record indicates +changes to the NSEC3 chains are in progress. The rest of the record +contains an NSEC3PARAM record. The flag field tells what operation to +perform based on the flag bits. + + 0x01 OPTOUT + + 0x80 CREATE + + 0x40 REMOVE + + 0x20 NONSEC + +DNSKEY rollovers +~~~~~~~~~~~~~~~~ + +As with insecure-to-secure conversions, rolling DNSSEC keys can be done +in two ways: using a dynamic DNS update, or the ``auto-dnssec`` zone +option. + +Dynamic DNS update method +~~~~~~~~~~~~~~~~~~~~~~~~~ + +To perform key rollovers via dynamic update, you need to add the ``K*`` +files for the new keys so that ``named`` can find them. You can then add +the new DNSKEY RRs via dynamic update. ``named`` will then cause the +zone to be signed with the new keys. When the signing is complete the +private type records will be updated so that the last octet is non zero. + +If this is for a KSK you need to inform the parent and any trust anchor +repositories of the new KSK. + +You should then wait for the maximum TTL in the zone before removing the +old DNSKEY. If it is a KSK that is being updated, you also need to wait +for the DS RRset in the parent to be updated and its TTL to expire. This +ensures that all clients will be able to verify at least one signature +when you remove the old DNSKEY. + +The old DNSKEY can be removed via UPDATE. Take care to specify the +correct key. ``named`` will clean out any signatures generated by the +old key after the update completes. + +Automatic key rollovers +~~~~~~~~~~~~~~~~~~~~~~~ + +When a new key reaches its activation date (as set by ``dnssec-keygen`` +or ``dnssec-settime``), if the ``auto-dnssec`` zone option is set to +``maintain``, ``named`` will automatically carry out the key rollover. +If the key's algorithm has not previously been used to sign the zone, +then the zone will be fully signed as quickly as possible. However, if +the new key is replacing an existing key of the same algorithm, then the +zone will be re-signed incrementally, with signatures from the old key +being replaced with signatures from the new key as their signature +validity periods expire. By default, this rollover completes in 30 days, +after which it will be safe to remove the old key from the DNSKEY RRset. + +NSEC3PARAM rollovers via UPDATE +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Add the new NSEC3PARAM record via dynamic update. When the new NSEC3 +chain has been generated, the NSEC3PARAM flag field will be zero. At +this point you can remove the old NSEC3PARAM record. The old chain will +be removed after the update request completes. + +Converting from NSEC to NSEC3 +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To do this, you just need to add an NSEC3PARAM record. When the +conversion is complete, the NSEC chain will have been removed and the +NSEC3PARAM record will have a zero flag field. The NSEC3 chain will be +generated before the NSEC chain is destroyed. + +Converting from NSEC3 to NSEC +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To do this, use ``nsupdate`` to remove all NSEC3PARAM records with a +zero flag field. The NSEC chain will be generated before the NSEC3 chain +is removed. + +Converting from secure to insecure +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +To convert a signed zone to unsigned using dynamic DNS, delete all the +DNSKEY records from the zone apex using ``nsupdate``. All signatures, +NSEC or NSEC3 chains, and associated NSEC3PARAM records will be removed +automatically. This will take place after the update request completes. + +This requires the ``dnssec-secure-to-insecure`` option to be set to +``yes`` in ``named.conf``. + +In addition, if the ``auto-dnssec maintain`` zone statement is used, it +should be removed or changed to ``allow`` instead (or it will re-sign). + +Periodic re-signing +~~~~~~~~~~~~~~~~~~~ + +In any secure zone which supports dynamic updates, ``named`` will +periodically re-sign RRsets which have not been re-signed as a result of +some update action. The signature lifetimes will be adjusted so as to +spread the re-sign load over time rather than all at once. + +NSEC3 and OPTOUT +~~~~~~~~~~~~~~~~ + +``named`` only supports creating new NSEC3 chains where all the NSEC3 +records in the zone have the same OPTOUT state. ``named`` supports +UPDATES to zones where the NSEC3 records in the chain have mixed OPTOUT +state. ``named`` does not support changing the OPTOUT state of an +individual NSEC3 record, the entire chain needs to be changed if the +OPTOUT state of an individual NSEC3 needs to be changed. diff --git a/doc/arm/dnssec.xml b/doc/arm/dnssec.xml deleted file mode 100644 index 3c0cf4dfec..0000000000 --- a/doc/arm/dnssec.xml +++ /dev/null @@ -1,370 +0,0 @@ - - - -
DNSSEC, Dynamic Zones, and Automatic Signing - -
Converting from insecure to secure - -
- - Changing a zone from insecure to secure can be done in three - ways: using a dynamic DNS update, use the - auto-dnssec zone option, or set a DNSSEC - policy for the zone with dnssec-policy. - - - For either method, you need to configure - named so that it can see the - K* files which contain the public and private - parts of the keys that will be used to sign the zone. These files - will have been generated by - dnssec-keygen (or created when needed by - named if dnssec-policy is - used). Keys should be placed in the key-directory, as specified in - named.conf: - - zone example.net { - type master; - update-policy local; - file "dynamic/example.net/example.net"; - key-directory "dynamic/example.net"; - }; - - - If one KSK and one ZSK DNSKEY key have been generated, this - configuration will cause all records in the zone to be signed - with the ZSK, and the DNSKEY RRset to be signed with the KSK as - well. An NSEC chain will be generated as part of the initial - signing process. - - - With dnssec-policy you specify what keys should - be KSK and/or ZSK. If you want a key to sign all records with a key - you will need to specify a CSK: - - - dnssec-policy csk { - keys { - csk key-directory lifetime P5Y algorithm 13; - }; - }; - - -
Dynamic DNS update method - -
- To insert the keys via dynamic update: - - % nsupdate - > ttl 3600 - > update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8= - > update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk= - > send - - - While the update request will complete almost immediately, - the zone will not be completely signed until - named has had time to walk the zone and - generate the NSEC and RRSIG records. The NSEC record at the apex - will be added last, to signal that there is a complete NSEC - chain. - - - If you wish to sign using NSEC3 instead of NSEC, you should - add an NSEC3PARAM record to the initial update request. If you - wish the NSEC3 chain to have the OPTOUT bit set, set it in the - flags field of the NSEC3PARAM record. - - - % nsupdate - > ttl 3600 - > update add example.net DNSKEY 256 3 7 AwEAAZn17pUF0KpbPA2c7Gz76Vb18v0teKT3EyAGfBfL8eQ8al35zz3Y I1m/SAQBxIqMfLtIwqWPdgthsu36azGQAX8= - > update add example.net DNSKEY 257 3 7 AwEAAd/7odU/64o2LGsifbLtQmtO8dFDtTAZXSX2+X3e/UNlq9IHq3Y0 XtC0Iuawl/qkaKVxXe2lo8Ct+dM6UehyCqk= - > update add example.net NSEC3PARAM 1 1 100 1234567890 - > send - - - Again, this update request will complete almost - immediately; however, the record won't show up until - named has had a chance to build/remove the - relevant chain. A private type record will be created to record - the state of the operation (see below for more details), and will - be removed once the operation completes. - - - While the initial signing and NSEC/NSEC3 chain generation - is happening, other updates are possible as well. - - -
Fully automatic zone signing - -
- - To enable automatic signing, you can set a - dnssec-policy, or add the - auto-dnssec option to the zone statement in - named.conf. - auto-dnssec has two possible arguments: - allow or - maintain. - - - With auto-dnssec allow, - named can search the key directory for keys - matching the zone, insert them into the zone, and use them to - sign the zone. It will do so only when it receives an - rndc sign <zonename>. - - - - auto-dnssec maintain includes the above - functionality, but will also automatically adjust the zone's - DNSKEY records on schedule according to the keys' timing metadata. - (See and - for more information.) - - - dnssec-policy is like - auto-dnssec maintain, but will also automatically - create new keys when necessary. Also any configuration related - to DNSSEC signing is retrieved from the policy (ignoring existing - DNSSEC named.conf options). - - - named will periodically search the key directory - for keys matching the zone, and if the keys' metadata indicates - that any change should be made the zone, such as adding, removing, - or revoking a key, then that action will be carried out. By default, - the key directory is checked for changes every 60 minutes; this period - can be adjusted with the , up - to a maximum of 24 hours. The rndc loadkeys forces - named to check for key updates immediately. - - - If keys are present in the key directory the first time the zone - is loaded, the zone will be signed immediately, without waiting for an - rndc sign or rndc loadkeys - command. (Those commands can still be used when there are unscheduled - key changes, however.) - - - When new keys are added to a zone, the TTL is set to match that - of any existing DNSKEY RRset. If there is no existing DNSKEY RRset, - then the TTL will be set to the TTL specified when the key was - created (using the dnssec-keygen -L option), if - any, or to the SOA TTL. - - - If you wish the zone to be signed using NSEC3 instead of NSEC, - submit an NSEC3PARAM record via dynamic update prior to the - scheduled publication and activation of the keys. If you wish the - NSEC3 chain to have the OPTOUT bit set, set it in the flags field - of the NSEC3PARAM record. The NSEC3PARAM record will not appear in - the zone immediately, but it will be stored for later reference. When - the zone is signed and the NSEC3 chain is completed, the NSEC3PARAM - record will appear in the zone. - - - Using the - auto-dnssec option requires the zone to be - configured to allow dynamic updates, by adding an - allow-update or - update-policy statement to the zone - configuration. If this has not been done, the configuration will - fail. - - -
Private-type records - -
- - The state of the signing process is signaled by - private-type records (with a default type value of 65534). When - signing is complete, these records will have a nonzero value for - the final octet (for those records which have a nonzero initial - octet). - - - The private type record format: If the first octet is - non-zero then the record indicates that the zone needs to be - signed with the key matching the record, or that all signatures - that match the record should be removed. - - - - - algorithm (octet 1) - key id in network order (octet 2 and 3) - removal flag (octet 4) - complete flag (octet 5) - - - - Only records flagged as "complete" can be removed via - dynamic update. Attempts to remove other private type records - will be silently ignored. - - - If the first octet is zero (this is a reserved algorithm - number that should never appear in a DNSKEY record) then the - record indicates changes to the NSEC3 chains are in progress. The - rest of the record contains an NSEC3PARAM record. The flag field - tells what operation to perform based on the flag bits. - - - - - 0x01 OPTOUT - 0x80 CREATE - 0x40 REMOVE - 0x20 NONSEC - - -
DNSKEY rollovers - -
- - As with insecure-to-secure conversions, rolling DNSSEC - keys can be done in two ways: using a dynamic DNS update, or the - auto-dnssec zone option. - - -
Dynamic DNS update method - -
- - To perform key rollovers via dynamic update, you need to add - the K* files for the new keys so that - named can find them. You can then add the new - DNSKEY RRs via dynamic update. - named will then cause the zone to be signed - with the new keys. When the signing is complete the private type - records will be updated so that the last octet is non - zero. - - - If this is for a KSK you need to inform the parent and any - trust anchor repositories of the new KSK. - - - You should then wait for the maximum TTL in the zone before - removing the old DNSKEY. If it is a KSK that is being updated, - you also need to wait for the DS RRset in the parent to be - updated and its TTL to expire. This ensures that all clients will - be able to verify at least one signature when you remove the old - DNSKEY. - - - The old DNSKEY can be removed via UPDATE. Take care to - specify the correct key. - named will clean out any signatures generated - by the old key after the update completes. - - -
Automatic key rollovers - -
- - When a new key reaches its activation date (as set by - dnssec-keygen or dnssec-settime), - if the auto-dnssec zone option is set to - maintain, named will - automatically carry out the key rollover. If the key's algorithm - has not previously been used to sign the zone, then the zone will - be fully signed as quickly as possible. However, if the new key - is replacing an existing key of the same algorithm, then the - zone will be re-signed incrementally, with signatures from the - old key being replaced with signatures from the new key as their - signature validity periods expire. By default, this rollover - completes in 30 days, after which it will be safe to remove the - old key from the DNSKEY RRset. - - -
NSEC3PARAM rollovers via UPDATE - -
- - Add the new NSEC3PARAM record via dynamic update. When the - new NSEC3 chain has been generated, the NSEC3PARAM flag field - will be zero. At this point you can remove the old NSEC3PARAM - record. The old chain will be removed after the update request - completes. - - -
Converting from NSEC to NSEC3 - -
- - To do this, you just need to add an NSEC3PARAM record. When - the conversion is complete, the NSEC chain will have been removed - and the NSEC3PARAM record will have a zero flag field. The NSEC3 - chain will be generated before the NSEC chain is - destroyed. - - - NSEC3 is not supported yet with dnssec-policy. - - -
Converting from NSEC3 to NSEC - -
- - To do this, use nsupdate to - remove all NSEC3PARAM records with a zero flag - field. The NSEC chain will be generated before the NSEC3 chain is - removed. - - -
Converting from secure to insecure - -
- - To convert a signed zone to unsigned using dynamic DNS, - delete all the DNSKEY records from the zone apex using - nsupdate. All signatures, NSEC or NSEC3 chains, - and associated NSEC3PARAM records will be removed automatically. - This will take place after the update request completes. - This requires the - dnssec-secure-to-insecure option to be set to - yes in - named.conf. - In addition, if the auto-dnssec maintain - zone statement is used, it should be removed or changed to - allow instead (or it will re-sign). - - -
Periodic re-signing - -
- - In any secure zone which supports dynamic updates, named - will periodically re-sign RRsets which have not been re-signed as - a result of some update action. The signature lifetimes will be - adjusted so as to spread the re-sign load over time rather than - all at once. - - -
NSEC3 and OPTOUT - -
- - named only supports creating new NSEC3 chains - where all the NSEC3 records in the zone have the same OPTOUT - state. - named supports UPDATES to zones where the NSEC3 - records in the chain have mixed OPTOUT state. - named does not support changing the OPTOUT - state of an individual NSEC3 record, the entire chain needs to be - changed if the OPTOUT state of an individual NSEC3 needs to be - changed. - -
diff --git a/doc/arm/dyndb.rst b/doc/arm/dyndb.rst new file mode 100644 index 0000000000..898e60e4c4 --- /dev/null +++ b/doc/arm/dyndb.rst @@ -0,0 +1,98 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _dyndb-info: + +DynDB (Dynamic Database) +------------------------ + +DynDB is an extension to BIND 9 which, like DLZ (see +:ref:`dlz-info`), allows zone data to be retrieved from an external +database. Unlike DLZ, a DynDB module provides a full-featured BIND zone +database interface. Where DLZ translates DNS queries into real-time +database lookups, resulting in relatively poor query performance, and is +unable to handle DNSSEC-signed data due to its limited API, a DynDB +module can pre-load an in-memory database from the external data source, +providing the same performance and functionality as zones served +natively by BIND. + +A DynDB module supporting LDAP has been created by Red Hat and is +available from https://fedorahosted.org/bind-dyndb-ldap/. + +A sample DynDB module for testing and developer guidance is included +with the BIND source code, in the directory +``bin/tests/system/dyndb/driver``. + +Configuring DynDB +~~~~~~~~~~~~~~~~~ + +A DynDB database is configured with a ``dyndb`` statement in +``named.conf``: + +:: + + dyndb example "driver.so" { + parameters + }; + + +The file ``driver.so`` is a DynDB module which implements the full DNS +database API. Multiple ``dyndb`` statements can be specified, to load +different drivers or multiple instances of the same driver. Zones +provided by a DynDB module are added to the view's zone table, and are +treated as normal authoritative zones when BIND is responding to +queries. Zone configuration is handled internally by the DynDB module. + +The parameters are passed as an opaque string to the DynDB module's +initialization routine. Configuration syntax will differ depending on +the driver. + +Sample DynDB Module +~~~~~~~~~~~~~~~~~~~ + +For guidance in implementation of DynDB modules, the directory +``bin/tests/system/dyndb/driver``. contains a basic DynDB module. The +example sets up two zones, whose names are passed to the module as +arguments in the ``dyndb`` statement: + +:: + + dyndb sample "sample.so" { example.nil. arpa. }; + + +In the above example, the module is configured to create a zone +"example.nil", which can answer queries and AXFR requests, and accept +DDNS updates. At runtime, prior to any updates, the zone contains an +SOA, NS, and a single A record at the apex: + +:: + + example.nil. 86400 IN SOA example.nil. example.nil. ( + 0 28800 7200 604800 86400 + ) + example.nil. 86400 IN NS example.nil. + example.nil. 86400 IN A 127.0.0.1 + + +When the zone is updated dynamically, the DynDB module will determine +whether the updated RR is an address (i.e., type A or AAAA) and if so, +it will automatically update the corresponding PTR record in a reverse +zone. (Updates are not stored permanently; all updates are lost when the +server is restarted.) diff --git a/doc/arm/dyndb.xml b/doc/arm/dyndb.xml deleted file mode 100644 index a9c5b49872..0000000000 --- a/doc/arm/dyndb.xml +++ /dev/null @@ -1,99 +0,0 @@ - - - -
DynDB (Dynamic Database) - - - DynDB is an extension to BIND 9 which, like DLZ - (see ), allows zone data to be - retrieved from an external database. Unlike DLZ, a DynDB module - provides a full-featured BIND zone database interface. Where - DLZ translates DNS queries into real-time database lookups, - resulting in relatively poor query performance, and is unable - to handle DNSSEC-signed data due to its limited API, a DynDB - module can pre-load an in-memory database from the external - data source, providing the same performance and functionality - as zones served natively by BIND. - - - A DynDB module supporting LDAP has been created by Red Hat - and is available from - https://fedorahosted.org/bind-dyndb-ldap/. - - - A sample DynDB module for testing and developer guidance - is included with the BIND source code, in the directory - bin/tests/system/dyndb/driver. - - -
Configuring DynDB - - - A DynDB database is configured with a dyndb - statement in named.conf: - - - dyndb example "driver.so" { - parameters - }; - - - The file driver.so is a DynDB module which - implements the full DNS database API. Multiple - dyndb statements can be specified, to load - different drivers or multiple instances of the same driver. - Zones provided by a DynDB module are added to the view's zone - table, and are treated as normal authoritative zones when BIND - is responding to queries. Zone configuration is handled internally - by the DynDB module. - - - The parameters are passed as an opaque - string to the DynDB module's initialization routine. Configuration - syntax will differ depending on the driver. - -
-
Sample DynDB Module - - - For guidance in implementation of DynDB modules, the directory - bin/tests/system/dyndb/driver. - contains a basic DynDB module. - The example sets up two zones, whose names are passed - to the module as arguments in the dyndb - statement: - - - dyndb sample "sample.so" { example.nil. arpa. }; - - - In the above example, the module is configured to create a zone - "example.nil", which can answer queries and AXFR requests, and - accept DDNS updates. At runtime, prior to any updates, the zone - contains an SOA, NS, and a single A record at the apex: - - - example.nil. 86400 IN SOA example.nil. example.nil. ( - 0 28800 7200 604800 86400 - ) - example.nil. 86400 IN NS example.nil. - example.nil. 86400 IN A 127.0.0.1 - - - When the zone is updated dynamically, the DynDB module will determine - whether the updated RR is an address (i.e., type A or AAAA) and if - so, it will automatically update the corresponding PTR record in a - reverse zone. (Updates are not stored permanently; all updates are - lost when the server is restarted.) - -
-
diff --git a/doc/arm/forward.zoneopt.xml b/doc/arm/forward.zoneopt.xml deleted file mode 100644 index 429bbca35e..0000000000 --- a/doc/arm/forward.zoneopt.xml +++ /dev/null @@ -1,20 +0,0 @@ - - - - -zone string [ class ] { - type forward; - delegation-only boolean; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; -}; - diff --git a/doc/arm/general.rst b/doc/arm/general.rst new file mode 100644 index 0000000000..4f7b41bd52 --- /dev/null +++ b/doc/arm/general.rst @@ -0,0 +1,377 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. General: + +General DNS Reference Information +================================= + +.. _ipv6addresses: + +IPv6 addresses (AAAA) +--------------------- + +IPv6 addresses are 128-bit identifiers for interfaces and sets of +interfaces which were introduced in the DNS to facilitate scalable +Internet routing. There are three types of addresses: *Unicast*, an +identifier for a single interface; *Anycast*, an identifier for a set of +interfaces; and *Multicast*, an identifier for a set of interfaces. Here +we describe the global Unicast address scheme. For more information, see +:rfc:`3587`, "Global Unicast Address Format." + +IPv6 unicast addresses consist of a *global routing prefix*, a *subnet +identifier*, and an *interface identifier*. + +The global routing prefix is provided by the upstream provider or ISP, +and (roughly) corresponds to the IPv4 *network* section of the address +range. The subnet identifier is for local subnetting, much the same as +subnetting an IPv4 /16 network into /24 subnets. The interface +identifier is the address of an individual interface on a given network; +in IPv6, addresses belong to interfaces rather than to machines. + +The subnetting capability of IPv6 is much more flexible than that of +IPv4: subnetting can be carried out on bit boundaries, in much the same +way as Classless InterDomain Routing (CIDR), and the DNS PTR +representation ("nibble" format) makes setting up reverse zones easier. + +The Interface Identifier must be unique on the local link, and is +usually generated automatically by the IPv6 implementation, although it +is usually possible to override the default setting if necessary. A +typical IPv6 address might look like: +``2001:db8:201:9:a00:20ff:fe81:2b32`` + +IPv6 address specifications often contain long strings of zeros, so the +architects have included a shorthand for specifying them. The double +colon (``::``) indicates the longest possible string of zeros that can +fit, and can be used only once in an address. + +.. _bibliography: + +Bibliography (and Suggested Reading) +------------------------------------ + +.. _rfcs: + +Request for Comments (RFCs) +~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Specification documents for the Internet protocol suite, including the +DNS, are published as part of the Request for Comments (RFCs) series of +technical notes. The standards themselves are defined by the Internet +Engineering Task Force (IETF) and the Internet Engineering Steering +Group (IESG). RFCs can be obtained online via FTP at: + +`ftp://www.isi.edu/in-notes/RFCxxxx.txt `__ + +(where xxxx is the number of the RFC). RFCs are also available via the +Web at: + +http://www.ietf.org/rfc/. + +Standards +--------- + +:rfc:`974` - C. Partridge. *Mail Routing and the Domain System.* January 1986. + +:rfc:`1034` - P.V. Mockapetris. *Domain Names — Concepts and Facilities.* November +1987. + +:rfc:`1035` - P. V. Mockapetris. *Domain Names — Implementation and Specification.* +November 1987. + +.. _proposed_standards: + +Proposed Standards +------------------ + +:rfc:`2181` - R. Elz and R. Bush. *Clarifications to the DNS Specification.* July 1997. + +:rfc:`2308` - M. Andrews. *Negative Caching of DNS Queries.* March 1998. + +:rfc:`1995` - M. Ohta. *Incremental Zone Transfer in DNS.* August 1996. + +:rfc:`1996` - P. Vixie. *A Mechanism for Prompt Notification of Zone Changes.* +August 1996. + +:rfc:`2136` - P. Vixie, S. Thomson, Y. Rekhter, and J. Bound. *Dynamic Updates in the +Domain Name System.* April 1997. + +:rfc:`2671` - P. Vixie. *Extension Mechanisms for DNS (EDNS0).* August 1997. + +:rfc:`2672` - M. Crawford. *Non-Terminal DNS Name Redirection.* August 1999. + +:rfc:`2845` - P. Vixie, O. Gudmundsson, D. Eastlake, 3rd, and B. Wellington. *Secret Key +Transaction Authentication for DNS (TSIG).* May 2000. + +:rfc:`2930` - D. Eastlake, 3rd. *Secret Key Establishment for DNS (TKEY RR).* +September 2000. + +:rfc:`2931` - D. Eastlake, 3rd. *DNS Request and Transaction Signatures (SIG(0)s).* +September 2000. + +:rfc:`3007` - B. Wellington. *Secure Domain Name System (DNS) Dynamic Update.* +November 2000. + +:rfc:`3645` - S. Kwan, P. Garg, J. Gilroy, L. Esibov, J. Westhead, and R. Hall. *Generic +Security Service Algorithm for Secret Key Transaction Authentication for +DNS (GSS-TSIG).* October 2003. + +DNS Security Proposed Standards +------------------------------- + +:rfc:`3225` - D. Conrad. *Indicating Resolver Support of DNSSEC.* December 2001. + +:rfc:`3833` - D. Atkins and R. Austein. *Threat Analysis of the Domain Name System +(DNS).* August 2004. + +:rfc:`4033` - R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. *DNS Security +Introduction and Requirements.* March 2005. + +:rfc:`4034` - R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. *Resource Records for +the DNS Security Extensions.* March 2005. + +:rfc:`4035` - R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. *Protocol +Modifications for the DNS Security Extensions.* March 2005. + +Other Important RFCs About DNS Implementation +--------------------------------------------- + +:rfc:`1535` - E. Gavron. *A Security Problem and Proposed Correction With Widely +Deployed DNS Software.* October 1993. + +:rfc:`1536` - A. Kumar, J. Postel, C. Neuman, P. Danzig, and S. Miller. *Common DNS +Implementation Errors and Suggested Fixes.* October 1993. + +:rfc:`1982` - R. Elz and R. Bush. *Serial Number Arithmetic.* August 1996. + +:rfc:`4074` - Y. Morishita and T. Jinmei. *Common Misbehaviour Against DNS Queries for +IPv6 Addresses.* May 2005. + +Resource Record Types +--------------------- + +:rfc:`1183` - C. F. Everhart, L. A. Mamakos, R. Ullmann, P. Mockapetris. *New DNS RR +Definitions.* October 1990. + +:rfc:`1706` - B. Manning and R. Colella. *DNS NSAP Resource Records.* October 1994. + +:rfc:`2168` - R. Daniel and M. Mealling. *Resolution of Uniform Resource Identifiers +using the Domain Name System.* June 1997. + +:rfc:`1876` - C. Davis, P. Vixie, T. Goodwin, and I. Dickinson. *A Means for Expressing +Location Information in the Domain Name System.* January 1996. + +:rfc:`2052` - A. Gulbrandsen and P. Vixie. *A DNS RR for Specifying the Location of +Services.* October 1996. + +:rfc:`2163` - A. Allocchio. *Using the Internet DNS to Distribute MIXER +Conformant Global Address Mapping.* January 1998. + +:rfc:`2230` - R. Atkinson. *Key Exchange Delegation Record for the DNS.* October +1997. + +:rfc:`2536` - D. Eastlake, 3rd. *DSA KEYs and SIGs in the Domain Name System (DNS).* +March 1999. + +:rfc:`2537` - D. Eastlake, 3rd. *RSA/MD5 KEYs and SIGs in the Domain Name System +(DNS).* March 1999. + +:rfc:`2538` - D. Eastlake, 3rd and O. Gudmundsson. *Storing Certificates in the Domain +Name System (DNS).* March 1999. + +:rfc:`2539` - D. Eastlake, 3rd. *Storage of Diffie-Hellman Keys in the Domain Name +System (DNS).* March 1999. + +:rfc:`2540` - D. Eastlake, 3rd. *Detached Domain Name System (DNS) Information.* +March 1999. + +:rfc:`2782` - A. Gulbrandsen, P. Vixie, and L. Esibov. *A DNS RR for specifying the +location of services (DNS SRV).* February 2000. + +:rfc:`2915` - M. Mealling and R. Daniel. *The Naming Authority Pointer (NAPTR) DNS +Resource Record.* September 2000. + +:rfc:`3110` - D. Eastlake, 3rd. *RSA/SHA-1 SIGs and RSA KEYs in the Domain Name +System (DNS).* May 2001. + +:rfc:`3123` - P. Koch. *A DNS RR Type for Lists of Address Prefixes (APL RR).* June +2001. + +:rfc:`3596` - S. Thomson, C. Huitema, V. Ksinant, and M. Souissi. *DNS Extensions to +support IP version 6.* October 2003. + +:rfc:`3597` - A. Gustafsson. *Handling of Unknown DNS Resource Record (RR) Types.* +September 2003. + +DNS and the Internet +-------------------- + +:rfc:`1101` - P. V. Mockapetris. *DNS Encoding of Network Names and Other Types.* +April 1989. + +:rfc:`1123` - R. Braden. *Requirements for Internet Hosts - Application and +Support.* October 1989. + +:rfc:`1591` - J. Postel. *Domain Name System Structure and Delegation.* March 1994. + +:rfc:`2317` - H. Eidnes, G. de Groot, and P. Vixie. *Classless IN-ADDR.ARPA Delegation.* +March 1998. + +:rfc:`2826` - Internet Architecture Board. *IAB Technical Comment on the Unique +DNS Root.* May 2000. + +:rfc:`2929` - D. Eastlake, 3rd, E. Brunner-Williams, and B. Manning. *Domain Name System +(DNS) IANA Considerations.* September 2000. + +DNS Operations +-------------- + +:rfc:`1033` - M. Lottor. *Domain administrators operations guide.* November 1987. + +:rfc:`1537` - P. Beertema. *Common DNS Data File Configuration Errors.* October +1993. + +:rfc:`1912` - D. Barr. *Common DNS Operational and Configuration Errors.* February +1996. + +:rfc:`2010` - B. Manning and P.Vixie. *Operational Criteria for Root Name Servers.* +October 1996. + +:rfc:`2219` - M. Hamilton and R. Wright. *Use of DNS Aliases for Network Services.* +October 1997. + +Internationalized Domain Names +------------------------------ + +:rfc:`2825` - IAB and R. Daigle. *A Tangled Web: Issues of I18N, Domain Names, and +the Other Internet protocols.* May 2000. + +:rfc:`3490` - P. Faltstrom, P. Hoffman, and A. Costello. *Internationalizing Domain Names +in Applications (IDNA).* March 2003. + +:rfc:`3491` - P. Hoffman and M. Blanchet. *Nameprep: A Stringprep Profile for +Internationalized Domain Names.* March 2003. + +:rfc:`3492` - A. Costello. *Punycode: A Bootstring encoding of Unicode for +Internationalized Domain Names in Applications (IDNA).* March 2003. + +Other DNS-related RFCs +---------------------- + +.. note:: + + Note: the following list of RFCs, although DNS-related, are not + concerned with implementing software. + +:rfc:`1464` - R. Rosenbaum. *Using the Domain Name System To Store Arbitrary +String Attributes.* May 1993. + +:rfc:`1713` - A. Romao. *Tools for DNS Debugging.* November 1994. + +:rfc:`1794` - T. Brisco. *DNS Support for Load Balancing.* April 1995. + +:rfc:`2240` - O. Vaughan. *A Legal Basis for Domain Name Allocation.* November 1997. + +:rfc:`2345` - J. Klensin, T. Wolf, and G. Oglesby. *Domain Names and Company Name +Retrieval.* May 1998. + +:rfc:`2352` - O. Vaughan. *A Convention For Using Legal Names as Domain Names.* May +1998. + +:rfc:`3071` - J. Klensin. *Reflections on the DNS, RFC 1591, and Categories of +Domains.* February 2001. + +:rfc:`3258` - T. Hardie. *Distributing Authoritative Name Servers via Shared +Unicast Addresses.* April 2002. + +:rfc:`3901` - A. Durand and J. Ihren. *DNS IPv6 Transport Operational Guidelines.* +September 2004. + +Obsolete and Unimplemented Experimental RFC +------------------------------------------- + +:rfc:`1712` - C. Farrell, M. Schulze, S. Pleitner, and D. Baldoni. *DNS Encoding of +Geographical Location.* November 1994. + +:rfc:`2673` - M. Crawford. *Binary Labels in the Domain Name System.* August 1999. + +:rfc:`2874` - M. Crawford and C. Huitema. *DNS Extensions to Support IPv6 Address +Aggregation and Renumbering.* July 2000. + +Obsoleted DNS Security RFCs +--------------------------- + +.. note:: + + Most of these have been consolidated into :rfc:`4033`, :rfc:`4034` and + :rfc:`4035` which collectively describe DNSSECbis. + +:rfc:`2065` - D. Eastlake, 3rd and C. Kaufman. *Domain Name System Security Extensions.* +January 1997. + +:rfc:`2137` - D. Eastlake, 3rd. *Secure Domain Name System Dynamic Update.* April +1997. + +:rfc:`2535` - D. Eastlake, 3rd. *Domain Name System Security Extensions.* March 1999. + +:rfc:`3008` - B. Wellington. *Domain Name System Security (DNSSEC) Signing +Authority.* November 2000. + +:rfc:`3090` - E. Lewis. *DNS Security Extension Clarification on Zone Status.* +March 2001. + +:rfc:`3445` - D. Massey and S. Rose. *Limiting the Scope of the KEY Resource Record +(RR).* December 2002. + +:rfc:`3655` - B. Wellington and O. Gudmundsson. *Redefinition of DNS Authenticated +Data (AD) bit.* November 2003. + +:rfc:`3658` - O. Gudmundsson. *Delegation Signer (DS) Resource Record (RR).* +December 2003. + +:rfc:`3755` - S. Weiler. *Legacy Resolver Compatibility for Delegation Signer +(DS).* May 2004. + +:rfc:`3757` - O. Kolkman, J. Schlyter, and E. Lewis. *Domain Name System KEY (DNSKEY) +Resource Record (RR) Secure Entry Point (SEP) Flag.* April 2004. + +:rfc:`3845` - J. Schlyter. *DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format.* +August 2004. + +.. _internet_drafts: + +Internet Drafts +~~~~~~~~~~~~~~~ + +Internet Drafts (IDs) are rough-draft working documents of the Internet +Engineering Task Force. They are, in essence, RFCs in the preliminary +stages of development. Implementors are cautioned not to regard IDs as +archival, and they should not be quoted or cited in any formal documents +unless accompanied by the disclaimer that they are "works in progress." +IDs have a lifespan of six months after which they are deleted unless +updated by their authors. + +.. _more_about_bind: + +Other Documents About BIND +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Paul Albitz and Cricket Liu. *DNS and BIND.* Copyright 1998 Sebastopol, CA: O'Reilly and +Associates. diff --git a/doc/arm/hint.zoneopt.xml b/doc/arm/hint.zoneopt.xml deleted file mode 100644 index c1b4fad4bb..0000000000 --- a/doc/arm/hint.zoneopt.xml +++ /dev/null @@ -1,20 +0,0 @@ - - - - -zone string [ class ] { - type hint; - check-names ( fail | warn | ignore ); - delegation-only boolean; - file quoted_string; -}; - diff --git a/doc/arm/history.rst b/doc/arm/history.rst new file mode 100644 index 0000000000..2e4e5ef6f5 --- /dev/null +++ b/doc/arm/history.rst @@ -0,0 +1,84 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. History: + +A Brief History of the DNS and BIND +=================================== + +Although the "official" beginning of the Domain Name System occurred in +1984 with the publication of :rfc:`920`, the core of the new system was +described in 1983 in :rfc:`882` and :rfc:`883`. From 1984 to 1987, the ARPAnet +(the precursor to today's Internet) became a testbed of experimentation +for developing the new naming/addressing scheme in a rapidly expanding, +operational network environment. New RFCs were written and published in +1987 that modified the original documents to incorporate improvements +based on the working model. :rfc:`1034`, "Domain Names-Concepts and +Facilities", and :rfc:`1035`, "Domain Names-Implementation and +Specification" were published and became the standards upon which all +DNS implementations are built. + +The first working domain name server, called "Jeeves", was written in +1983-84 by Paul Mockapetris for operation on DEC Tops-20 machines +located at the University of Southern California's Information Sciences +Institute (USC-ISI) and SRI International's Network Information Center +(SRI-NIC). A DNS server for Unix machines, the Berkeley Internet Name +Domain (BIND) package, was written soon after by a group of graduate +students at the University of California at Berkeley under a grant from +the US Defense Advanced Research Projects Administration (DARPA). + +Versions of BIND through 4.8.3 were maintained by the Computer Systems +Research Group (CSRG) at UC Berkeley. Douglas Terry, Mark Painter, David +Riggle and Songnian Zhou made up the initial BIND project team. After +that, additional work on the software package was done by Ralph +Campbell. Kevin Dunlap, a Digital Equipment Corporation employee on loan +to the CSRG, worked on BIND for 2 years, from 1985 to 1987. Many other +people also contributed to BIND development during that time: Doug +Kingston, Craig Partridge, Smoot Carl-Mitchell, Mike Muuss, Jim Bloom +and Mike Schwartz. BIND maintenance was subsequently handled by Mike +Karels and Øivind Kure. + +BIND versions 4.9 and 4.9.1 were released by Digital Equipment +Corporation (now Compaq Computer Corporation). Paul Vixie, then a DEC +employee, became BIND's primary caretaker. He was assisted by Phil +Almquist, Robert Elz, Alan Barrett, Paul Albitz, Bryan Beecher, Andrew +Partan, Andy Cherenson, Tom Limoncelli, Berthold Paffrath, Fuat Baran, +Anant Kumar, Art Harkin, Win Treese, Don Lewis, Christophe Wolfhugel, +and others. + +In 1994, BIND version 4.9.2 was sponsored by Vixie Enterprises. Paul +Vixie became BIND's principal architect/programmer. + +BIND versions from 4.9.3 onward have been developed and maintained by +the Internet Systems Consortium and its predecessor, the Internet +Software Consortium, with support being provided by ISC's sponsors. + +As co-architects/programmers, Bob Halley and Paul Vixie released the +first production-ready version of BIND version 8 in May 1997. + +BIND version 9 was released in September 2000 and is a major rewrite of +nearly all aspects of the underlying BIND architecture. + +BIND versions 4 and 8 are officially deprecated. No additional +development is done on BIND version 4 or BIND version 8. + +BIND development work is made possible today by the sponsorship of +several corporations, and by the tireless work efforts of numerous +individuals. diff --git a/doc/arm/in-view.zoneopt.xml b/doc/arm/in-view.zoneopt.xml deleted file mode 100644 index a91b6f3742..0000000000 --- a/doc/arm/in-view.zoneopt.xml +++ /dev/null @@ -1,17 +0,0 @@ - - - - -zone string [ class ] { - in-view string; -}; - diff --git a/doc/arm/index.rst b/doc/arm/index.rst new file mode 100644 index 0000000000..1e2aacab83 --- /dev/null +++ b/doc/arm/index.rst @@ -0,0 +1,37 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +************************************* +BIND 9 Administrator Reference Manual +************************************* + +.. toctree:: + :numbered: + :maxdepth: 2 + + introduction + requirements + configuration + reference + advanced + security + troubleshooting + +.. toctree:: + :caption: Appendices + :name: appendices + :maxdepth: 2 + + notes + history + general + libdns + manpages + diff --git a/doc/arm/introduction.rst b/doc/arm/introduction.rst new file mode 100644 index 0000000000..b6112a3384 --- /dev/null +++ b/doc/arm/introduction.rst @@ -0,0 +1,318 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _Introduction: + +Introduction +============ + +The Internet Domain Name System (DNS) consists of the syntax to specify +the names of entities in the Internet in a hierarchical manner, the +rules used for delegating authority over names, and the system +implementation that actually maps names to Internet addresses. DNS data +is maintained in a group of distributed hierarchical databases. + +.. _doc_scope: + +Scope of Document +----------------- + +The Berkeley Internet Name Domain (BIND) implements a domain name server +for a number of operating systems. This document provides basic +information about the installation and care of the Internet Systems +Consortium (ISC) BIND version 9 software package for system +administrators. + +.. _organization: + +Organization of This Document +----------------------------- + +In this document, *Chapter 1* introduces the basic DNS and BIND +concepts. *Chapter 2* describes resource requirements for running BIND +in various environments. Information in *Chapter 3* is *task-oriented* +in its presentation and is organized functionally, to aid in the process +of installing the BIND 9 software. The task-oriented section is followed +by *Chapter 4*, which is organized as a reference manual to aid in the ongoing +maintenance of the software. *Chapter 5* contains more advanced concepts that +the system administrator may need for implementing certain options. *Chapter 6* +addresses security considerations, and *Chapter 7* contains troubleshooting help. +The main body of the document is followed by several *appendices* which contain +useful reference information, such as a *bibliography* and historic +information related to BIND and the Domain Name System. + +.. _conventions: + +Conventions Used in This Document +--------------------------------- + +In this document, we use the following general typographic conventions: + ++-------------------------------------+--------------------------------+ +| *To describe:* | *We use the style:* | ++-------------------------------------+--------------------------------+ +| a pathname, filename, URL, | ``Fixed width`` | +| hostname, mailing list name, or new | | +| term or concept | | ++-------------------------------------+--------------------------------+ +| literal user input | ``Fixed Width Bold`` | ++-------------------------------------+--------------------------------+ +| program output | ``Fixed Width`` | ++-------------------------------------+--------------------------------+ + +The following conventions are used in descriptions of the BIND +configuration file: + ++-------------------------------------+--------------------------------+ +| *To describe:* | *We use the style:* | ++-------------------------------------+--------------------------------+ +| keywords | ``Fixed Width`` | ++-------------------------------------+--------------------------------+ +| variables | ``Fixed Width`` | ++-------------------------------------+--------------------------------+ +| Optional input | [Text is enclosed in square | +| | brackets] | ++-------------------------------------+--------------------------------+ + +.. _dns_overview: + +The Domain Name System (DNS) +---------------------------- + +The purpose of this document is to explain the installation and upkeep +of the BIND (Berkeley Internet Name Domain) software package, and we +begin by reviewing the fundamentals of the Domain Name System (DNS) as +they relate to BIND. + +.. _dns_fundamentals: + +DNS Fundamentals +~~~~~~~~~~~~~~~~ + +The Domain Name System (DNS) is a hierarchical, distributed database. It +stores information for mapping Internet host names to IP addresses and +vice versa, mail routing information, and other data used by Internet +applications. + +Clients look up information in the DNS by calling a *resolver* library, +which sends queries to one or more *name servers* and interprets the +responses. The BIND 9 software distribution contains a name server, +``named``, and a set of associated tools. + +.. _domain_names: + +Domains and Domain Names +~~~~~~~~~~~~~~~~~~~~~~~~ + +The data stored in the DNS is identified by *domain names* that are +organized as a tree according to organizational or administrative +boundaries. Each node of the tree, called a *domain*, is given a label. +The domain name of the node is the concatenation of all the labels on +the path from the node to the *root* node. This is represented in +written form as a string of labels listed from right to left and +separated by dots. A label need only be unique within its parent domain. + +For example, a domain name for a host at the company *Example, Inc.* +could be ``ourhost.example.com``, where ``com`` is the top level domain +to which ``ourhost.example.com`` belongs, ``example`` is a subdomain of +``com``, and ``ourhost`` is the name of the host. + +For administrative purposes, the name space is partitioned into areas +called *zones*, each starting at a node and extending down to the leaf +nodes or to nodes where other zones start. The data for each zone is +stored in a *name server*, which answers queries about the zone using +the *DNS protocol*. + +The data associated with each domain name is stored in the form of +*resource records* (RRs). Some of the supported resource record types +are described in :ref:`types_of_resource_records_and_when_to_use_them`. + +For more detailed information about the design of the DNS and the DNS +protocol, please refer to the standards documents listed in :ref:`rfcs`. + +Zones +~~~~~ + +To properly operate a name server, it is important to understand the +difference between a *zone* and a *domain*. + +As stated previously, a zone is a point of delegation in the DNS tree. A +zone consists of those contiguous parts of the domain tree for which a +name server has complete information and over which it has authority. It +contains all domain names from a certain point downward in the domain +tree except those which are delegated to other zones. A delegation point +is marked by one or more *NS records* in the parent zone, which should +be matched by equivalent NS records at the root of the delegated zone. + +For instance, consider the ``example.com`` domain which includes names +such as ``host.aaa.example.com`` and ``host.bbb.example.com`` even +though the ``example.com`` zone includes only delegations for the +``aaa.example.com`` and ``bbb.example.com`` zones. A zone can map +exactly to a single domain, but could also include only part of a +domain, the rest of which could be delegated to other name servers. +Every name in the DNS tree is a *domain*, even if it is *terminal*, that +is, has no *subdomains*. Every subdomain is a domain and every domain +except the root is also a subdomain. The terminology is not intuitive +and we suggest that you read :rfc:`1033`, :rfc:`1034` and :rfc:`1035` to gain a complete +understanding of this difficult and subtle topic. + +Though BIND is called a "domain name server", it deals primarily in +terms of zones. The master and slave declarations in the ``named.conf`` +file specify zones, not domains. When you ask some other site if it is +willing to be a slave server for your *domain*, you are actually asking +for slave service for some collection of zones. + +.. _auth_servers: + +Authoritative Name Servers +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Each zone is served by at least one *authoritative name server*, which +contains the complete data for the zone. To make the DNS tolerant of +server and network failures, most zones have two or more authoritative +servers, on different networks. + +Responses from authoritative servers have the "authoritative answer" +(AA) bit set in the response packets. This makes them easy to identify +when debugging DNS configurations using tools like ``dig`` (:ref:`diagnostic_tools`). + +.. _primary_master: + +The Primary Master +^^^^^^^^^^^^^^^^^^ + +The authoritative server where the master copy of the zone data is +maintained is called the *primary master* server, or simply the +*primary*. Typically it loads the zone contents from some local file +edited by humans or perhaps generated mechanically from some other local +file which is edited by humans. This file is called the *zone file* or +*master file*. + +In some cases, however, the master file may not be edited by humans at +all, but may instead be the result of *dynamic update* operations. + +.. _slave_server: + +Slave Servers +^^^^^^^^^^^^^ + +The other authoritative servers, the *slave* servers (also known as +*secondary* servers) load the zone contents from another server using a +replication process known as a *zone transfer*. Typically the data are +transferred directly from the primary master, but it is also possible to +transfer it from another slave. In other words, a slave server may +itself act as a master to a subordinate slave server. + +Periodically, the slave server must send a refresh query to determine +whether the zone contents have been updated. This is done by sending a +query for the zone's SOA record and checking whether the SERIAL field +has been updated; if so, a new transfer request is initiated. The timing +of these refresh queries is controlled by the SOA REFRESH and RETRY +fields, but can be overridden with the ``max-refresh-time``, +``min-refresh-time``, ``max-retry-time``, and ``min-retry-time`` +options. + +If the zone data cannot be updated within the time specified by the SOA +EXPIRE option (up to a hard-coded maximum of 24 weeks) then the slave +zone expires and will no longer respond to queries. + +.. _stealth_server: + +Stealth Servers +^^^^^^^^^^^^^^^ + +Usually all of the zone's authoritative servers are listed in NS records +in the parent zone. These NS records constitute a *delegation* of the +zone from the parent. The authoritative servers are also listed in the +zone file itself, at the *top level* or *apex* of the zone. You can list +servers in the zone's top-level NS records that are not in the parent's +NS delegation, but you cannot list servers in the parent's delegation +that are not present at the zone's top level. + +A *stealth server* is a server that is authoritative for a zone but is +not listed in that zone's NS records. Stealth servers can be used for +keeping a local copy of a zone to speed up access to the zone's records +or to make sure that the zone is available even if all the "official" +servers for the zone are inaccessible. + +A configuration where the primary master server itself is a stealth +server is often referred to as a "hidden primary" configuration. One use +for this configuration is when the primary master is behind a firewall +and therefore unable to communicate directly with the outside world. + +.. _cache_servers: + +Caching Name Servers +~~~~~~~~~~~~~~~~~~~~ + +The resolver libraries provided by most operating systems are *stub +resolvers*, meaning that they are not capable of performing the full DNS +resolution process by themselves by talking directly to the +authoritative servers. Instead, they rely on a local name server to +perform the resolution on their behalf. Such a server is called a +*recursive* name server; it performs *recursive lookups* for local +clients. + +To improve performance, recursive servers cache the results of the +lookups they perform. Since the processes of recursion and caching are +intimately connected, the terms *recursive server* and *caching server* +are often used synonymously. + +The length of time for which a record may be retained in the cache of a +caching name server is controlled by the Time To Live (TTL) field +associated with each resource record. + +.. _forwarder: + +Forwarding +^^^^^^^^^^ + +Even a caching name server does not necessarily perform the complete +recursive lookup itself. Instead, it can *forward* some or all of the +queries that it cannot satisfy from its cache to another caching name +server, commonly referred to as a *forwarder*. + +There may be one or more forwarders, and they are queried in turn until +the list is exhausted or an answer is found. Forwarders are typically +used when you do not wish all the servers at a given site to interact +directly with the rest of the Internet servers. A typical scenario would +involve a number of internal DNS servers and an Internet firewall. +Servers unable to pass packets through the firewall would forward to the +server that can do it, and that server would query the Internet DNS +servers on the internal server's behalf. + +.. _multi_role: + +Name Servers in Multiple Roles +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The BIND name server can simultaneously act as a master for some zones, +a slave for other zones, and as a caching (recursive) server for a set +of local clients. + +However, since the functions of authoritative name service and +caching/recursive name service are logically separate, it is often +advantageous to run them on separate server machines. A server that only +provides authoritative name service (an *authoritative-only* server) can +run with recursion disabled, improving reliability and security. A +server that is not authoritative for any zones and only provides +recursive service to local clients (a *caching-only* server) does not +need to be reachable from the Internet at large and can be placed inside +a firewall. diff --git a/doc/arm/isc-logo.pdf b/doc/arm/isc-logo.pdf index 17d38a8a80..f6b9de52b6 100644 Binary files a/doc/arm/isc-logo.pdf and b/doc/arm/isc-logo.pdf differ diff --git a/doc/arm/key.grammar.xml b/doc/arm/key.grammar.xml deleted file mode 100644 index 33cc23ac42..0000000000 --- a/doc/arm/key.grammar.xml +++ /dev/null @@ -1,19 +0,0 @@ - - - - - -key string { - algorithm string; - secret string; -}; - diff --git a/doc/arm/libdns.rst b/doc/arm/libdns.rst new file mode 100644 index 0000000000..6862d35d51 --- /dev/null +++ b/doc/arm/libdns.rst @@ -0,0 +1,329 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _bind9.library: + +BIND 9 DNS Library Support +========================== + +This version of BIND 9 "exports" its internal libraries so that they can +be used by third-party applications more easily (we call them "export" +libraries in this document). Certain library functions are altered from +specific BIND-only behavior to more generic behavior when used by other +applications; to enable this generic behavior, the calling program +initializes the libraries by calling ``isc_lib_register()``. + +In addition to DNS-related APIs that are used within BIND 9, the +libraries provide the following features: + +- The "DNS client" module. This is a higher level API that provides an + interface to name resolution, single DNS transaction with a + particular server, and dynamic update. Regarding name resolution, it + supports advanced features such as DNSSEC validation and caching. + This module supports both synchronous and asynchronous mode. + +- The "IRS" (Information Retrieval System) library. It provides an + interface to parse the traditional ``resolv.conf`` file and more + advanced, DNS-specific configuration file for the rest of this + package (see the description for the ``dns.conf`` file below). + +- As part of the IRS library, the standard address-name mapping + functions, ``getaddrinfo()`` and ``getnameinfo()``, are provided. + They use the DNSSEC-aware validating resolver backend, and could use + other advanced features of the BIND 9 libraries such as caching. The + ``getaddrinfo()`` function resolves both A and AAAA RRs concurrently + when the address family is unspecified. + +- An experimental framework to support other event libraries than BIND + 9's internal event task system. + +Installation +------------ + +:: + + $ make install + + +Normal installation of BIND will also install library object and header +files. Root privilege is normally required. + +To see how to build your own application after the installation, see +``lib/samples/Makefile-postinstall.in``. + +Known Defects/Restrictions +-------------------------- + +- The "fixed" RRset order is not (currently) supported in the export + library. If you want to use "fixed" RRset order for, e.g. ``named`` + while still building the export library even without the fixed order + support, build them separately: + + :: + + $ ./configure --enable-fixed-rrset [other flags, but not --enable-exportlib] + $ make + $ ./configure --enable-exportlib [other flags, but not --enable-fixed-rrset] + $ cd lib/export + $ make + +- :rfc:`5011` is not supported in the validating stub resolver of the + export library. In fact, it is not clear whether it should: trust + anchors would be a system-wide configuration which would be managed + by an administrator, while the stub resolver will be used by ordinary + applications run by a normal user. + +- Not all common ``/etc/resolv.conf`` options are supported in the IRS + library. The only available options in this version are ``debug`` and + ``ndots``. + +The dns.conf File +----------------- + +The IRS library supports an "advanced" configuration file related to the +DNS library for configuration parameters that would be beyond the +capability of the ``resolv.conf`` file. Specifically, it is intended to +provide DNSSEC related configuration parameters. By default the path to +this configuration file is ``/etc/dns.conf``. This module is very +experimental and the configuration syntax or library interfaces may +change in future versions. Currently, only the ``trusted-keys`` +statement is supported, whose syntax is the same as the same statement +in ``named.conf``. (See :ref:`trusted-keys` for details.) + +Sample Applications +------------------- + +Some sample application programs using this API are provided for +reference. The following is a brief description of these applications. + +sample: a simple stub resolver utility +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Sends a query of a given name (of a given optional RR type) to a +specified recursive server and prints the result as a list of RRs. It +can also act as a validating stub resolver if a trust anchor is given +via a set of command line options. + +Usage: sample [options] server_address hostname + +Options and Arguments: + +``-t RRtype`` + specify the RR type of the query. The default is the A RR. + +``[-a algorithm] [-e] -k keyname -K keystring`` + specify a command-line DNS key to validate the answer. For example, + to specify the following DNSKEY of example.com: example.com. 3600 IN + DNSKEY 257 3 5 xxx specify the options as follows: + + :: + + -e -k example.com -K "xxx" + + + -e means that this key is a zone's "key signing key" (also known as + "secure entry point"). When -a is omitted rsasha1 will be used by + default. + +``-s domain:alt_server_address`` + specify a separate recursive server address for the specific + "domain". Example: -s example.com:2001:db8::1234 + +``server_address`` + an IP(v4/v6) address of the recursive server to which queries are + sent. + +``hostname`` + the domain name for the query + +sample-async: a simple stub resolver, working asynchronously +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Similar to "sample", but accepts a list of (query) domain names as a +separate file and resolves the names asynchronously. + +Usage: sample-async [-s server_address] [-t RR_type] input_file + +Options and Arguments: + +``-s server_address`` + an IPv4 address of the recursive server to which queries are sent. + (IPv6 addresses are not supported in this implementation) +``-t RR_type`` + specify the RR type of the queries. The default is the A RR. +``input_file`` + a list of domain names to be resolved. each line consists of a single + domain name. Example: + :: + + www.example.com + mx.example.net + ns.xxx.example + + +sample-request: a simple DNS transaction client +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Sends a query to a specified server, and prints the response with +minimal processing. It doesn't act as a "stub resolver": it stops the +processing once it gets any response from the server, whether it's a +referral or an alias (CNAME or DNAME) that would require further queries +to get the ultimate answer. In other words, this utility acts as a very +simplified ``dig``. + +Usage: sample-request [-t RRtype] server_address hostname + +Options and Arguments: + +``-t RRtype`` + specify the RR type of the queries. The default is the A RR. + +``server_address`` + an IP(v4/v6) address of the recursive server to which the query is + sent. + +``hostname`` + the domain name for the query + +sample-gai: getaddrinfo() and getnameinfo() test code +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +This is a test program to check ``getaddrinfo()`` and ``getnameinfo()`` +behavior. It takes a host name as an argument, calls ``getaddrinfo()`` +with the given host name, and calls ``getnameinfo()`` with the resulting +IP addresses returned by ``getaddrinfo()``. If the dns.conf file exists +and defines a trust anchor, the underlying resolver will act as a +validating resolver, and ``getaddrinfo()``/``getnameinfo()`` will fail +with an EAI_INSECUREDATA error when DNSSEC validation fails. + +Usage: sample-gai hostname + +sample-update: a simple dynamic update client program +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Accepts a single update command as a command-line argument, sends an +update request message to the authoritative server, and shows the +response from the server. In other words, this is a simplified +``nsupdate``. + +Usage: sample-update [options] (add|delete) "update data" + +Options and Arguments: + +``-a auth_server`` + An IP address of the authoritative server that has authority for the + zone containing the update name. This should normally be the primary + authoritative server that accepts dynamic updates. It can also be a + secondary server that is configured to forward update requests to the + primary server. + +``-k keyfile`` + A TSIG key file to secure the update transaction. The keyfile format + is the same as that for the nsupdate utility. + +``-p prerequisite`` + A prerequisite for the update (only one prerequisite can be + specified). The prerequisite format is the same as that is accepted + by the nsupdate utility. + +``-r recursive_server`` + An IP address of a recursive server that this utility will use. A + recursive server may be necessary to identify the authoritative + server address to which the update request is sent. + +``-z zonename`` + The domain name of the zone that contains + +``(add|delete)`` + Specify the type of update operation. Either "add" or "delete" must + be specified. + +``update data`` + Specify the data to be updated. A typical example of the data would + look like "name TTL RRtype RDATA". + +.. note:: + + In practice, either -a or -r must be specified. Others can be + optional; the underlying library routine tries to identify the + appropriate server and the zone name for the update. + +Examples: assuming the primary authoritative server of the +dynamic.example.com zone has an IPv6 address 2001:db8::1234, + +:: + + $ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add "foo.dynamic.example.com 30 IN A 192.168.2.1" + +adds an A RR for foo.dynamic.example.com using the given key. + +:: + + $ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com 30 IN A" + +removes all A RRs for foo.dynamic.example.com using the given key. + +:: + + $ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com" + +removes all RRs for foo.dynamic.example.com using the given key. + +nsprobe: domain/name server checker in terms of RFC 4074 +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Checks a set of domains to see the name servers of the domains behave +correctly in terms of :rfc:`4074`. This is included in the set of sample +programs to show how the export library can be used in a DNS-related +application. + +Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file] + +Options + +``-d`` + Run in "debug" mode. With this option nsprobe will dump every RRs it + receives. + +``-v`` + Increase verbosity of other normal log messages. This can be + specified multiple times. + +``-c cache_address`` + Specify an IP address of a recursive (caching) name server. nsprobe + uses this server to get the NS RRset of each domain and the A and/or + AAAA RRsets for the name servers. The default value is 127.0.0.1. + +``input_file`` + A file name containing a list of domain (zone) names to be probed. + when omitted the standard input will be used. Each line of the input + file specifies a single domain name such as "example.com". In general + this domain name must be the apex name of some DNS zone (unlike + normal "host names" such as "www.example.com"). nsprobe first + identifies the NS RRsets for the given domain name, and sends A and + AAAA queries to these servers for some "widely used" names under the + zone; specifically, adding "www" and "ftp" to the zone name. + +Library References +------------------ + +As of this writing, there is no formal "manual" for the libraries, +except this document, header files (some of which provide pretty +detailed explanations), and sample application programs. diff --git a/doc/arm/libdns.xml b/doc/arm/libdns.xml deleted file mode 100644 index 21e4f69257..0000000000 --- a/doc/arm/libdns.xml +++ /dev/null @@ -1,519 +0,0 @@ - - - -
- - BIND 9 DNS Library Support - - - This version of BIND 9 "exports" its internal libraries so - that they can be used by third-party applications more easily (we - call them "export" libraries in this document). Certain library - functions are altered from specific BIND-only behavior to more generic - behavior when used by other applications; to enable this generic behavior, - the calling program initializes the libraries by calling - isc_lib_register(). - - - In addition to DNS-related APIs that are used within BIND 9, the - libraries provide the following features: - - - - - The "DNS client" module. This is a higher level API that - provides an interface to name resolution, single DNS transaction - with a particular server, and dynamic update. Regarding name - resolution, it supports advanced features such as DNSSEC validation - and caching. This module supports both synchronous and asynchronous - mode. - - - - - The "IRS" (Information Retrieval System) library. It provides an - interface to parse the traditional resolv.conf - file and more advanced, DNS-specific configuration file for the - rest of this package (see the description for the - dns.conf file below). - - - - - As part of the IRS library, the standard address-name - mapping functions, getaddrinfo() and - getnameinfo(), are provided. They use the - DNSSEC-aware validating resolver backend, and could use other - advanced features of the BIND 9 libraries such as caching. The - getaddrinfo() function resolves both A - and AAAA RRs concurrently when the address family is - unspecified. - - - - - An experimental framework to support other event - libraries than BIND 9's internal event task system. - - - -
- - Installation - - -$ make install - - - Normal installation of BIND will also install library object - and header files. Root privilege is normally required. - -
-
- - Known Defects/Restrictions - - - - - The "fixed" RRset order is not (currently) supported in the export - library. If you want to use "fixed" RRset order for, e.g. - named while still building the export library - even without the fixed order support, build them separately: - -$ ./configure --enable-fixed-rrset [other flags, but not --enable-exportlib] -$ make -$ ./configure --enable-exportlib [other flags, but not --enable-fixed-rrset] -$ cd lib/export -$ make - - - - - - RFC 5011 is not supported in the validating stub resolver of the - export library. In fact, it is not clear whether it should: trust - anchors would be a system-wide configuration which would be managed - by an administrator, while the stub resolver will be used by - ordinary applications run by a normal user. - - - - - Not all common /etc/resolv.conf options are - supported in the IRS library. The only available options in this - version are debug and ndots. - - - -
-
- - The dns.conf File - - - The IRS library supports an "advanced" configuration file related to - the DNS library for configuration parameters that would be beyond the - capability of the resolv.conf file. - Specifically, it is intended to provide DNSSEC related configuration - parameters. By default the path to this configuration file is - /etc/dns.conf. This module is very experimental - and the configuration syntax or library interfaces may change in - future versions. Currently, only static key configuration is supported. - managed-keys and trusted-keys - statements are parsed exactly as they are in - named.conf, except that all - managed-keys entries will be treated as - if they were configured with the static-key - or static-ds keywords, even if they are configured - with initial-key or iniital-ds. - (See for syntax details.) - -
-
- - Sample Applications - - - Some sample application programs using this API are provided for - reference. The following is a brief description of these - applications. - -
- - sample: a simple stub resolver utility - - - Sends a query of a given name (of a given optional RR type) to a - specified recursive server and prints the result as a list of RRs. - It can also act as a validating stub resolver if a trust anchor is - given via a set of command line options. - - - Usage: sample [options] server_address hostname - - - Options and Arguments: - - - - -t RRtype - - - specify the RR type of the query. The default is the A RR. - - - - - [-a algorithm] [-e] -k keyname -K keystring - - - specify a command-line DNS key to validate the answer. For - example, to specify the following DNSKEY of example.com: - - example.com. 3600 IN DNSKEY 257 3 5 xxx - - specify the options as follows: - --e -k example.com -K "xxx" - - -e means that this key is a zone's "key signing key" (also known - as "secure entry point"). - When -a is omitted rsasha1 will be used by default. - - - - - -s domain:alt_server_address - - - specify a separate recursive server address for the specific - "domain". Example: -s example.com:2001:db8::1234 - - - - - server_address - - - an IP(v4/v6) address of the recursive server to which queries - are sent. - - - - - hostname - - - the domain name for the query - - - - -
-
- - sample-async: a simple stub resolver, working asynchronously - - - Similar to "sample", but accepts a list - of (query) domain names as a separate file and resolves the names - asynchronously. - - Usage: sample-async [-s server_address] [-t RR_type] input_file - - Options and Arguments: - - - - -s server_address - - an IPv4 address of the recursive server to which queries are sent. - (IPv6 addresses are not supported in this implementation) - - - - -t RR_type - - specify the RR type of the queries. The default is the A - RR. - - - - input_file - - a list of domain names to be resolved. each line consists of a - single domain name. Example: - - www.example.com - mx.example.net - ns.xxx.example - - - - -
-
- - sample-request: a simple DNS transaction client - - - Sends a query to a specified server, and prints the response with - minimal processing. It doesn't act as a "stub resolver": it stops - the processing once it gets any response from the server, whether - it's a referral or an alias (CNAME or DNAME) that would require - further queries to get the ultimate answer. In other words, this - utility acts as a very simplified dig. - - - Usage: sample-request [-t RRtype] server_address hostname - - - Options and Arguments: - - - - -t RRtype - - - specify the RR type of the queries. The default is the A RR. - - - - - server_address - - - an IP(v4/v6) address of the recursive server to which - the query is sent. - - - - - hostname - - - the domain name for the query - - - - -
-
- - sample-gai: getaddrinfo() and getnameinfo() test code - - - This is a test program to check getaddrinfo() and - getnameinfo() behavior. It takes a host name as an - argument, calls getaddrinfo() with the given host - name, and calls getnameinfo() with the resulting - IP addresses returned by getaddrinfo(). If the - dns.conf file exists and defines a trust anchor, the underlying - resolver will act as a validating resolver, and - getaddrinfo()/getnameinfo() - will fail with an EAI_INSECUREDATA error when DNSSEC validation - fails. - - - Usage: sample-gai hostname - -
-
- - sample-update: a simple dynamic update client program - - - Accepts a single update command as a command-line argument, sends - an update request message to the authoritative server, and shows - the response from the server. In other words, this is a simplified - nsupdate. - - - Usage: sample-update [options] (add|delete) "update data" - - - Options and Arguments: - - - - -a auth_server - - - An IP address of the authoritative server that has authority - for the zone containing the update name. This should - normally be the primary authoritative server that accepts - dynamic updates. It can also be a secondary server that is - configured to forward update requests to the primary server. - - - - - -k keyfile - - - A TSIG key file to secure the update transaction. The - keyfile format is the same as that for the nsupdate utility. - - - - - -p prerequisite - - - A prerequisite for the update (only one prerequisite can be - specified). The prerequisite format is the same as that is - accepted by the nsupdate utility. - - - - - -r recursive_server - - - An IP address of a recursive server that this utility will - use. A recursive server may be necessary to identify the - authoritative server address to which the update request is - sent. - - - - - -z zonename - - - The domain name of the zone that contains - - - - - (add|delete) - - - Specify the type of update operation. Either "add" or - "delete" must be specified. - - - - - "update data" - - - Specify the data to be updated. A typical example of the - data would look like "name TTL RRtype RDATA". - - - - - - - In practice, either -a or -r must be specified. Others can be - optional; the underlying library routine tries to identify the - appropriate server and the zone name for the update. - - - - Examples: assuming the primary authoritative server of the - dynamic.example.com zone has an IPv6 address 2001:db8::1234, - - -$ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add "foo.dynamic.example.com 30 IN A 192.168.2.1" - - adds an A RR for foo.dynamic.example.com using the given key. - - -$ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com 30 IN A" - - removes all A RRs for foo.dynamic.example.com using the given key. - - -$ sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com" - - removes all RRs for foo.dynamic.example.com using the given key. - -
-
- - nsprobe: domain/name server checker in terms of RFC 4074 - - - Checks a set of domains to see the name servers of the domains - behave correctly in terms of RFC 4074. This is included in the set - of sample programs to show how the export library can be used in a - DNS-related application. - - - Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file] - - - Options - - - - -d - - - Run in "debug" mode. With this option nsprobe will dump - every RRs it receives. - - - - - -v - - - Increase verbosity of other normal log messages. This can be - specified multiple times. - - - - - -c cache_address - - - Specify an IP address of a recursive (caching) name server. - nsprobe uses this server to get the NS RRset of each domain - and the A and/or AAAA RRsets for the name servers. The - default value is 127.0.0.1. - - - - - input_file - - - A file name containing a list of domain (zone) names to be - probed. when omitted the standard input will be used. Each - line of the input file specifies a single domain name such as - "example.com". In general this domain name must be the apex - name of some DNS zone (unlike normal "host names" such as - "www.example.com"). nsprobe first identifies the NS RRsets - for the given domain name, and sends A and AAAA queries to - these servers for some "widely used" names under the zone; - specifically, adding "www" and "ftp" to the zone name. - - - - -
-
-
- - Library References - - - As of this writing, there is no formal "manual" for the libraries, - except this document, header files (some of which provide pretty - detailed explanations), and sample application programs. - -
-
diff --git a/doc/arm/logging-categories.rst b/doc/arm/logging-categories.rst new file mode 100644 index 0000000000..f3dba3c43f --- /dev/null +++ b/doc/arm/logging-categories.rst @@ -0,0 +1,178 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + ++----------------------------+----------------------------------------------------+ +| ``client`` | Processing of client requests. | ++----------------------------+----------------------------------------------------+ +| ``cname`` | Logs nameservers that are skipped due to them | +| | being a CNAME rather than A / AAAA records. | ++----------------------------+----------------------------------------------------+ +| ``config`` | Configuration file parsing and processing. | ++----------------------------+----------------------------------------------------+ +| ``database`` | Messages relating to the databases used internally | +| | by the name server to store zone and cache data. | ++----------------------------+----------------------------------------------------+ +| ``default`` | The default category defines the logging options | +| | for those categories where no specific | +| | configuration has been defined. | ++----------------------------+----------------------------------------------------+ +| ``delegation-only`` | Delegation only. Logs queries that have been | +| | forced to NXDOMAIN as the result of a | +| | delegation-only zone or a ``delegation-only`` in a | +| | forward, hint or stub zone declaration. | ++----------------------------+----------------------------------------------------+ +| ``dispatch`` | Dispatching of incoming packets to the server | +| | modules where they are to be processed. | ++----------------------------+----------------------------------------------------+ +| ``dnssec`` | DNSSEC and TSIG protocol processing. | ++----------------------------+----------------------------------------------------+ +| ``dnstap`` | The "dnstap" DNS traffic capture system. | ++----------------------------+----------------------------------------------------+ +| ``edns-disabled`` | Log queries that have been forced to use plain DNS | +| | due to timeouts. This is often due to the remote | +| | servers not being :rfc:`1034` compliant (not | +| | always returning FORMERR or similar to EDNS | +| | queries and other extensions to the DNS when | +| | they are not understood). In other words, this | +| | is targeted at servers that fail to respond to DNS | +| | queries that they don't understand. | +| | | +| | Note: the log message can also be due to packet | +| | loss. Before reporting servers for non-:rfc:`1034` | +| | compliance they should be re-tested to determine | +| | the nature of the non-compliance. This testing | +| | should prevent or reduce the number of | +| | false-positive reports. | +| | | +| | Note: eventually ``named`` will have to stop | +| | treating such timeouts as due to :rfc:`1034` non | +| | compliance and start treating it as plain packet | +| | loss. Falsely classifying packet loss as due to | +| | :rfc:`1034` non compliance impacts on DNSSEC | +| | validation which requires EDNS for the DNSSEC | +| | records to be returned. | ++----------------------------+----------------------------------------------------+ +| ``general`` | The catch-all. Many things still aren't classified | +| | into categories, and they all end up here. | ++----------------------------+----------------------------------------------------+ +| ``lame-servers`` | Lame servers. These are misconfigurations in | +| | remote servers, discovered by BIND 9 when trying | +| | to query those servers during resolution. | ++----------------------------+----------------------------------------------------+ +| ``network`` | Network operations. | ++----------------------------+----------------------------------------------------+ +| ``notify`` | The NOTIFY protocol. | ++----------------------------+----------------------------------------------------+ +| ``nsid`` | NSID options received from upstream servers. | ++----------------------------+----------------------------------------------------+ +| ``queries`` | Specify where queries should be logged to. | +| | | +| | At startup, specifying the category ``queries`` | +| | will also enable query logging unless ``querylog`` | +| | option has been specified. | +| | | +| | The query log entry first reports a client object | +| | identifier in @0x format. | +| | Next, it reports the client's IP address and port | +| | number, and the query name, class and type. Next, | +| | it reports whether the Recursion Desired flag was | +| | set (+ if set, - if not set), whether the query | +| | was signed (S), whether EDNS was in use along with | +| | the EDNS version number (E(#)), whether TCP was | +| | used (T), whether DO (DNSSEC Ok) was set (D), | +| | whether CD (Checking Disabled) was set (C), | +| | whether a valid DNS Server COOKIE was received | +| | (V), and whether a DNS COOKIE option without a | +| | valid Server COOKIE was present (K). After this | +| | the destination address the query was sent to is | +| | reported. Finally, if any CLIENT-SUBNET option was | +| | present in the client query, it is included in | +| | square brackets in the format [ECS | +| | address/source/scope]. | +| | | +| | ``client 127.0.0.1#62536 (www.example.com):`` | +| | ``query: www.example.com IN AAAA +SE`` | +| | | +| | ``client ::1#62537 (www.example.net):`` | +| | ``query: www.example.net IN AAAA -SE`` | +| | | +| | (The first part of this log message, showing the | +| | client address/port number and query name, is | +| | repeated in all subsequent log messages related to | +| | the same query.) | ++----------------------------+----------------------------------------------------+ +| ``query-errors`` | Information about queries that resulted in some | +| | failure. | ++----------------------------+----------------------------------------------------+ +| ``rate-limit`` | The start, periodic, and final notices of the rate | +| | limiting of a stream of responses are logged at | +| | ``info`` severity in this category. These messages | +| | include a hash value of the domain name of the | +| | response and the name itself, except when there is | +| | insufficient memory to record the name for the | +| | final notice The final notice is normally delayed | +| | until about one minute after rate limit stops. A | +| | lack of memory can hurry the final notice, in | +| | which case it starts with an asterisk (*). Various | +| | internal events are logged at debug 1 level and | +| | higher. | +| | | +| | Rate limiting of individual requests is logged in | +| | the ``query-errors`` category. | ++----------------------------+----------------------------------------------------+ +| ``resolver`` | DNS resolution, such as the recursive lookups | +| | performed on behalf of clients by a caching name | +| | server. | ++----------------------------+----------------------------------------------------+ +| ``rpz`` | Information about errors in response policy zone | +| | files, rewritten responses, and at the highest | +| | ``debug`` levels, mere rewriting attempts. | ++----------------------------+----------------------------------------------------+ +| ``security`` | Approval and denial of requests. | ++----------------------------+----------------------------------------------------+ +| ``serve-stale`` | Whether or not a stale answer is used following a | +| | resolver failure. | ++----------------------------+----------------------------------------------------+ +| ``spill`` | Logs queries that have been terminated, either by | +| | dropping or responding with SERVFAIL, as a result | +| | of a fetchlimit quota being exceeded. | ++----------------------------+----------------------------------------------------+ +| ``trust-anchor-telemetry`` | Logs trust-anchor-telemetry requests received by | +| | named. | ++----------------------------+----------------------------------------------------+ +| ``unmatched`` | Messages that ``named`` was unable to determine | +| | the class of or for which there was no matching | +| | ``view``. A one line summary is also logged to the | +| | ``client`` category. This category is best sent to | +| | a file or stderr, by default it is sent to the | +| | ``null`` channel. | ++----------------------------+----------------------------------------------------+ +| ``update`` | Dynamic updates. | ++----------------------------+----------------------------------------------------+ +| ``update-security`` | Approval and denial of update requests. | +| | | ++----------------------------+----------------------------------------------------+ +| ``xfer-in`` | Zone transfers the server is receiving. | ++----------------------------+----------------------------------------------------+ +| ``xfer-out`` | Zone transfers the server is sending. | ++----------------------------+----------------------------------------------------+ +| ``zoneload`` | Loading of zones and creation of automatic empty | +| | zones. | ++----------------------------+----------------------------------------------------+ diff --git a/doc/arm/logging-categories.xml b/doc/arm/logging-categories.xml deleted file mode 100644 index 25914633ab..0000000000 --- a/doc/arm/logging-categories.xml +++ /dev/null @@ -1,428 +0,0 @@ - - - - - - - - - - - client - - - - Processing of client requests. - - - - - - cname - - - - Logs nameservers that are skipped due to them being - a CNAME rather than A / AAAA records. - - - - - - config - - - - Configuration file parsing and processing. - - - - - - database - - - - Messages relating to the databases used - internally by the name server to store zone and cache - data. - - - - - - default - - - - The default category defines the logging - options for those categories where no specific - configuration has been - defined. - - - - - - delegation-only - - - - Delegation only. Logs queries that have been - forced to NXDOMAIN as the result of a - delegation-only zone or a - delegation-only in a - forward, hint or stub zone declaration. - - - - - - dispatch - - - - Dispatching of incoming packets to the - server modules where they are to be processed. - - - - - - dnssec - - - - DNSSEC and TSIG protocol processing. - - - - - - dnstap - - - - The "dnstap" DNS traffic capture system. - - - - - - edns-disabled - - - - Log queries that have been forced to use plain - DNS due to timeouts. This is often due to - the remote servers not being RFC 1034 compliant - (not always returning FORMERR or similar to - EDNS queries and other extensions to the DNS - when they are not understood). In other words, this is - targeted at servers that fail to respond to - DNS queries that they don't understand. - - - Note: the log message can also be due to - packet loss. Before reporting servers for - non-RFC 1034 compliance they should be re-tested - to determine the nature of the non-compliance. - This testing should prevent or reduce the - number of false-positive reports. - - - Note: eventually named will have to stop - treating such timeouts as due to RFC 1034 non - compliance and start treating it as plain - packet loss. Falsely classifying packet - loss as due to RFC 1034 non compliance impacts - on DNSSEC validation which requires EDNS for - the DNSSEC records to be returned. - - - - - - general - - - - The catch-all. Many things still aren't - classified into categories, and they all end up here. - - - - - - lame-servers - - - - Lame servers. These are misconfigurations - in remote servers, discovered by BIND 9 when trying to - query those servers during resolution. - - - - - - network - - - - Network operations. - - - - - - notify - - - - The NOTIFY protocol. - - - - - - nsid - - - - NSID options received from upstream servers. - - - - - - queries - - - - Specify where queries should be logged to. - - - At startup, specifying the category queries will also - enable query logging unless querylog option has been - specified. - - - - The query log entry first reports a client object - identifier in @0x<hexadecimal-number> - format. Next, it reports the client's IP - address and port number, and the query name, - class and type. Next, it reports whether the - Recursion Desired flag was set (+ if set, - - if not set), whether the query was signed (S), - whether EDNS was in use along with the EDNS version - number (E(#)), whether TCP was used (T), whether - DO (DNSSEC Ok) was set (D), whether CD (Checking - Disabled) was set (C), whether a valid DNS Server - COOKIE was received (V), and whether a DNS - COOKIE option without a valid Server COOKIE was - present (K). After this the destination - address the query was sent to is reported. - Finally, if any CLIENT-SUBNET option - was present in the client query, it is - included in square brackets in the format - [ECS address/source/scope]. - - - - client 127.0.0.1#62536 (www.example.com): query: www.example.com IN AAAA +SE - - - client ::1#62537 (www.example.net): query: www.example.net IN AAAA -SE - - - (The first part of this log message, showing the - client address/port number and query name, is - repeated in all subsequent log messages related - to the same query.) - - - - - - query-errors - - - - Information about queries that resulted in some - failure. - - - - - - rate-limit - - - - The start, periodic, and final notices of the - rate limiting of a stream of responses are logged at - info severity in this category. - These messages include a hash value of the domain name - of the response and the name itself, - except when there is insufficient memory to record - the name for the final notice - The final notice is normally delayed until about one - minute after rate limit stops. - A lack of memory can hurry the final notice, - in which case it starts with an asterisk (*). - Various internal events are logged at debug 1 level - and higher. - - - Rate limiting of individual requests - is logged in the query-errors category. - - - - - - resolver - - - - DNS resolution, such as the recursive - lookups performed on behalf of clients by a caching name - server. - - - - - - rpz - - - - Information about errors in response policy zone files, - rewritten responses, and at the highest - debug levels, mere rewriting - attempts. - - - - - - security - - - - Approval and denial of requests. - - - - - - serve-stale - - - - Whether or not a stale answer is used - following a resolver failure. - - - - - - spill - - - - Logs queries that have been terminated, either by dropping - or responding with SERVFAIL, as a result of a fetchlimit - quota being exceeded. - - - - - - trust-anchor-telemetry - - - - Logs trust-anchor-telemetry requests received by named. - - - - - - unmatched - - - - Messages that named was unable to determine the - class of or for which there was no matching view. - A one line summary is also logged to the client category. - This category is best sent to a file or stderr, by - default it is sent to - the null channel. - - - - - - update - - - - Dynamic updates. - - - - - - update-security - - - - Approval and denial of update requests. - - - - - - xfer-in - - - - Zone transfers the server is receiving. - - - - - - xfer-out - - - - Zone transfers the server is sending. - - - - - - zoneload - - - - Loading of zones and creation of automatic empty zones. - - - - - - diff --git a/doc/arm/logging.grammar.xml b/doc/arm/logging.grammar.xml deleted file mode 100644 index cc15150ab8..0000000000 --- a/doc/arm/logging.grammar.xml +++ /dev/null @@ -1,30 +0,0 @@ - - - - - -logging { - category string { string; ... }; - channel string { - buffered boolean; - file quoted_string [ versions ( unlimited | integer ) ] - [ size size ] [ suffix ( increment | timestamp ) ]; - null; - print-category boolean; - print-severity boolean; - print-time ( iso8601 | iso8601-utc | local | boolean ); - severity log_severity; - stderr; - syslog [ syslog_facility ]; - }; -}; - diff --git a/doc/arm/man.arpaname.html b/doc/arm/man.arpaname.html deleted file mode 100644 index dfcbab7976..0000000000 --- a/doc/arm/man.arpaname.html +++ /dev/null @@ -1,95 +0,0 @@ - - - - - -arpaname - - - - - - - - -
-
- - - - -
-

Name

-

- arpaname - — translate IP addresses to the corresponding ARPA names -

-
- - - -
-

Synopsis

-

- arpaname - {ipaddress ...} -

-
- -
-

DESCRIPTION

- -

- arpaname translates IP addresses (IPv4 and - IPv6) to the corresponding IN-ADDR.ARPA or IP6.ARPA names. -

-
- -
-

SEE ALSO

- -

- BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.ddns-confgen.html b/doc/arm/man.ddns-confgen.html deleted file mode 100644 index 59a59cb880..0000000000 --- a/doc/arm/man.ddns-confgen.html +++ /dev/null @@ -1,225 +0,0 @@ - - - - - -ddns-confgen - - - - - - - - -
-
- - - - - -
-

Name

-

- ddns-confgen - — ddns key generation tool -

-
- - - -
-

Synopsis

-

- tsig-keygen - [-a algorithm] - [-h] - [name] -

-

- ddns-confgen - [-a algorithm] - [-h] - [-k keyname] - [-q] - [-r randomfile] - [ - -s name - | -z zone - ] -

-
- -
-

DESCRIPTION

- -

- tsig-keygen and ddns-confgen - are invocation methods for a utility that generates keys for use - in TSIG signing. The resulting keys can be used, for example, - to secure dynamic DNS updates to a zone or for the - rndc command channel. -

- -

- When run as tsig-keygen, a domain name - can be specified on the command line which will be used as - the name of the generated key. If no name is specified, - the default is tsig-key. -

- -

- When run as ddns-confgen, the generated - key is accompanied by configuration text and instructions - that can be used with nsupdate and - named when setting up dynamic DNS, - including an example update-policy - statement. (This usage similar to the - rndc-confgen command for setting - up command channel security.) -

- -

- Note that named itself can configure a - local DDNS key for use with nsupdate -l: - it does this when a zone is configured with - update-policy local;. - ddns-confgen is only needed when a - more elaborate configuration is required: for instance, - if nsupdate is to be used from a remote - system. -

-
- -
-

OPTIONS

- - -
-
-a algorithm
-
-

- Specifies the algorithm to use for the TSIG key. Available - choices are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384 and hmac-sha512. The default is hmac-sha256. - Options are case-insensitive, and the "hmac-" prefix - may be omitted. -

-
-
-h
-
-

- Prints a short summary of options and arguments. -

-
-
-k keyname
-
-

- Specifies the key name of the DDNS authentication key. - The default is ddns-key when neither - the -s nor -z option is - specified; otherwise, the default - is ddns-key as a separate label - followed by the argument of the option, e.g., - ddns-key.example.com. - The key name must have the format of a valid domain name, - consisting of letters, digits, hyphens and periods. -

-
-
-q
-
-

- (ddns-confgen only.) Quiet mode: Print - only the key, with no explanatory text or usage examples; - This is essentially identical to tsig-keygen. -

-
-
-s name
-
-

- (ddns-confgen only.) - Generate configuration example to allow dynamic updates - of a single hostname. The example named.conf - text shows how to set an update policy for the specified - name - using the "name" nametype. The default key name is - ddns-key.name. - Note that the "self" nametype cannot be used, since - the name to be updated may differ from the key name. - This option cannot be used with the -z option. -

-
-
-z zone
-
-

- (ddns-confgen only.) - Generate configuration example to allow dynamic updates - of a zone: The example named.conf text - shows how to set an update policy for the specified - zone - using the "zonesub" nametype, allowing updates to - all subdomain names within that - zone. - This option cannot be used with the -s option. -

-
-
-
- -
-

SEE ALSO

- -

- nsupdate(1) - , - - named.conf(5) - , - - named(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.delv.html b/doc/arm/man.delv.html deleted file mode 100644 index 05147a811d..0000000000 --- a/doc/arm/man.delv.html +++ /dev/null @@ -1,626 +0,0 @@ - - - - - -delv - - - - - - - - -
-
- - - - - -
-

Name

-

- delv - — DNS lookup and validation utility -

-
- - - -
-

Synopsis

-

- delv - [@server] - [ - [-4] - | [-6] - ] - [-a anchor-file] - [-b address] - [-c class] - [-d level] - [-i] - [-m] - [-p port#] - [-q name] - [-t type] - [-x addr] - [name] - [type] - [class] - [queryopt...] -

- -

- delv - [-h] -

- -

- delv - [-v] -

- -

- delv - [queryopt...] - [query...] -

-
- -
-

DESCRIPTION

- -

delv - is a tool for sending - DNS queries and validating the results, using the same internal - resolver and validator logic as named. -

-

- delv will send to a specified name server all - queries needed to fetch and validate the requested data; this - includes the original requested query, subsequent queries to follow - CNAME or DNAME chains, and queries for DNSKEY and DS records - to establish a chain of trust for DNSSEC validation. - It does not perform iterative resolution, but simulates the - behavior of a name server configured for DNSSEC validating and - forwarding. -

-

- By default, responses are validated using built-in DNSSEC trust - anchor for the root zone ("."). Records returned by - delv are either fully validated or - were not signed. If validation fails, an explanation of - the failure is included in the output; the validation process - can be traced in detail. Because delv does - not rely on an external server to carry out validation, it can - be used to check the validity of DNS responses in environments - where local name servers may not be trustworthy. -

-

- Unless it is told to query a specific name server, - delv will try each of the servers listed in - /etc/resolv.conf. If no usable server - addresses are found, delv will send - queries to the localhost addresses (127.0.0.1 for IPv4, ::1 - for IPv6). -

-

- When no command line arguments or options are given, - delv will perform an NS query for "." - (the root zone). -

-
- -
-

SIMPLE USAGE

- - -

- A typical invocation of delv looks like: -

-
 delv @server name type 
-

- where: - -

-
-
server
-
-

- is the name or IP address of the name server to query. This - can be an IPv4 address in dotted-decimal notation or an IPv6 - address in colon-delimited notation. When the supplied - server argument is a hostname, - delv resolves that name before - querying that name server (note, however, that this - initial lookup is not validated - by DNSSEC). -

-

- If no server argument is - provided, delv consults - /etc/resolv.conf; if an - address is found there, it queries the name server at - that address. If either of the -4 or - -6 options are in use, then - only addresses for the corresponding transport - will be tried. If no usable addresses are found, - delv will send queries to - the localhost addresses (127.0.0.1 for IPv4, - ::1 for IPv6). -

-
-
name
-
-

- is the domain name to be looked up. -

-
-
type
-
-

- indicates what type of query is required — - ANY, A, MX, etc. - type can be any valid query - type. If no - type argument is supplied, - delv will perform a lookup for an - A record. -

-
-
-

-

- -
- -
-

OPTIONS

- -
-
-a anchor-file
-
-

- Specifies a file from which to read DNSSEC trust anchors. - The default is /etc/bind.keys, which - is included with BIND 9 and contains - one or more trust anchors for the root zone ("."). -

-

- Keys that do not match the root zone name are ignored. - An alternate key name can be specified using the - +root=NAME options. -

-

- Note: When reading the trust anchor file, - delv treats trust-anchors - initial-key and static-key - entries identically. That is, even if a key is configured - with initial-key, indicating that it is - meant to be used only as an initializing key for RFC 5011 - key maintenance, it is still treated by delv - as if it had been configured as a static-key. - delv does not consult the managed keys - database maintained by named. This means - that if either of the keys in - /etc/bind.keys is revoked - and rolled over, it will be necessary to update - /etc/bind.keys to use DNSSEC - validation in delv. -

-
-
-b address
-
-

- Sets the source IP address of the query to - address. This must be a valid address - on one of the host's network interfaces or "0.0.0.0" or "::". - An optional source port may be specified by appending - "#<port>" -

-
-
-c class
-
-

- Sets the query class for the requested data. Currently, - only class "IN" is supported in delv - and any other value is ignored. -

-
-
-d level
-
-

- Set the systemwide debug level to level. - The allowed range is from 0 to 99. - The default is 0 (no debugging). - Debugging traces from delv become - more verbose as the debug level increases. - See the +mtrace, +rtrace, - and +vtrace options below for additional - debugging details. -

-
-
-h
-
-

- Display the delv help usage output and exit. -

-
-
-i
-
-

- Insecure mode. This disables internal DNSSEC validation. - (Note, however, this does not set the CD bit on upstream - queries. If the server being queried is performing DNSSEC - validation, then it will not return invalid data; this - can cause delv to time out. When it - is necessary to examine invalid data to debug a DNSSEC - problem, use dig +cd.) -

-
-
-m
-
-

- Enables memory usage debugging. -

-
-
-p port#
-
-

- Specifies a destination port to use for queries instead of - the standard DNS port number 53. This option would be used - with a name server that has been configured to listen - for queries on a non-standard port number. -

-
-
-q name
-
-

- Sets the query name to name. - While the query name can be specified without using the - -q, it is sometimes necessary to disambiguate - names from types or classes (for example, when looking up the - name "ns", which could be misinterpreted as the type NS, - or "ch", which could be misinterpreted as class CH). -

-
-
-t type
-
-

- Sets the query type to type, which - can be any valid query type supported in BIND 9 except - for zone transfer types AXFR and IXFR. As with - -q, this is useful to distinguish - query name type or class when they are ambiguous. - it is sometimes necessary to disambiguate names from types. -

-

- The default query type is "A", unless the -x - option is supplied to indicate a reverse lookup, in which case - it is "PTR". -

-
-
-v
-
-

- Print the delv version and exit. -

-
-
-x addr
-
-

- Performs a reverse lookup, mapping an addresses to - a name. addr is an IPv4 address in - dotted-decimal notation, or a colon-delimited IPv6 address. - When -x is used, there is no need to provide - the name or type - arguments. delv automatically performs a - lookup for a name like 11.12.13.10.in-addr.arpa - and sets the query type to PTR. IPv6 addresses are looked up - using nibble format under the IP6.ARPA domain. -

-
-
-4
-
-

- Forces delv to only use IPv4. -

-
-
-6
-
-

- Forces delv to only use IPv6. -

-
-
-
- -
-

QUERY OPTIONS

- - -

delv - provides a number of query options which affect the way results are - displayed, and in some cases the way lookups are performed. -

- -

- Each query option is identified by a keyword preceded by a plus sign - (+). Some keywords set or reset an - option. These may be preceded by the string - no to negate the meaning of that keyword. - Other keywords assign values to options like the timeout interval. - They have the form +keyword=value. - The query options are: - -

-
-
+[no]cdflag
-
-

- Controls whether to set the CD (checking disabled) bit in - queries sent by delv. This may be useful - when troubleshooting DNSSEC problems from behind a validating - resolver. A validating resolver will block invalid responses, - making it difficult to retrieve them for analysis. Setting - the CD flag on queries will cause the resolver to return - invalid responses, which delv can then - validate internally and report the errors in detail. -

-
-
+[no]class
-
-

- Controls whether to display the CLASS when printing - a record. The default is to display the CLASS. -

-
-
+[no]ttl
-
-

- Controls whether to display the TTL when printing - a record. The default is to display the TTL. -

-
-
+[no]rtrace
-
-

- Toggle resolver fetch logging. This reports the - name and type of each query sent by delv - in the process of carrying out the resolution and validation - process: this includes including the original query and - all subsequent queries to follow CNAMEs and to establish a - chain of trust for DNSSEC validation. -

-

- This is equivalent to setting the debug level to 1 in - the "resolver" logging category. Setting the systemwide - debug level to 1 using the -d option will - product the same output (but will affect other logging - categories as well). -

-
-
+[no]mtrace
-
-

- Toggle message logging. This produces a detailed dump of - the responses received by delv in the - process of carrying out the resolution and validation process. -

-

- This is equivalent to setting the debug level to 10 - for the "packets" module of the "resolver" logging - category. Setting the systemwide debug level to 10 using - the -d option will produce the same output - (but will affect other logging categories as well). -

-
-
+[no]vtrace
-
-

- Toggle validation logging. This shows the internal - process of the validator as it determines whether an - answer is validly signed, unsigned, or invalid. -

-

- This is equivalent to setting the debug level to 3 - for the "validator" module of the "dnssec" logging - category. Setting the systemwide debug level to 3 using - the -d option will produce the same output - (but will affect other logging categories as well). -

-
-
+[no]short
-
-

- Provide a terse answer. The default is to print the answer in a - verbose form. -

-
-
+[no]comments
-
-

- Toggle the display of comment lines in the output. The default - is to print comments. -

-
-
+[no]rrcomments
-
-

- Toggle the display of per-record comments in the output (for - example, human-readable key information about DNSKEY records). - The default is to print per-record comments. -

-
-
+[no]crypto
-
-

- Toggle the display of cryptographic fields in DNSSEC records. - The contents of these field are unnecessary to debug most DNSSEC - validation failures and removing them makes it easier to see - the common failures. The default is to display the fields. - When omitted they are replaced by the string "[omitted]" or - in the DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". -

-
-
+[no]trust
-
-

- Controls whether to display the trust level when printing - a record. The default is to display the trust level. -

-
-
+[no]split[=W]
-
-

- Split long hex- or base64-formatted fields in resource - records into chunks of W characters - (where W is rounded up to the nearest - multiple of 4). - +nosplit or - +split=0 causes fields not to be - split at all. The default is 56 characters, or 44 characters - when multiline mode is active. -

-
-
+[no]all
-
-

- Set or clear the display options - +[no]comments, - +[no]rrcomments, and - +[no]trust as a group. -

-
-
+[no]multiline
-
-

- Print long records (such as RRSIG, DNSKEY, and SOA records) - in a verbose multi-line format with human-readable comments. - The default is to print each record on a single line, to - facilitate machine parsing of the delv - output. -

-
-
+[no]dnssec
-
-

- Indicates whether to display RRSIG records in the - delv output. The default is to - do so. Note that (unlike in dig) - this does not control whether to - request DNSSEC records or whether to validate them. - DNSSEC records are always requested, and validation - will always occur unless suppressed by the use of - -i or +noroot. -

-
-
+[no]root[=ROOT]
-
-

- Indicates whether to perform conventional - DNSSEC validation, and if so, specifies the - name of a trust anchor. The default is to validate using - a trust anchor of "." (the root zone), for which there is - a built-in key. If specifying a different trust anchor, - then -a must be used to specify a file - containing the key. -

-
-
+[no]tcp
-
-

- Controls whether to use TCP when sending queries. - The default is to use UDP unless a truncated - response has been received. -

-
-
+[no]unknownformat
-
-

- Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. -

-
-
+[no]yaml
-
-

- Print response data in YAML format. -

-
-
-

- -

-
- -
-

FILES

- -

/etc/bind.keys

-

/etc/resolv.conf

-
- -
-

SEE ALSO

- -

- dig(1) - , - - named(8) - , - RFC4034, - RFC4035, - RFC4431, - RFC5074, - RFC5155. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dig.html b/doc/arm/man.dig.html deleted file mode 100644 index dc0a0e1a0a..0000000000 --- a/doc/arm/man.dig.html +++ /dev/null @@ -1,1193 +0,0 @@ - - - - - -dig - - - - - - - - -
-
- - - - - -
-

Name

-

- dig - — DNS lookup utility -

-
- - - -
-

Synopsis

-

- dig - [@server] - [-b address] - [-c class] - [-f filename] - [-k filename] - [-m] - [-p port#] - [-q name] - [-t type] - [-v] - [-x addr] - [-y [hmac:]name:key] - [ - [-4] - | [-6] - ] - [name] - [type] - [class] - [queryopt...] -

- -

- dig - [-h] -

- -

- dig - [global-queryopt...] - [query...] -

-
- -
-

DESCRIPTION

- -

dig is a flexible tool - for interrogating DNS name servers. It performs DNS lookups and - displays the answers that are returned from the name server(s) that - were queried. Most DNS administrators use dig to - troubleshoot DNS problems because of its flexibility, ease of use and - clarity of output. Other lookup tools tend to have less functionality - than dig. -

- -

- Although dig is normally used with - command-line - arguments, it also has a batch mode of operation for reading lookup - requests from a file. A brief summary of its command-line arguments - and options is printed when the -h option is given. - Unlike earlier versions, the BIND 9 implementation of - dig allows multiple lookups to be issued - from the - command line. -

- -

- Unless it is told to query a specific name server, - dig will try each of the servers listed in - /etc/resolv.conf. If no usable server addresses - are found, dig will send the query to the local - host. -

- -

- When no command line arguments or options are given, - dig will perform an NS query for "." (the root). -

- -

- It is possible to set per-user defaults for dig via - ${HOME}/.digrc. This file is read and any - options in it are applied before the command line arguments. - The -r option disables this feature, for - scripts that need predictable behaviour. -

- -

- The IN and CH class names overlap with the IN and CH top level - domain names. Either use the -t and - -c options to specify the type and class, - use the -q the specify the domain name, or - use "IN." and "CH." when looking up these top level domains. -

- -
- -
-

SIMPLE USAGE

- - -

- A typical invocation of dig looks like: -

-
 dig @server name type 
-

- where: - -

-
-
server
-
-

- is the name or IP address of the name server to query. This - can be an IPv4 address in dotted-decimal notation or an IPv6 - address in colon-delimited notation. When the supplied - server argument is a hostname, - dig resolves that name before querying - that name server. -

-

- If no server argument is - provided, dig consults - /etc/resolv.conf; if an - address is found there, it queries the name server at - that address. If either of the -4 or - -6 options are in use, then - only addresses for the corresponding transport - will be tried. If no usable addresses are found, - dig will send the query to the - local host. The reply from the name server that - responds is displayed. -

-
-
name
-
-

- is the name of the resource record that is to be looked up. -

-
-
type
-
-

- indicates what type of query is required — - ANY, A, MX, SIG, etc. - type can be any valid query - type. If no - type argument is supplied, - dig will perform a lookup for an - A record. -

-
-
-

-

- -
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only. -

-
-
-6
-
-

- Use IPv6 only. -

-
-
-b address[#port]
-
-

- Set the source IP address of the query. - The address must be a valid address on - one of the host's network interfaces, or "0.0.0.0" or "::". An - optional port may be specified by appending "#<port>" -

-
-
-c class
-
-

- Set the query class. The - default class is IN; other classes - are HS for Hesiod records or CH for Chaosnet records. -

-
-
-f file
-
-

- Batch mode: dig reads a list of lookup - requests to process from the - given file. Each line in the file - should be organized in the same way they would be - presented as queries to - dig using the command-line interface. -

-
-
-k keyfile
-
-

- Sign queries using TSIG using a key read from the given file. - Key files can be generated using - - tsig-keygen(8) - . - When using TSIG authentication with dig, - the name server that is queried needs to know the key and - algorithm that is being used. In BIND, this is done by - providing appropriate key - and server statements in - named.conf. -

-
-
-m
-
-

- Enable memory usage debugging. - -

-
-
-p port
-
-

- Send the query to a non-standard port on the server, - instead of the default port 53. This option would be used - to test a name server that has been configured to listen - for queries on a non-standard port number. -

-
-
-q name
-
-

- The domain name to query. This is useful to distinguish - the name from other arguments. -

-
-
-r
-
-

- Do not read options from ${HOME}/.digrc. - This is useful for scripts that need predictable behaviour. -

-
-
-t type
-
-

- The resource record type to query. It can be any valid query - type. If it is a resource record type supported in BIND 9, it - can be given by the type mnemonic (such as "NS" or "AAAA"). - The default query type is "A", unless the -x - option is supplied to indicate a reverse lookup. A zone - transfer can be requested by specifying a type of AXFR. When - an incremental zone transfer (IXFR) is required, set the - type to ixfr=N. - The incremental zone transfer will contain the changes - made to the zone since the serial number in the zone's SOA - record was - N. -

-

- All resource record types can be expressed as "TYPEnn", where - "nn" is the number of the type. If the resource record type is - not supported in BIND 9, the result will be displayed as - described in RFC 3597. -

-
-
-u
-
-

- Print query times in microseconds instead of milliseconds. -

-
-
-v
-
-

- Print the version number and exit. -

-
-
-x addr
-
-

- Simplified reverse lookups, for mapping addresses to - names. The addr is an IPv4 address - in dotted-decimal notation, or a colon-delimited IPv6 - address. When the -x is used, there is no - need to provide - the name, class - and type - arguments. dig automatically performs a - lookup for a name like - 94.2.0.192.in-addr.arpa and sets the - query type and class to PTR and IN respectively. IPv6 - addresses are looked up using nibble format under the - IP6.ARPA domain. -

-
-
-y [hmac:]keyname:secret
-
-

- Sign queries using TSIG with the given authentication key. - keyname is the name of the key, and - secret is the base64 encoded shared secret. - hmac is the name of the key algorithm; - valid choices are hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384, or - hmac-sha512. If hmac - is not specified, the default is hmac-md5 - or if MD5 was disabled hmac-sha256. -

-

- NOTE: You should use the -k option and - avoid the -y option, because - with -y the shared secret is supplied as - a command line argument in clear text. This may be visible - in the output from - - ps(1) - - or in a history file maintained by the user's shell. -

-
-
-
- -
-

QUERY OPTIONS

- - -

dig - provides a number of query options which affect - the way in which lookups are made and the results displayed. Some of - these set or reset flag bits in the query header, some determine which - sections of the answer get printed, and others determine the timeout - and retry strategies. -

- -

- Each query option is identified by a keyword preceded by a plus sign - (+). Some keywords set or reset an - option. These may be preceded - by the string no to negate the meaning of - that keyword. Other - keywords assign values to options like the timeout interval. They - have the form +keyword=value. - Keywords may be abbreviated, provided the abbreviation is - unambiguous; for example, +cd is equivalent - to +cdflag. - The query options are: - -

-
-
+[no]aaflag
-
-

- A synonym for +[no]aaonly. -

-
-
+[no]aaonly
-
-

- Sets the "aa" flag in the query. -

-
-
+[no]additional
-
-

- Display [do not display] the additional section of a - reply. The default is to display it. -

-
-
+[no]adflag
-
-

- Set [do not set] the AD (authentic data) bit in the - query. This requests the server to return whether - all of the answer and authority sections have all - been validated as secure according to the security - policy of the server. AD=1 indicates that all records - have been validated as secure and the answer is not - from a OPT-OUT range. AD=0 indicate that some part - of the answer was insecure or not validated. This - bit is set by default. -

-
-
+[no]all
-
-

- Set or clear all display flags. -

-
-
+[no]answer
-
-

- Display [do not display] the answer section of a - reply. The default is to display it. -

-
-
+[no]authority
-
-

- Display [do not display] the authority section of a - reply. The default is to display it. -

-
-
+[no]badcookie
-
-

- Retry lookup with the new server cookie if a - BADCOOKIE response is received. -

-
-
+[no]besteffort
-
-

- Attempt to display the contents of messages which are - malformed. The default is to not display malformed - answers. -

-
-
+bufsize=B
-
-

- Set the UDP message buffer size advertised using EDNS0 - to B bytes. The maximum and - minimum sizes of this buffer are 65535 and 0 respectively. - Values outside this range are rounded up or down - appropriately. Values other than zero will cause a - EDNS query to be sent. -

-
-
+[no]cdflag
-
-

- Set [do not set] the CD (checking disabled) bit in - the query. This requests the server to not perform - DNSSEC validation of responses. -

-
-
+[no]class
-
-

- Display [do not display] the CLASS when printing the - record. -

-
-
+[no]cmd
-
-

- Toggles the printing of the initial comment in the - output, identifying the version of dig - and the query options that have been applied. This option - always has global effect; it cannot be set globally - and then overridden on a per-lookup basis. The default - is to print this comment. -

-
-
+[no]comments
-
-

- Toggles the display of some comment lines in the output, - containing information about the packet header and - OPT pseudosection, and the names of the response - section. The default is to print these comments. -

-

- Other types of comments in the output are not affected by - this option, but can be controlled using other command - line switches. These include +[no]cmd, - +[no]question, - +[no]stats, and - +[no]rrcomments. -

-
-
+[no]cookie[=####]
-
-

- Send a COOKIE EDNS option, with optional - value. Replaying a COOKIE from a previous response will - allow the server to identify a previous client. The - default is +cookie. -

-

- +cookie is also set when +trace - is set to better emulate the default queries from a - nameserver. -

-
-
+[no]crypto
-
-

- Toggle the display of cryptographic fields in DNSSEC - records. The contents of these field are unnecessary - to debug most DNSSEC validation failures and removing - them makes it easier to see the common failures. The - default is to display the fields. When omitted they - are replaced by the string "[omitted]" or in the - DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". -

-
-
+[no]defname
-
-

- Deprecated, treated as a synonym for - +[no]search -

-
-
+[no]dnssec
-
-

- Requests DNSSEC records be sent by setting the DNSSEC - OK bit (DO) in the OPT record in the additional section - of the query. -

-
-
+domain=somename
-
-

- Set the search list to contain the single domain - somename, as if specified in - a domain directive in - /etc/resolv.conf, and enable - search list processing as if the - +search option were given. -

-
-
+dscp=value
-
-

- Set the DSCP code point to be used when sending the - query. Valid DSCP code points are in the range - [0..63]. By default no code point is explicitly set. -

-
-
+[no]edns[=#]
-
-

- Specify the EDNS version to query with. Valid values - are 0 to 255. Setting the EDNS version will cause - a EDNS query to be sent. +noedns - clears the remembered EDNS version. EDNS is set to - 0 by default. -

-
-
+[no]ednsflags[=#]
-
-

- Set the must-be-zero EDNS flags bits (Z bits) to the - specified value. Decimal, hex and octal encodings are - accepted. Setting a named flag (e.g. DO) will silently be - ignored. By default, no Z bits are set. -

-
-
+[no]ednsnegotiation
-
-

- Enable / disable EDNS version negotiation. By default - EDNS version negotiation is enabled. -

-
-
+[no]ednsopt[=code[:value]]
-
-

- Specify EDNS option with code point code - and optionally payload of value as a - hexadecimal string. code can be - either an EDNS option name (for example, - NSID or ECS), - or an arbitrary numeric value. +noednsopt - clears the EDNS options to be sent. -

-
-
+[no]expire
-
-

- Send an EDNS Expire option. -

-
-
+[no]expandaaaa
-
-

- When printing AAAA record print all zero nibbles rather - than the default RFC 5952 preferred presentation format. -

-
-
+[no]fail
-
-

- Do not try the next server if you receive a SERVFAIL. - The default is to not try the next server which is - the reverse of normal stub resolver behavior. -

-
-
+[no]header-only
-
-

- Send a query with a DNS header without a question section. - The default is to add a question section. The query type - and query name are ignored when this is set. -

-
-
+[no]identify
-
-

- Show [or do not show] the IP address and port number - that supplied the answer when the - +short option is enabled. If - short form answers are requested, the default is not - to show the source address and port number of the - server that provided the answer. -

-
-
+[no]idnin
-
-

- Process [do not process] IDN domain names on input. - This requires IDN SUPPORT to have been enabled at - compile time. -

-

- The default is to process IDN input when standard output - is a tty. The IDN processing on input is disabled when - dig output is redirected to files, pipes, and other - non-tty file descriptors. -

-
-
+[no]idnout
-
-

- Convert [do not convert] puny code on output. - This requires IDN SUPPORT to have been enabled at - compile time. -

-

- The default is to process puny code on output when - standard output is a tty. The puny code processing on - output is disabled when dig output is redirected to - files, pipes, and other non-tty file descriptors. -

-
-
+[no]ignore
-
-

- Ignore truncation in UDP responses instead of retrying - with TCP. By default, TCP retries are performed. -

-
-
+[no]keepalive
-
-

- Send [or do not send] an EDNS Keepalive option. -

-
-
+[no]keepopen
-
-

- Keep the TCP socket open between queries and reuse - it rather than creating a new TCP socket for each - lookup. The default is +nokeepopen. -

-
-
+[no]mapped
-
-

- Allow mapped IPv4 over IPv6 addresses to be used. The - default is +mapped. -

-
-
+[no]multiline
-
-

- Print records like the SOA records in a verbose - multi-line format with human-readable comments. The - default is to print each record on a single line, to - facilitate machine parsing of the dig - output. -

-
-
+ndots=D
-
-

- Set the number of dots that have to appear in - name to D - for it to be considered absolute. The default value - is that defined using the ndots statement in - /etc/resolv.conf, or 1 if no - ndots statement is present. Names with fewer dots - are interpreted as relative names and will be searched - for in the domains listed in the search - or domain directive in - /etc/resolv.conf if - +search is set. -

-
-
+[no]nsid
-
-

- Include an EDNS name server ID request when sending - a query. -

-
-
+[no]nssearch
-
-

- When this option is set, dig - attempts to find the authoritative name servers for - the zone containing the name being looked up and - display the SOA record that each name server has for - the zone. Addresses of servers that that did not - respond are also printed. -

-
-
+[no]onesoa
-
-

- Print only one (starting) SOA record when performing - an AXFR. The default is to print both the starting - and ending SOA records. -

-
-
+[no]opcode=value
-
-

- Set [restore] the DNS message opcode to the specified - value. The default value is QUERY (0). -

-
-
+padding=value
-
-

- Pad the size of the query packet using the EDNS Padding option - to blocks of value bytes. For example, - +padding=32 would cause a 48-byte query to - be padded to 64 bytes. The default block size is 0, which - disables padding. The maximum is 512. Values are - ordinarily expected to be powers of two, such as 128; - however, this is not mandatory. Responses to - padded queries may also be padded, but only if the query - uses TCP or DNS COOKIE. -

-
-
+[no]qr
-
-

- Toggles the display of the query message as it is sent. - By default, the query is not printed. -

-
-
+[no]question
-
-

- Toggles the display of the question section of a query - when an answer is returned. The default is to print - the question section as a comment. -

-
-
+[no]raflag
-
-

- Set [do not set] the RA (Recursion Available) bit in - the query. The default is +noraflag. This bit should - be ignored by the server for QUERY. -

-
-
+[no]rdflag
-
-

- A synonym for +[no]recurse. -

-
-
+[no]recurse
-
-

- Toggle the setting of the RD (recursion desired) bit - in the query. This bit is set by default, which means - dig normally sends recursive - queries. Recursion is automatically disabled when - using the +nssearch option, and - when using +trace except for - an initial recursive query to get the list of root - servers. -

-
-
+retry=T
-
-

- Sets the number of times to retry UDP queries to - server to T instead of the - default, 2. Unlike +tries, - this does not include the initial query. -

-
-
+[no]rrcomments
-
-

- Toggle the display of per-record comments in the - output (for example, human-readable key information - about DNSKEY records). The default is not to print - record comments unless multiline mode is active. -

-
-
+[no]search
-
-

- Use [do not use] the search list defined by the - searchlist or domain directive in - resolv.conf (if any). The search - list is not used by default. -

-

- 'ndots' from resolv.conf (default 1) - which may be overridden by +ndots - determines if the name will be treated as relative - or not and hence whether a search is eventually - performed or not. -

-
-
+[no]short
-
-

- Provide a terse answer. The default is to print the - answer in a verbose form. This option always has global - effect; it cannot be set globally and then overridden on - a per-lookup basis. -

-
-
+[no]showsearch
-
-

- Perform [do not perform] a search showing intermediate - results. -

-
-
+[no]sigchase
-
-

- This feature is now obsolete and has been removed; - use delv instead. -

-
-
+split=W
-
-

- Split long hex- or base64-formatted fields in resource - records into chunks of W - characters (where W is rounded - up to the nearest multiple of 4). - +nosplit or - +split=0 causes fields not to - be split at all. The default is 56 characters, or - 44 characters when multiline mode is active. -

-
-
+[no]stats
-
-

- Toggles the printing of statistics: when the query was made, - the size of the reply and so on. The default behavior is to - print the query statistics as a comment after each lookup. -

-
-
+[no]subnet=addr[/prefix-length]
-
-

- Send (don't send) an EDNS Client Subnet option with the - specified IP address or network prefix. -

-

- dig +subnet=0.0.0.0/0, or simply - dig +subnet=0 for short, sends an EDNS - CLIENT-SUBNET option with an empty address and a source - prefix-length of zero, which signals a resolver that - the client's address information must - not be used when resolving - this query. -

-
-
+[no]tcflag
-
-

- Set [do not set] the TC (TrunCation) bit in the query. - The default is +notcflag. This bit should be ignored - by the server for QUERY. -

-
-
+[no]tcp
-
-

- Use [do not use] TCP when querying name servers. The - default behavior is to use UDP unless a type - any or ixfr=N - query is requested, in which case the default is TCP. - AXFR queries always use TCP. -

-
-
+timeout=T
-
-

- - Sets the timeout for a query to - T seconds. The default - timeout is 5 seconds. - An attempt to set T to less - than 1 will result - in a query timeout of 1 second being applied. -

-
-
+[no]topdown
-
-

- This feature is related to dig +sigchase, - which is obsolete and has been removed. Use - delv instead. -

-
-
+[no]trace
-
-

- Toggle tracing of the delegation path from the root - name servers for the name being looked up. Tracing - is disabled by default. When tracing is enabled, - dig makes iterative queries to - resolve the name being looked up. It will follow - referrals from the root servers, showing the answer - from each server that was used to resolve the lookup. -

- If @server is also specified, it affects only the - initial query for the root zone name servers. -

- +dnssec is also set when +trace - is set to better emulate the default queries from a - nameserver. -

-
-
+tries=T
-
-

- Sets the number of times to try UDP queries to server - to T instead of the default, - 3. If T is less than or equal - to zero, the number of tries is silently rounded up - to 1. -

-
-
+trusted-key=####
-
-

- Formerly specified trusted keys for use with - dig +sigchase. This feature is now - obsolete and has been removed; use - delv instead. -

-
-
+[no]ttlid
-
-

- Display [do not display] the TTL when printing the - record. -

-
-
+[no]ttlunits
-
-

- Display [do not display] the TTL in friendly human-readable - time units of "s", "m", "h", "d", and "w", representing - seconds, minutes, hours, days and weeks. Implies +ttlid. -

-
-
+[no]unexpected
-
-

- Accept [do not accept] answers from unexpected sources. By - default, dig won't accept a reply from a - source other than the one to which it sent the query. -

-
-
+[no]unknownformat
-
-

- Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. -

-
-
+[no]vc
-
-

- Use [do not use] TCP when querying name servers. This - alternate syntax to +[no]tcp - is provided for backwards compatibility. The "vc" - stands for "virtual circuit". -

-
-
+[no]yaml
-
-

- Print the responses (and, if +qr is in use, - also the outgoing queries) in a detailed YAML format. -

-
-
+[no]zflag
-
-

- Set [do not set] the last unassigned DNS header flag in a - DNS query. This flag is off by default. -

-
-
-

- -

-
- -
-

MULTIPLE QUERIES

- - -

- The BIND 9 implementation of dig - supports - specifying multiple queries on the command line (in addition to - supporting the -f batch file option). Each of those - queries can be supplied with its own set of flags, options and query - options. -

- -

- In this case, each query argument - represent an - individual query in the command-line syntax described above. Each - consists of any of the standard options and flags, the name to be - looked up, an optional query type and class and any query options that - should be applied to that query. -

- -

- A global set of query options, which should be applied to all queries, - can also be supplied. These global query options must precede the - first tuple of name, class, type, options, flags, and query options - supplied on the command line. Any global query options (except - +[no]cmd and +[no]short options) - can be overridden by a query-specific set of query options. - For example: -

-
-dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
-
-

- shows how dig could be used from the - command line - to make three lookups: an ANY query for www.isc.org, a - reverse lookup of 127.0.0.1 and a query for the NS records of - isc.org. - - A global query option of +qr is - applied, so - that dig shows the initial query it made - for each - lookup. The final query has a local query option of - +noqr which means that dig - will not print the initial query when it looks up the NS records for - isc.org. -

- -
- -
-

IDN SUPPORT

- -

- If dig has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - dig appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, use - parameters +noidnin and - +noidnout or define - the IDN_DISABLE environment variable. - -

-
- -
-

FILES

- -

/etc/resolv.conf -

-

${HOME}/.digrc -

-
- -
-

SEE ALSO

- -

- delv(1) - , - - host(1) - , - - named(8) - , - - dnssec-keygen(8) - , - RFC 1035. -

-
- -
-

BUGS

- -

- There are probably too many query options. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-cds.html b/doc/arm/man.dnssec-cds.html deleted file mode 100644 index 14c02c1118..0000000000 --- a/doc/arm/man.dnssec-cds.html +++ /dev/null @@ -1,381 +0,0 @@ - - - - - -dnssec-cds - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-cds - — change DS records for a child zone based on CDS/CDNSKEY -

-
- - - -
-

Synopsis

-

- dnssec-cds - [-a alg...] - [-c class] - [-D] - {-d dsset-file} - {-f child-file} - [-i [extension]] - [-s start-time] - [-T ttl] - [-u] - [-v level] - [-V] - {domain} -

-
- -
-

DESCRIPTION

- -

- The dnssec-cds command changes DS records at - a delegation point based on CDS or CDNSKEY records published in - the child zone. If both CDS and CDNSKEY records are present in - the child zone, the CDS is preferred. This enables a child zone - to inform its parent of upcoming changes to its key-signing keys; - by polling periodically with dnssec-cds, the - parent can keep the DS records up to date and enable automatic - rolling of KSKs. -

-

- Two input files are required. The - -f child-file - option specifies a file containing the child's CDS and/or CDNSKEY - records, plus RRSIG and DNSKEY records so that they can be - authenticated. The - -d path - option specifies the location of a file containing the current DS - records. For example, this could be a dsset- - file generated by dnssec-signzone, or the output of - dnssec-dsfromkey, or the output of a previous - run of dnssec-cds. -

-

- The dnssec-cds command uses special DNSSEC - validation logic specified by RFC 7344. It requires that the CDS - and/or CDNSKEY records are validly signed by a key represented in the - existing DS records. This will typically be the pre-existing - key-signing key (KSK). -

-

- For protection against replay attacks, the signatures on the - child records must not be older than they were on a previous run - of dnssec-cds. This time is obtained from the - modification time of the dsset- file, or - from the -s option. -

-

- To protect against breaking the delegation, - dnssec-cds ensures that the DNSKEY RRset can be - verified by every key algorithm in the new DS RRset, and that the - same set of keys are covered by every DS digest type. -

-

- By default, replacement DS records are written to the standard - output; with the -i option the input file is - overwritten in place. The replacement DS records will be the - same as the existing records when no change is required. The - output can be empty if the CDS / CDNSKEY records specify that - the child zone wants to go insecure. -

-

- Warning: Be careful not to delete the DS records - when dnssec-cds fails! -

-

- Alternatively, dnssec-cds -u writes - an nsupdate script to the standard output. - You can use the -u and -i - options together to maintain a dsset- file - as well as emit an nsupdate script. -

- -
- -
-

OPTIONS

- -
-
-a algorithm
-
-

- Specify a digest algorithm to use when converting CDNSKEY - records to DS records. This option can be repeated, so - that multiple DS records are created for each CDNSKEY - record. This option has no effect when using CDS records. -

-

- The algorithm must be one of - SHA-1, SHA-256, or SHA-384. These values are case insensitive, - and the hyphen may be omitted. If no algorithm is specified, - the default is SHA-256. -

-
-
-c class
-
-

- Specifies the DNS class of the zones. -

-
-
-D
-
-

- Generate DS records from CDNSKEY records if both CDS and - CDNSKEY records are present in the child zone. By default - CDS records are preferred. -

-
-
-d path
-
-

- Location of the parent DS records. - The path can be the name of a file - containing the DS records, or if it is a - directory, dnssec-cds looks for - a dsset- file for - the domain inside the directory. -

-

- To protect against replay attacks, child records are - rejected if they were signed earlier than the modification - time of the dsset- file. This can be - adjusted with the -s option. -

-
-
-f child-file
-
-

- File containing the child's CDS and/or CDNSKEY records, - plus its DNSKEY records and the covering RRSIG records so - that they can be authenticated. -

-

- The EXAMPLES below describe how to generate this file. -

-
-
-i[extension]
-
-

- Update the dsset- file in place, - instead of writing DS records to the standard output. -

-

- There must be no space between the -i and - the extension. If you provide - no extension then the - old dsset- is discarded. If - an extension is present, a - backup of the old dsset- file is kept - with the extension appended to - its filename. -

-

- To protect against replay attacks, the modification time - of the dsset- file is set to match - the signature inception time of the child records, - provided that is later than the file's current - modification time. -

-
-
-s start-time
-
-

- Specify the date and time after which RRSIG records become - acceptable. This can be either an absolute or relative - time. An absolute start time is indicated by a number in - YYYYMMDDHHMMSS notation; 20170827133700 denotes 13:37:00 - UTC on August 27th, 2017. A time relative to - the dsset- file is indicated with -N, - which is N seconds before the file modification time. A - time relative to the current time is indicated with now+N. -

-

- If no start-time is specified, the - modification time of the dsset- file - is used. -

-
-
-T ttl
-
-

- Specifies a TTL to be used for new DS records. If not - specified, the default is the TTL of the old DS records. - If they had no explicit TTL then the new DS records also - have no explicit TTL. -

-
-
-u
-
-

- Write an nsupdate script to the - standard output, instead of printing the new DS reords. - The output will be empty if no change is needed. -

-

- Note: The TTL of new records needs to be specified, either - in the original dsset- file, or with - the -T option, or using - the nsupdate ttl - command. -

-
-
-V
-
-

- Print version information. -

-
-
-v level
-
-

- Sets the debugging level. Level 1 is intended to be - usefully verbose for general users; higher levels are - intended for developers. -

-
-
domain
-
-

- The name of the delegation point / child zone apex. -

-
-
-
- -
-

EXIT STATUS

- -

- The dnssec-cds command exits 0 on success, or - non-zero if an error occurred. -

-

- In the success case, the DS records might or might not need - to be changed. -

- -
- -
-

EXAMPLES

- -

- Before running dnssec-signzone, you can ensure - that the delegations are up-to-date by running - dnssec-cds on every dsset- file. -

-

- To fetch the child records required by dnssec-cds - you can invoke dig as in the script below. It's - okay if the dig fails since - dnssec-cds performs all the necessary checking. -

-
for f in dsset-*
-do
-	d=${f#dsset-}
-	dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS |
-	dnssec-cds -i -f /dev/stdin -d $f $d
-done
-
- -

- When the parent zone is automatically signed by - named, you can use dnssec-cds - with nsupdate to maintain a delegation as follows. - The dsset- file allows the script to avoid - having to fetch and validate the parent DS records, and it keeps the - replay attack protection time. -

-
-dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS |
-dnssec-cds -u -i -f /dev/stdin -d $f $d |
-nsupdate -l
-
-
- -
-

SEE ALSO

- -

- - dig(1) - , - - dnssec-settime(8) - , - - dnssec-signzone(8) - , - - nsupdate(1) - , - BIND 9 Administrator Reference Manual, - RFC 7344. -

- -
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-dsfromkey.html b/doc/arm/man.dnssec-dsfromkey.html deleted file mode 100644 index 3357a80763..0000000000 --- a/doc/arm/man.dnssec-dsfromkey.html +++ /dev/null @@ -1,346 +0,0 @@ - - - - - -dnssec-dsfromkey - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-dsfromkey - — DNSSEC DS RR generation tool -

-
- - - -
-

Synopsis

-

- dnssec-dsfromkey - [ - -1 - | -2 - | -a alg - ] - [ - -C - | -l domain - ] - [-T TTL] - [-v level] - [-K directory] - {keyfile} -

-

- dnssec-dsfromkey - [ - -1 - | -2 - | -a alg - ] - [ - -C - | -l domain - ] - [-T TTL] - [-v level] - [-c class] - [-A] - {-f file} - [dnsname] -

-

- dnssec-dsfromkey - [ - -1 - | -2 - | -a alg - ] - [ - -C - | -l domain - ] - [-T TTL] - [-v level] - [-c class] - [-K directory] - {-s} - {dnsname} -

-

- dnssec-dsfromkey - [ - -h - | -V - ] -

-
- -
-

DESCRIPTION

- -

- The dnssec-dsfromkey command outputs DS (Delegation - Signer) resource records (RRs), or CDS (Child DS) RRs with the - -C option. -

- -

- The input keys can be specified in a number of ways: -

- -

- By default, dnssec-dsfromkey reads a key file - named like Knnnn.+aaa+iiiii.key, as generated - by dnssec-keygen. -

- -

- With the -f file - option, dnssec-dsfromkey reads keys from a zone file - or partial zone file (which can contain just the DNSKEY records). -

- -

- With the -s - option, dnssec-dsfromkey reads - a keyset- file, as generated - by dnssec-keygen -C. -

- -
- -
-

OPTIONS

- -
-
-1
-
-

- An abbreviation for -a SHA-1. - (Note: The SHA-1 algorithm is no longer recommended for use - when generating new DS and CDS records.) -

-
-
-2
-
-

- An abbreviation for -a SHA-256. -

-
-
-a algorithm
-
-

- Specify a digest algorithm to use when converting DNSKEY - records to DS records. This option can be repeated, so - that multiple DS records are created for each DNSKEY - record. -

-

- The algorithm must be one of - SHA-1, SHA-256, or SHA-384. These values are case insensitive, - and the hyphen may be omitted. If no algorithm is specified, - the default is SHA-256. - (Note: The SHA-1 algorithm is no longer recommended for use - when generating new DS and CDS records.) -

-
-
-A
-
-

- Include ZSKs when generating DS records. Without this option, only - keys which have the KSK flag set will be converted to DS records - and printed. Useful only in -f zone file mode. -

-
-
-c class
-
-

- Specifies the DNS class (default is IN). Useful only - in -s keyset or -f - zone file mode. -

-
-
-C
-
-

- Generate CDS records rather than DS records. -

-
-
-f file
-
-

- Zone file mode: dnssec-dsfromkey's - final dnsname argument is - the DNS domain name of a zone whose master file can be read - from file. If the zone name is the same as - file, then it may be omitted. -

-

- If file is "-", then - the zone data is read from the standard input. This makes it - possible to use the output of the dig - command as input, as in: -

-

- dig dnskey example.com | dnssec-dsfromkey -f - example.com -

-
-
-h
-
-

- Prints usage information. -

-
-
-K directory
-
-

- Look for key files or keyset- files in - directory. -

-
-
-s
-
-

- Keyset mode: dnssec-dsfromkey's - final dnsname argument is the DNS - domain name used to locate a keyset- file. -

-
-
-T TTL
-
-

- Specifies the TTL of the DS records. By default the TTL is omitted. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-
- -
-

EXAMPLE

- -

- To build the SHA-256 DS RR from the - Kexample.com.+003+26160 - keyfile name, you can issue the following command: -

-

dnssec-dsfromkey -2 Kexample.com.+003+26160 -

-

- The command would print something like: -

-

example.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0C5EA0B94 -

- -
- -
-

FILES

- -

- The keyfile can be designated by the key identification - Knnnn.+aaa+iiiii or the full file name - Knnnn.+aaa+iiiii.key as generated by - dnssec-keygen(8). -

-

- The keyset file name is built from the directory, - the string keyset- and the - dnsname. -

-
- -
-

CAVEAT

- -

- A keyfile error can give a "file not found" even if the file exists. -

-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 3658 (DS RRs), - RFC 4509 (SHA-256 for DS RRs), - RFC 6605 (SHA-384 for DS RRs), - RFC 7344 (CDS and CDNSKEY RRs). -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-importkey.html b/doc/arm/man.dnssec-importkey.html deleted file mode 100644 index 2b6267b8d2..0000000000 --- a/doc/arm/man.dnssec-importkey.html +++ /dev/null @@ -1,255 +0,0 @@ - - - - - -dnssec-importkey - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-importkey - — import DNSKEY records from external systems so they can be managed -

-
- - - -
-

Synopsis

-

- dnssec-importkey - [-K directory] - [-L ttl] - [-P date/offset] - [-P sync date/offset] - [-D date/offset] - [-D sync date/offset] - [-h] - [-v level] - [-V] - {keyfile} -

-

- dnssec-importkey - {-f filename} - [-K directory] - [-L ttl] - [-P date/offset] - [-P sync date/offset] - [-D date/offset] - [-D sync date/offset] - [-h] - [-v level] - [-V] - [dnsname] -

-
- -
-

DESCRIPTION

- -

dnssec-importkey - reads a public DNSKEY record and generates a pair of - .key/.private files. The DNSKEY record may be read from an - existing .key file, in which case a corresponding .private file - will be generated, or it may be read from any other file or - from the standard input, in which case both .key and .private - files will be generated. -

-

- The newly-created .private file does not - contain private key data, and cannot be used for signing. - However, having a .private file makes it possible to set - publication (-P) and deletion - (-D) times for the key, which means the - public key can be added to and removed from the DNSKEY RRset - on schedule even if the true private key is stored offline. -

-
- -
-

OPTIONS

- - -
-
-f filename
-
-

- Zone file mode: instead of a public keyfile name, the argument - is the DNS domain name of a zone master file, which can be read - from file. If the domain name is the same as - file, then it may be omitted. -

-

- If file is set to "-", then - the zone data is read from the standard input. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to reside. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. Setting the default TTL to - 0 or none removes it. -

-
-
-h
-
-

- Emit usage message and exit. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-
- -
-

TIMING OPTIONS

- -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. -

-
-
-P sync date/offset
-
-

- Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records that match - this key are to be deleted. -

-
-
-
- -
-

FILES

- -

- A keyfile can be designed by the key identification - Knnnn.+aaa+iiiii or the full file name - Knnnn.+aaa+iiiii.key as generated by - dnssec-keygen(8). -

-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 5011. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-keyfromlabel.html b/doc/arm/man.dnssec-keyfromlabel.html deleted file mode 100644 index 1fd757c12c..0000000000 --- a/doc/arm/man.dnssec-keyfromlabel.html +++ /dev/null @@ -1,501 +0,0 @@ - - - - - -dnssec-keyfromlabel - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-keyfromlabel - — DNSSEC key generation tool -

-
- - - -
-

Synopsis

-

- dnssec-keyfromlabel - {-l label} - [-3] - [-a algorithm] - [-A date/offset] - [-c class] - [-D date/offset] - [-D sync date/offset] - [-E engine] - [-f flag] - [-G] - [-I date/offset] - [-i interval] - [-k] - [-K directory] - [-L ttl] - [-n nametype] - [-P date/offset] - [-P sync date/offset] - [-p protocol] - [-R date/offset] - [-S key] - [-t type] - [-v level] - [-V] - [-y] - {name} -

-
- -
-

DESCRIPTION

- -

dnssec-keyfromlabel - generates a key pair of files that referencing a key object stored - in a cryptographic hardware service module (HSM). The private key - file can be used for DNSSEC signing of zone data as if it were a - conventional signing key created by dnssec-keygen, - but the key material is stored within the HSM, and the actual signing - takes place there. -

-

- The name of the key is specified on the command - line. This must match the name of the zone for which the key is - being generated. -

-
- -
-

OPTIONS

- - -
-
-a algorithm
-
-

- Selects the cryptographic algorithm. The value of - algorithm must be one of RSASHA1, - NSEC3RSASHA1, RSASHA256, RSASHA512, - ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. -

-

- If no algorithm is specified, then RSASHA1 will be used by - default, unless the -3 option is specified, - in which case NSEC3RSASHA1 will be used instead. (If - -3 is used and an algorithm is specified, - that algorithm will be checked for compatibility with NSEC3.) -

-

- These values are case insensitive. In some cases, abbreviations - are supported, such as ECDSA256 for ECDSAP256SHA256 and - ECDSA384 for ECDSAP384SHA384. If RSASHA1 is specified - along with the -3 option, then NSEC3RSASHA1 - will be used instead. -

-

- As of BIND 9.12.0, this option is mandatory except when using - the -S option (which copies the algorithm from - the predecessory key). Previously, the default for newly - generated keys was RSASHA1. -

-
-
-3
-
-

- Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used with an algorithm that has both - NSEC and NSEC3 versions, then the NSEC3 version will be - used; for example, dnssec-keygen -3a RSASHA1 - specifies the NSEC3RSASHA1 algorithm. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-l label
-
-

- Specifies the label for a key pair in the crypto hardware. -

-

- When BIND 9 is built with OpenSSL-based - PKCS#11 support, the label is an arbitrary string that - identifies a particular key. -

-

- When BIND 9 is built with native PKCS#11 - support, the label is a PKCS#11 URI string in the format - "pkcs11:keyword=value[;keyword=value;...]" - Keywords include "token", which identifies the HSM; "object", which - identifies the key; and "pin-source", which identifies a file from - which the HSM's PIN code can be obtained. The label will be - stored in the on-disk "private" file. -

-

- If the label contains a - pin-source field, tools using the generated - key files will be able to use the HSM for signing and other - operations without any need for an operator to manually enter - a PIN. Note: Making the HSM's PIN accessible in this manner - may reduce the security advantage of using an HSM; be sure - this is what you want to do before making use of this feature. -

-
-
-n nametype
-
-

- Specifies the owner type of the key. The value of - nametype must either be ZONE (for a DNSSEC - zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated with - a host (KEY)), - USER (for a key associated with a user(KEY)) or OTHER (DNSKEY). - These values are case insensitive. -

-
-
-C
-
-

- Compatibility mode: generates an old-style key, without - any metadata. By default, dnssec-keyfromlabel - will include the key's creation date in the metadata stored - with the private key, and other dates may be set there as well - (publication date, activation date, etc). Keys that include - this data may be incompatible with older versions of BIND; the - -C option suppresses them. -

-
-
-c class
-
-

- Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. -

-
-
-f flag
-
-

- Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. -

-
-
-G
-
-

- Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - dnssec-keyfromlabel. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to be written. -

-
-
-k
-
-

- Generate KEY records rather than DNSKEY records. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. Setting the default TTL to - 0 or none removes it. -

-
-
-p protocol
-
-

- Sets the protocol value for the key. The protocol - is a number between 0 and 255. The default is 3 (DNSSEC). - Other possible values for this argument are listed in - RFC 2535 and its successors. -

-
-
-S key
-
-

- Generate a key as an explicit successor to an existing key. - The name, algorithm, size, and type of the key will be set - to match the predecessor. The activation date of the new - key will be set to the inactivation date of the existing - one. The publication date will be set to the activation - date minus the prepublication interval, which defaults to - 30 days. -

-
-
-t type
-
-

- Indicates the use of the key. type must be - one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default - is AUTHCONF. AUTH refers to the ability to authenticate - data, and CONF the ability to encrypt data. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-y
-
-

- Allows DNSSEC key files to be generated even if the key ID - would collide with that of an existing key, in the event of - either key being revoked. (This is only safe to use if you - are sure you won't be using RFC 5011 trust anchor maintenance - with either of the keys involved.) -

-
-
-
- -
-

TIMING OPTIONS

- - -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". -

-
-
-P sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records which match - this key are to be published to the zone. -

-
-
-A date/offset
-
-

- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". -

-
-
-R date/offset
-
-

- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -

-
-
-I date/offset
-
-

- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records which match - this key are to be deleted. -

-
-
-i interval
-
-

- Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. -

-

- If the key is being created as an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. -

-

- As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. -

-
-
-
- -
-

GENERATED KEY FILES

- -

- When dnssec-keyfromlabel completes - successfully, - it prints a string of the form Knnnn.+aaa+iiiii - to the standard output. This is an identification string for - the key files it has generated. -

-
    -
  • -

    nnnn is the key name. -

    -
  • -
  • -

    aaa is the numeric representation - of the algorithm. -

    -
  • -
  • -

    iiiii is the key identifier (or - footprint). -

    -
  • -
-

dnssec-keyfromlabel - creates two files, with names based - on the printed string. Knnnn.+aaa+iiiii.key - contains the public key, and - Knnnn.+aaa+iiiii.private contains the - private key. -

-

- The .key file contains a DNS KEY record - that - can be inserted into a zone file (directly or with a $INCLUDE - statement). -

-

- The .private file contains - algorithm-specific - fields. For obvious security reasons, this file does not have - general read permission. -

-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 4034, - The PKCS#11 URI Scheme (draft-pechanec-pkcs11uri-13). -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-keygen.html b/doc/arm/man.dnssec-keygen.html deleted file mode 100644 index 12783bc5c5..0000000000 --- a/doc/arm/man.dnssec-keygen.html +++ /dev/null @@ -1,594 +0,0 @@ - - - - - -dnssec-keygen - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-keygen - — DNSSEC key generation tool -

-
- - - -
-

Synopsis

-

- dnssec-keygen - [-3] - [-A date/offset] - [-a algorithm] - [-b keysize] - [-C] - [-c class] - [-D date/offset] - [-D sync date/offset] - [-d bits] - [-E engine] - [-f flag] - [-G] - [-g generator] - [-h] - [-I date/offset] - [-i interval] - [-K directory] - [-k policy] - [-L ttl] - [-l file] - [-n nametype] - [-P date/offset] - [-P sync date/offset] - [-p protocol] - [-q] - [-R date/offset] - [-S key] - [-s strength] - [-T rrtype] - [-t type] - [-V] - [-v level] - {name} -

-
- -
-

DESCRIPTION

- -

dnssec-keygen - generates keys for DNSSEC (Secure DNS), as defined in RFC 2535 - and RFC 4034. It can also generate keys for use with - TSIG (Transaction Signatures) as defined in RFC 2845, or TKEY - (Transaction Key) as defined in RFC 2930. -

-

- The name of the key is specified on the command - line. For DNSSEC keys, this must match the name of the zone for - which the key is being generated. -

-

- The dnssec-keymgr command acts as a wrapper - around dnssec-keygen, generating and updating keys - as needed to enforce defined security policies such as key rollover - scheduling. Using dnssec-keymgr may be preferable - to direct use of dnssec-keygen. -

-
- -
-

OPTIONS

- - -
-
-3
-
-

- Use an NSEC3-capable algorithm to generate a DNSSEC key. - If this option is used with an algorithm that has both - NSEC and NSEC3 versions, then the NSEC3 version will be - used; for example, dnssec-keygen -3a RSASHA1 - specifies the NSEC3RSASHA1 algorithm. -

-
-
-a algorithm
-
-

- Selects the cryptographic algorithm. For DNSSEC keys, the value - of algorithm must be one of RSASHA1, - NSEC3RSASHA1, RSASHA256, RSASHA512, - ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. For - TKEY, the value must be DH (Diffie Hellman); specifying - his value will automatically set the -T KEY - option as well. -

-

- These values are case insensitive. In some cases, abbreviations - are supported, such as ECDSA256 for ECDSAP256SHA256 and - ECDSA384 for ECDSAP384SHA384. If RSASHA1 is specified - along with the -3 option, then NSEC3RSASHA1 - will be used instead. -

-

- This parameter must be specified except - when using the -S option, which copies the - algorithm from the predecessor key. -

-

- In prior releases, HMAC algorithms could be generated for - use as TSIG keys, but that feature has been removed as of - BIND 9.13.0. Use tsig-keygen to generate - TSIG keys. -

-
-
-b keysize
-
-

- Specifies the number of bits in the key. The choice of key - size depends on the algorithm used. RSA keys must be - between 1024 and 4096 bits. Diffie Hellman keys must be between - 128 and 4096 bits. Elliptic curve algorithms don't need this - parameter. -

-

- If the key size is not specified, some algorithms have - pre-defined defaults. For instance, RSA keys have a default - size of 2048 bits. -

-
-
-C
-
-

- Compatibility mode: generates an old-style key, without any - timing metadata. By default, dnssec-keygen - will include the key's creation date in the metadata stored with - the private key, and other dates may be set there as well - (publication date, activation date, etc). Keys that include this - data may be incompatible with older versions of BIND; the - -C option suppresses them. -

-
-
-c class
-
-

- Indicates that the DNS record containing the key should have - the specified class. If not specified, class IN is used. -

-
-
-d bits
-
-

- Key size in bits. For the algorithms RSASHA1, NSEC3RSASA1, - RSASHA256 and RSASHA512 the key size must be in range 1024-4096. - DH size is between 128 and 4096. This option is ignored for - algorithms ECDSAP256SHA256, ECDSAP384SHA384, ED25519 and ED448. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-f flag
-
-

- Set the specified flag in the flag field of the KEY/DNSKEY record. - The only recognized flags are KSK (Key Signing Key) and REVOKE. -

-
-
-G
-
-

- Generate a key, but do not publish it or sign with it. This - option is incompatible with -P and -A. -

-
-
-g generator
-
-

- If generating a Diffie Hellman key, use this generator. - Allowed values are 2 and 5. If no generator - is specified, a known prime from RFC 2539 will be used - if possible; otherwise the default is 2. -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - dnssec-keygen. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to be written. -

-
-
-k policy
-
-

- Create keys for a specific dnssec-policy. If a policy uses - multiple keys, dnssec-keygen will generate - multiple keys. This will also create a ".state" file to keep - track of the key state. -

-

- This option creates keys according to the dnssec-policy - configuration, hence it cannot be used together with many of - the other options that dnssec-keygen - provides. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. If this value is not set and there - is no existing DNSKEY RRset, the TTL will default to the - SOA TTL. Setting the default TTL to 0 - or none is the same as leaving it unset. -

-
-
-l file
-
-

- Provide a configuration file that contains a dnssec-policy - statement (matching the policy set with -k). -

-
-
-n nametype
-
-

- Specifies the owner type of the key. The value of - nametype must either be ZONE (for a DNSSEC - zone key (KEY/DNSKEY)), HOST or ENTITY (for a key associated - with a host (KEY)), USER (for a key associated with a - user(KEY)) or OTHER (DNSKEY). These values are case - insensitive. Defaults to ZONE for DNSKEY generation. -

-
-
-p protocol
-
-

- Sets the protocol value for the generated key, for use - with -T KEY. The protocol is a number between 0 - and 255. The default is 3 (DNSSEC). Other possible values for - this argument are listed in RFC 2535 and its successors. -

-
-
-q
-
-

- Quiet mode: Suppresses unnecessary output, including - progress indication. Without this option, when - dnssec-keygen is run interactively - to generate an RSA or DSA key pair, it will print a string - of symbols to stderr indicating the - progress of the key generation. A '.' indicates that a - random number has been found which passed an initial - sieve test; '+' means a number has passed a single - round of the Miller-Rabin primality test; a space - means that the number has passed all the tests and is - a satisfactory key. -

-
-
-S key
-
-

- Create a new key which is an explicit successor to an - existing key. The name, algorithm, size, and type of the - key will be set to match the existing key. The activation - date of the new key will be set to the inactivation date of - the existing one. The publication date will be set to the - activation date minus the prepublication interval, which - defaults to 30 days. -

-
-
-s strength
-
-

- Specifies the strength value of the key. The strength is - a number between 0 and 15, and currently has no defined - purpose in DNSSEC. -

-
-
-T rrtype
-
-

- Specifies the resource record type to use for the key. - rrtype must be either DNSKEY or KEY. The - default is DNSKEY when using a DNSSEC algorithm, but it can be - overridden to KEY for use with SIG(0). -

-
-
-t type
-
-

- Indicates the use of the key, for use with -T - KEY. type must be one of AUTHCONF, - NOAUTHCONF, NOAUTH, or NOCONF. The default is AUTHCONF. AUTH - refers to the ability to authenticate data, and CONF the ability - to encrypt data. -

-
-
-V
-
-

- Prints version information. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-
- -
-

TIMING OPTIONS

- - -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To explicitly prevent a date from being - set, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. If not set, and if the -G option has - not been used, the default is "now". -

-
-
-P sync date/offset
-
-

- Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. -

-
-
-A date/offset
-
-

- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. If not set, and if the -G option has not been used, the - default is "now". If set, if and -P is not set, then - the publication date will be set to the activation date - minus the prepublication interval. -

-
-
-R date/offset
-
-

- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -

-
-
-I date/offset
-
-

- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records that match this - key are to be deleted. -

-
-
-i interval
-
-

- Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. -

-

- If the key is being created as an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. -

-

- As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. -

-
-
-
- - -
-

GENERATED KEYS

- -

- When dnssec-keygen completes - successfully, - it prints a string of the form Knnnn.+aaa+iiiii - to the standard output. This is an identification string for - the key it has generated. -

-
    -
  • -

    nnnn is the key name. -

    -
  • -
  • -

    aaa is the numeric representation - of the - algorithm. -

    -
  • -
  • -

    iiiii is the key identifier (or - footprint). -

    -
  • -
-

dnssec-keygen - creates two files, with names based - on the printed string. Knnnn.+aaa+iiiii.key - contains the public key, and - Knnnn.+aaa+iiiii.private contains the - private - key. -

-

- The .key file contains a DNSKEY or KEY record. - When a zone is being signed by named - or dnssec-signzone -S, DNSKEY - records are included automatically. In other cases, - the .key file can be inserted into a zone file - manually or with a $INCLUDE statement. -

-

- The .private file contains - algorithm-specific - fields. For obvious security reasons, this file does not have - general read permission. -

-
- -
-

EXAMPLE

- -

- To generate an ECDSAP256SHA256 zone-signing key for the zone - example.com, issue the command: -

-

- dnssec-keygen -a ECDSAP256SHA256 example.com -

-

- The command would print a string of the form: -

-

Kexample.com.+013+26160 -

-

- In this example, dnssec-keygen creates - the files Kexample.com.+013+26160.key - and - Kexample.com.+013+26160.private. -

-

- To generate a matching key-signing key, issue the command: -

-

- dnssec-keygen -a ECDSAP256SHA256 -f KSK example.com -

-
- -
-

SEE ALSO

- -

- dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 2539, - RFC 2845, - RFC 4034. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-revoke.html b/doc/arm/man.dnssec-revoke.html deleted file mode 100644 index 87bf44004e..0000000000 --- a/doc/arm/man.dnssec-revoke.html +++ /dev/null @@ -1,176 +0,0 @@ - - - - - -dnssec-revoke - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-revoke - — set the REVOKED bit on a DNSSEC key -

-
- - - -
-

Synopsis

-

- dnssec-revoke - [-hr] - [-v level] - [-V] - [-K directory] - [-E engine] - [-f] - [-R] - {keyfile} -

-
- -
-

DESCRIPTION

- -

dnssec-revoke - reads a DNSSEC key file, sets the REVOKED bit on the key as defined - in RFC 5011, and creates a new pair of key files containing the - now-revoked key. -

-
- -
-

OPTIONS

- - -
-
-h
-
-

- Emit usage message and exit. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to reside. -

-
-
-r
-
-

- After writing the new keyset files remove the original keyset - files. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-f
-
-

- Force overwrite: Causes dnssec-revoke to - write the new key pair even if a file already exists matching - the algorithm and key ID of the revoked key. -

-
-
-R
-
-

- Print the key tag of the key with the REVOKE bit set but do - not revoke the key. -

-
-
-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - BIND 9 Administrator Reference Manual, - RFC 5011. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-settime.html b/doc/arm/man.dnssec-settime.html deleted file mode 100644 index 37ff2e45f2..0000000000 --- a/doc/arm/man.dnssec-settime.html +++ /dev/null @@ -1,429 +0,0 @@ - - - - - -dnssec-settime - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-settime - — set the key timing metadata for a DNSSEC key -

-
- - - -
-

Synopsis

-

- dnssec-settime - [-f] - [-K directory] - [-L ttl] - [-P date/offset] - [-P sync date/offset] - [-A date/offset] - [-R date/offset] - [-I date/offset] - [-D date/offset] - [-D sync date/offset] - [-S key] - [-i interval] - [-h] - [-V] - [-v level] - [-E engine] - [-s] - [-g state] - [-d state date/offset] - [-k state date/offset] - [-r state date/offset] - [-z state date/offset] - {keyfile} -

-
- -
-

DESCRIPTION

- -

dnssec-settime - reads a DNSSEC private key file and sets the key timing metadata - as specified by the -P, -A, - -R, -I, and -D - options. The metadata can then be used by - dnssec-signzone or other signing software to - determine when a key is to be published, whether it should be - used for signing a zone, etc. -

-

- If none of these options is set on the command line, - then dnssec-settime simply prints the key timing - metadata already stored in the key. -

-

- When key metadata fields are changed, both files of a key - pair (Knnnn.+aaa+iiiii.key and - Knnnn.+aaa+iiiii.private) are regenerated. -

-

- Metadata fields are stored in the private file. A human-readable - description of the metadata is also placed in comments in the key - file. The private file's permissions are always set to be - inaccessible to anyone other than the owner (mode 0600). -

-

- When working with state files, it is possible to update the timing - metadata in those files as well with -s. If this - option is used you can also update key states with -d - (DS), -k (DNSKEY), -r (RRSIG of KSK), - or -z (RRSIG of ZSK). Allowed states are HIDDEN, - RUMOURED, OMNIPRESENT, and UNRETENTIVE. -

-

- You can also set the goal state of the key with -g. - This should be either HIDDEN or OMNIPRESENT (representing whether the - key should be removed from the zone, or published). -

-

- It is NOT RECOMMENDED to manipulate state files manually except for - testing purposes. -

-
- -
-

OPTIONS

- - -
-
-f
-
-

- Force an update of an old-format key with no metadata fields. - Without this option, dnssec-settime will - fail when attempting to update a legacy key. With this option, - the key will be recreated in the new format, but with the - original key data retained. The key's creation date will be - set to the present time. If no other values are specified, - then the key's publication and activation dates will also - be set to the present time. -

-
-
-K directory
-
-

- Sets the directory in which the key files are to reside. -

-
-
-L ttl
-
-

- Sets the default TTL to use for this key when it is converted - into a DNSKEY RR. If the key is imported into a zone, - this is the TTL that will be used for it, unless there was - already a DNSKEY RRset in place, in which case the existing TTL - would take precedence. If this value is not set and there - is no existing DNSKEY RRset, the TTL will default to the - SOA TTL. Setting the default TTL to 0 - or none removes it from the key. -

-
-
-h
-
-

- Emit usage message and exit. -

-
-
-V
-
-

- Prints version information. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-
- -
-

TIMING OPTIONS

- -

- Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. - If the argument begins with a '+' or '-', it is interpreted as - an offset from the present time. For convenience, if such an offset - is followed by one of the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', - then the offset is computed in years (defined as 365 24-hour days, - ignoring leap years), months (defined as 30 24-hour days), weeks, - days, hours, or minutes, respectively. Without a suffix, the offset - is computed in seconds. To unset a date, use 'none' or 'never'. -

- -
-
-P date/offset
-
-

- Sets the date on which a key is to be published to the zone. - After that date, the key will be included in the zone but will - not be used to sign it. -

-
-
-P sync date/offset
-
-

- Sets the date on which CDS and CDNSKEY records that match this - key are to be published to the zone. -

-
-
-A date/offset
-
-

- Sets the date on which the key is to be activated. After that - date, the key will be included in the zone and used to sign - it. -

-
-
-R date/offset
-
-

- Sets the date on which the key is to be revoked. After that - date, the key will be flagged as revoked. It will be included - in the zone and will be used to sign it. -

-
-
-I date/offset
-
-

- Sets the date on which the key is to be retired. After that - date, the key will still be included in the zone, but it - will not be used to sign it. -

-
-
-D date/offset
-
-

- Sets the date on which the key is to be deleted. After that - date, the key will no longer be included in the zone. (It - may remain in the key repository, however.) -

-
-
-D sync date/offset
-
-

- Sets the date on which the CDS and CDNSKEY records that match this - key are to be deleted. -

-
-
-S predecessor key
-
-

- Select a key for which the key being modified will be an - explicit successor. The name, algorithm, size, and type of the - predecessor key must exactly match those of the key being - modified. The activation date of the successor key will be set - to the inactivation date of the predecessor. The publication - date will be set to the activation date minus the prepublication - interval, which defaults to 30 days. -

-
-
-i interval
-
-

- Sets the prepublication interval for a key. If set, then - the publication and activation dates must be separated by at least - this much time. If the activation date is specified but the - publication date isn't, then the publication date will default - to this much time before the activation date; conversely, if - the publication date is specified but activation date isn't, - then activation will be set to this much time after publication. -

-

- If the key is being set to be an explicit successor to another - key, then the default prepublication interval is 30 days; - otherwise it is zero. -

-

- As with date offsets, if the argument is followed by one of - the suffixes 'y', 'mo', 'w', 'd', 'h', or 'mi', then the - interval is measured in years, months, weeks, days, hours, - or minutes, respectively. Without a suffix, the interval is - measured in seconds. -

-
-
-
- -
-

KEY STATE OPTIONS

- -

- Known key states are HIDDEN, RUMOURED, OMNIPRESENT and UNRETENTIVE. - These should not be set manually except for testing purposes. -

- -
-
-s
-
-

- When setting key timing data, also update the state file. -

-
-
-g
-
-

- Set the goal state for this key. Must be HIDDEN or OMNIPRESENT. -

-
-
-d
-
-

- Set the DS state for this key, and when it was last changed. -

-
-
-k
-
-

- Set the DNSKEY state for this key, and when it was last changed. -

-
-
-r
-
-

- Set the RRSIG (KSK) state for this key, and when it was last - changed. -

-
-
-z
-
-

- Set the RRSIG (ZSK) state for this key, and when it was last - changed. -

-
-
-
- -
-

PRINTING OPTIONS

- -

- dnssec-settime can also be used to print the - timing metadata associated with a key. -

- -
-
-u
-
-

- Print times in UNIX epoch format. -

-
-
-p C/P/Psync/A/R/I/D/Dsync/all
-
-

- Print a specific metadata value or set of metadata values. - The -p option may be followed by one or more - of the following letters or strings to indicate which value - or values to print: - C for the creation date, - P for the publication date, - Psync for the CDS and CDNSKEY publication date, - A for the activation date, - R for the revocation date, - I for the inactivation date, - D for the deletion date, and - Dsync for the CDS and CDNSKEY deletion date - To print all of the metadata, use -p all. -

-
-
-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 5011. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-signzone.html b/doc/arm/man.dnssec-signzone.html deleted file mode 100644 index 3d4b9562be..0000000000 --- a/doc/arm/man.dnssec-signzone.html +++ /dev/null @@ -1,712 +0,0 @@ - - - - - -dnssec-signzone - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-signzone - — DNSSEC zone signing tool -

-
- - - -
-

Synopsis

-

- dnssec-signzone - [-a] - [-c class] - [-d directory] - [-D] - [-E engine] - [-e end-time] - [-f output-file] - [-g] - [-h] - [-i interval] - [-I input-format] - [-j jitter] - [-K directory] - [-k key] - [-L serial] - [-l domain] - [-M maxttl] - [-N soa-serial-format] - [-o origin] - [-O output-format] - [-P] - [-Q] - [-q] - [-R] - [-S] - [-s start-time] - [-T ttl] - [-t] - [-u] - [-v level] - [-V] - [-X extended end-time] - [-x] - [-z] - [-3 salt] - [-H iterations] - [-A] - {zonefile} - [key...] -

-
- -
-

DESCRIPTION

- -

dnssec-signzone - signs a zone. It generates - NSEC and RRSIG records and produces a signed version of the - zone. The security status of delegations from the signed zone - (that is, whether the child zones are secure or not) is - determined by the presence or absence of a - keyset file for each child zone. -

-
- -
-

OPTIONS

- - -
-
-a
-
-

- Verify all generated signatures. -

-
-
-c class
-
-

- Specifies the DNS class of the zone. -

-
-
-C
-
-

- Compatibility mode: Generate a - keyset-zonename - file in addition to - dsset-zonename - when signing a zone, for use by older versions of - dnssec-signzone. -

-
-
-d directory
-
-

- Look for dsset- or - keyset- files in directory. -

-
-
-D
-
-

- Output only those record types automatically managed by - dnssec-signzone, i.e. RRSIG, NSEC, - NSEC3 and NSEC3PARAM records. If smart signing - (-S) is used, DNSKEY records are also - included. The resulting file can be included in the original - zone file with $INCLUDE. This option - cannot be combined with -O raw, - -O map, or serial number updating. -

-
-
-E engine
-
-

- When applicable, specifies the hardware to use for - cryptographic operations, such as a secure key store used - for signing. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-g
-
-

- Generate DS records for child zones from - dsset- or keyset- - file. Existing DS records will be removed. -

-
-
-K directory
-
-

- Key repository: Specify a directory to search for DNSSEC keys. - If not specified, defaults to the current directory. -

-
-
-k key
-
-

- Treat specified key as a key signing key ignoring any - key flags. This option may be specified multiple times. -

-
-
-M maxttl
-
-

- Sets the maximum TTL for the signed zone. - Any TTL higher than maxttl in the - input zone will be reduced to maxttl - in the output. This provides certainty as to the largest - possible TTL in the signed zone, which is useful to know when - rolling keys because it is the longest possible time before - signatures that have been retrieved by resolvers will expire - from resolver caches. Zones that are signed with this - option should be configured to use a matching - max-zone-ttl in named.conf. - (Note: This option is incompatible with -D, - because it modifies non-DNSSEC data in the output zone.) -

-
-
-s start-time
-
-

- Specify the date and time when the generated RRSIG records - become valid. This can be either an absolute or relative - time. An absolute start time is indicated by a number - in YYYYMMDDHHMMSS notation; 20000530144500 denotes - 14:45:00 UTC on May 30th, 2000. A relative start time is - indicated by +N, which is N seconds from the current time. - If no start-time is specified, the current - time minus 1 hour (to allow for clock skew) is used. -

-
-
-e end-time
-
-

- Specify the date and time when the generated RRSIG records - expire. As with start-time, an absolute - time is indicated in YYYYMMDDHHMMSS notation. A time relative - to the start time is indicated with +N, which is N seconds from - the start time. A time relative to the current time is - indicated with now+N. If no end-time is - specified, 30 days from the start time is used as a default. - end-time must be later than - start-time. -

-
-
-X extended end-time
-
-

- Specify the date and time when the generated RRSIG records - for the DNSKEY RRset will expire. This is to be used in cases - when the DNSKEY signatures need to persist longer than - signatures on other records; e.g., when the private component - of the KSK is kept offline and the KSK signature is to be - refreshed manually. -

-

- As with start-time, an absolute - time is indicated in YYYYMMDDHHMMSS notation. A time relative - to the start time is indicated with +N, which is N seconds from - the start time. A time relative to the current time is - indicated with now+N. If no extended end-time is - specified, the value of end-time is used as - the default. (end-time, in turn, defaults to - 30 days from the start time.) extended end-time - must be later than start-time. -

-
-
-f output-file
-
-

- The name of the output file containing the signed zone. The - default is to append .signed to - the input filename. If output-file is - set to "-", then the signed zone is - written to the standard output, with a default output - format of "full". -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - dnssec-signzone. -

-
-
-V
-
-

- Prints version information. -

-
-
-i interval
-
-

- When a previously-signed zone is passed as input, records - may be resigned. The interval option - specifies the cycle interval as an offset from the current - time (in seconds). If a RRSIG record expires after the - cycle interval, it is retained. Otherwise, it is considered - to be expiring soon, and it will be replaced. -

-

- The default cycle interval is one quarter of the difference - between the signature end and start times. So if neither - end-time or start-time - are specified, dnssec-signzone - generates - signatures that are valid for 30 days, with a cycle - interval of 7.5 days. Therefore, if any existing RRSIG records - are due to expire in less than 7.5 days, they would be - replaced. -

-
-
-I input-format
-
-

- The format of the input zone file. - Possible formats are "text" (default), - "raw", and "map". - This option is primarily intended to be used for dynamic - signed zones so that the dumped zone file in a non-text - format containing updates can be signed directly. - The use of this option does not make much sense for - non-dynamic zones. -

-
-
-j jitter
-
-

- When signing a zone with a fixed signature lifetime, all - RRSIG records issued at the time of signing expires - simultaneously. If the zone is incrementally signed, i.e. - a previously-signed zone is passed as input to the signer, - all expired signatures have to be regenerated at about the - same time. The jitter option specifies a - jitter window that will be used to randomize the signature - expire time, thus spreading incremental signature - regeneration over time. -

-

- Signature lifetime jitter also to some extent benefits - validators and servers by spreading out cache expiration, - i.e. if large numbers of RRSIGs don't expire at the same time - from all caches there will be less congestion than if all - validators need to refetch at mostly the same time. -

-
-
-L serial
-
-

- When writing a signed zone to "raw" or "map" format, set the - "source serial" value in the header to the specified serial - number. (This is expected to be used primarily for testing - purposes.) -

-
-
-n ncpus
-
-

- Specifies the number of threads to use. By default, one - thread is started for each detected CPU. -

-
-
-N soa-serial-format
-
-

- The SOA serial number format of the signed zone. - Possible formats are "keep" (default), - "increment", "unixtime", - and "date". -

- -
-
"keep"
-
-

Do not modify the SOA serial number.

-
-
"increment"
-
-

Increment the SOA serial number using RFC 1982 - arithmetic.

-
-
"unixtime"
-
-

Set the SOA serial number to the number of seconds - since epoch.

-
-
"date"
-
-

Set the SOA serial number to today's date in - YYYYMMDDNN format.

-
-
- -
-
-o origin
-
-

- The zone origin. If not specified, the name of the zone file - is assumed to be the origin. -

-
-
-O output-format
-
-

- The format of the output file containing the signed zone. - Possible formats are "text" (default), - which is the standard textual representation of the zone; - "full", which is text output in a - format suitable for processing by external scripts; - and "map", "raw", - and "raw=N", which store the zone in - binary formats for rapid loading by named. - "raw=N" specifies the format version of - the raw zone file: if N is 0, the raw file can be read by - any version of named; if N is 1, the file - can be read by release 9.9.0 or higher; the default is 1. -

-
-
-P
-
-

- Disable post sign verification tests. -

-

- The post sign verification test ensures that for each algorithm - in use there is at least one non revoked self signed KSK key, - that all revoked KSK keys are self signed, and that all records - in the zone are signed by the algorithm. - This option skips these tests. -

-
-
-Q
-
-

- Remove signatures from keys that are no longer active. -

-

- Normally, when a previously-signed zone is passed as input - to the signer, and a DNSKEY record has been removed and - replaced with a new one, signatures from the old key - that are still within their validity period are retained. - This allows the zone to continue to validate with cached - copies of the old DNSKEY RRset. The -Q - forces dnssec-signzone to remove - signatures from keys that are no longer active. This - enables ZSK rollover using the procedure described in - RFC 4641, section 4.2.1.1 ("Pre-Publish Key Rollover"). -

-
-
-q
-
-

- Quiet mode: Suppresses unnecessary output. Without this - option, when dnssec-signzone is run it - will print to standard output the number of keys in use, - the algorithms used to verify the zone was signed correctly - and other status information, and finally the filename - containing the signed zone. With it, that output is - suppressed, leaving only the filename. -

-
-
-R
-
-

- Remove signatures from keys that are no longer published. -

-

- This option is similar to -Q, except it - forces dnssec-signzone to signatures from - keys that are no longer published. This enables ZSK rollover - using the procedure described in RFC 4641, section 4.2.1.2 - ("Double Signature Zone Signing Key Rollover"). -

-
-
-S
-
-

- Smart signing: Instructs dnssec-signzone to - search the key repository for keys that match the zone being - signed, and to include them in the zone if appropriate. -

-

- When a key is found, its timing metadata is examined to - determine how it should be used, according to the following - rules. Each successive rule takes priority over the prior - ones: -

-
-
-
-

- If no timing metadata has been set for the key, the key is - published in the zone and used to sign the zone. -

-
-
-
-

- If the key's publication date is set and is in the past, the - key is published in the zone. -

-
-
-
-

- If the key's activation date is set and in the past, the - key is published (regardless of publication date) and - used to sign the zone. -

-
-
-
-

- If the key's revocation date is set and in the past, and the - key is published, then the key is revoked, and the revoked key - is used to sign the zone. -

-
-
-
-

- If either of the key's unpublication or deletion dates are set - and in the past, the key is NOT published or used to sign the - zone, regardless of any other metadata. -

-
-
-
-

- If key's sync publication date is set and in the past, - synchronization records (type CDS and/or CDNSKEY) are - created. -

-
-
-
-

- If key's sync deletion date is set and in the past, - synchronization records (type CDS and/or CDNSKEY) are - removed. -

-
-
-
-
-T ttl
-
-

- Specifies a TTL to be used for new DNSKEY records imported - into the zone from the key repository. If not - specified, the default is the TTL value from the zone's SOA - record. This option is ignored when signing without - -S, since DNSKEY records are not imported - from the key repository in that case. It is also ignored if - there are any pre-existing DNSKEY records at the zone apex, - in which case new records' TTL values will be set to match - them, or if any of the imported DNSKEY records had a default - TTL value. In the event of a a conflict between TTL values in - imported keys, the shortest one is used. -

-
-
-t
-
-

- Print statistics at completion. -

-
-
-u
-
-

- Update NSEC/NSEC3 chain when re-signing a previously signed - zone. With this option, a zone signed with NSEC can be - switched to NSEC3, or a zone signed with NSEC3 can - be switch to NSEC or to NSEC3 with different parameters. - Without this option, dnssec-signzone will - retain the existing chain when re-signing. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-x
-
-

- Only sign the DNSKEY, CDNSKEY, and CDS RRsets with - key-signing keys, and omit signatures from zone-signing - keys. (This is similar to the - dnssec-dnskey-kskonly yes; zone option in - named.) -

-
-
-z
-
-

- Ignore KSK flag on key when determining what to sign. This - causes KSK-flagged keys to sign all records, not just the - DNSKEY RRset. (This is similar to the - update-check-ksk no; zone option in - named.) -

-
-
-3 salt
-
-

- Generate an NSEC3 chain with the given hex encoded salt. - A dash (salt) can - be used to indicate that no salt is to be used when generating the NSEC3 chain. -

-
-
-H iterations
-
-

- When generating an NSEC3 chain, use this many iterations. The - default is 10. -

-
-
-A
-
-

- When generating an NSEC3 chain set the OPTOUT flag on all - NSEC3 records and do not generate NSEC3 records for insecure - delegations. -

-

- Using this option twice (i.e., -AA) - turns the OPTOUT flag off for all records. This is useful - when using the -u option to modify an NSEC3 - chain which previously had OPTOUT set. -

-
-
zonefile
-
-

- The file containing the zone to be signed. -

-
-
key
-
-

- Specify which keys should be used to sign the zone. If - no keys are specified, then the zone will be examined - for DNSKEY records at the zone apex. If these are found and - there are matching private keys, in the current directory, - then these will be used for signing. -

-
-
-
- -
-

EXAMPLE

- -

- The following command signs the example.com - zone with the ECDSAP256SHA256 key generated by key generated by - dnssec-keygen (Kexample.com.+013+17247). - Because the -S option is not being used, - the zone's keys must be in the master file - (db.example.com). This invocation looks - for dsset files, in the current directory, - so that DS records can be imported from them (-g). -

-
% dnssec-signzone -g -o example.com db.example.com \
-Kexample.com.+013+17247
-db.example.com.signed
-%
-

- In the above example, dnssec-signzone creates - the file db.example.com.signed. This - file should be referenced in a zone statement in a - named.conf file. -

-

- This example re-signs a previously signed zone with default parameters. - The private keys are assumed to be in the current directory. -

-
% cp db.example.com.signed db.example.com
-% dnssec-signzone -o example.com db.example.com
-db.example.com.signed
-%
-
- -
-

SEE ALSO

- -

- dnssec-keygen(8) - , - BIND 9 Administrator Reference Manual, - RFC 4033, RFC 4641. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnssec-verify.html b/doc/arm/man.dnssec-verify.html deleted file mode 100644 index 9895ea5ece..0000000000 --- a/doc/arm/man.dnssec-verify.html +++ /dev/null @@ -1,219 +0,0 @@ - - - - - -dnssec-verify - - - - - - - - -
-
- - - - - -
-

Name

-

- dnssec-verify - — DNSSEC zone verification tool -

-
- - - -
-

Synopsis

-

- dnssec-verify - [-c class] - [-E engine] - [-I input-format] - [-o origin] - [-q] - [-v level] - [-V] - [-x] - [-z] - {zonefile} -

-
- -
-

DESCRIPTION

- -

dnssec-verify - verifies that a zone is fully signed for each algorithm found - in the DNSKEY RRset for the zone, and that the NSEC / NSEC3 - chains are complete. -

-
- -
-

OPTIONS

- - -
-
-c class
-
-

- Specifies the DNS class of the zone. -

-
-
-E engine
-
-

- Specifies the cryptographic hardware to use, when applicable. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-I input-format
-
-

- The format of the input zone file. - Possible formats are "text" (default) - and "raw". - This option is primarily intended to be used for dynamic - signed zones so that the dumped zone file in a non-text - format containing updates can be verified independently. - The use of this option does not make much sense for - non-dynamic zones. -

-
-
-o origin
-
-

- The zone origin. If not specified, the name of the zone file - is assumed to be the origin. -

-
-
-v level
-
-

- Sets the debugging level. -

-
-
-V
-
-

- Prints version information. -

-
-
-q
-
-

- Quiet mode: Suppresses output. Without this option, when - dnssec-verify is run it will print to - standard output the number of keys in use, the algorithms - used to verify the zone was signed correctly and other - status information. With it, all non-error output is - suppressed, and only the exit code will indicate success. -

-
-
-x
-
-

- Only verify that the DNSKEY RRset is signed with key-signing - keys. Without this flag, it is assumed that the DNSKEY RRset - will be signed by all active keys. When this flag is set, - it will not be an error if the DNSKEY RRset is not signed - by zone-signing keys. This corresponds to the -x - option in dnssec-signzone. -

-
-
-z
-
-

- Ignore the KSK flag on the keys when determining whether - the zone if correctly signed. Without this flag it is - assumed that there will be a non-revoked, self-signed - DNSKEY with the KSK flag set for each algorithm and - that RRsets other than DNSKEY RRset will be signed with - a different DNSKEY without the KSK flag set. -

-

- With this flag set, we only require that for each algorithm, - there will be at least one non-revoked, self-signed DNSKEY, - regardless of the KSK flag state, and that other RRsets - will be signed by a non-revoked key for the same algorithm - that includes the self-signed key; the same key may be used - for both purposes. This corresponds to the -z - option in dnssec-signzone. -

-
-
zonefile
-
-

- The file containing the zone to be signed. -

-
-
-
- -
-

SEE ALSO

- -

- - dnssec-signzone(8) - , - BIND 9 Administrator Reference Manual, - RFC 4033. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.dnstap-read.html b/doc/arm/man.dnstap-read.html deleted file mode 100644 index 85d4996273..0000000000 --- a/doc/arm/man.dnstap-read.html +++ /dev/null @@ -1,148 +0,0 @@ - - - - - -dnstap-read - - - - - - - - -
-
- - - - - -
-

Name

-

- dnstap-read - — print dnstap data in human-readable form -

-
- - - -
-

Synopsis

-

- dnstap-read - [-m] - [-p] - [-x] - [-y] - {file} -

-
- -
-

DESCRIPTION

- -

- dnstap-read - reads dnstap data from a specified file - and prints it in a human-readable format. By default, - dnstap data is printed in a short summary - format, but if the -y option is specified, - then a longer and more detailed YAML format is used instead. -

-
- -
-

OPTIONS

- - -
-
-m
-
-

- Trace memory allocations; used for debugging memory leaks. -

-
-
-p
-
-

- After printing the dnstap data, print - the text form of the DNS message that was encapsulated in the - dnstap frame. -

-
-
-x
-
-

- After printing the dnstap data, print - a hex dump of the wire form of the DNS message that was - encapsulated in the dnstap frame. -

-
-
-y
-
-

- Print dnstap data in a detailed YAML - format. -

-
-
-
- -
-

SEE ALSO

- -

- - named(8) - , - - rndc(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.filter-aaaa.html b/doc/arm/man.filter-aaaa.html deleted file mode 100644 index 0e91759c23..0000000000 --- a/doc/arm/man.filter-aaaa.html +++ /dev/null @@ -1,173 +0,0 @@ - - - - - -filter-aaaa.so - - - - - - - - -
-
- - - - -
-

Name

-

- filter-aaaa.so - — filter AAAA in DNS responses when A is present -

-
- - - -
-

Synopsis

-

- plugin query "filter-aaaa.so" - [{ parameters }]; -

-
- -
-

DESCRIPTION

-

- filter-aaaa.so is a query plugin module for - named, enabling named - to omit some IPv6 addresses when responding to clients. -

-

- Until BIND 9.12, this feature was implemented natively in - named and enabled with the - filter-aaaa ACL and the - filter-aaaa-on-v4 and - filter-aaaa-on-v6 options. These options are - now deprecated in named.conf, but can be - passed as parameters to the filter-aaaa.so - plugin, for example: -

-
-plugin query "/usr/local/lib/filter-aaaa.so" {
-        filter-aaaa-on-v4 yes;
-        filter-aaaa-on-v6 yes;
-        filter-aaaa { 192.0.2.1; 2001:db8:2::1; };
-};
-
-

- This module is intended to aid transition from IPv4 to IPv6 by - withholding IPv6 addresses from DNS clients which are not connected - to the IPv6 Internet, when the name being looked up has an IPv4 - address available. Use of this module is not recommended unless - absolutely necessary. -

-

- Note: This mechanism can erroneously cause other servers not to - give AAAA records to their clients. If a recursing server with - both IPv6 and IPv4 network connections queries an authoritative - server using this mechanism via IPv4, it will be denied AAAA - records even if its client is using IPv6. -

-
- -
-

OPTIONS

-
-
filter-aaaa
-
-

- Specifies a list of client addresses for which AAAA - filtering is to be applied. The default is - any. -

-
-
filter-aaaa-on-v4
-
-

- If set to yes, the DNS client is - at an IPv4 address, in filter-aaaa, - and if the response does not include DNSSEC signatures, - then all AAAA records are deleted from the response. - This filtering applies to all responses and not only - authoritative responses. -

-

- If set to break-dnssec, - then AAAA records are deleted even when DNSSEC is - enabled. As suggested by the name, this causes the - response to fail to verify, because the DNSSEC protocol is - designed to detect deletions. -

-

- This mechanism can erroneously cause other servers not to - give AAAA records to their clients. A recursing server with - both IPv6 and IPv4 network connections that queries an - authoritative server using this mechanism via IPv4 will be - denied AAAA records even if its client is using IPv6. -

-
-
filter-aaaa-on-v6
-
-

- Identical to filter-aaaa-on-v4, - except it filters AAAA responses to queries from IPv6 - clients instead of IPv4 clients. To filter all - responses, set both options to yes. -

-
-
-
- -
-

SEE ALSO

-

- BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.host.html b/doc/arm/man.host.html deleted file mode 100644 index 274a48a934..0000000000 --- a/doc/arm/man.host.html +++ /dev/null @@ -1,378 +0,0 @@ - - - - - -host - - - - - - - - -
-
- - - - - -
-

Name

-

- host - — DNS lookup utility -

-
- - - -
-

Synopsis

-

- host - [-aACdlnrsTUwv] - [-c class] - [-N ndots] - [-p port] - [-R number] - [-t type] - [-W wait] - [-m flag] - [ - [-4] - | [-6] - ] - [-v] - [-V] - {name} - [server] -

-
- -
-

DESCRIPTION

- - -

host - is a simple utility for performing DNS lookups. - It is normally used to convert names to IP addresses and vice versa. - When no arguments or options are given, - host - prints a short summary of its command line arguments and options. -

- -

name is the domain name that is to be - looked - up. It can also be a dotted-decimal IPv4 address or a colon-delimited - IPv6 address, in which case host will by - default - perform a reverse lookup for that address. - server is an optional argument which - is either - the name or IP address of the name server that host - should query instead of the server or servers listed in - /etc/resolv.conf. -

- -
- -
-

OPTIONS

- -
-
-4
-
-

- Use IPv4 only for query transport. - See also the -6 option. -

-
-
-6
-
-

- Use IPv6 only for query transport. - See also the -4 option. -

-
-
-a
-
-

- "All". The -a option is normally equivalent - to -v -t ANY. - It also affects the behaviour of the -l - list zone option. -

-
-
-A
-
-

- "Almost all". The -A option is equivalent - to -a except RRSIG, NSEC, and NSEC3 - records are omitted from the output. -

-
-
-c class
-
-

- Query class: This can be used to lookup HS (Hesiod) or CH - (Chaosnet) class resource records. The default class is IN - (Internet). -

-
-
-C
-
-

- Check consistency: host will query the - SOA records for zone name from all - the listed authoritative name servers for that zone. The - list of name servers is defined by the NS records that are - found for the zone. -

-
-
-d
-
-

- Print debugging traces. - Equivalent to the -v verbose option. -

-
-
-l
-
-

- List zone: - The host command performs a zone transfer of - zone name and prints out the NS, - PTR and address records (A/AAAA). -

-

- Together, the -l -a - options print all records in the zone. -

-
-
-N ndots
-
-

- The number of dots that have to be - in name for it to be considered - absolute. The default value is that defined using the - ndots statement in /etc/resolv.conf, - or 1 if no ndots statement is present. Names with fewer - dots are interpreted as relative names and will be - searched for in the domains listed in - the search or domain directive - in /etc/resolv.conf. -

-
-
-p port
-
-

- Specify the port on the server to query. The default is 53. -

-
-
-r
-
-

- Non-recursive query: - Setting this option clears the RD (recursion desired) bit - in the query. This should mean that the name server - receiving the query will not attempt to - resolve name. - The -r option - enables host to mimic the behavior of a - name server by making non-recursive queries and expecting - to receive answers to those queries that can be - referrals to other name servers. -

-
-
-R number
-
-

- Number of retries for UDP queries: - If number is negative or zero, the - number of retries will default to 1. The default value is - 1, or the value of the attempts - option in /etc/resolv.conf, if set. -

-
-
-s
-
-

- Do not send the query to the next - nameserver if any server responds with a SERVFAIL - response, which is the reverse of normal stub resolver - behavior. -

-
-
-t type
-
-

- Query type: - The type argument can be any - recognized query type: CNAME, NS, SOA, TXT, DNSKEY, AXFR, etc. -

-

- When no query type is specified, host - automatically selects an appropriate query type. By default, it - looks for A, AAAA, and MX records. - If the -C option is given, queries will - be made for SOA records. - If name is a dotted-decimal IPv4 - address or colon-delimited IPv6 - address, host will query for PTR - records. -

-

- If a query type of IXFR is chosen the starting serial - number can be specified by appending an equal followed by - the starting serial number - (like -t IXFR=12345678). -

-
-
--T, -U -
-
-

- TCP/UDP: - By default, host uses UDP when making - queries. The -T option makes it use a TCP - connection when querying the name server. TCP will be - automatically selected for queries that require it, such - as zone transfer (AXFR) requests. Type ANY queries default - to TCP but can be forced to UDP initially using -U. -

-
-
-m flag
-
-

- Memory usage debugging: the flag can - be record, usage, - or trace. You can specify - the -m option more than once to set - multiple flags. -

-
-
-v
-
-

- Verbose output. - Equivalent to the -d debug option. - Verbose output can also be enabled by setting - the debug option - in /etc/resolv.conf. -

-
-
-V
-
-

- Print the version number and exit. -

-
-
-w
-
-

- Wait forever: The query timeout is set to the maximum possible. - See also the -W option. -

-
-
-W wait
-
-

- Timeout: Wait for up to wait - seconds for a reply. If wait is - less than one, the wait interval is set to one second. -

-

- By default, host will wait for 5 - seconds for UDP responses and 10 seconds for TCP - connections. These defaults can be overridden by - the timeout option - in /etc/resolv.conf. -

-

- See also the -w option. -

-
-
- -
- -
-

IDN SUPPORT

- -

- If host has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - host appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, define - the IDN_DISABLE environment variable. - The IDN support is disabled if the variable is set when - host runs. -

-
- -
-

FILES

- -

/etc/resolv.conf -

-
- -
-

SEE ALSO

- -

- dig(1) - , - - named(8) - . -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.mdig.html b/doc/arm/man.mdig.html deleted file mode 100644 index d380317c36..0000000000 --- a/doc/arm/man.mdig.html +++ /dev/null @@ -1,615 +0,0 @@ - - - - - -mdig - - - - - - - - -
-
- - - -
-

Name

-

- mdig - — DNS pipelined lookup utility -

-
- - - -
-

Synopsis

-

- mdig - {@server} - [-f filename] - [-h] - [-v] - [ - [-4] - | [-6] - ] - [-m] - [-b address] - [-p port#] - [-c class] - [-t type] - [-i] - [-x addr] - [plusopt...] -

- -

- mdig - {-h} -

- -

- mdig - [@server] - {global-opt...} - { - {local-opt...} - {query} - ...} -

-
- -
-

DESCRIPTION

- -

mdig - is a multiple/pipelined query version of dig: - instead of waiting for a response after sending each query, - it begins by sending all queries. Responses are displayed in - the order in which they are received, not in the order the - corresponding queries were sent. -

- -

- mdig options are a subset of the - dig options, and are divided into "anywhere - options" which can occur anywhere, "global options" which must - occur before the query name (or they are ignored with a warning), - and "local options" which apply to the next query on the command - line. -

- -

- The {@server} option is a mandatory global - option. It is the name or IP address of the name server to query. - (Unlike dig, this value is not retrieved from - /etc/resolv.conf.) It can be an IPv4 address - in dotted-decimal notation, an IPv6 address in colon-delimited - notation, or a hostname. When the supplied - server argument is a hostname, - mdig resolves that name before querying - the name server. -

- -

mdig - provides a number of query options which affect - the way in which lookups are made and the results displayed. Some of - these set or reset flag bits in the query header, some determine which - sections of the answer get printed, and others determine the timeout - and retry strategies. -

- -

- Each query option is identified by a keyword preceded by a plus - sign (+). Some keywords set or reset an - option. These may be preceded by the string no - to negate the meaning of that keyword. Other keywords assign - values to options like the timeout interval. They have the - form +keyword=value. -

-
- -
-

ANYWHERE OPTIONS

- - -

- The -f option makes mdig - operate in batch mode by reading a list of lookup requests to - process from the file filename. The file - contains a number of queries, one per line. Each entry in the - file should be organized in the same way they would be presented - as queries to mdig using the command-line interface. -

- -

- The -h causes mdig to - print the detailed help with the full list of options and exit. -

- -

- The -v causes mdig to - print the version number and exit. -

-
- -
-

GLOBAL OPTIONS

- - -

- The -4 option forces mdig to - only use IPv4 query transport. -

- -

- The -6 option forces mdig to - only use IPv6 query transport. -

- -

- The -b option sets the source IP address of the - query to address. This must be a valid - address on one of the host's network interfaces or "0.0.0.0" or - "::". An optional port may be specified by appending - "#<port>" -

- -

- The -m option enables memory usage debugging. -

- -

- The -p option is used when a non-standard port - number is to be queried. - port# is the port number - that mdig will send its queries instead of - the standard DNS port number 53. This option would be used to - test a name server that has been configured to listen for - queries on a non-standard port number. -

- -

- The global query options are: -

-
-
+[no]additional
-
-

- Display [do not display] the additional section of a - reply. The default is to display it. -

-
-
+[no]all
-
-

- Set or clear all display flags. -

-
-
+[no]answer
-
-

- Display [do not display] the answer section of a - reply. The default is to display it. -

-
-
+[no]authority
-
-

- Display [do not display] the authority section of a - reply. The default is to display it. -

-
-
+[no]besteffort
-
-

- Attempt to display the contents of messages which are - malformed. The default is to not display malformed - answers. -

-
-
+[no]cl
-
-

- Display [do not display] the CLASS when printing the - record. -

-
-
+[no]comments
-
-

- Toggle the display of comment lines in the output. - The default is to print comments. -

-
-
+[no]continue
-
-

- Continue on errors (e.g. timeouts). -

-
-
+[no]crypto
-
-

- Toggle the display of cryptographic fields in DNSSEC - records. The contents of these field are unnecessary - to debug most DNSSEC validation failures and removing - them makes it easier to see the common failures. The - default is to display the fields. When omitted they - are replaced by the string "[omitted]" or in the - DNSKEY case the key id is displayed as the replacement, - e.g. "[ key id = value ]". -

-
-
+dscp[=value]
-
-

- Set the DSCP code point to be used when sending the - query. Valid DSCP code points are in the range - [0..63]. By default no code point is explicitly set. -

-
-
+[no]multiline
-
-

- Print records like the SOA records in a verbose - multi-line format with human-readable comments. The - default is to print each record on a single line, to - facilitate machine parsing of the mdig - output. -

-
-
+[no]question
-
-

- Print [do not print] the question section of a query - when an answer is returned. The default is to print - the question section as a comment. -

-
-
+[no]rrcomments
-
-

- Toggle the display of per-record comments in the - output (for example, human-readable key information - about DNSKEY records). The default is not to print - record comments unless multiline mode is active. -

-
-
+[no]short
-
-

- Provide a terse answer. The default is to print the - answer in a verbose form. -

-
-
+split=W
-
-

- Split long hex- or base64-formatted fields in resource - records into chunks of W - characters (where W is rounded - up to the nearest multiple of 4). - +nosplit or - +split=0 causes fields not to - be split at all. The default is 56 characters, or - 44 characters when multiline mode is active. -

-
-
+[no]tcp
-
-

- Use [do not use] TCP when querying name servers. The - default behavior is to use UDP. -

-
-
+[no]ttlid
-
-

- Display [do not display] the TTL when printing the - record. -

-
-
+[no]ttlunits
-
-

- Display [do not display] the TTL in friendly human-readable - time units of "s", "m", "h", "d", and "w", representing - seconds, minutes, hours, days and weeks. Implies +ttlid. -

-
-
+[no]vc
-
-

- Use [do not use] TCP when querying name servers. This - alternate syntax to +[no]tcp - is provided for backwards compatibility. The "vc" - stands for "virtual circuit". -

-
-
+[no]yaml
-
-

- Print the responses in a detailed YAML format. -

-
-
-

- -

-
- -
-

LOCAL OPTIONS

- - -

- The -c option sets the query class to - class. It can be any valid query class - which is supported in BIND 9. The default query class is "IN". -

- -

- The -t option sets the query type to - type. It can be any valid query type - which is supported in BIND 9. The default query type is "A", - unless the -x option is supplied to indicate - a reverse lookup with the "PTR" query type. -

- -

- Reverse lookups — mapping addresses to names — are - simplified by the -x option. - addr is an IPv4 - address in dotted-decimal notation, or a colon-delimited IPv6 address. - mdig automatically performs a lookup for a - query name like 11.12.13.10.in-addr.arpa and - sets the query type and class to PTR and IN respectively. - By default, IPv6 addresses are looked up using nibble format - under the IP6.ARPA domain. -

- -

- The local query options are: -

-
-
+[no]aaflag
-
-

- A synonym for +[no]aaonly. -

-
-
+[no]aaonly
-
-

- Sets the "aa" flag in the query. -

-
-
+[no]adflag
-
-

- Set [do not set] the AD (authentic data) bit in the - query. This requests the server to return whether - all of the answer and authority sections have all - been validated as secure according to the security - policy of the server. AD=1 indicates that all records - have been validated as secure and the answer is not - from a OPT-OUT range. AD=0 indicate that some part - of the answer was insecure or not validated. This - bit is set by default. -

-
-
+bufsize=B
-
-

- Set the UDP message buffer size advertised using EDNS0 - to B bytes. The maximum and - minimum sizes of this buffer are 65535 and 0 respectively. - Values outside this range are rounded up or down - appropriately. Values other than zero will cause a - EDNS query to be sent. -

-
-
+[no]cdflag
-
-

- Set [do not set] the CD (checking disabled) bit in - the query. This requests the server to not perform - DNSSEC validation of responses. -

-
-
+[no]cookie[=####]
-
-

- Send a COOKIE EDNS option, with optional value. - Replaying a COOKIE from a previous response will allow - the server to identify a previous client. The default - is +nocookie. -

-
-
+[no]dnssec
-
-

- Requests DNSSEC records be sent by setting the DNSSEC - OK bit (DO) in the OPT record in the additional section - of the query. -

-
-
+[no]edns[=#]
-
-

- Specify the EDNS version to query with. Valid values - are 0 to 255. Setting the EDNS version will cause - a EDNS query to be sent. +noedns - clears the remembered EDNS version. EDNS is set to - 0 by default. -

-
-
+[no]ednsflags[=#]
-
-

- Set the must-be-zero EDNS flags bits (Z bits) to the - specified value. Decimal, hex and octal encodings are - accepted. Setting a named flag (e.g. DO) will silently be - ignored. By default, no Z bits are set. -

-
-
+[no]ednsopt[=code[:value]]
-
-

- Specify EDNS option with code point code - and optionally payload of value as a - hexadecimal string. +noednsopt - clears the EDNS options to be sent. -

-
-
+[no]expire
-
-

- Send an EDNS Expire option. -

-
-
+[no]nsid
-
-

- Include an EDNS name server ID request when sending - a query. -

-
-
+[no]recurse
-
-

- Toggle the setting of the RD (recursion desired) bit - in the query. This bit is set by default, which means - mdig normally sends recursive - queries. -

-
-
+retry=T
-
-

- Sets the number of times to retry UDP queries to - server to T instead of the - default, 2. Unlike +tries, - this does not include the initial query. -

-
-
+[no]subnet=addr[/prefix-length]
-
-

- Send (don't send) an EDNS Client Subnet option with the - specified IP address or network prefix. -

-

- mdig +subnet=0.0.0.0/0, or simply - mdig +subnet=0 for short, sends an EDNS - client-subnet option with an empty address and a source - prefix-length of zero, which signals a resolver that - the client's address information must - not be used when resolving - this query. -

-
-
+timeout=T
-
-

- Sets the timeout for a query to - T seconds. The default - timeout is 5 seconds for UDP transport and 10 for TCP. - An attempt to set T to less - than 1 will result - in a query timeout of 1 second being applied. -

-
-
+tries=T
-
-

- Sets the number of times to try UDP queries to server - to T instead of the default, - 3. If T is less than or equal - to zero, the number of tries is silently rounded up - to 1. -

-
-
+udptimeout=T
-
-

- Sets the timeout between UDP query retries. -

-
-
+[no]unknownformat
-
-

- Print all RDATA in unknown RR type presentation format - (RFC 3597). The default is to print RDATA for known types - in the type's presentation format. -

-
-
+[no]zflag
-
-

- Set [do not set] the last unassigned DNS header flag in a - DNS query. This flag is off by default. -

-
-
-

- -

-
- -
-

SEE ALSO

- -

- dig(1) - , - RFC1035. -

-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.named-checkconf.html b/doc/arm/man.named-checkconf.html deleted file mode 100644 index 33bb5738ab..0000000000 --- a/doc/arm/man.named-checkconf.html +++ /dev/null @@ -1,219 +0,0 @@ - - - - - -named-checkconf - - - - - - - - -
-
- - - - - - - -
-

Name

-

- named-checkconf - — named configuration file syntax checking tool -

-
- -
-

Synopsis

-

- named-checkconf - [-chjlvz] - [-p - [-x - ]] - [-t directory] - {filename} -

-
- -
-

DESCRIPTION

- -

named-checkconf - checks the syntax, but not the semantics, of a - named configuration file. The file is parsed - and checked for syntax errors, along with all files included by it. - If no file is specified, /etc/named.conf is read - by default. -

-

- Note: files that named reads in separate - parser contexts, such as rndc.key and - bind.keys, are not automatically read - by named-checkconf. Configuration - errors in these files may cause named to - fail to run, even if named-checkconf was - successful. named-checkconf can be run - on these files explicitly, however. -

-
- -
-

OPTIONS

- -
-
-h
-
-

- Print the usage summary and exit. -

-
-
-j
-
-

- When loading a zonefile read the journal if it exists. -

-
-
-l
-
-

- List all the configured zones. Each line of output - contains the zone name, class (e.g. IN), view, and type - (e.g. master or slave). -

-
-
-c
-
-

- Check "core" configuration only. This suppresses the loading - of plugin modules, and causes all parameters to - plugin statements to be ignored. -

-
-
-i
-
-

- Ignore warnings on deprecated options. -

-
-
-p
-
-

- Print out the named.conf and included files - in canonical form if no errors were detected. - See also the -x option. -

-
-
-t directory
-
-

- Chroot to directory so that include - directives in the configuration file are processed as if - run by a similarly chrooted named. -

-
-
-v
-
-

- Print the version of the named-checkconf - program and exit. -

-
-
-x
-
-

- When printing the configuration files in canonical - form, obscure shared secrets by replacing them with - strings of question marks ('?'). This allows the - contents of named.conf and related - files to be shared — for example, when submitting - bug reports — without compromising private data. - This option cannot be used without -p. -

-
-
-z
-
-

- Perform a test load of all master zones found in - named.conf. -

-
-
filename
-
-

- The name of the configuration file to be checked. If not - specified, it defaults to /etc/named.conf. -

-
-
- -
- -
-

RETURN VALUES

- -

named-checkconf - returns an exit status of 1 if - errors were detected and 0 otherwise. -

-
- -
-

SEE ALSO

- -

- named(8) - , - - named-checkzone(8) - , - BIND 9 Administrator Reference Manual. -

-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.named-checkzone.html b/doc/arm/man.named-checkzone.html deleted file mode 100644 index ec4bbc0358..0000000000 --- a/doc/arm/man.named-checkzone.html +++ /dev/null @@ -1,468 +0,0 @@ - - - - - -named-checkzone - - - - - - - - -
-
- - - - - - - -
-

Name

-

- named-checkzone, - named-compilezone - — zone file validity checking or converting tool -

-
- -
-

Synopsis

-

- named-checkzone - [-d] - [-h] - [-j] - [-q] - [-v] - [-c class] - [-f format] - [-F format] - [-J filename] - [-i mode] - [-k mode] - [-m mode] - [-M mode] - [-n mode] - [-l ttl] - [-L serial] - [-o filename] - [-r mode] - [-s style] - [-S mode] - [-t directory] - [-T mode] - [-w directory] - [-D] - [-W mode] - {zonename} - {filename} -

-

- named-compilezone - [-d] - [-j] - [-q] - [-v] - [-c class] - [-C mode] - [-f format] - [-F format] - [-J filename] - [-i mode] - [-k mode] - [-m mode] - [-n mode] - [-l ttl] - [-L serial] - [-r mode] - [-s style] - [-t directory] - [-T mode] - [-w directory] - [-D] - [-W mode] - {-o filename} - {zonename} - {filename} -

-
- -
-

DESCRIPTION

- -

named-checkzone - checks the syntax and integrity of a zone file. It performs the - same checks as named does when loading a - zone. This makes named-checkzone useful for - checking zone files before configuring them into a name server. -

-

- named-compilezone is similar to - named-checkzone, but it always dumps the - zone contents to a specified file in a specified format. - Additionally, it applies stricter check levels by default, - since the dump output will be used as an actual zone file - loaded by named. - When manually specified otherwise, the check levels must at - least be as strict as those specified in the - named configuration file. -

-
- -
-

OPTIONS

- - -
-
-d
-
-

- Enable debugging. -

-
-
-h
-
-

- Print the usage summary and exit. -

-
-
-q
-
-

- Quiet mode - exit code only. -

-
-
-v
-
-

- Print the version of the named-checkzone - program and exit. -

-
-
-j
-
-

- When loading a zone file, read the journal if it exists. - The journal file name is assumed to be the zone file name - appended with the string .jnl. -

-
-
-J filename
-
-

- When loading the zone file read the journal from the given - file, if it exists. (Implies -j.) -

-
-
-c class
-
-

- Specify the class of the zone. If not specified, "IN" is assumed. -

-
-
-i mode
-
-

- Perform post-load zone integrity checks. Possible modes are - "full" (default), - "full-sibling", - "local", - "local-sibling" and - "none". -

-

- Mode "full" checks that MX records - refer to A or AAAA record (both in-zone and out-of-zone - hostnames). Mode "local" only - checks MX records which refer to in-zone hostnames. -

-

- Mode "full" checks that SRV records - refer to A or AAAA record (both in-zone and out-of-zone - hostnames). Mode "local" only - checks SRV records which refer to in-zone hostnames. -

-

- Mode "full" checks that delegation NS - records refer to A or AAAA record (both in-zone and out-of-zone - hostnames). It also checks that glue address records - in the zone match those advertised by the child. - Mode "local" only checks NS records which - refer to in-zone hostnames or that some required glue exists, - that is when the nameserver is in a child zone. -

-

- Mode "full-sibling" and - "local-sibling" disable sibling glue - checks but are otherwise the same as "full" - and "local" respectively. -

-

- Mode "none" disables the checks. -

-
-
-f format
-
-

- Specify the format of the zone file. - Possible formats are "text" (default), - "raw", and "map". -

-
-
-F format
-
-

- Specify the format of the output file specified. - For named-checkzone, - this does not cause any effects unless it dumps the zone - contents. -

-

- Possible formats are "text" (default), - which is the standard textual representation of the zone, - and "map", "raw", - and "raw=N", which store the zone in a - binary format for rapid loading by named. - "raw=N" specifies the format version of - the raw zone file: if N is 0, the raw file can be read by - any version of named; if N is 1, the file - can be read by release 9.9.0 or higher; the default is 1. -

-
-
-k mode
-
-

- Perform "check-names" checks with the - specified failure mode. - Possible modes are "fail" - (default for named-compilezone), - "warn" - (default for named-checkzone) and - "ignore". -

-
-
-l ttl
-
-

- Sets a maximum permissible TTL for the input file. - Any record with a TTL higher than this value will cause - the zone to be rejected. This is similar to using the - max-zone-ttl option in - named.conf. -

-
-
-L serial
-
-

- When compiling a zone to "raw" or "map" format, set the - "source serial" value in the header to the specified serial - number. (This is expected to be used primarily for testing - purposes.) -

-
-
-m mode
-
-

- Specify whether MX records should be checked to see if they - are addresses. Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-M mode
-
-

- Check if a MX record refers to a CNAME. - Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-n mode
-
-

- Specify whether NS records should be checked to see if they - are addresses. - Possible modes are "fail" - (default for named-compilezone), - "warn" - (default for named-checkzone) and - "ignore". -

-
-
-o filename
-
-

- Write zone output to filename. - If filename is - then - write to standard out. - This is mandatory for named-compilezone. -

-
-
-r mode
-
-

- Check for records that are treated as different by DNSSEC but - are semantically equal in plain DNS. - Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-s style
-
-

- Specify the style of the dumped zone file. - Possible styles are "full" (default) - and "relative". - The full format is most suitable for processing - automatically by a separate script. - On the other hand, the relative format is more - human-readable and is thus suitable for editing by hand. - For named-checkzone - this does not cause any effects unless it dumps the zone - contents. - It also does not have any meaning if the output format - is not text. -

-
-
-S mode
-
-

- Check if a SRV record refers to a CNAME. - Possible modes are "fail", - "warn" (default) and - "ignore". -

-
-
-t directory
-
-

- Chroot to directory so that - include - directives in the configuration file are processed as if - run by a similarly chrooted named. -

-
-
-T mode
-
-

- Check if Sender Policy Framework (SPF) records exist - and issues a warning if an SPF-formatted TXT record is - not also present. Possible modes are "warn" - (default), "ignore". -

-
-
-w directory
-
-

- chdir to directory so that - relative - filenames in master file $INCLUDE directives work. This - is similar to the directory clause in - named.conf. -

-
-
-D
-
-

- Dump zone file in canonical format. - This is always enabled for named-compilezone. -

-
-
-W mode
-
-

- Specify whether to check for non-terminal wildcards. - Non-terminal wildcards are almost always the result of a - failure to understand the wildcard matching algorithm (RFC 1034). - Possible modes are "warn" (default) - and - "ignore". -

-
-
zonename
-
-

- The domain name of the zone being checked. -

-
-
filename
-
-

- The name of the zone file. -

-
-
- -
- -
-

RETURN VALUES

- -

named-checkzone - returns an exit status of 1 if - errors were detected and 0 otherwise. -

-
- -
-

SEE ALSO

- -

- named(8) - , - - named-checkconf(8) - , - RFC 1035, - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.named-journalprint.html b/doc/arm/man.named-journalprint.html deleted file mode 100644 index 9949d8b142..0000000000 --- a/doc/arm/man.named-journalprint.html +++ /dev/null @@ -1,122 +0,0 @@ - - - - - -named-journalprint - - - - - - - - -
-
- - - - - -
-

Name

-

- named-journalprint - — print zone journal in human-readable form -

-
- - - -
-

Synopsis

-

- named-journalprint - {journal} -

-
- -
-

DESCRIPTION

- -

- named-journalprint - prints the contents of a zone journal file in a human-readable - form. -

-

- Journal files are automatically created by named - when changes are made to dynamic zones (e.g., by - nsupdate). They record each addition - or deletion of a resource record, in binary format, allowing the - changes to be re-applied to the zone when the server is - restarted after a shutdown or crash. By default, the name of - the journal file is formed by appending the extension - .jnl to the name of the corresponding - zone file. -

-

- named-journalprint converts the contents of a given - journal file into a human-readable text format. Each line begins - with "add" or "del", to indicate whether the record was added or - deleted, and continues with the resource record in master-file - format. -

-
- -
-

SEE ALSO

- -

- - named(8) - , - - nsupdate(1) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.named-nzd2nzf.html b/doc/arm/man.named-nzd2nzf.html deleted file mode 100644 index 7a99f28e0c..0000000000 --- a/doc/arm/man.named-nzd2nzf.html +++ /dev/null @@ -1,124 +0,0 @@ - - - - - -named-nzd2nzf - - - - - - - - -
-
- - - - -
-

Name

-

- named-nzd2nzf - — - Convert an NZD database to NZF text format - -

-
- - - -
-

Synopsis

-

- named-nzd2nzf - {filename} -

-
- -
-

DESCRIPTION

- -

- named-nzd2nzf converts an NZD database to NZF - format and prints it to standard output. This can be used to - review the configuration of zones that were added to - named via rndc addzone. - It can also be used to restore the old file format - when rolling back from a newer version - of BIND to an older version. -

-
- -
-

ARGUMENTS

- -
-
filename
-
-

- The name of the .nzd file whose contents - should be printed. -

-
-
-
- -
-

SEE ALSO

- -

- BIND 9 Administrator Reference Manual -

-
- -
-

AUTHOR

- -

Internet Systems Consortium -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.named-rrchecker.html b/doc/arm/man.named-rrchecker.html deleted file mode 100644 index b32ceb779c..0000000000 --- a/doc/arm/man.named-rrchecker.html +++ /dev/null @@ -1,126 +0,0 @@ - - - - - -named-rrchecker - - - - - - - - -
-
- - - -
-

Name

-

- named-rrchecker - — syntax checker for individual DNS resource records -

-
- - - -
-

Synopsis

-

- named-rrchecker - [-h] - [-o origin] - [-p] - [-u] - [-C] - [-T] - [-P] -

-
- -
-

DESCRIPTION

- -

named-rrchecker - read a individual DNS resource record from standard input and checks if it - is syntactically correct. -

-

- The -h prints out the help menu. -

-

- The -o origin - option specifies a origin to be used when interpreting the record. -

-

- The -p prints out the resulting record in canonical - form. If there is no canonical form defined then the record will be - printed in unknown record format. -

-

- The -u prints out the resulting record in unknown record - form. -

-

- The -C, -T and -P - print out the known class, standard type and private type mnemonics - respectively. -

-
- -
-

SEE ALSO

- -

- RFC 1034, - RFC 1035, - - named(8) - -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.named.conf.html b/doc/arm/man.named.conf.html deleted file mode 100644 index addde781bf..0000000000 --- a/doc/arm/man.named.conf.html +++ /dev/null @@ -1,1102 +0,0 @@ - - - - - -named.conf - - - - - - - - -
-
- - - - - -
-

Name

-

- named.conf - — configuration file for named -

-
- - - -
-

Synopsis

-

- named.conf -

-
- -
-

DESCRIPTION

- -

named.conf is the configuration file - for - named. Statements are enclosed - in braces and terminated with a semi-colon. Clauses in - the statements are also semi-colon terminated. The usual - comment styles are supported: -

-

- C style: /* */ -

-

- C++ style: // to end of line -

-

- Unix style: # to end of line -

-
- -
-

ACL

-


-acl string { address_match_element; ... };
-

-
- -
-

CONTROLS

-


-controls {
- inet ( ipv4_address | ipv6_address |
-     * ) [ port ( integer | * ) ] allow
-     { address_match_element; ... } [
-     keys { string; ... } ] [ read-only
-     boolean ];
- unix quoted_string perm integer
-     owner integer group integer [
-     keys { string; ... } ] [ read-only
-     boolean ];
-};
-

-
- -
-

DLZ

-


-dlz string {
- database string;
- search boolean;
-};
-

-
- -
-

DNSSEC-POLICY

-


-dnssec-policy string {
- dnskey-ttl duration;
- keys { ( csk | ksk | zsk ) ( key-directory ) lifetime ( duration | unlimited )
-     algorithm integer [ integer ]; ... };
- max-zone-ttl duration;
- parent-ds-ttl duration;
- parent-propagation-delay duration;
- parent-registration-delay duration;
- publish-safety duration;
- retire-safety duration;
- signatures-refresh duration;
- signatures-validity duration;
- signatures-validity-dnskey duration;
- zone-propagation-delay duration;
-};
-

-
- -
-

DYNDB

-


-dyndb string quoted_string {
-    unspecified-text };
-

-
- -
-

KEY

-


-key string {
- algorithm string;
- secret string;
-};
-

-
- -
-

LOGGING

-


-logging {
- category string { string; ... };
- channel string {
- buffered boolean;
- file quoted_string [ versions ( unlimited | integer ) ]
-     [ size size ] [ suffix ( increment | timestamp ) ];
- null;
- print-category boolean;
- print-severity boolean;
- print-time ( iso8601 | iso8601-utc | local | boolean );
- severity log_severity;
- stderr;
- syslog [ syslog_facility ];
- };
-};
-

-
- -
-

MANAGED-KEYS

-

Deprecated - see DNSSEC-KEYS.

-


-managed-keys { string ( static-key
-    | initial-key | static-ds |
-    initial-ds ) integer integer
-    integer quoted_string; ... }; deprecated
-

-
- -
-

MASTERS

-


-masters string [ port integer ] [ dscp
-    integer ] { ( masters | ipv4_address [
-    port integer ] | ipv6_address [ port
-    integer ] ) [ key string ]; ... };
-

-
- -
-

OPTIONS

-


-options {
- allow-new-zones boolean;
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-cache { address_match_element; ... };
- allow-query-cache-on { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-recursion { address_match_element; ... };
- allow-recursion-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- alt-transfer-source ( ipv4_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- answer-cookie boolean;
- attach-cache string;
- auth-nxdomain boolean; // default changed
- auto-dnssec ( allow | maintain | off );
- automatic-interface-scan boolean;
- avoid-v4-udp-ports { portrange; ... };
- avoid-v6-udp-ports { portrange; ... };
- bindkeys-file quoted_string;
- blackhole { address_match_element; ... };
- cache-file quoted_string;
- catalog-zones { zone string [ default-masters [ port integer ]
-     [ dscp integer ] { ( masters | ipv4_address [ port
-     integer ] | ipv6_address [ port integer ] ) [ key
-     string ]; ... } ] [ zone-directory quoted_string ] [
-     in-memory boolean ] [ min-update-interval duration ]; ... };
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( primary | master |
-     secondary | slave | response ) (
-     fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- clients-per-query integer;
- cookie-algorithm ( aes | siphash24 );
- cookie-secret string;
- coresize ( default | unlimited | sizeval );
- datasize ( default | unlimited | sizeval );
- deny-answer-addresses { address_match_element; ... } [
-     except-from { string; ... } ];
- deny-answer-aliases { string; ... } [ except-from { string; ...
-     } ];
- dialup ( notify | notify-passive | passive | refresh | boolean );
- directory quoted_string;
- disable-algorithms string { string;
-     ... };
- disable-ds-digests string { string;
-     ... };
- disable-empty-zone string;
- dns64 netprefix {
- break-dnssec boolean;
- clients { address_match_element; ... };
- exclude { address_match_element; ... };
- mapped { address_match_element; ... };
- recursive-only boolean;
- suffix ipv6_address;
- };
- dns64-contact string;
- dns64-server string;
- dnskey-sig-validity integer;
- dnsrps-enable boolean;
- dnsrps-options { unspecified-text };
- dnssec-accept-expired boolean;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-must-be-secure string boolean;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- dnssec-validation ( yes | no | auto );
- dnstap { ( all | auth | client | forwarder |
-     resolver | update ) [ ( query | response ) ];
-     ... };
- dnstap-identity ( quoted_string | none |
-     hostname );
- dnstap-output ( file | unix ) quoted_string [
-     size ( unlimited | size ) ] [ versions (
-     unlimited | integer ) ] [ suffix ( increment
-     | timestamp ) ];
- dnstap-version ( quoted_string | none );
- dscp integer;
- dual-stack-servers [ port integer ] { ( quoted_string [ port
-     integer ] [ dscp integer ] | ipv4_address [ port
-     integer ] [ dscp integer ] | ipv6_address [ port
-     integer ] [ dscp integer ] ); ... };
- dump-file quoted_string;
- edns-udp-size integer;
- empty-contact string;
- empty-server string;
- empty-zones-enable boolean;
- fetch-quota-params integer fixedpoint fixedpoint fixedpoint;
- fetches-per-server integer [ ( drop | fail ) ];
- fetches-per-zone integer [ ( drop | fail ) ];
- files ( default | unlimited | sizeval );
- flush-zones-on-shutdown boolean;
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { ( ipv4_address
-     | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
- fstrm-set-buffer-hint integer;
- fstrm-set-flush-timeout integer;
- fstrm-set-input-queue-size integer;
- fstrm-set-output-notify-threshold integer;
- fstrm-set-output-queue-model ( mpsc | spsc );
- fstrm-set-output-queue-size integer;
- fstrm-set-reopen-interval duration;
- geoip-directory ( quoted_string | none );
- glue-cache boolean;
- heartbeat-interval integer;
- hostname ( quoted_string | none );
- inline-signing boolean;
- interface-interval duration;
- ixfr-from-differences ( primary | master | secondary | slave |
-     boolean );
- keep-response-order { address_match_element; ... };
- key-directory quoted_string;
- lame-ttl duration;
- listen-on [ port integer ] [ dscp
-     integer ] {
-     address_match_element; ... };
- listen-on-v6 [ port integer ] [ dscp
-     integer ] {
-     address_match_element; ... };
- lmdb-mapsize sizeval;
- lock-file ( quoted_string | none );
- managed-keys-directory quoted_string;
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- match-mapped-addresses boolean;
- max-cache-size ( default | unlimited | sizeval | percentage );
- max-cache-ttl duration;
- max-clients-per-query integer;
- max-journal-size ( default | unlimited | sizeval );
- max-ncache-ttl duration;
- max-records integer;
- max-recursion-depth integer;
- max-recursion-queries integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-rsa-exponent-size integer;
- max-stale-ttl duration;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-udp-size integer;
- max-zone-ttl ( unlimited | duration );
- memstatistics boolean;
- memstatistics-file quoted_string;
- message-compression boolean;
- min-cache-ttl duration;
- min-ncache-ttl duration;
- min-refresh-time integer;
- min-retry-time integer;
- minimal-any boolean;
- minimal-responses ( no-auth | no-auth-recursive | boolean );
- multi-master boolean;
- new-zones-directory quoted_string;
- no-case-compress { address_match_element; ... };
- nocookie-udp-size integer;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-rate integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- notify-to-soa boolean;
- nta-lifetime duration;
- nta-recheck duration;
- nxdomain-redirect string;
- pid-file ( quoted_string | none );
- port integer;
- preferred-glue string;
- prefetch integer [ integer ];
- provide-ixfr boolean;
- qname-minimization ( strict | relaxed | disabled | off );
- query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- querylog boolean;
- random-device ( quoted_string | none );
- rate-limit {
- all-per-second integer;
- errors-per-second integer;
- exempt-clients { address_match_element; ... };
- ipv4-prefix-length integer;
- ipv6-prefix-length integer;
- log-only boolean;
- max-table-size integer;
- min-table-size integer;
- nodata-per-second integer;
- nxdomains-per-second integer;
- qps-scale integer;
- referrals-per-second integer;
- responses-per-second integer;
- slip integer;
- window integer;
- };
- recursing-file quoted_string;
- recursion boolean;
- recursive-clients integer;
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- require-server-cookie boolean;
- reserved-sockets integer;
- resolver-nonbackoff-tries integer;
- resolver-query-timeout integer;
- resolver-retry-interval integer;
- response-padding { address_match_element; ... } block-size
-     integer;
- response-policy { zone string [ add-soa boolean ] [ log
-     boolean ] [ max-policy-ttl duration ] [ min-update-interval
-     duration ] [ policy ( cname | disabled | drop | given | no-op
-     | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [
-     recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ]; ... } [ add-soa boolean ] [
-     break-dnssec boolean ] [ max-policy-ttl duration ] [
-     min-update-interval duration ] [ min-ns-dots integer ] [
-     nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ]
-     [ recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ] [ dnsrps-enable boolean ] [
-     dnsrps-options { unspecified-text } ];
- root-delegation-only [ exclude { string; ... } ];
- root-key-sentinel boolean;
- rrset-order { [ class string ] [ type string ] [ name
-     quoted_string ] string string; ... };
- secroots-file quoted_string;
- send-cookie boolean;
- serial-query-rate integer;
- serial-update-method ( date | increment | unixtime );
- server-id ( quoted_string | none | hostname );
- servfail-ttl duration;
- session-keyalg string;
- session-keyfile ( quoted_string | none );
- session-keyname string;
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- sortlist { address_match_element; ... };
- stacksize ( default | unlimited | sizeval );
- stale-answer-enable boolean;
- stale-answer-ttl duration;
- startup-notify-rate integer;
- statistics-file quoted_string;
- synth-from-dnssec boolean;
- tcp-advertised-timeout integer;
- tcp-clients integer;
- tcp-idle-timeout integer;
- tcp-initial-timeout integer;
- tcp-keepalive-timeout integer;
- tcp-listen-queue integer;
- tkey-dhkey quoted_string integer;
- tkey-domain quoted_string;
- tkey-gssapi-credential quoted_string;
- tkey-gssapi-keytab quoted_string;
- transfer-format ( many-answers | one-answer );
- transfer-message-size integer;
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- transfers-in integer;
- transfers-out integer;
- transfers-per-ns integer;
- trust-anchor-telemetry boolean; // experimental
- try-tcp-refresh boolean;
- update-check-ksk boolean;
- use-alt-transfer-source boolean;
- use-v4-udp-ports { portrange; ... };
- use-v6-udp-ports { portrange; ... };
- v6-bias integer;
- validate-except { string; ... };
- version ( quoted_string | none );
- zero-no-soa-ttl boolean;
- zero-no-soa-ttl-cache boolean;
- zone-statistics ( full | terse | none | boolean );
-};
-

-
- -
-

PLUGIN

-


-plugin ( query ) string [ { unspecified-text
-    } ];
-

-
- -
-

SERVER

-


-server netprefix {
- bogus boolean;
- edns boolean;
- edns-udp-size integer;
- edns-version integer;
- keys server_key;
- max-udp-size integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- padding integer;
- provide-ixfr boolean;
- query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- send-cookie boolean;
- tcp-keepalive boolean;
- tcp-only boolean;
- transfer-format ( many-answers | one-answer );
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- transfers integer;
-};
-

-
- -
-

STATISTICS-CHANNELS

-


-statistics-channels {
- inet ( ipv4_address | ipv6_address |
-     * ) [ port ( integer | * ) ] [
-     allow { address_match_element; ...
-     } ];
-};
-

-
- -
-

TRUST-ANCHORS

-


-trust-anchors { string ( static-key |
-    initial-key | static-ds | initial-ds )
-    integer integer integer
-    quoted_string; ... };
-

-
- -
-

TRUSTED-KEYS

-

Deprecated - see DNSSEC-KEYS.

-


-trusted-keys { string integer
-    integer integer
-    quoted_string; ... }; deprecated
-

-
- -
-

VIEW

-


-view string [ class ] {
- allow-new-zones boolean;
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-cache { address_match_element; ... };
- allow-query-cache-on { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-recursion { address_match_element; ... };
- allow-recursion-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- alt-transfer-source ( ipv4_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- attach-cache string;
- auth-nxdomain boolean; // default changed
- auto-dnssec ( allow | maintain | off );
- cache-file quoted_string;
- catalog-zones { zone string [ default-masters [ port integer ]
-     [ dscp integer ] { ( masters | ipv4_address [ port
-     integer ] | ipv6_address [ port integer ] ) [ key
-     string ]; ... } ] [ zone-directory quoted_string ] [
-     in-memory boolean ] [ min-update-interval duration ]; ... };
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( primary | master |
-     secondary | slave | response ) (
-     fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- clients-per-query integer;
- deny-answer-addresses { address_match_element; ... } [
-     except-from { string; ... } ];
- deny-answer-aliases { string; ... } [ except-from { string; ...
-     } ];
- dialup ( notify | notify-passive | passive | refresh | boolean );
- disable-algorithms string { string;
-     ... };
- disable-ds-digests string { string;
-     ... };
- disable-empty-zone string;
- dlz string {
- database string;
- search boolean;
- };
- dns64 netprefix {
- break-dnssec boolean;
- clients { address_match_element; ... };
- exclude { address_match_element; ... };
- mapped { address_match_element; ... };
- recursive-only boolean;
- suffix ipv6_address;
- };
- dns64-contact string;
- dns64-server string;
- dnskey-sig-validity integer;
- dnsrps-enable boolean;
- dnsrps-options { unspecified-text };
- dnssec-accept-expired boolean;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-must-be-secure string boolean;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- dnssec-validation ( yes | no | auto );
- dnstap { ( all | auth | client | forwarder |
-     resolver | update ) [ ( query | response ) ];
-     ... };
- dual-stack-servers [ port integer ] { ( quoted_string [ port
-     integer ] [ dscp integer ] | ipv4_address [ port
-     integer ] [ dscp integer ] | ipv6_address [ port
-     integer ] [ dscp integer ] ); ... };
- dyndb string quoted_string {
-     unspecified-text };
- edns-udp-size integer;
- empty-contact string;
- empty-server string;
- empty-zones-enable boolean;
- fetch-quota-params integer fixedpoint fixedpoint fixedpoint;
- fetches-per-server integer [ ( drop | fail ) ];
- fetches-per-zone integer [ ( drop | fail ) ];
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { ( ipv4_address
-     | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
- glue-cache boolean;
- inline-signing boolean;
- ixfr-from-differences ( primary | master | secondary | slave |
-     boolean );
- key string {
- algorithm string;
- secret string;
- };
- key-directory quoted_string;
- lame-ttl duration;
- lmdb-mapsize sizeval;
- managed-keys { string (
-     static-key | initial-key
-     | static-ds | initial-ds
-     ) integer integer
-     integer
-     quoted_string; ... }; deprecated
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- match-clients { address_match_element; ... };
- match-destinations { address_match_element; ... };
- match-recursive-only boolean;
- max-cache-size ( default | unlimited | sizeval | percentage );
- max-cache-ttl duration;
- max-clients-per-query integer;
- max-journal-size ( default | unlimited | sizeval );
- max-ncache-ttl duration;
- max-records integer;
- max-recursion-depth integer;
- max-recursion-queries integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-stale-ttl duration;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-udp-size integer;
- max-zone-ttl ( unlimited | duration );
- message-compression boolean;
- min-cache-ttl duration;
- min-ncache-ttl duration;
- min-refresh-time integer;
- min-retry-time integer;
- minimal-any boolean;
- minimal-responses ( no-auth | no-auth-recursive | boolean );
- multi-master boolean;
- new-zones-directory quoted_string;
- no-case-compress { address_match_element; ... };
- nocookie-udp-size integer;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- notify-to-soa boolean;
- nta-lifetime duration;
- nta-recheck duration;
- nxdomain-redirect string;
- plugin ( query ) string [ {
-     unspecified-text } ];
- preferred-glue string;
- prefetch integer [ integer ];
- provide-ixfr boolean;
- qname-minimization ( strict | relaxed | disabled | off );
- query-source ( ( [ address ] ( ipv4_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port (
-     integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ]
-     port ( integer | * ) ) ) [ dscp integer ];
- rate-limit {
- all-per-second integer;
- errors-per-second integer;
- exempt-clients { address_match_element; ... };
- ipv4-prefix-length integer;
- ipv6-prefix-length integer;
- log-only boolean;
- max-table-size integer;
- min-table-size integer;
- nodata-per-second integer;
- nxdomains-per-second integer;
- qps-scale integer;
- referrals-per-second integer;
- responses-per-second integer;
- slip integer;
- window integer;
- };
- recursion boolean;
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- require-server-cookie boolean;
- resolver-nonbackoff-tries integer;
- resolver-query-timeout integer;
- resolver-retry-interval integer;
- response-padding { address_match_element; ... } block-size
-     integer;
- response-policy { zone string [ add-soa boolean ] [ log
-     boolean ] [ max-policy-ttl duration ] [ min-update-interval
-     duration ] [ policy ( cname | disabled | drop | given | no-op
-     | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [
-     recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ]; ... } [ add-soa boolean ] [
-     break-dnssec boolean ] [ max-policy-ttl duration ] [
-     min-update-interval duration ] [ min-ns-dots integer ] [
-     nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ]
-     [ recursive-only boolean ] [ nsip-enable boolean ] [
-     nsdname-enable boolean ] [ dnsrps-enable boolean ] [
-     dnsrps-options { unspecified-text } ];
- root-delegation-only [ exclude { string; ... } ];
- root-key-sentinel boolean;
- rrset-order { [ class string ] [ type string ] [ name
-     quoted_string ] string string; ... };
- send-cookie boolean;
- serial-update-method ( date | increment | unixtime );
- server netprefix {
- bogus boolean;
- edns boolean;
- edns-udp-size integer;
- edns-version integer;
- keys server_key;
- max-udp-size integer;
- notify-source ( ipv4_address | * ) [ port ( integer | *
-     ) ] [ dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer
-     | * ) ] [ dscp integer ];
- padding integer;
- provide-ixfr boolean;
- query-source ( ( [ address ] ( ipv4_address | * ) [ port
-     ( integer | * ) ] ) | ( [ [ address ] (
-     ipv4_address | * ) ] port ( integer | * ) ) ) [
-     dscp integer ];
- query-source-v6 ( ( [ address ] ( ipv6_address | * ) [
-     port ( integer | * ) ] ) | ( [ [ address ] (
-     ipv6_address | * ) ] port ( integer | * ) ) ) [
-     dscp integer ];
- request-expire boolean;
- request-ixfr boolean;
- request-nsid boolean;
- send-cookie boolean;
- tcp-keepalive boolean;
- tcp-only boolean;
- transfer-format ( many-answers | one-answer );
- transfer-source ( ipv4_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- transfers integer;
- };
- servfail-ttl duration;
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- sortlist { address_match_element; ... };
- stale-answer-enable boolean;
- stale-answer-ttl duration;
- synth-from-dnssec boolean;
- transfer-format ( many-answers | one-answer );
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- trust-anchor-telemetry boolean; // experimental
- trust-anchors { string ( static-key |
-     initial-key | static-ds | initial-ds
-     ) integer integer integer
-     quoted_string; ... };
- trusted-keys { string
-     integer integer
-     integer
-     quoted_string; ... }; deprecated
- try-tcp-refresh boolean;
- update-check-ksk boolean;
- use-alt-transfer-source boolean;
- v6-bias integer;
- validate-except { string; ... };
- zero-no-soa-ttl boolean;
- zero-no-soa-ttl-cache boolean;
- zone string [ class ] {
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { (
-     masters | ipv4_address [ port integer ] |
-     ipv6_address [ port integer ] ) [ key string ];
-     ... };
- alt-transfer-source ( ipv4_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- auto-dnssec ( allow | maintain | off );
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- database string;
- delegation-only boolean;
- dialup ( notify | notify-passive | passive | refresh |
-     boolean );
- dlz string;
- dnskey-sig-validity integer;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- file quoted_string;
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { (
-     ipv4_address | ipv6_address ) [ port integer ] [
-     dscp integer ]; ... };
- in-view string;
- inline-signing boolean;
- ixfr-from-differences boolean;
- journal quoted_string;
- key-directory quoted_string;
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- masters [ port integer ] [ dscp integer ] { ( masters
-     | ipv4_address [ port integer ] | ipv6_address [
-     port integer ] ) [ key string ]; ... };
- max-journal-size ( default | unlimited | sizeval );
- max-records integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-zone-ttl ( unlimited | duration );
- min-refresh-time integer;
- min-retry-time integer;
- multi-master boolean;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-source ( ipv4_address | * ) [ port ( integer | *
-     ) ] [ dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer
-     | * ) ] [ dscp integer ];
- notify-to-soa boolean;
- request-expire boolean;
- request-ixfr boolean;
- serial-update-method ( date | increment | unixtime );
- server-addresses { ( ipv4_address | ipv6_address ); ... };
- server-names { string; ... };
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- transfer-source ( ipv4_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port (
-     integer | * ) ] [ dscp integer ];
- try-tcp-refresh boolean;
- type ( primary | master | secondary | slave | mirror |
-     delegation-only | forward | hint | redirect |
-     static-stub | stub );
- update-check-ksk boolean;
- update-policy ( local | { ( deny | grant ) string (
-     6to4-self | external | krb5-self | krb5-selfsub |
-     krb5-subdomain | ms-self | ms-selfsub | ms-subdomain |
-     name | self | selfsub | selfwild | subdomain | tcp-self
-     | wildcard | zonesub ) [ string ] rrtypelist; ... };
- use-alt-transfer-source boolean;
- zero-no-soa-ttl boolean;
- zone-statistics ( full | terse | none | boolean );
- };
- zone-statistics ( full | terse | none | boolean );
-};
-

-
- -
-

ZONE

-


-zone string [ class ] {
- allow-notify { address_match_element; ... };
- allow-query { address_match_element; ... };
- allow-query-on { address_match_element; ... };
- allow-transfer { address_match_element; ... };
- allow-update { address_match_element; ... };
- allow-update-forwarding { address_match_element; ... };
- also-notify [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- alt-transfer-source ( ipv4_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer |
-     * ) ] [ dscp integer ];
- auto-dnssec ( allow | maintain | off );
- check-dup-records ( fail | warn | ignore );
- check-integrity boolean;
- check-mx ( fail | warn | ignore );
- check-mx-cname ( fail | warn | ignore );
- check-names ( fail | warn | ignore );
- check-sibling boolean;
- check-spf ( warn | ignore );
- check-srv-cname ( fail | warn | ignore );
- check-wildcard boolean;
- database string;
- delegation-only boolean;
- dialup ( notify | notify-passive | passive | refresh | boolean );
- dlz string;
- dnskey-sig-validity integer;
- dnssec-dnskey-kskonly boolean;
- dnssec-loadkeys-interval integer;
- dnssec-policy string;
- dnssec-secure-to-insecure boolean;
- dnssec-update-mode ( maintain | no-resign );
- file quoted_string;
- forward ( first | only );
- forwarders [ port integer ] [ dscp integer ] { ( ipv4_address
-     | ipv6_address ) [ port integer ] [ dscp integer ]; ... };
- in-view string;
- inline-signing boolean;
- ixfr-from-differences boolean;
- journal quoted_string;
- key-directory quoted_string;
- masterfile-format ( map | raw | text );
- masterfile-style ( full | relative );
- masters [ port integer ] [ dscp integer ] { ( masters |
-     ipv4_address [ port integer ] | ipv6_address [ port
-     integer ] ) [ key string ]; ... };
- max-journal-size ( default | unlimited | sizeval );
- max-records integer;
- max-refresh-time integer;
- max-retry-time integer;
- max-transfer-idle-in integer;
- max-transfer-idle-out integer;
- max-transfer-time-in integer;
- max-transfer-time-out integer;
- max-zone-ttl ( unlimited | duration );
- min-refresh-time integer;
- min-retry-time integer;
- multi-master boolean;
- notify ( explicit | master-only | boolean );
- notify-delay integer;
- notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ]
-     [ dscp integer ];
- notify-to-soa boolean;
- request-expire boolean;
- request-ixfr boolean;
- serial-update-method ( date | increment | unixtime );
- server-addresses { ( ipv4_address | ipv6_address ); ... };
- server-names { string; ... };
- sig-signing-nodes integer;
- sig-signing-signatures integer;
- sig-signing-type integer;
- sig-validity-interval integer [ integer ];
- transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [
-     dscp integer ];
- transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * )
-     ] [ dscp integer ];
- try-tcp-refresh boolean;
- type ( primary | master | secondary | slave | mirror |
-     delegation-only | forward | hint | redirect | static-stub |
-     stub );
- update-check-ksk boolean;
- update-policy ( local | { ( deny | grant ) string ( 6to4-self |
-     external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self
-     | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild
-     | subdomain | tcp-self | wildcard | zonesub ) [ string ]
-     rrtypelist; ... };
- use-alt-transfer-source boolean;
- zero-no-soa-ttl boolean;
- zone-statistics ( full | terse | none | boolean );
-};
-

-
- -
-

FILES

- -

/etc/named.conf -

-
- -
-

SEE ALSO

- -

- ddns-confgen(8) - , - - named(8) - , - - named-checkconf(8) - , - - rndc(8) - , - - rndc-confgen(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.named.html b/doc/arm/man.named.html deleted file mode 100644 index 2519ff73e3..0000000000 --- a/doc/arm/man.named.html +++ /dev/null @@ -1,497 +0,0 @@ - - - - - -named - - - - - - - - -
-
- - - - - -
-

Name

-

- named - — Internet domain name server -

-
- - - -
-

Synopsis

-

- named - [ - [-4] - | [-6] - ] - [-c config-file] - [-d debug-level] - [-D string] - [-E engine-name] - [-f] - [-g] - [-L logfile] - [-M option] - [-m flag] - [-n #cpus] - [-p port] - [-s] - [-S #max-socks] - [-t directory] - [-U #listeners] - [-u user] - [-v] - [-V] - [-X lock-file] - [-x cache-file] -

-
- -
-

DESCRIPTION

- -

named - is a Domain Name System (DNS) server, - part of the BIND 9 distribution from ISC. For more - information on the DNS, see RFCs 1033, 1034, and 1035. -

-

- When invoked without arguments, named - will - read the default configuration file - /etc/named.conf, read any initial - data, and listen for queries. -

-
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only even if the host machine is capable of IPv6. - -4 and -6 are mutually - exclusive. -

-
-
-6
-
-

- Use IPv6 only even if the host machine is capable of IPv4. - -4 and -6 are mutually - exclusive. -

-
-
-c config-file
-
-

- Use config-file as the - configuration file instead of the default, - /etc/named.conf. To - ensure that reloading the configuration file continues - to work after the server has changed its working - directory due to to a possible - directory option in the configuration - file, config-file should be - an absolute pathname. -

-
-
-d debug-level
-
-

- Set the daemon's debug level to debug-level. - Debugging traces from named become - more verbose as the debug level increases. -

-
-
-D string
-
-

- Specifies a string that is used to identify a instance of - named in a process listing. The contents - of string are - not examined. -

-
-
-E engine-name
-
-

- When applicable, specifies the hardware to use for - cryptographic operations, such as a secure key store used - for signing. -

-

- When BIND is built with OpenSSL PKCS#11 support, this defaults - to the string "pkcs11", which identifies an OpenSSL engine - that can drive a cryptographic accelerator or hardware service - module. When BIND is built with native PKCS#11 cryptography - (--enable-native-pkcs11), it defaults to the path of the PKCS#11 - provider library specified via "--with-pkcs11". -

-
-
-f
-
-

- Run the server in the foreground (i.e. do not daemonize). -

-
-
-g
-
-

- Run the server in the foreground and force all logging - to stderr. -

-
-
-L logfile
-
-

- Log to the file logfile by default - instead of the system log. -

-
-
-M option
-
-

- Sets the default memory context options. If set to - external, - this causes the internal memory manager to be bypassed - in favor of system-provided memory allocation functions. - If set to fill, - blocks of memory will be filled with tag values when allocated - or freed, to assist debugging of memory problems. - (nofill - disables this behavior, and is the default unless - named has been compiled with developer - options.) -

-
-
-m flag
-
-

- Turn on memory usage debugging flags. Possible flags are - usage, - trace, - record, - size, and - mctx. - These correspond to the ISC_MEM_DEBUGXXXX flags described in - <isc/mem.h>. -

-
-
-n #cpus
-
-

- Create #cpus worker threads - to take advantage of multiple CPUs. If not specified, - named will try to determine the - number of CPUs present and create one thread per CPU. - If it is unable to determine the number of CPUs, a - single worker thread will be created. -

-
-
-p port
-
-

- Listen for queries on port port. If not - specified, the default is port 53. -

-
-
-s
-
-

- Write memory usage statistics to stdout on exit. -

-
-

Note

-

- This option is mainly of interest to BIND 9 developers - and may be removed or changed in a future release. -

-
-
-
-S #max-socks
-
-

- Allow named to use up to - #max-socks sockets. - The default value is 21000 on systems built with default - configuration options, and 4096 on systems built with - "configure --with-tuning=small". -

-
-

Warning

-

- This option should be unnecessary for the vast majority - of users. - The use of this option could even be harmful because the - specified value may exceed the limitation of the - underlying system API. - It is therefore set only when the default configuration - causes exhaustion of file descriptors and the - operational environment is known to support the - specified number of sockets. - Note also that the actual maximum number is normally a little - fewer than the specified value because - named reserves some file descriptors - for its internal use. -

-
-
-
-t directory
-
-

Chroot - to directory after - processing the command line arguments, but before - reading the configuration file. -

-
-

Warning

-

- This option should be used in conjunction with the - -u option, as chrooting a process - running as root doesn't enhance security on most - systems; the way chroot(2) is - defined allows a process with root privileges to - escape a chroot jail. -

-
-
-
-U #listeners
-
-

- Use #listeners - worker threads to listen for incoming UDP packets on each - address. If not specified, named will - calculate a default value based on the number of detected - CPUs: 1 for 1 CPU, and the number of detected CPUs - minus one for machines with more than 1 CPU. This cannot - be increased to a value higher than the number of CPUs. - If -n has been set to a higher value than - the number of detected CPUs, then -U may - be increased as high as that value, but no higher. - On Windows, the number of UDP listeners is hardwired to 1 - and this option has no effect. -

-
-
-u user
-
-

Setuid - to user after completing - privileged operations, such as creating sockets that - listen on privileged ports. -

-
-

Note

-

- On Linux, named uses the kernel's - capability mechanism to drop all root privileges - except the ability to bind(2) to - a - privileged port and set process resource limits. - Unfortunately, this means that the -u - option only works when named is - run - on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or - later, since previous kernels did not allow privileges - to be retained after setuid(2). -

-
-
-
-v
-
-

- Report the version number and exit. -

-
-
-V
-
-

- Report the version number and build options, and exit. -

-
-
-X lock-file
-
-

- Acquire a lock on the specified file at runtime; this - helps to prevent duplicate named instances - from running simultaneously. - Use of this option overrides the lock-file - option in named.conf. - If set to none, the lock file check - is disabled. -

-
-
-x cache-file
-
-

- Load data from cache-file into the - cache of the default view. -

-
-

Warning

-

- This option must not be used. It is only of interest - to BIND 9 developers and may be removed or changed in a - future release. -

-
-
-
- -
- -
-

SIGNALS

- -

- In routine operation, signals should not be used to control - the nameserver; rndc should be used - instead. -

- -
-
SIGHUP
-
-

- Force a reload of the server. -

-
-
SIGINT, SIGTERM
-
-

- Shut down the server. -

-
-
- -

- The result of sending any other signals to the server is undefined. -

- -
- -
-

CONFIGURATION

- -

- The named configuration file is too complex - to describe in detail here. A complete description is provided - in the - BIND 9 Administrator Reference Manual. -

- -

- named inherits the umask - (file creation mode mask) from the parent process. If files - created by named, such as journal files, - need to have custom permissions, the umask - should be set explicitly in the script used to start the - named process. -

- -
- -
-

FILES

- - -
-
/etc/named.conf
-
-

- The default configuration file. -

-
-
/var/run/named/named.pid
-
-

- The default process-id file. -

-
-
- -
- -
-

SEE ALSO

- -

RFC 1033, - RFC 1034, - RFC 1035, - - named-checkconf - (8) - , - - named-checkzone - (8) - , - - rndc - (8) - , - - named.conf - (5) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.nsec3hash.html b/doc/arm/man.nsec3hash.html deleted file mode 100644 index 98c514fa15..0000000000 --- a/doc/arm/man.nsec3hash.html +++ /dev/null @@ -1,160 +0,0 @@ - - - - - -nsec3hash - - - - - - - - -
-
- - - - - -
-

Name

-

- nsec3hash - — generate NSEC3 hash -

-
- - - -
-

Synopsis

-

- nsec3hash - {salt} - {algorithm} - {iterations} - {domain} -

-

- nsec3hash -r - {algorithm} - {flags} - {iterations} - {salt} - {domain} -

-
- -
-

DESCRIPTION

- -

- nsec3hash generates an NSEC3 hash based on - a set of NSEC3 parameters. This can be used to check the validity - of NSEC3 records in a signed zone. -

- -

- If this command is invoked as nsec3hash -r, - it takes arguments in an order matching the first four fields - of an NSEC3 record, followed by the domain name: algorithm, flags, - iterations, salt, domain. This makes it convenient to copy and - paste a portion of an NSEC3 or NSEC3PARAM record into a command - line to confirm the correctness of an NSEC3 hash. -

- -
- -
-

ARGUMENTS

- -
-
salt
-
-

- The salt provided to the hash algorithm. -

-
-
algorithm
-
-

- A number indicating the hash algorithm. Currently the - only supported hash algorithm for NSEC3 is SHA-1, which is - indicated by the number 1; consequently "1" is the only - useful value for this argument. -

-
-
flags
-
-

- Provided for compatibility with NSEC3 record presentation - format, but ignored since the flags do not affect the hash. -

-
-
iterations
-
-

- The number of additional times the hash should be performed. -

-
-
domain
-
-

- The domain name to be hashed. -

-
-
-
- -
-

SEE ALSO

- -

- BIND 9 Administrator Reference Manual, - RFC 5155. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.nslookup.html b/doc/arm/man.nslookup.html deleted file mode 100644 index 55ed84d0aa..0000000000 --- a/doc/arm/man.nslookup.html +++ /dev/null @@ -1,448 +0,0 @@ - - - - - -nslookup - - - - - - - - -
-
- - - - - -
-

Name

-

- nslookup - — query Internet name servers interactively -

-
- - - -
-

Synopsis

-

- nslookup - [-option] - [name | -] - [server] -

-
- -
-

DESCRIPTION

- -

Nslookup - is a program to query Internet domain name servers. Nslookup - has two modes: interactive and non-interactive. Interactive mode allows - the user to query name servers for information about various hosts and - domains or to print a list of hosts in a domain. Non-interactive mode - is - used to print just the name and requested information for a host or - domain. -

-
- -
-

ARGUMENTS

- -

- Interactive mode is entered in the following cases: -

-
    -
  1. -

    - when no arguments are given (the default name server will be used) -

    -
  2. -
  3. -

    - when the first argument is a hyphen (-) and the second argument is - the host name or Internet address of a name server. -

    -
  4. -
-

-

- -

- Non-interactive mode is used when the name or Internet address of the - host to be looked up is given as the first argument. The optional second - argument specifies the host name or address of a name server. -

- -

- Options can also be specified on the command line if they precede the - arguments and are prefixed with a hyphen. For example, to - change the default query type to host information, and the initial - timeout to 10 seconds, type: - -

-
-nslookup -query=hinfo  -timeout=10
-
-

- -

-

- The -version option causes - nslookup to print the version - number and immediately exits. -

- -
- -
-

INTERACTIVE COMMANDS

- -
-
host [server]
-
-

- Look up information for host using the current default server or - using server, if specified. If host is an Internet address and - the query type is A or PTR, the name of the host is returned. - If host is a name and does not have a trailing period, the - search list is used to qualify the name. -

- -

- To look up a host not in the current domain, append a period to - the name. -

-
-
server domain
-
-

-
-
lserver domain
-
-

- Change the default server to domain; lserver uses the initial - server to look up information about domain, while server uses - the current default server. If an authoritative answer can't be - found, the names of servers that might have the answer are - returned. -

-
-
root
-
-

- not implemented -

-
-
finger
-
-

- not implemented -

-
-
ls
-
-

- not implemented -

-
-
view
-
-

- not implemented -

-
-
help
-
-

- not implemented -

-
-
?
-
-

- not implemented -

-
-
exit
-
-

- Exits the program. -

-
-
set - keyword[=value]
-
-

- This command is used to change state information that affects - the lookups. Valid keywords are: -

-
-
all
-
-

- Prints the current values of the frequently used - options to set. - Information about the current default - server and host is also printed. -

-
-
class=value
-
-

- Change the query class to one of: -

-
-
IN
-
-

- the Internet class -

-
-
CH
-
-

- the Chaos class -

-
-
HS
-
-

- the Hesiod class -

-
-
ANY
-
-

- wildcard -

-
-
-

- The class specifies the protocol group of the information. - -

-

- (Default = IN; abbreviation = cl) -

-
-
[no]debug
-
-

- Turn on or off the display of the full response packet and - any intermediate response packets when searching. -

-

- (Default = nodebug; abbreviation = [no]deb) -

-
-
[no]d2
-
-

- Turn debugging mode on or off. This displays more about - what nslookup is doing. -

-

- (Default = nod2) -

-
-
domain=name
-
-

- Sets the search list to name. -

-
-
[no]search
-
-

- If the lookup request contains at least one period but - doesn't end with a trailing period, append the domain - names in the domain search list to the request until an - answer is received. -

-

- (Default = search) -

-
-
port=value
-
-

- Change the default TCP/UDP name server port to value. -

-

- (Default = 53; abbreviation = po) -

-
-
querytype=value
-
-

-
-
type=value
-
-

- Change the type of the information query. -

-

- (Default = A and then AAAA; abbreviations = q, ty) -

-

- Note: It is - only possible to specify one query type, only - the default behavior looks up both when an - alternative is not specified. -

-
-
[no]recurse
-
-

- Tell the name server to query other servers if it does not - have the - information. -

-

- (Default = recurse; abbreviation = [no]rec) -

-
-
ndots=number
-
-

- Set the number of dots (label separators) in a domain - that will disable searching. Absolute names always - stop searching. -

-
-
retry=number
-
-

- Set the number of retries to number. -

-
-
timeout=number
-
-

- Change the initial timeout interval for waiting for a - reply to number seconds. -

-
-
[no]vc
-
-

- Always use a virtual circuit when sending requests to the - server. -

-

- (Default = novc) -

-
-
[no]fail
-
-

- Try the next nameserver if a nameserver responds with - SERVFAIL or a referral (nofail) or terminate query - (fail) on such a response. -

-

- (Default = nofail) -

-
-
-

-

-
-
-
- -
-

RETURN VALUES

-

- nslookup returns with an exit status of 1 - if any query failed, and 0 otherwise. -

-
- -
-

IDN SUPPORT

- -

- If nslookup has been built with IDN (internationalized - domain name) support, it can accept and display non-ASCII domain names. - nslookup appropriately converts character encoding of - domain name before sending a request to DNS server or displaying a - reply from the server. - If you'd like to turn off the IDN support for some reason, define - the IDN_DISABLE environment variable. - The IDN support is disabled if the variable is set when - nslookup runs or when the standard output is not - a tty. -

-
- -
-

FILES

- -

/etc/resolv.conf -

-
- -
-

SEE ALSO

- -

- dig(1) - , - - host(1) - , - - named(8) - . -

-
-
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.nsupdate.html b/doc/arm/man.nsupdate.html deleted file mode 100644 index 37cb94d42f..0000000000 --- a/doc/arm/man.nsupdate.html +++ /dev/null @@ -1,823 +0,0 @@ - - - - - -nsupdate - - - - - - - - -
-
- - - - -
-

Name

-

- nsupdate - — Dynamic DNS update utility -

-
- - - -
-

Synopsis

-

- nsupdate - [-d] - [-D] - [-i] - [-L level] - [ - [-g] - | [-o] - | [-l] - | [-y [hmac:]keyname:secret] - | [-k keyfile] - ] - [-t timeout] - [-u udptimeout] - [-r udpretries] - [-v] - [-T] - [-P] - [-V] - [ - [-4] - | [-6] - ] - [filename] -

-
- -
-

DESCRIPTION

- -

nsupdate - is used to submit Dynamic DNS Update requests as defined in RFC 2136 - to a name server. - This allows resource records to be added or removed from a zone - without manually editing the zone file. - A single update request can contain requests to add or remove more than - one - resource record. -

-

- Zones that are under dynamic control via - nsupdate - or a DHCP server should not be edited by hand. - Manual edits could - conflict with dynamic updates and cause data to be lost. -

-

- The resource records that are dynamically added or removed with - nsupdate - have to be in the same zone. - Requests are sent to the zone's master server. - This is identified by the MNAME field of the zone's SOA record. -

-

- Transaction signatures can be used to authenticate the Dynamic - DNS updates. These use the TSIG resource record type described - in RFC 2845 or the SIG(0) record described in RFC 2535 and - RFC 2931 or GSS-TSIG as described in RFC 3645. -

-

- TSIG relies on - a shared secret that should only be known to - nsupdate and the name server. - For instance, suitable key and - server statements would be added to - /etc/named.conf so that the name server - can associate the appropriate secret key and algorithm with - the IP address of the client application that will be using - TSIG authentication. You can use ddns-confgen - to generate suitable configuration fragments. - nsupdate - uses the -y or -k options - to provide the TSIG shared secret. These options are mutually exclusive. -

-

- SIG(0) uses public key cryptography. - To use a SIG(0) key, the public key must be stored in a KEY - record in a zone served by the name server. -

-

- GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode - is switched on with the -g flag. A - non-standards-compliant variant of GSS-TSIG used by Windows - 2000 can be switched on with the -o flag. -

-
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only. -

-
-
-6
-
-

- Use IPv6 only. -

-
-
-d
-
-

- Debug mode. This provides tracing information about the - update requests that are made and the replies received - from the name server. -

-
-
-D
-
-

- Extra debug mode. -

-
-
-i
-
-

- Force interactive mode, even when standard input is not a terminal. -

-
-
-k keyfile
-
-

- The file containing the TSIG authentication key. - Keyfiles may be in two formats: a single file containing - a named.conf-format key - statement, which may be generated automatically by - ddns-confgen, or a pair of files whose names are - of the format K{name}.+157.+{random}.key and - K{name}.+157.+{random}.private, which can be - generated by dnssec-keygen. - The -k may also be used to specify a SIG(0) key used - to authenticate Dynamic DNS update requests. In this case, the key - specified is not an HMAC-MD5 key. -

-
-
-l
-
-

- Local-host only mode. This sets the server address to - localhost (disabling the server so that the server - address cannot be overridden). Connections to the local server will - use a TSIG key found in /var/run/named/session.key, - which is automatically generated by named if any - local master zone has set update-policy to - local. The location of this key file can be - overridden with the -k option. -

-
-
-L level
-
-

- Set the logging debug level. If zero, logging is disabled. -

-
-
-p port
-
-

- Set the port to use for connections to a name server. The - default is 53. -

-
-
-P
-
-

- Print the list of private BIND-specific resource record - types whose format is understood - by nsupdate. See also - the -T option. -

-
-
-r udpretries
-
-

- The number of UDP retries. The default is 3. If zero, only - one update request will be made. -

-
-
-t timeout
-
-

- The maximum time an update request can take before it is - aborted. The default is 300 seconds. Zero can be used to - disable the timeout. -

-
-
-T
-
-

- Print the list of IANA standard resource record types - whose format is understood by nsupdate. - nsupdate will exit after the lists are - printed. The -T option can be combined - with the -P option. -

-

- Other types can be entered using "TYPEXXXXX" where "XXXXX" is the - decimal value of the type with no leading zeros. The rdata, - if present, will be parsed using the UNKNOWN rdata format, - (<backslash> <hash> <space> <length> - <space> <hexstring>). -

-
-
-u udptimeout
-
-

- The UDP retry interval. The default is 3 seconds. If zero, - the interval will be computed from the timeout interval and - number of UDP retries. -

-
-
-v
-
-

- Use TCP even for small update requests. - By default, nsupdate - uses UDP to send update requests to the name server unless they are too - large to fit in a UDP request in which case TCP will be used. - TCP may be preferable when a batch of update requests is made. -

-
-
-V
-
-

- Print the version number and exit. -

-
-
-y [hmac:]keyname:secret
-
-

- Literal TSIG authentication key. - keyname is the name of the key, and - secret is the base64 encoded shared secret. - hmac is the name of the key algorithm; - valid choices are hmac-md5, - hmac-sha1, hmac-sha224, - hmac-sha256, hmac-sha384, or - hmac-sha512. If hmac - is not specified, the default is hmac-md5 - or if MD5 was disabled hmac-sha256. -

-

- NOTE: Use of the -y option is discouraged because the - shared secret is supplied as a command line argument in clear text. - This may be visible in the output from - - ps(1) - - or in a history file maintained by the user's shell. -

-
-
-
- -
-

INPUT FORMAT

- -

nsupdate - reads input from - filename - or standard input. - Each command is supplied on exactly one line of input. - Some commands are for administrative purposes. - The others are either update instructions or prerequisite checks on the - contents of the zone. - These checks set conditions that some name or set of - resource records (RRset) either exists or is absent from the zone. - These conditions must be met if the entire update request is to succeed. - Updates will be rejected if the tests for the prerequisite conditions - fail. -

-

- Every update request consists of zero or more prerequisites - and zero or more updates. - This allows a suitably authenticated update request to proceed if some - specified resource records are present or missing from the zone. - A blank input line (or the send command) - causes the - accumulated commands to be sent as one Dynamic DNS update request to the - name server. -

-

- The command formats and their meaning are as follows: -

-
-
- server - {servername} - [port] -
-
-

- Sends all dynamic update requests to the name server - servername. - When no server statement is provided, - nsupdate - will send updates to the master server of the correct zone. - The MNAME field of that zone's SOA record will identify the - master - server for that zone. - port - is the port number on - servername - where the dynamic update requests get sent. - If no port number is specified, the default DNS port number of - 53 is - used. -

-
-
- local - {address} - [port] -
-
-

- Sends all dynamic update requests using the local - address. - - When no local statement is provided, - nsupdate - will send updates using an address and port chosen by the - system. - port - can additionally be used to make requests come from a specific - port. - If no port number is specified, the system will assign one. -

-
-
- zone - {zonename} -
-
-

- Specifies that all updates are to be made to the zone - zonename. - If no - zone - statement is provided, - nsupdate - will attempt determine the correct zone to update based on the - rest of the input. -

-
-
- class - {classname} -
-
-

- Specify the default class. - If no class is specified, the - default class is - IN. -

-
-
- ttl - {seconds} -
-
-

- Specify the default time to live for records to be added. - The value none will clear the default - ttl. -

-
-
- key - [hmac:] {keyname} - {secret} -
-
-

- Specifies that all updates are to be TSIG-signed using the - keyname secret pair. - If hmac is specified, then it sets the - signing algorithm in use; the default is - hmac-md5 or if MD5 was disabled - hmac-sha256. The key - command overrides any key specified on the command line via - -y or -k. -

-
-
- gsstsig -
-
-

- Use GSS-TSIG to sign the updated. This is equivalent to - specifying -g on the command line. -

-
-
- oldgsstsig -
-
-

- Use the Windows 2000 version of GSS-TSIG to sign the updated. - This is equivalent to specifying -o on the - command line. -

-
-
- realm - {[realm_name]} -
-
-

- When using GSS-TSIG use realm_name rather - than the default realm in krb5.conf. If no - realm is specified the saved realm is cleared. -

-
-
- check-names - {[yes_or_no]} -
-
-

- Turn on or off check-names processing on records to - be added. Check-names has no effect on prerequisites - or records to be deleted. By default check-names - processing is on. If check-names processing fails - the record will not be added to the UPDATE message. -

-
-
- [prereq] nxdomain - {domain-name} -
-
-

- Requires that no resource record of any type exists with name - domain-name. -

-
-
- [prereq] yxdomain - {domain-name} -
-
-

- Requires that - domain-name - exists (has as at least one resource record, of any type). -

-
-
- [prereq] nxrrset - {domain-name} - [class] - {type} -
-
-

- Requires that no resource record exists of the specified - type, - class - and - domain-name. - If - class - is omitted, IN (internet) is assumed. -

-
-
- [prereq] yxrrset - {domain-name} - [class] - {type} -
-
-

- This requires that a resource record of the specified - type, - class - and - domain-name - must exist. - If - class - is omitted, IN (internet) is assumed. -

-
-
- [prereq] yxrrset - {domain-name} - [class] - {type} - {data...} -
-
-

- The - data - from each set of prerequisites of this form - sharing a common - type, - class, - and - domain-name - are combined to form a set of RRs. This set of RRs must - exactly match the set of RRs existing in the zone at the - given - type, - class, - and - domain-name. - The - data - are written in the standard text representation of the resource - record's - RDATA. -

-
-
- [update] del[ete] - {domain-name} - [ttl] - [class] - [type [data...]] -
-
-

- Deletes any resource records named - domain-name. - If - type - and - data - is provided, only matching resource records will be removed. - The internet class is assumed if - class - is not supplied. The - ttl - is ignored, and is only allowed for compatibility. -

-
-
- [update] add - {domain-name} - {ttl} - [class] - {type} - {data...} -
-
-

- Adds a new resource record with the specified - ttl, - class - and - data. -

-
-
- show -
-
-

- Displays the current message, containing all of the - prerequisites and - updates specified since the last send. -

-
-
- send -
-
-

- Sends the current message. This is equivalent to entering a - blank line. -

-
-
- answer -
-
-

- Displays the answer. -

-
-
- debug -
-
-

- Turn on debugging. -

-
-
- version -
-
-

- Print version number. -

-
-
- help -
-
-

- Print a list of commands. -

-
-
-

-

- -

- Lines beginning with a semicolon are comments and are ignored. -

- -
- -
-

EXAMPLES

- -

- The examples below show how - nsupdate - could be used to insert and delete resource records from the - example.com - zone. - Notice that the input in each example contains a trailing blank line so - that - a group of commands are sent as one dynamic update request to the - master name server for - example.com. - -

-
-# nsupdate
-> update delete oldhost.example.com A
-> update add newhost.example.com 86400 A 172.16.1.1
-> send
-
-

-

-

- Any A records for - oldhost.example.com - are deleted. - And an A record for - newhost.example.com - with IP address 172.16.1.1 is added. - The newly-added record has a 1 day TTL (86400 seconds). -

-
-# nsupdate
-> prereq nxdomain nickname.example.com
-> update add nickname.example.com 86400 CNAME somehost.example.com
-> send
-
-

-

-

- The prerequisite condition gets the name server to check that there - are no resource records of any type for - nickname.example.com. - - If there are, the update request fails. - If this name does not exist, a CNAME for it is added. - This ensures that when the CNAME is added, it cannot conflict with the - long-standing rule in RFC 1034 that a name must not exist as any other - record type if it exists as a CNAME. - (The rule has been updated for DNSSEC in RFC 2535 to allow CNAMEs to have - RRSIG, DNSKEY and NSEC records.) -

-
- -
-

FILES

- - -
-
/etc/resolv.conf
-
-

- used to identify default name server -

-
-
/var/run/named/session.key
-
-

- sets the default TSIG key for use in local-only mode -

-
-
K{name}.+157.+{random}.key
-
-

- base-64 encoding of HMAC-MD5 key created by - - dnssec-keygen(8) - . -

-
-
K{name}.+157.+{random}.private
-
-

- base-64 encoding of HMAC-MD5 key created by - - dnssec-keygen(8) - . -

-
-
-
- -
-

SEE ALSO

- -

- RFC 2136, - RFC 3007, - RFC 2104, - RFC 2845, - RFC 1034, - RFC 2535, - RFC 2931, - - named(8) - , - - ddns-confgen(8) - , - - dnssec-keygen(8) - . -

-
- -
-

BUGS

- -

- The TSIG key is redundantly stored in two separate files. - This is a consequence of nsupdate using the DST library - for its cryptographic operations, and may change in future - releases. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.pkcs11-destroy.html b/doc/arm/man.pkcs11-destroy.html deleted file mode 100644 index b2cd17ea5e..0000000000 --- a/doc/arm/man.pkcs11-destroy.html +++ /dev/null @@ -1,167 +0,0 @@ - - - - - -pkcs11-destroy - - - - - - - - -
-
- - - - - -
-

Name

-

- pkcs11-destroy - — destroy PKCS#11 objects -

-
- - - -
-

Synopsis

-

- pkcs11-destroy - [-m module] - [-s slot] - { - -i ID - | -l label - } - [-p PIN] - [-w seconds] -

-
- -
-

DESCRIPTION

- -

- pkcs11-destroy destroys keys stored in a - PKCS#11 device, identified by their ID or - label. -

-

- Matching keys are displayed before being destroyed. By default, - there is a five second delay to allow the user to interrupt the - process before the destruction takes place. -

-
- -
-

ARGUMENTS

- -
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-s slot
-
-

- Open the session with the given PKCS#11 slot. The default is - slot 0. -

-
-
-i ID
-
-

- Destroy keys with the given object ID. -

-
-
-l label
-
-

- Destroy keys with the given label. -

-
-
-p PIN
-
-

- Specify the PIN for the device. If no PIN is provided on the - command line, pkcs11-destroy will prompt for it. -

-
-
-w seconds
-
-

- Specify how long to pause before carrying out key destruction. - The default is five seconds. If set to 0, - destruction will be immediate. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-keygen(8) - , - - pkcs11-list(8) - , - - pkcs11-tokens(8) - -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.pkcs11-keygen.html b/doc/arm/man.pkcs11-keygen.html deleted file mode 100644 index 46e0539413..0000000000 --- a/doc/arm/man.pkcs11-keygen.html +++ /dev/null @@ -1,205 +0,0 @@ - - - - - -pkcs11-keygen - - - - - - - - -
-
- - - - - -
-

Name

-

- pkcs11-keygen - — generate keys on a PKCS#11 device -

-
- - - -
-

Synopsis

-

- pkcs11-keygen - {-a algorithm} - [-b keysize] - [-e] - [-i id] - [-m module] - [-P] - [-p PIN] - [-q] - [-S] - [-s slot] - {label} -

-
- -
-

DESCRIPTION

- -

- pkcs11-keygen causes a PKCS#11 device to generate - a new key pair with the given label (which must be - unique) and with keysize bits of prime. -

-
- -
-

ARGUMENTS

- -
-
-a algorithm
-
-

- Specify the key algorithm class: Supported classes are RSA, - DSA, DH, ECC and ECX. In addition to these strings, the - algorithm can be specified as a DNSSEC - signing algorithm that will be used with this key; for - example, NSEC3RSASHA1 maps to RSA, ECDSAP256SHA256 maps - to ECC, and ED25519 to ECX. The default class is "RSA". -

-
-
-b keysize
-
-

- Create the key pair with keysize bits of - prime. For ECC keys, the only valid values are 256 and 384, - and the default is 256. For ECX kyes, the only valid values - are 256 and 456, and the default is 256. -

-
-
-e
-
-

- For RSA keys only, use a large exponent. -

-
-
-i id
-
-

- Create key objects with id. The id is either - an unsigned short 2 byte or an unsigned long 4 byte number. -

-
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-P
-
-

- Set the new private key to be non-sensitive and extractable. - The allows the private key data to be read from the PKCS#11 - device. The default is for private keys to be sensitive and - non-extractable. -

-
-
-p PIN
-
-

- Specify the PIN for the device. If no PIN is provided on - the command line, pkcs11-keygen will - prompt for it. -

-
-
-q
-
-

- Quiet mode: suppress unnecessary output. -

-
-
-S
-
-

- For Diffie-Hellman (DH) keys only, use a special prime of - 768, 1024 or 1536 bit size and base (aka generator) 2. - If not specified, bit size will default to 1024. -

-
-
-s slot
-
-

- Open the session with the given PKCS#11 slot. The default is - slot 0. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-destroy(8) - , - - pkcs11-list(8) - , - - pkcs11-tokens(8) - , - - dnssec-keyfromlabel(8) - -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.pkcs11-list.html b/doc/arm/man.pkcs11-list.html deleted file mode 100644 index 70193a1337..0000000000 --- a/doc/arm/man.pkcs11-list.html +++ /dev/null @@ -1,163 +0,0 @@ - - - - - -pkcs11-list - - - - - - - - -
-
- - - - - -
-

Name

-

- pkcs11-list - — list PKCS#11 objects -

-
- - - -
-

Synopsis

-

- pkcs11-list - [-P] - [-m module] - [-s slot] - [-i ID] - [-l label] - [-p PIN] -

-
- -
-

DESCRIPTION

- -

- pkcs11-list - lists the PKCS#11 objects with ID or - label or by default all objects. - The object class, label, and ID are displayed for all - keys. For private or secret keys, the extractability - attribute is also displayed, as either true, - false, or never. -

-
- -
-

ARGUMENTS

- -
-
-P
-
-

- List only the public objects. (Note that on some PKCS#11 - devices, all objects are private.) -

-
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-s slot
-
-

- Open the session with the given PKCS#11 slot. The default is - slot 0. -

-
-
-i ID
-
-

- List only key objects with the given object ID. -

-
-
-l label
-
-

- List only key objects with the given label. -

-
-
-p PIN
-
-

- Specify the PIN for the device. If no PIN is provided on the - command line, pkcs11-list will prompt for it. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-destroy(8) - , - - pkcs11-keygen(8) - , - - pkcs11-tokens(8) - -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.pkcs11-tokens.html b/doc/arm/man.pkcs11-tokens.html deleted file mode 100644 index 60d0ac6003..0000000000 --- a/doc/arm/man.pkcs11-tokens.html +++ /dev/null @@ -1,128 +0,0 @@ - - - - - -pkcs11-tokens - - - - - - - - -
-
- - - - - -
-

Name

-

- pkcs11-tokens - — list PKCS#11 available tokens -

-
- - - -
-

Synopsis

-

- pkcs11-tokens - [-m module] - [-v] -

-
- -
-

DESCRIPTION

- -

- pkcs11-tokens - lists the PKCS#11 available tokens with defaults from the slot/token - scan performed at application initialization. -

-
- -
-

ARGUMENTS

- -
-
-m module
-
-

- Specify the PKCS#11 provider module. This must be the full - path to a shared library object implementing the PKCS#11 API - for the device. -

-
-
-v
-
-

- Make the PKCS#11 libisc initialization verbose. -

-
-
-
- -
-

SEE ALSO

- -

- - pkcs11-destroy(8) - , - - pkcs11-keygen(8) - , - - pkcs11-list(8) - -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.rndc-confgen.html b/doc/arm/man.rndc-confgen.html deleted file mode 100644 index c11d2dce0f..0000000000 --- a/doc/arm/man.rndc-confgen.html +++ /dev/null @@ -1,265 +0,0 @@ - - - - - -rndc-confgen - - - - - - - - -
-
- - - - - -
-

Name

-

- rndc-confgen - — rndc key generation tool -

-
- - - -
-

Synopsis

-

- rndc-confgen - [-a] - [-A algorithm] - [-b keysize] - [-c keyfile] - [-h] - [-k keyname] - [-p port] - [-s address] - [-t chrootdir] - [-u user] -

-
- -
-

DESCRIPTION

- -

rndc-confgen - generates configuration files - for rndc. It can be used as a - convenient alternative to writing the - rndc.conf file - and the corresponding controls - and key - statements in named.conf by hand. - Alternatively, it can be run with the -a - option to set up a rndc.key file and - avoid the need for a rndc.conf file - and a controls statement altogether. -

- -
- -
-

OPTIONS

- - -
-
-a
-
-

- Do automatic rndc configuration. - This creates a file rndc.key - in /etc (or whatever - sysconfdir - was specified as when BIND was - built) - that is read by both rndc - and named on startup. The - rndc.key file defines a default - command channel and authentication key allowing - rndc to communicate with - named on the local host - with no further configuration. -

-

- Running rndc-confgen -a allows - BIND 9 and rndc to be used as - drop-in - replacements for BIND 8 and ndc, - with no changes to the existing BIND 8 - named.conf file. -

-

- If a more elaborate configuration than that - generated by rndc-confgen -a - is required, for example if rndc is to be used remotely, - you should run rndc-confgen without - the - -a option and set up a - rndc.conf and - named.conf - as directed. -

-
-
-A algorithm
-
-

- Specifies the algorithm to use for the TSIG key. Available - choices are: hmac-md5, hmac-sha1, hmac-sha224, hmac-sha256, - hmac-sha384 and hmac-sha512. The default is hmac-sha256. -

-
-
-b keysize
-
-

- Specifies the size of the authentication key in bits. - Must be between 1 and 512 bits; the default is the - hash size. -

-
-
-c keyfile
-
-

- Used with the -a option to specify - an alternate location for rndc.key. -

-
-
-h
-
-

- Prints a short summary of the options and arguments to - rndc-confgen. -

-
-
-k keyname
-
-

- Specifies the key name of the rndc authentication key. - This must be a valid domain name. - The default is rndc-key. -

-
-
-p port
-
-

- Specifies the command channel port where named - listens for connections from rndc. - The default is 953. -

-
-
-s address
-
-

- Specifies the IP address where named - listens for command channel connections from - rndc. The default is the loopback - address 127.0.0.1. -

-
-
-t chrootdir
-
-

- Used with the -a option to specify - a directory where named will run - chrooted. An additional copy of the rndc.key - will be written relative to this directory so that - it will be found by the chrooted named. -

-
-
-u user
-
-

- Used with the -a option to set the - owner - of the rndc.key file generated. - If - -t is also specified only the file - in - the chroot area has its owner changed. -

-
-
-
- -
-

EXAMPLES

- -

- To allow rndc to be used with - no manual configuration, run -

-

rndc-confgen -a -

-

- To print a sample rndc.conf file and - corresponding controls and key - statements to be manually inserted into named.conf, - run -

-

rndc-confgen -

-
- -
-

SEE ALSO

- -

- rndc(8) - , - - rndc.conf(5) - , - - named(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.rndc.conf.html b/doc/arm/man.rndc.conf.html deleted file mode 100644 index c663b8b93b..0000000000 --- a/doc/arm/man.rndc.conf.html +++ /dev/null @@ -1,273 +0,0 @@ - - - - - -rndc.conf - - - - - - - - -
-
- - - - - -
-

Name

-

- rndc.conf - — rndc configuration file -

-
- - - -
-

Synopsis

-

- rndc.conf -

-
- -
-

DESCRIPTION

- -

rndc.conf is the configuration file - for rndc, the BIND 9 name server control - utility. This file has a similar structure and syntax to - named.conf. Statements are enclosed - in braces and terminated with a semi-colon. Clauses in - the statements are also semi-colon terminated. The usual - comment styles are supported: -

-

- C style: /* */ -

-

- C++ style: // to end of line -

-

- Unix style: # to end of line -

-

rndc.conf is much simpler than - named.conf. The file uses three - statements: an options statement, a server statement - and a key statement. -

-

- The options statement contains five clauses. - The default-server clause is followed by the - name or address of a name server. This host will be used when - no name server is given as an argument to - rndc. The default-key - clause is followed by the name of a key which is identified by - a key statement. If no - keyid is provided on the rndc command line, - and no key clause is found in a matching - server statement, this default key will be - used to authenticate the server's commands and responses. The - default-port clause is followed by the port - to connect to on the remote name server. If no - port option is provided on the rndc command - line, and no port clause is found in a - matching server statement, this default port - will be used to connect. - The default-source-address and - default-source-address-v6 clauses which - can be used to set the IPv4 and IPv6 source addresses - respectively. -

-

- After the server keyword, the server - statement includes a string which is the hostname or address - for a name server. The statement has three possible clauses: - key, port and - addresses. The key name must match the - name of a key statement in the file. The port number - specifies the port to connect to. If an addresses - clause is supplied these addresses will be used instead of - the server name. Each address can take an optional port. - If an source-address or source-address-v6 - of supplied then these will be used to specify the IPv4 and IPv6 - source addresses respectively. -

-

- The key statement begins with an identifying - string, the name of the key. The statement has two clauses. - algorithm identifies the authentication algorithm - for rndc to use; currently only HMAC-MD5 - (for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 - (default), HMAC-SHA384 and HMAC-SHA512 are - supported. This is followed by a secret clause which contains - the base-64 encoding of the algorithm's authentication key. The - base-64 string is enclosed in double quotes. -

-

- There are two common ways to generate the base-64 string for the - secret. The BIND 9 program rndc-confgen - can - be used to generate a random key, or the - mmencode program, also known as - mimencode, can be used to generate a - base-64 - string from known input. mmencode does - not - ship with BIND 9 but is available on many systems. See the - EXAMPLE section for sample command lines for each. -

-
- -
-

EXAMPLE

- - -
-      options {
-        default-server  localhost;
-        default-key     samplekey;
-      };
-
-

-

-
-      server localhost {
-        key             samplekey;
-      };
-
-

-

-
-      server testserver {
-        key		testkey;
-        addresses	{ localhost port 5353; };
-      };
-
-

-

-
-      key samplekey {
-        algorithm       hmac-sha256;
-        secret          "6FMfj43Osz4lyb24OIe2iGEz9lf1llJO+lz";
-      };
-
-

-

-
-      key testkey {
-        algorithm	hmac-sha256;
-        secret		"R3HI8P6BKw9ZwXwN3VZKuQ==";
-      };
-    
-

-

- -

- In the above example, rndc will by - default use - the server at localhost (127.0.0.1) and the key called samplekey. - Commands to the localhost server will use the samplekey key, which - must also be defined in the server's configuration file with the - same name and secret. The key statement indicates that samplekey - uses the HMAC-SHA256 algorithm and its secret clause contains the - base-64 encoding of the HMAC-SHA256 secret enclosed in double quotes. -

-

- If rndc -s testserver is used then rndc will - connect to server on localhost port 5353 using the key testkey. -

-

- To generate a random secret with rndc-confgen: -

-

rndc-confgen -

-

- A complete rndc.conf file, including - the - randomly generated key, will be written to the standard - output. Commented-out key and - controls statements for - named.conf are also printed. -

-

- To generate a base-64 secret with mmencode: -

-

echo "known plaintext for a secret" | mmencode -

-
- -
-

NAME SERVER CONFIGURATION

- -

- The name server must be configured to accept rndc connections and - to recognize the key specified in the rndc.conf - file, using the controls statement in named.conf. - See the sections on the controls statement in the - BIND 9 Administrator Reference Manual for details. -

-
- -
-

SEE ALSO

- -

- rndc(8) - , - - rndc-confgen(8) - , - - mmencode(1) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/man.rndc.html b/doc/arm/man.rndc.html deleted file mode 100644 index eb342989f5..0000000000 --- a/doc/arm/man.rndc.html +++ /dev/null @@ -1,1026 +0,0 @@ - - - - - -rndc - - - - - - - -
-
- - - - - -
-

Name

-

- rndc - — name server control utility -

-
- - - -
-

Synopsis

-

- rndc - [-b source-address] - [-c config-file] - [-k key-file] - [-s server] - [-p port] - [-q] - [-r] - [-V] - [-y key_id] - [ - [-4] - | [-6] - ] - {command} -

-
- -
-

DESCRIPTION

- -

rndc - controls the operation of a name - server. It supersedes the ndc utility - that was provided in old BIND releases. If - rndc is invoked with no command line - options or arguments, it prints a short summary of the - supported commands and the available options and their - arguments. -

-

rndc - communicates with the name server over a TCP connection, sending - commands authenticated with digital signatures. In the current - versions of - rndc and named, - the only supported authentication algorithms are HMAC-MD5 - (for compatibility), HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 - (default), HMAC-SHA384 and HMAC-SHA512. - They use a shared secret on each end of the connection. - This provides TSIG-style authentication for the command - request and the name server's response. All commands sent - over the channel must be signed by a key_id known to the - server. -

-

rndc - reads a configuration file to - determine how to contact the name server and decide what - algorithm and key it should use. -

-
- -
-

OPTIONS

- - -
-
-4
-
-

- Use IPv4 only. -

-
-
-6
-
-

- Use IPv6 only. -

-
-
-b source-address
-
-

- Use source-address - as the source address for the connection to the server. - Multiple instances are permitted to allow setting of both - the IPv4 and IPv6 source addresses. -

-
-
-c config-file
-
-

- Use config-file - as the configuration file instead of the default, - /etc/rndc.conf. -

-
-
-k key-file
-
-

- Use key-file - as the key file instead of the default, - /etc/rndc.key. The key in - /etc/rndc.key will be used to - authenticate - commands sent to the server if the config-file - does not exist. -

-
-
-s server
-
-

server is - the name or address of the server which matches a - server statement in the configuration file for - rndc. If no server is supplied on the - command line, the host named by the default-server clause - in the options statement of the rndc - configuration file will be used. -

-
-
-p port
-
-

- Send commands to TCP port - port - instead - of BIND 9's default control channel port, 953. -

-
-
-q
-
-

- Quiet mode: Message text returned by the server - will not be printed except when there is an error. -

-
-
-r
-
-

- Instructs rndc to print the result code - returned by named after executing the - requested command (e.g., ISC_R_SUCCESS, ISC_R_FAILURE, etc). -

-
-
-V
-
-

- Enable verbose logging. -

-
-
-y key_id
-
-

- Use the key key_id - from the configuration file. - key_id - must be - known by named with the same algorithm and secret string - in order for control message validation to succeed. - If no key_id - is specified, rndc will first look - for a key clause in the server statement of the server - being used, or if no server statement is present for that - host, then the default-key clause of the options statement. - Note that the configuration file contains shared secrets - which are used to send authenticated control commands - to name servers. It should therefore not have general read - or write access. -

-
-
-
- -
-

COMMANDS

- -

- A list of commands supported by rndc can - be seen by running rndc without arguments. -

-

- Currently supported commands are: -

- -
-
addzone zone [class [view]] configuration
-
-

- Add a zone while the server is running. This - command requires the - allow-new-zones option to be set - to yes. The - configuration string - specified on the command line is the zone - configuration text that would ordinarily be - placed in named.conf. -

-

- The configuration is saved in a file called - viewname.nzf - (or, if named is compiled with - liblmdb, an LMDB database file called - viewname.nzd). - viewname is the - name of the view, unless the view name contains characters - that are incompatible with use as a file name, in which case - a cryptographic hash of the view name is used instead. - When named is - restarted, the file will be loaded into the view - configuration, so that zones that were added - can persist after a restart. -

-

- This sample addzone command - would add the zone example.com - to the default view: -

-

-$ rndc addzone example.com '{ type master; file "example.com.db"; };' -

-

- (Note the brackets and semi-colon around the zone - configuration text.) -

-

- See also rndc delzone and rndc modzone. -

-
-
delzone [-clean] zone [class [view]]
-
-

- Delete a zone while the server is running. -

-

- If the -clean argument is specified, - the zone's master file (and journal file, if any) - will be deleted along with the zone. Without the - -clean option, zone files must - be cleaned up by hand. (If the zone is of - type "slave" or "stub", the files needing to - be cleaned up will be reported in the output - of the rndc delzone command.) -

-

- If the zone was originally added via - rndc addzone, then it will be - removed permanently. However, if it was originally - configured in named.conf, then - that original configuration is still in place; when - the server is restarted or reconfigured, the zone will - come back. To remove it permanently, it must also be - removed from named.conf -

-

- See also rndc addzone and rndc modzone. -

-
-
dnstap ( -reopen | -roll [number] )
-
-

- Close and re-open DNSTAP output files. - rndc dnstap -reopen allows the output - file to be renamed externally, so - that named can truncate and re-open it. - rndc dnstap -roll causes the output file - to be rolled automatically, similar to log files; the most - recent output file has ".0" appended to its name; the - previous most recent output file is moved to ".1", and so on. - If number is specified, then the - number of backup log files is limited to that number. -

-
-
dumpdb [-all|-cache|-zones|-adb|-bad|-fail] [view ...]
-
-

- Dump the server's caches (default) and/or zones to - the dump file for the specified views. If no view - is specified, all views are dumped. - (See the dump-file option in - the BIND 9 Administrator Reference Manual.) -

-
-
flush
-
-

- Flushes the server's cache. -

-
-
flushname name [view]
-
-

- Flushes the given name from the view's DNS cache - and, if applicable, from the view's nameserver address - database, bad server cache and SERVFAIL cache. -

-
-
flushtree name [view]
-
-

- Flushes the given name, and all of its subdomains, - from the view's DNS cache, address database, - bad server cache, and SERVFAIL cache. -

-
-
freeze [zone [class [view]]]
-
-

- Suspend updates to a dynamic zone. If no zone is - specified, then all zones are suspended. This allows - manual edits to be made to a zone normally updated by - dynamic update. It also causes changes in the - journal file to be synced into the master file. - All dynamic update attempts will be refused while - the zone is frozen. -

-

- See also rndc thaw. -

-
-
halt [-p]
-
-

- Stop the server immediately. Recent changes - made through dynamic update or IXFR are not saved to - the master files, but will be rolled forward from the - journal files when the server is restarted. - If -p is specified named's process id is returned. - This allows an external process to determine when named - had completed halting. -

-

- See also rndc stop. -

-
-
loadkeys zone [class [view]]
-
-

- Fetch all DNSSEC keys for the given zone - from the key directory. If they are within - their publication period, merge them into the - zone's DNSKEY RRset. Unlike rndc - sign, however, the zone is not - immediately re-signed by the new keys, but is - allowed to incrementally re-sign over time. -

-

- This command requires that the zone is configured with a - dnssec-policy, or that the - auto-dnssec zone option - be set to maintain, - and also requires the zone to be configured to - allow dynamic DNS. - (See "Dynamic Update Policies" in the Administrator - Reference Manual for more details.) -

-
-
managed-keys (status | refresh | sync | destroy) [class [view]]
-
-

- Inspect and control the "managed keys" database which - handles RFC 5011 DNSSEC trust anchor maintenance. If a view - is specified, these commands are applied to that view; - otherwise they are applied to all views. -

-
    -
  • -

    - When run with the status keyword, prints - the current status of the managed keys database. -

    -
  • -
  • -

    - When run with the refresh keyword, - forces an immediate refresh query to be sent for all - the managed keys, updating the managed keys database - if any new keys are found, without waiting the normal - refresh interval. -

    -
  • -
  • -

    - When run with the sync keyword, forces an - immediate dump of the managed keys database to disk - (in the file managed-keys.bind or - (viewname.mkeys). - This synchronizes the database with its journal file, so - that the database's current contents can be inspected - visually. -

    -
  • -
  • -

    - When run with the destroy keyword, the - managed keys database is shut down and deleted, and all key - maintenance is terminated. This command should be used only - with extreme caution. -

    -

    - Existing keys that are already trusted are not deleted - from memory; DNSSEC validation can continue after this - command is used. However, key maintenance operations will - cease until named is restarted or - reconfigured, and all existing key maintenance state - will be deleted. -

    -

    - Running rndc reconfig or restarting - named immediately after this command - will cause key maintenance to be reinitialized from scratch, - just as if the server were being started for the first time. - This is primarily intended for testing, but it may also be - used, for example, to jumpstart the acquisition of new keys - in the event of a trust anchor rollover, or as a - brute-force repair for key maintenance problems. -

    -
  • -
-
-
modzone zone [class [view]] configuration
-
-

- Modify the configuration of a zone while the server - is running. This command requires the - allow-new-zones option to be - set to yes. As with - addzone, the - configuration string - specified on the command line is the zone - configuration text that would ordinarily be - placed in named.conf. -

-

- If the zone was originally added via - rndc addzone, the configuration - changes will be recorded permanently and will still be - in effect after the server is restarted or reconfigured. - However, if it was originally configured in - named.conf, then that original - configuration is still in place; when the server is - restarted or reconfigured, the zone will revert to - its original configuration. To make the changes - permanent, it must also be modified in - named.conf -

-

- See also rndc addzone and rndc delzone. -

-
-
notify zone [class [view]]
-
-

- Resend NOTIFY messages for the zone. -

-
-
notrace
-
-

- Sets the server's debugging level to 0. -

-

- See also rndc trace. -

-
-
nta - [( -class class | -dump | -force | -remove | -lifetime duration)] - domain - [view] -
-
-

- Sets a DNSSEC negative trust anchor (NTA) - for domain, with a lifetime of - duration. The default lifetime is - configured in named.conf via the - nta-lifetime option, and defaults to - one hour. The lifetime cannot exceed one week. -

-

- A negative trust anchor selectively disables - DNSSEC validation for zones that are known to be - failing because of misconfiguration rather than - an attack. When data to be validated is - at or below an active NTA (and above any other - configured trust anchors), named will - abort the DNSSEC validation process and treat the data as - insecure rather than bogus. This continues until the - NTA's lifetime is elapsed. -

-

- NTAs persist across restarts of the named server. - The NTAs for a view are saved in a file called - name.nta, - where name is the - name of the view, or if it contains characters - that are incompatible with use as a file name, a - cryptographic hash generated from the name - of the view. -

-

- An existing NTA can be removed by using the - -remove option. -

-

- An NTA's lifetime can be specified with the - -lifetime option. TTL-style - suffixes can be used to specify the lifetime in - seconds, minutes, or hours. If the specified NTA - already exists, its lifetime will be updated to the - new value. Setting lifetime to zero - is equivalent to -remove. -

-

- If the -dump is used, any other arguments - are ignored, and a list of existing NTAs is printed - (note that this may include NTAs that are expired but - have not yet been cleaned up). -

-

- Normally, named will periodically - test to see whether data below an NTA can now be - validated (see the nta-recheck option - in the Administrator Reference Manual for details). - If data can be validated, then the NTA is regarded as - no longer necessary, and will be allowed to expire - early. The -force overrides this - behavior and forces an NTA to persist for its entire - lifetime, regardless of whether data could be - validated if the NTA were not present. -

-

- The view class can be specified with -class. - The default is class IN, which is - the only class for which DNSSEC is currently supported. -

-

- All of these options can be shortened, i.e., to - -l, -r, -d, - -f, and -c. -

-

- Unrecognized options are treated as errors. To reference - a domain or view name that begins with a hyphen, - use a double-hyphen on the command line to indicate the - end of options. -

-
-
querylog [ on | off ]
-
-

- Enable or disable query logging. (For backward - compatibility, this command can also be used without - an argument to toggle query logging on and off.) -

-

- Query logging can also be enabled - by explicitly directing the queries - category to a - channel in the - logging section of - named.conf or by specifying - querylog yes; in the - options section of - named.conf. -

-
-
reconfig
-
-

- Reload the configuration file and load new zones, - but do not reload existing zone files even if they - have changed. - This is faster than a full reload when there - is a large number of zones because it avoids the need - to examine the - modification times of the zones files. -

-
-
recursing
-
-

- Dump the list of queries named is currently - recursing on, and the list of domains to which iterative - queries are currently being sent. (The second list includes - the number of fetches currently active for the given domain, - and how many have been passed or dropped because of the - fetches-per-zone option.) -

-
-
refresh zone [class [view]]
-
-

- Schedule zone maintenance for the given zone. -

-
-
reload
-
-

- Reload configuration file and zones. -

-
-
reload zone [class [view]]
-
-

- Reload the given zone. -

-
-
retransfer zone [class [view]]
-
-

- Retransfer the given slave zone from the master server. -

-

- If the zone is configured to use - inline-signing, the signed - version of the zone is discarded; after the - retransfer of the unsigned version is complete, the - signed version will be regenerated with all new - signatures. -

-
-
scan
-
-

- Scan the list of available network interfaces - for changes, without performing a full - reconfig or waiting for the - interface-interval timer. -

-
-
secroots [-] [view ...]
-
-

- Dump the security roots (i.e., trust anchors - configured via trust-anchors statements, or the - managed-keys or trusted-keys statements (both deprecated), or - via dnssec-validation auto) and negative trust - anchors for the specified views. If no view is specified, all - views are dumped. Security roots will indicate whether - they are configured as trusted keys, managed keys, or - initializing managed keys (managed keys that have not yet - been updated by a successful key refresh query). -

-

- If the first argument is "-", then the output is - returned via the rndc response channel - and printed to the standard output. - Otherwise, it is written to the secroots dump file, which - defaults to named.secroots, but can be - overridden via the secroots-file option in - named.conf. -

-

- See also rndc managed-keys. -

-
-
serve-stale ( on | off | reset | status ) [class [view]]
-
-

- Enable, disable, reset, or report the current status - of the serving of stale answers as configured in - named.conf. -

-

- If serving of stale answers is disabled by - rndc-serve-stale off, then it - will remain disabled even if named - is reloaded or reconfigured. - rndc serve-stale reset restores - the setting as configured in named.conf. -

-

- rndc serve-stale status will report - whether serving of stale answers is currently enabled, - disabled by the configuration, or disabled by - rndc. It will also report the - values of stale-answer-ttl and - max-stale-ttl. -

-
-
showzone zone [class [view]]
-
-

- Print the configuration of a running zone. -

-

- See also rndc zonestatus. -

-
-
sign zone [class [view]]
-
-

- Fetch all DNSSEC keys for the given zone - from the key directory (see the - key-directory option in - the BIND 9 Administrator Reference Manual). If they are within - their publication period, merge them into the - zone's DNSKEY RRset. If the DNSKEY RRset - is changed, then the zone is automatically - re-signed with the new key set. -

-

- This command requires that the zone is configured with a - dnssec-policy, or that the - auto-dnssec zone option be set - to allow or - maintain, - and also requires the zone to be configured to - allow dynamic DNS. - (See "Dynamic Update Policies" in the Administrator - Reference Manual for more details.) -

-

- See also rndc loadkeys. -

-
-
signing [( -list | -clear keyid/algorithm | -clear all | -nsec3param ( parameters | none ) | -serial value ) ] zone [class [view]]
-
-

- List, edit, or remove the DNSSEC signing state records - for the specified zone. The status of ongoing DNSSEC - operations (such as signing or generating - NSEC3 chains) is stored in the zone in the form - of DNS resource records of type - sig-signing-type. - rndc signing -list converts - these records into a human-readable form, - indicating which keys are currently signing - or have finished signing the zone, and which NSEC3 - chains are being created or removed. -

-

- rndc signing -clear can remove - a single key (specified in the same format that - rndc signing -list uses to - display it), or all keys. In either case, only - completed keys are removed; any record indicating - that a key has not yet finished signing the zone - will be retained. -

-

- rndc signing -nsec3param sets - the NSEC3 parameters for a zone. This is the - only supported mechanism for using NSEC3 with - inline-signing zones. - Parameters are specified in the same format as - an NSEC3PARAM resource record: hash algorithm, - flags, iterations, and salt, in that order. -

-

- Currently, the only defined value for hash algorithm - is 1, representing SHA-1. - The flags may be set to - 0 or 1, - depending on whether you wish to set the opt-out - bit in the NSEC3 chain. iterations - defines the number of additional times to apply - the algorithm when generating an NSEC3 hash. The - salt is a string of data expressed - in hexadecimal, a hyphen (`-') if no salt is - to be used, or the keyword auto, - which causes named to generate a - random 64-bit salt. -

-

- So, for example, to create an NSEC3 chain using - the SHA-1 hash algorithm, no opt-out flag, - 10 iterations, and a salt value of "FFFF", use: - rndc signing -nsec3param 1 0 10 FFFF zone. - To set the opt-out flag, 15 iterations, and no - salt, use: - rndc signing -nsec3param 1 1 15 - zone. -

-

- rndc signing -nsec3param none - removes an existing NSEC3 chain and replaces it - with NSEC. -

-

- rndc signing -serial value sets - the serial number of the zone to value. If the value - would cause the serial number to go backwards it will - be rejected. The primary use is to set the serial on - inline signed zones. -

-
-
stats
-
-

- Write server statistics to the statistics file. - (See the statistics-file option in - the BIND 9 Administrator Reference Manual.) -

-
-
status
-
-

- Display status of the server. - Note that the number of zones includes the internal bind/CH zone - and the default ./IN - hint zone if there is not an - explicit root zone configured. -

-
-
stop [-p]
-
-

- Stop the server, making sure any recent changes - made through dynamic update or IXFR are first saved to - the master files of the updated zones. - If -p is specified named's process id is returned. - This allows an external process to determine when named - had completed stopping. -

-

See also rndc halt.

-
-
sync [-clean] [zone [class [view]]]
-
-

- Sync changes in the journal file for a dynamic zone - to the master file. If the "-clean" option is - specified, the journal file is also removed. If - no zone is specified, then all zones are synced. -

-
-
tcp-timeouts [initial idle keepalive advertised]
-
-

- When called without arguments, display the current - values of the tcp-initial-timeout, - tcp-idle-timeout, - tcp-keepalive-timeout and - tcp-advertised-timeout options. - When called with arguments, update these values. This - allows an administrator to make rapid adjustments when - under a denial of service attack. See the descriptions of - these options in the BIND 9 Administrator Reference Manual - for details of their use. -

-
-
thaw [zone [class [view]]]
-
-

- Enable updates to a frozen dynamic zone. If no - zone is specified, then all frozen zones are - enabled. This causes the server to reload the zone - from disk, and re-enables dynamic updates after the - load has completed. After a zone is thawed, - dynamic updates will no longer be refused. If - the zone has changed and the - ixfr-from-differences option is - in use, then the journal file will be updated to - reflect changes in the zone. Otherwise, if the - zone has changed, any existing journal file will be - removed. -

-

See also rndc freeze.

-
-
trace
-
-

- Increment the servers debugging level by one. -

-
-
trace level
-
-

- Sets the server's debugging level to an explicit - value. -

-

- See also rndc notrace. -

-
-
tsig-delete keyname [view]
-
-

- Delete a given TKEY-negotiated key from the server. - (This does not apply to statically configured TSIG - keys.) -

-
-
tsig-list
-
-

- List the names of all TSIG keys currently configured - for use by named in each view. The - list includes both statically configured keys and dynamic - TKEY-negotiated keys. -

-
-
validation ( on | off | status ) [view ...]
-
-

- Enable, disable, or check the current status of - DNSSEC validation. By default, validation is enabled. - The cache is flushed when validation is turned on or off - to avoid using data that might differ between states. -

-
-
zonestatus zone [class [view]]
-
-

- Displays the current status of the given zone, - including the master file name and any include - files from which it was loaded, when it was most - recently loaded, the current serial number, the - number of nodes, whether the zone supports - dynamic updates, whether the zone is DNSSEC - signed, whether it uses automatic DNSSEC key - management or inline signing, and the scheduled - refresh or expiry times for the zone. -

-

- See also rndc showzone. -

-
-
- -

- rndc commands that specify zone names, - such as reload, retransfer - or zonestatus, can be ambiguous when applied - to zones of type redirect. Redirect zones are - always called ".", and can be confused with zones of type - hint or with slaved copies of the root zone. - To specify a redirect zone, use the special zone name - -redirect, without a trailing period. - (With a trailing period, this would specify a zone called - "-redirect".) -

-
- -
-

LIMITATIONS

- -

- There is currently no way to provide the shared secret for a - key_id without using the configuration file. -

-

- Several error messages could be clearer. -

-
- -
-

SEE ALSO

- -

- rndc.conf(5) - , - - rndc-confgen(8) - , - - named(8) - , - - named.conf(5) - , - - ndc(8) - , - BIND 9 Administrator Reference Manual. -

-
- -
- -

BIND 9.17.1 (Development Release)

- - diff --git a/doc/arm/managed-keys.grammar.xml b/doc/arm/managed-keys.grammar.xml deleted file mode 100644 index 2e1e7219f5..0000000000 --- a/doc/arm/managed-keys.grammar.xml +++ /dev/null @@ -1,19 +0,0 @@ - - - - - -managed-keys { string ( static-key - | initial-key | static-ds | - initial-ds ) integer integer - integer quoted_string; ... }; deprecated - diff --git a/doc/arm/managed-keys.rst b/doc/arm/managed-keys.rst new file mode 100644 index 0000000000..cbe4c48b3c --- /dev/null +++ b/doc/arm/managed-keys.rst @@ -0,0 +1,101 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _rfc5011.support: + +Dynamic Trust Anchor Management +------------------------------- + +BIND is able to maintain DNSSEC trust anchors using :rfc:`5011` key +management. This feature allows ``named`` to keep track of changes to +critical DNSSEC keys without any need for the operator to make changes +to configuration files. + +Validating Resolver +~~~~~~~~~~~~~~~~~~~ + +To configure a validating resolver to use :rfc:`5011` to maintain a trust +anchor, configure the trust anchor using a ``dnssec-keys`` statement and +the ``initial-key`` keyword. Information about this can be found in +:ref:`trust-anchors`. + +Authoritative Server +~~~~~~~~~~~~~~~~~~~~ + +To set up an authoritative zone for :rfc:`5011` trust anchor maintenance, +generate two (or more) key signing keys (KSKs) for the zone. Sign the +zone with one of them; this is the "active" KSK. All KSKs which do not +sign the zone are "stand-by" keys. + +Any validating resolver which is configured to use the active KSK as an +RFC 5011-managed trust anchor will take note of the stand-by KSKs in the +zone's DNSKEY RRset, and store them for future reference. The resolver +will recheck the zone periodically, and after 30 days, if the new key is +still there, then the key will be accepted by the resolver as a valid +trust anchor for the zone. Any time after this 30-day acceptance timer +has completed, the active KSK can be revoked, and the zone can be +"rolled over" to the newly accepted key. + +The easiest way to place a stand-by key in a zone is to use the "smart +signing" features of ``dnssec-keygen`` and ``dnssec-signzone``. If a key +with a publication date in the past, but an activation date which is +unset or in the future, " ``dnssec-signzone -S``" will include the +DNSKEY record in the zone, but will not sign with it: + +:: + + $ dnssec-keygen -K keys -f KSK -P now -A now+2y example.net + $ dnssec-signzone -S -K keys example.net + +To revoke a key, the new command ``dnssec-revoke`` has been added. This +adds the REVOKED bit to the key flags and re-generates the ``K*.key`` +and ``K*.private`` files. + +After revoking the active key, the zone must be signed with both the +revoked KSK and the new active KSK. (Smart signing takes care of this +automatically.) + +Once a key has been revoked and used to sign the DNSKEY RRset in which +it appears, that key will never again be accepted as a valid trust +anchor by the resolver. However, validation can proceed using the new +active key (which had been accepted by the resolver when it was a +stand-by key). + +See :rfc:`5011` for more details on key rollover scenarios. + +When a key has been revoked, its key ID changes, increasing by 128, and +wrapping around at 65535. So, for example, the key +"``Kexample.com.+005+10000``" becomes "``Kexample.com.+005+10128``". + +If two keys have IDs exactly 128 apart, and one is revoked, then the two +key IDs will collide, causing several problems. To prevent this, +``dnssec-keygen`` will not generate a new key if another key is present +which may collide. This checking will only occur if the new keys are +written to the same directory which holds all other keys in use for that +zone. + +Older versions of BIND 9 did not have this precaution. Exercise caution +if using key revocation on keys that were generated by previous +releases, or if using keys stored in multiple directories or on multiple +machines. + +It is expected that a future release of BIND 9 will address this problem +in a different way, by storing revoked keys with their original +unrevoked key IDs. diff --git a/doc/arm/managed-keys.xml b/doc/arm/managed-keys.xml deleted file mode 100644 index fd7b24eedf..0000000000 --- a/doc/arm/managed-keys.xml +++ /dev/null @@ -1,94 +0,0 @@ - - - -
Dynamic Trust Anchor Management - - - BIND is able to maintain DNSSEC trust anchors using RFC 5011 key - management. This feature allows named to keep track - of changes to critical DNSSEC keys without any need for the operator to - make changes to configuration files. - - -
Validating Resolver - - - To configure a validating resolver to use RFC 5011 to - maintain a trust anchor, configure the trust anchor using a - trust-anchors statement and the - initial-key or initial-ds - keyword. Information about this can be found in - . -
-
Authoritative Server - - To set up an authoritative zone for RFC 5011 trust anchor - maintenance, generate two (or more) key signing keys (KSKs) for - the zone. Sign the zone with one of them; this is the "active" - KSK. All KSKs which do not sign the zone are "stand-by" - keys. - Any validating resolver which is configured to use the - active KSK as an RFC 5011-managed trust anchor will take note - of the stand-by KSKs in the zone's DNSKEY RRset, and store them - for future reference. The resolver will recheck the zone - periodically, and after 30 days, if the new key is still there, - then the key will be accepted by the resolver as a valid trust - anchor for the zone. Any time after this 30-day acceptance - timer has completed, the active KSK can be revoked, and the - zone can be "rolled over" to the newly accepted key. - The easiest way to place a stand-by key in a zone is to - use the "smart signing" features of - dnssec-keygen and - dnssec-signzone. If a key with a publication - date in the past, but an activation date which is unset or in - the future, " - dnssec-signzone -S" will include the DNSKEY - record in the zone, but will not sign with it: - -$ dnssec-keygen -K keys -f KSK -P now -A now+2y example.net -$ dnssec-signzone -S -K keys example.net - - To revoke a key, the new command - dnssec-revoke has been added. This adds the - REVOKED bit to the key flags and re-generates the - K*.key and - K*.private files. - After revoking the active key, the zone must be signed - with both the revoked KSK and the new active KSK. (Smart - signing takes care of this automatically.) - Once a key has been revoked and used to sign the DNSKEY - RRset in which it appears, that key will never again be - accepted as a valid trust anchor by the resolver. However, - validation can proceed using the new active key (which had been - accepted by the resolver when it was a stand-by key). - See RFC 5011 for more details on key rollover - scenarios. - When a key has been revoked, its key ID changes, - increasing by 128, and wrapping around at 65535. So, for - example, the key "Kexample.com.+005+10000" becomes - "Kexample.com.+005+10128". - If two keys have IDs exactly 128 apart, and one is - revoked, then the two key IDs will collide, causing several - problems. To prevent this, - dnssec-keygen will not generate a new key if - another key is present which may collide. This checking will - only occur if the new keys are written to the same directory - which holds all other keys in use for that zone. - Older versions of BIND 9 did not have this precaution. - Exercise caution if using key revocation on keys that were - generated by previous releases, or if using keys stored in - multiple directories or on multiple machines. - It is expected that a future release of BIND 9 will - address this problem in a different way, by storing revoked - keys with their original unrevoked key IDs. -
-
diff --git a/doc/arm/manpages.rst b/doc/arm/manpages.rst new file mode 100644 index 0000000000..62bb3cf957 --- /dev/null +++ b/doc/arm/manpages.rst @@ -0,0 +1,48 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _manpages: + +Manual Pages +============ + +.. include:: ../../bin//rndc/rndc.conf.rst +.. include:: ../../bin//rndc/rndc.rst +.. include:: ../../bin//tools/nsec3hash.rst +.. include:: ../../bin//tools/dnstap-read.rst +.. include:: ../../bin//tools/named-nzd2nzf.rst +.. include:: ../../bin//tools/named-journalprint.rst +.. include:: ../../bin//tools/mdig.rst +.. include:: ../../bin//tools/named-rrchecker.rst +.. include:: ../../bin//tools/arpaname.rst +.. include:: ../../bin//dnssec/dnssec-revoke.rst +.. include:: ../../bin//dnssec/dnssec-cds.rst +.. include:: ../../bin//dnssec/dnssec-keygen.rst +.. include:: ../../bin//dnssec/dnssec-keyfromlabel.rst +.. include:: ../../bin//dnssec/dnssec-verify.rst +.. include:: ../../bin//dnssec/dnssec-settime.rst +.. include:: ../../bin//dnssec/dnssec-importkey.rst +.. include:: ../../bin//dnssec/dnssec-signzone.rst +.. include:: ../../bin//dnssec/dnssec-dsfromkey.rst +.. include:: ../../bin//plugins/filter-aaaa.rst +.. include:: ../../bin//confgen/ddns-confgen.rst +.. include:: ../../bin//confgen/rndc-confgen.rst +.. include:: ../../bin//delv/delv.rst +.. include:: ../../bin//nsupdate/nsupdate.rst +.. include:: ../../bin//dig/host.rst +.. include:: ../../bin//dig/dig.rst +.. include:: ../../bin//dig/nslookup.rst +.. include:: ../../bin//named/named.rst +.. include:: ../../bin//pkcs11/pkcs11-keygen.rst +.. include:: ../../bin//pkcs11/pkcs11-tokens.rst +.. include:: ../../bin//pkcs11/pkcs11-list.rst +.. include:: ../../bin//pkcs11/pkcs11-destroy.rst +.. include:: ../../bin//check/named-checkconf.rst +.. include:: ../../bin//check/named-checkzone.rst diff --git a/doc/arm/master.zoneopt.xml b/doc/arm/master.zoneopt.xml deleted file mode 100644 index 054b440492..0000000000 --- a/doc/arm/master.zoneopt.xml +++ /dev/null @@ -1,71 +0,0 @@ - - - - -zone string [ class ] { - type ( master | primary ); - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - auto-dnssec ( allow | maintain | off ); - check-dup-records ( fail | warn | ignore ); - check-integrity boolean; - check-mx ( fail | warn | ignore ); - check-mx-cname ( fail | warn | ignore ); - check-names ( fail | warn | ignore ); - check-sibling boolean; - check-spf ( warn | ignore ); - check-srv-cname ( fail | warn | ignore ); - check-wildcard boolean; - database string; - dialup ( notify | notify-passive | passive | refresh | boolean ); - dlz string; - dnskey-sig-validity integer; - dnssec-dnskey-kskonly boolean; - dnssec-loadkeys-interval integer; - dnssec-policy string; - dnssec-secure-to-insecure boolean; - dnssec-update-mode ( maintain | no-resign ); - file quoted_string; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - inline-signing boolean; - ixfr-from-differences boolean; - journal quoted_string; - key-directory quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - max-journal-size ( default | unlimited | sizeval ); - max-records integer; - max-transfer-idle-out integer; - max-transfer-time-out integer; - max-zone-ttl ( unlimited | duration ); - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - notify-to-soa boolean; - serial-update-method ( date | increment | unixtime ); - sig-signing-nodes integer; - sig-signing-signatures integer; - sig-signing-type integer; - sig-validity-interval integer [ integer ]; - update-check-ksk boolean; - update-policy ( local | { ( deny | grant ) string ( 6to4-self | external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild | subdomain | tcp-self | wildcard | zonesub ) [ string ] rrtypelist; ... }; - zero-no-soa-ttl boolean; - zone-statistics ( full | terse | none | boolean ); -}; - diff --git a/doc/arm/masters.grammar.xml b/doc/arm/masters.grammar.xml deleted file mode 100644 index 658fdfc1f4..0000000000 --- a/doc/arm/masters.grammar.xml +++ /dev/null @@ -1,19 +0,0 @@ - - - - - -masters string [ port integer ] [ dscp - integer ] { ( masters | ipv4_address [ - port integer ] | ipv6_address [ port - integer ] ) [ key string ]; ... }; - diff --git a/doc/arm/mirror.zoneopt.xml b/doc/arm/mirror.zoneopt.xml deleted file mode 100644 index 694fd80d78..0000000000 --- a/doc/arm/mirror.zoneopt.xml +++ /dev/null @@ -1,56 +0,0 @@ - - - - -zone string [ class ] { - type mirror; - allow-notify { address_match_element; ... }; - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update-forwarding { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - check-names ( fail | warn | ignore ); - database string; - file quoted_string; - ixfr-from-differences boolean; - journal quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... }; - max-journal-size ( default | unlimited | sizeval ); - max-records integer; - max-refresh-time integer; - max-retry-time integer; - max-transfer-idle-in integer; - max-transfer-idle-out integer; - max-transfer-time-in integer; - max-transfer-time-out integer; - min-refresh-time integer; - min-retry-time integer; - multi-master boolean; - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - request-expire boolean; - request-ixfr boolean; - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - try-tcp-refresh boolean; - use-alt-transfer-source boolean; - zero-no-soa-ttl boolean; - zone-statistics ( full | terse | none | boolean ); -}; - diff --git a/doc/arm/notes-9.17.0.xml b/doc/arm/notes-9.17.0.xml deleted file mode 100644 index 1c365fb30d..0000000000 --- a/doc/arm/notes-9.17.0.xml +++ /dev/null @@ -1,108 +0,0 @@ - - -
Notes for BIND 9.17.0 - -
Known Issues - - - - UDP network ports used for listening can no longer simultaneously be - used for sending traffic. An example configuration which triggers - this issue would be one which uses the same - address:port pair for - listen-on(-v6) statements as for - notify-source(-v6) or - transfer-source(-v6). While this issue affects all - operating systems, it only triggers log messages (e.g. "unable to - create dispatch for reserved port") on some of them. There are - currently no plans to make such a combination of settings work again. - - - -
- -
New Features - - - - When a secondary server receives a large incremental zone - transfer (IXFR), it can have a negative impact on query - performance while the incremental changes are applied to - the zone. To address this, named can now - limit the size of IXFR responses it sends in response to zone - transfer requests. If an IXFR response would be larger than an - AXFR of the entire zone, it will send an AXFR response instead. - - - This behavior is controlled by the max-ixfr-ratio - option - a percentage value representing the ratio of IXFR size - to the size of a full zone transfer. The default is - 100%. [GL #1515] - - - - - A new RPZ option nsdname-wait-recurse - controls whether RPZ-NSDNAME rules should always be applied - even if the names of authoritative name servers for the query - name need to be looked up recurively first. The default is - yes. Setting it to - no speeds up initial responses by skipping - RPZ-NSDNAME rules when name server domain names are not yet - in the cache. The names will be looked up in the background and - the rule will be applied for subsequent queries. [GL #1138] - - - -
- -
Feature Changes - - - - The system-provided POSIX Threads read-write lock implementation is - now used by default instead of the native BIND 9 implementation. - Please be aware that glibc versions 2.26 through 2.29 had a - bug - that could cause BIND 9 to deadlock. A fix was released in glibc 2.30, - and most current Linux distributions have patched or updated glibc, - with the notable exception of Ubuntu 18.04 (Bionic) which is a work in - progress. If you are running on an affected operating system, compile - BIND 9 with --disable-pthread-rwlock until a fixed - version of glibc is available. [GL !3125] - - - - - The rndc nta -dump and - rndc secroots commands now both include - validate-except entries when listing negative - trust anchors. These are indicated by the keyword - permanent in place of the expiry - date. [GL #1532] - - - -
- -
Bug Fixes - - - - Fixed re-signing issues with inline zones which resulted in - records being re-signed late or not at all. - - - -
- -
diff --git a/doc/arm/notes-download.xml b/doc/arm/notes-download.xml deleted file mode 100644 index 84bb469e3a..0000000000 --- a/doc/arm/notes-download.xml +++ /dev/null @@ -1,20 +0,0 @@ - - -
Download - - The latest versions of BIND 9 software can always be found at - https://www.isc.org/download/. - There you will find additional information about each release, - source code, and pre-compiled versions for Microsoft Windows - operating systems. - -
diff --git a/doc/arm/notes-eol.xml b/doc/arm/notes-eol.xml deleted file mode 100644 index 9ba7e548c9..0000000000 --- a/doc/arm/notes-eol.xml +++ /dev/null @@ -1,29 +0,0 @@ - - -
End of Life - - BIND 9.17 is an unstable development branch. When its development - is complete, it will be renamed to BIND 9.18, which will be a - stable branch. - - - The end of life date for BIND 9.18 has not yet been determined. - For those needing long term support, the current Extended Support - Version (ESV) is BIND 9.11, which will be supported until at - least December 2021. - - - See - https://kb.isc.org/docs/aa-00896 - for details of ISC's software support policy. - -
diff --git a/doc/arm/notes-intro.xml b/doc/arm/notes-intro.xml deleted file mode 100644 index 435df4361b..0000000000 --- a/doc/arm/notes-intro.xml +++ /dev/null @@ -1,24 +0,0 @@ - - -
Introduction - - BIND 9.17 is an unstable development release of BIND. - This document summarizes new features and functional changes that - have been introduced on this branch. With each development release - leading up to the stable BIND 9.18 release, this document will be - updated with additional features added and bugs fixed. - - - Please see the file CHANGES for a more - detailed list of changes and bug fixes. - -
diff --git a/doc/arm/notes-license.xml b/doc/arm/notes-license.xml deleted file mode 100644 index d11396175e..0000000000 --- a/doc/arm/notes-license.xml +++ /dev/null @@ -1,34 +0,0 @@ - - -
License - - BIND 9 is open source software licensed under the terms of the Mozilla - Public License, version 2.0 (see the LICENSE - file for the full text). - - - The license requires that if you make changes to BIND and distribute - them outside your organization, those changes must be published under - the same license. It does not require that you publish or disclose - anything other than the changes you have made to our software. This - requirement does not affect anyone who is using BIND, with or without - modifications, without redistributing it, nor anyone redistributing - BIND without changes. - - - Those wishing to discuss license compliance may contact ISC at - - https://www.isc.org/contact/. - -
diff --git a/doc/arm/notes-platforms.xml b/doc/arm/notes-platforms.xml deleted file mode 100644 index 907a5ac76d..0000000000 --- a/doc/arm/notes-platforms.xml +++ /dev/null @@ -1,35 +0,0 @@ - - -
Supported Platforms - - To build on UNIX-like systems, BIND requires support for POSIX.1c - threads (IEEE Std 1003.1c-1995), the Advanced Sockets API for - IPv6 (RFC 3542), and standard atomic operations provided by the - C compiler. - - - The libuv asynchronous I/O library and the - OpenSSL cryptography library must be available for the target - platform. A PKCS#11 provider can be used instead of OpenSSL for - Public Key cryptography (i.e., DNSSEC signing and validation), - but OpenSSL is still required for general cryptography operations - such as hashing and random number generation. - - - More information can be found in the PLATFORMS.md - file that is included in the source distribution of BIND 9. If your - compiler and system libraries provide the above features, BIND 9 - should compile and run. If that isn't the case, the BIND - development team will generally accept patches that add support - for systems that are still supported by their respective vendors. - -
diff --git a/doc/arm/notes-thankyou.xml b/doc/arm/notes-thankyou.xml deleted file mode 100644 index f84ad5594f..0000000000 --- a/doc/arm/notes-thankyou.xml +++ /dev/null @@ -1,16 +0,0 @@ - - -
Thank You - - Thank you to everyone who assisted us in making this release possible. - -
diff --git a/doc/arm/notes-wrapper.xml b/doc/arm/notes-wrapper.xml deleted file mode 100644 index 2a8f6d885e..0000000000 --- a/doc/arm/notes-wrapper.xml +++ /dev/null @@ -1,18 +0,0 @@ -]> - - - -
</info> - - <xi:include xmlns:xi="http://www.w3.org/2001/XInclude" href="notes.xml"/> -</article> diff --git a/doc/arm/notes.conf b/doc/arm/notes.conf deleted file mode 100644 index f8dd8326f5..0000000000 --- a/doc/arm/notes.conf +++ /dev/null @@ -1,3 +0,0 @@ -TexInputs: ../tex// -TexStyle: notestyle -XslParam: ../xsl/notes-param.xsl diff --git a/doc/arm/notes.html b/doc/arm/notes.html deleted file mode 100644 index 6cef9ed8f0..0000000000 --- a/doc/arm/notes.html +++ /dev/null @@ -1,323 +0,0 @@ -<!-- - - - - This Source Code Form is subject to the terms of the Mozilla Public - - License, v. 2.0. If a copy of the MPL was not distributed with this - - file, You can obtain one at http://mozilla.org/MPL/2.0/. ---> -<!-- $Id$ --> -<html> -<head> -<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> -<title> - - -
- -
-

-Release Notes for BIND Version 9.17.1

- -
-

-Introduction

-

- BIND 9.17 is an unstable development release of BIND. - This document summarizes new features and functional changes that - have been introduced on this branch. With each development release - leading up to the stable BIND 9.18 release, this document will be - updated with additional features added and bugs fixed. -

-

- Please see the file CHANGES for a more - detailed list of changes and bug fixes. -

-
-
-

-Supported Platforms

-

- To build on UNIX-like systems, BIND requires support for POSIX.1c - threads (IEEE Std 1003.1c-1995), the Advanced Sockets API for - IPv6 (RFC 3542), and standard atomic operations provided by the - C compiler. -

-

- The libuv asynchronous I/O library and the - OpenSSL cryptography library must be available for the target - platform. A PKCS#11 provider can be used instead of OpenSSL for - Public Key cryptography (i.e., DNSSEC signing and validation), - but OpenSSL is still required for general cryptography operations - such as hashing and random number generation. -

-

- More information can be found in the PLATFORMS.md - file that is included in the source distribution of BIND 9. If your - compiler and system libraries provide the above features, BIND 9 - should compile and run. If that isn't the case, the BIND - development team will generally accept patches that add support - for systems that are still supported by their respective vendors. -

-
-
-

-Download

-

- The latest versions of BIND 9 software can always be found at - https://www.isc.org/download/. - There you will find additional information about each release, - source code, and pre-compiled versions for Microsoft Windows - operating systems. -

-
- -
-

-Notes for BIND 9.17.1

- -
-

-Security Fixes

-
  • -

    - DNS rebinding protection was ineffective when BIND 9 is configured as - a forwarding DNS server. Found and responsibly reported by Tobias - Klein. [GL #1574] -

    -
-
- -
-

-Known Issues

-
  • -

    - We have received reports that in some circumstances, receipt of an - IXFR can cause the processing of queries to slow significantly. Some - of these were related to RPZ processing, which has been fixed in this - release (see below). Others appear to occur where there are - NSEC3-related changes (such as an operator changing the NSEC3 salt - used in the hash calculation). These are being investigated. - [GL #1685] -

    -
-
- -
-

-New Features

-
  • -

    - A new option, nsdname-wait-recurse, has been added - to the response-policy clause in the configuration - file. When set to no, RPZ NSDNAME rules are only - applied if the authoritative nameservers for the query name have been - looked up and are present in the cache. If this information is not - present, the RPZ NSDNAME rules are ignored, but the information is - looked up in the background and applied to subsequent queries. The - default is yes, meaning that RPZ NSDNAME rules - should always be applied, even if the information needs to be looked - up first. [GL #1138] -

    -
-
- -
-

-Feature Changes

-
  • -

    - The previous DNSSEC sign statistics used lots of memory. The number of - keys to track is reduced to four per zone, which should be enough for - 99% of all signed zones. [GL #1179] -

    -
-
- -
-

-Bug Fixes

-
    -
  • -

    - When an RPZ policy zone was updated via zone transfer and a large - number of records was deleted, named could become - nonresponsive for a short period while deleted names were removed from - the RPZ summary database. This database cleanup is now done - incrementally over a longer period of time, reducing such delays. - [GL #1447] -

    -
  • -
  • -

    - When trying to migrate an already-signed zone from - auto-dnssec maintain to one based on - dnssec-policy, the existing keys were immediately - deleted and replaced with new ones. As the key rollover timing - constraints were not being followed, it was possible that some clients - would not have been able to validate responses until all old DNSSEC - information had timed out from caches. BIND now looks at the time - metadata of the existing keys and incorporates it into its DNSSEC - policy operation. [GL #1706] -

    -
  • -
-
- -
-
-

-Notes for BIND 9.17.0

- -
-

-Known Issues

-
  • -

    - UDP network ports used for listening can no longer simultaneously be - used for sending traffic. An example configuration which triggers - this issue would be one which uses the same - address:port pair for - listen-on(-v6) statements as for - notify-source(-v6) or - transfer-source(-v6). While this issue affects all - operating systems, it only triggers log messages (e.g. "unable to - create dispatch for reserved port") on some of them. There are - currently no plans to make such a combination of settings work again. -

    -
-
- -
-

-New Features

-
    -
  • -

    - When a secondary server receives a large incremental zone - transfer (IXFR), it can have a negative impact on query - performance while the incremental changes are applied to - the zone. To address this, named can now - limit the size of IXFR responses it sends in response to zone - transfer requests. If an IXFR response would be larger than an - AXFR of the entire zone, it will send an AXFR response instead. -

    -

    - This behavior is controlled by the max-ixfr-ratio - option - a percentage value representing the ratio of IXFR size - to the size of a full zone transfer. The default is - 100%. [GL #1515] -

    -
  • -
  • -

    - A new RPZ option nsdname-wait-recurse - controls whether RPZ-NSDNAME rules should always be applied - even if the names of authoritative name servers for the query - name need to be looked up recurively first. The default is - yes. Setting it to - no speeds up initial responses by skipping - RPZ-NSDNAME rules when name server domain names are not yet - in the cache. The names will be looked up in the background and - the rule will be applied for subsequent queries. [GL #1138] -

    -
  • -
-
- -
-

-Feature Changes

-
    -
  • -

    - The system-provided POSIX Threads read-write lock implementation is - now used by default instead of the native BIND 9 implementation. - Please be aware that glibc versions 2.26 through 2.29 had a - bug - that could cause BIND 9 to deadlock. A fix was released in glibc 2.30, - and most current Linux distributions have patched or updated glibc, - with the notable exception of Ubuntu 18.04 (Bionic) which is a work in - progress. If you are running on an affected operating system, compile - BIND 9 with --disable-pthread-rwlock until a fixed - version of glibc is available. [GL !3125] -

    -
  • -
  • -

    - The rndc nta -dump and - rndc secroots commands now both include - validate-except entries when listing negative - trust anchors. These are indicated by the keyword - permanent in place of the expiry - date. [GL #1532] -

    -
  • -
-
- -
-

-Bug Fixes

-
  • -

    - Fixed re-signing issues with inline zones which resulted in - records being re-signed late or not at all. -

    -
-
- -
- -
-

-License

-

- BIND 9 is open source software licensed under the terms of the Mozilla - Public License, version 2.0 (see the LICENSE - file for the full text). -

-

- The license requires that if you make changes to BIND and distribute - them outside your organization, those changes must be published under - the same license. It does not require that you publish or disclose - anything other than the changes you have made to our software. This - requirement does not affect anyone who is using BIND, with or without - modifications, without redistributing it, nor anyone redistributing - BIND without changes. -

-

- Those wishing to discuss license compliance may contact ISC at - - https://www.isc.org/contact/. -

-
-
-

-End of Life

-

- BIND 9.17 is an unstable development branch. When its development - is complete, it will be renamed to BIND 9.18, which will be a - stable branch. -

-

- The end of life date for BIND 9.18 has not yet been determined. - For those needing long term support, the current Extended Support - Version (ESV) is BIND 9.11, which will be supported until at - least December 2021. -

-

- See - https://kb.isc.org/docs/aa-00896 - for details of ISC's software support policy. -

-
-
-

-Thank You

-

- Thank you to everyone who assisted us in making this release possible. -

-
-
-
- diff --git a/doc/arm/notes.pdf b/doc/arm/notes.pdf deleted file mode 100644 index 336ab44c59..0000000000 Binary files a/doc/arm/notes.pdf and /dev/null differ diff --git a/doc/arm/notes.rst b/doc/arm/notes.rst new file mode 100644 index 0000000000..31a916f474 --- /dev/null +++ b/doc/arm/notes.rst @@ -0,0 +1,171 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _relnotes: + +Release Notes +============= + +.. _relnotes_intro: + +Introduction +------------ + +BIND 9.15 is an unstable development release of BIND. This document +summarizes new features and functional changes that have been introduced +on this branch. With each development release leading up to the stable +BIND 9.16 release, this document will be updated with additional +features added and bugs fixed. + +.. _relnotes_versions: + +Note on Version Numbering +------------------------- + +Until BIND 9.12, new feature development releases were tagged as "alpha" +and "beta", leading up to the first stable release for a given +development branch, which always ended in ".0". More recently, BIND +adopted the "odd-unstable/even-stable" release numbering convention. +There will be no "alpha" or "beta" releases in the 9.15 branch, only +increasing version numbers. So, for example, what would previously have +been called 9.15.0a1, 9.15.0a2, 9.15.0b1, and so on, will instead be +called 9.15.0, 9.15.1, 9.15.2, etc. + +The first stable release from this development branch will be renamed as +9.16.0. Thereafter, maintenance releases will continue on the 9.16 +branch, while unstable feature development proceeds in 9.17. + +.. _relnotes_platforms: + +Supported Platforms +------------------- + +To build on UNIX-like systems, BIND requires support for POSIX.1c +threads (IEEE Std 1003.1c-1995), the Advanced Sockets API for IPv6 +(:rfc:`3542`), and standard atomic operations provided by the C compiler. + +The OpenSSL cryptography library must be available for the target +platform. A PKCS#11 provider can be used instead for Public Key +cryptography (i.e., DNSSEC signing and validation), but OpenSSL is still +required for general cryptography operations such as hashing and random +number generation. + +More information can be found in the ``PLATFORMS.md`` file that is +included in the source distribution of BIND 9. If your compiler and +system libraries provide the above features, BIND 9 should compile and +run. If that isn't the case, the BIND development team will generally +accept patches that add support for systems that are still supported by +their respective vendors. + +.. _relnotes_download: + +Download +-------- + +The latest versions of BIND 9 software can always be found at +http://www.isc.org/downloads/. There you will find additional +information about each release, source code, and pre-compiled versions +for Microsoft Windows operating systems. + +.. _relnotes_security: + +Security Fixes +-------------- + +- None. + +.. _relnotes_features: + +New Features +------------ + +- The new ``add-soa`` option specifies whether or not the + ``response-policy`` zone's SOA record should be included in the + additional section of RPZ responses. [GL #865] + +.. _relnotes_removed: + +Removed Features +---------------- + +- The ``dnssec-enable`` option has been deprecated and no longer has + any effect. DNSSEC responses are always enabled if signatures and + other DNSSEC data are present. [GL #866] + +.. _relnotes_changes: + +Feature Changes +--------------- + +- None. + +.. _relnotes_bugs: + +Bug Fixes +--------- + +- The ``allow-update`` and ``allow-update-forwarding`` options were + inadvertently treated as configuration errors when used at the + ``options`` or ``view`` level. This has now been corrected. [GL #913] + +.. _relnotes_license: + +License +------- + +BIND is open source software licenced under the terms of the Mozilla +Public License, version 2.0 (see the ``LICENSE`` file for the full +text). + +The license requires that if you make changes to BIND and distribute +them outside your organization, those changes must be published under +the same license. It does not require that you publish or disclose +anything other than the changes you have made to our software. This +requirement does not affect anyone who is using BIND, with or without +modifications, without redistributing it, nor anyone redistributing BIND +without changes. + +Those wishing to discuss license compliance may contact ISC at +https://www.isc.org/mission/contact/. + +.. _end_of_life: + +End of Life +----------- + +BIND 9.15 is an unstable development branch. When its development is +complete, it will be renamed to BIND 9.16, which will be a stable +branch. + +The end of life date for BIND 9.16 has not yet been determined. For +those needing long term support, the current Extended Support Version +(ESV) is BIND 9.11, which will be supported until at least December +2021. See https://www.isc.org/downloads/software-support-policy/ for +details of ISC's software support policy. + +.. _relnotes_thanks: + +Thank You +--------- + +Thank you to everyone who assisted us in making this release possible. +If you would like to contribute to ISC to assist us in continuing to +make quality open source software, please visit our donations page at +http://www.isc.org/donate/. diff --git a/doc/arm/notes.txt b/doc/arm/notes.txt deleted file mode 100644 index d3f88c9fed..0000000000 --- a/doc/arm/notes.txt +++ /dev/null @@ -1,177 +0,0 @@ -Release Notes for BIND Version 9.17.1 - -Introduction - -BIND 9.17 is an unstable development release of BIND. This document -summarizes new features and functional changes that have been introduced -on this branch. With each development release leading up to the stable -BIND 9.18 release, this document will be updated with additional features -added and bugs fixed. - -Please see the file CHANGES for a more detailed list of changes and bug -fixes. - -Supported Platforms - -To build on UNIX-like systems, BIND requires support for POSIX.1c threads -(IEEE Std 1003.1c-1995), the Advanced Sockets API for IPv6 (RFC 3542), and -standard atomic operations provided by the C compiler. - -The libuv asynchronous I/O library and the OpenSSL cryptography library -must be available for the target platform. A PKCS#11 provider can be used -instead of OpenSSL for Public Key cryptography (i.e., DNSSEC signing and -validation), but OpenSSL is still required for general cryptography -operations such as hashing and random number generation. - -More information can be found in the PLATFORMS.md file that is included in -the source distribution of BIND 9. If your compiler and system libraries -provide the above features, BIND 9 should compile and run. If that isn't -the case, the BIND development team will generally accept patches that add -support for systems that are still supported by their respective vendors. - -Download - -The latest versions of BIND 9 software can always be found at https:// -www.isc.org/download/. There you will find additional information about -each release, source code, and pre-compiled versions for Microsoft Windows -operating systems. - -Notes for BIND 9.17.1 - -Security Fixes - - * DNS rebinding protection was ineffective when BIND 9 is configured as - a forwarding DNS server. Found and responsibly reported by Tobias - Klein. [GL #1574] - -Known Issues - - * We have received reports that in some circumstances, receipt of an - IXFR can cause the processing of queries to slow significantly. Some - of these were related to RPZ processing, which has been fixed in this - release (see below). Others appear to occur where there are - NSEC3-related changes (such as an operator changing the NSEC3 salt - used in the hash calculation). These are being investigated. [GL - #1685] - -New Features - - * A new option, nsdname-wait-recurse, has been added to the - response-policy clause in the configuration file. When set to no, RPZ - NSDNAME rules are only applied if the authoritative nameservers for - the query name have been looked up and are present in the cache. If - this information is not present, the RPZ NSDNAME rules are ignored, - but the information is looked up in the background and applied to - subsequent queries. The default is yes, meaning that RPZ NSDNAME rules - should always be applied, even if the information needs to be looked - up first. [GL #1138] - -Feature Changes - - * The previous DNSSEC sign statistics used lots of memory. The number of - keys to track is reduced to four per zone, which should be enough for - 99% of all signed zones. [GL #1179] - -Bug Fixes - - * When an RPZ policy zone was updated via zone transfer and a large - number of records was deleted, named could become nonresponsive for a - short period while deleted names were removed from the RPZ summary - database. This database cleanup is now done incrementally over a - longer period of time, reducing such delays. [GL #1447] - - * When trying to migrate an already-signed zone from auto-dnssec - maintain to one based on dnssec-policy, the existing keys were - immediately deleted and replaced with new ones. As the key rollover - timing constraints were not being followed, it was possible that some - clients would not have been able to validate responses until all old - DNSSEC information had timed out from caches. BIND now looks at the - time metadata of the existing keys and incorporates it into its DNSSEC - policy operation. [GL #1706] - -Notes for BIND 9.17.0 - -Known Issues - - * UDP network ports used for listening can no longer simultaneously be - used for sending traffic. An example configuration which triggers this - issue would be one which uses the same address:port pair for listen-on - (-v6) statements as for notify-source(-v6) or transfer-source(-v6). - While this issue affects all operating systems, it only triggers log - messages (e.g. "unable to create dispatch for reserved port") on some - of them. There are currently no plans to make such a combination of - settings work again. - -New Features - - * When a secondary server receives a large incremental zone transfer - (IXFR), it can have a negative impact on query performance while the - incremental changes are applied to the zone. To address this, named - can now limit the size of IXFR responses it sends in response to zone - transfer requests. If an IXFR response would be larger than an AXFR of - the entire zone, it will send an AXFR response instead. - - This behavior is controlled by the max-ixfr-ratio option - a - percentage value representing the ratio of IXFR size to the size of a - full zone transfer. The default is 100%. [GL #1515] - - * A new RPZ option nsdname-wait-recurse controls whether RPZ-NSDNAME - rules should always be applied even if the names of authoritative name - servers for the query name need to be looked up recurively first. The - default is yes. Setting it to no speeds up initial responses by - skipping RPZ-NSDNAME rules when name server domain names are not yet - in the cache. The names will be looked up in the background and the - rule will be applied for subsequent queries. [GL #1138] - -Feature Changes - - * The system-provided POSIX Threads read-write lock implementation is - now used by default instead of the native BIND 9 implementation. - Please be aware that glibc versions 2.26 through 2.29 had a bug that - could cause BIND 9 to deadlock. A fix was released in glibc 2.30, and - most current Linux distributions have patched or updated glibc, with - the notable exception of Ubuntu 18.04 (Bionic) which is a work in - progress. If you are running on an affected operating system, compile - BIND 9 with --disable-pthread-rwlock until a fixed version of glibc is - available. [GL !3125] - - * The rndc nta -dump and rndc secroots commands now both include - validate-except entries when listing negative trust anchors. These are - indicated by the keyword permanent in place of the expiry date. [GL - #1532] - -Bug Fixes - - * Fixed re-signing issues with inline zones which resulted in records - being re-signed late or not at all. - -License - -BIND 9 is open source software licensed under the terms of the Mozilla -Public License, version 2.0 (see the LICENSE file for the full text). - -The license requires that if you make changes to BIND and distribute them -outside your organization, those changes must be published under the same -license. It does not require that you publish or disclose anything other -than the changes you have made to our software. This requirement does not -affect anyone who is using BIND, with or without modifications, without -redistributing it, nor anyone redistributing BIND without changes. - -Those wishing to discuss license compliance may contact ISC at https:// -www.isc.org/contact/. - -End of Life - -BIND 9.17 is an unstable development branch. When its development is -complete, it will be renamed to BIND 9.18, which will be a stable branch. - -The end of life date for BIND 9.18 has not yet been determined. For those -needing long term support, the current Extended Support Version (ESV) is -BIND 9.11, which will be supported until at least December 2021. - -See https://kb.isc.org/docs/aa-00896 for details of ISC's software support -policy. - -Thank You - -Thank you to everyone who assisted us in making this release possible. diff --git a/doc/arm/notes.xml b/doc/arm/notes.xml deleted file mode 100644 index 4440a021be..0000000000 --- a/doc/arm/notes.xml +++ /dev/null @@ -1,33 +0,0 @@ - - - - - - -]> - - -
- - - - - - - - - - - - -
diff --git a/doc/arm/noteversion.xml.in b/doc/arm/noteversion.xml.in deleted file mode 100644 index 14bbba4389..0000000000 --- a/doc/arm/noteversion.xml.in +++ /dev/null @@ -1,12 +0,0 @@ - - -Release Notes for BIND Version @BIND9_VERSION@ diff --git a/doc/arm/options.grammar.xml b/doc/arm/options.grammar.xml deleted file mode 100644 index f1e393fae8..0000000000 --- a/doc/arm/options.grammar.xml +++ /dev/null @@ -1,309 +0,0 @@ - - - - - -options { - allow-new-zones boolean; - allow-notify { address_match_element; ... }; - allow-query { address_match_element; ... }; - allow-query-cache { address_match_element; ... }; - allow-query-cache-on { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-recursion { address_match_element; ... }; - allow-recursion-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update { address_match_element; ... }; - allow-update-forwarding { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( masters | - ipv4_address [ port integer ] | ipv6_address [ port - integer ] ) [ key string ]; ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | - * ) ] [ dscp integer ]; - answer-cookie boolean; - attach-cache string; - auth-nxdomain boolean; // default changed - auto-dnssec ( allow | maintain | off ); - automatic-interface-scan boolean; - avoid-v4-udp-ports { portrange; ... }; - avoid-v6-udp-ports { portrange; ... }; - bindkeys-file quoted_string; - blackhole { address_match_element; ... }; - cache-file quoted_string; - catalog-zones { zone string [ default-masters [ port integer ] - [ dscp integer ] { ( masters | ipv4_address [ port - integer ] | ipv6_address [ port integer ] ) [ key - string ]; ... } ] [ zone-directory quoted_string ] [ - in-memory boolean ] [ min-update-interval duration ]; ... }; - check-dup-records ( fail | warn | ignore ); - check-integrity boolean; - check-mx ( fail | warn | ignore ); - check-mx-cname ( fail | warn | ignore ); - check-names ( primary | master | - secondary | slave | response ) ( - fail | warn | ignore ); - check-sibling boolean; - check-spf ( warn | ignore ); - check-srv-cname ( fail | warn | ignore ); - check-wildcard boolean; - clients-per-query integer; - cookie-algorithm ( aes | siphash24 ); - cookie-secret string; - coresize ( default | unlimited | sizeval ); - datasize ( default | unlimited | sizeval ); - deny-answer-addresses { address_match_element; ... } [ - except-from { string; ... } ]; - deny-answer-aliases { string; ... } [ except-from { string; ... - } ]; - dialup ( notify | notify-passive | passive | refresh | boolean ); - directory quoted_string; - disable-algorithms string { string; - ... }; - disable-ds-digests string { string; - ... }; - disable-empty-zone string; - dns64 netprefix { - break-dnssec boolean; - clients { address_match_element; ... }; - exclude { address_match_element; ... }; - mapped { address_match_element; ... }; - recursive-only boolean; - suffix ipv6_address; - }; - dns64-contact string; - dns64-server string; - dnskey-sig-validity integer; - dnsrps-enable boolean; - dnsrps-options { unspecified-text }; - dnssec-accept-expired boolean; - dnssec-dnskey-kskonly boolean; - dnssec-loadkeys-interval integer; - dnssec-must-be-secure string boolean; - dnssec-policy string; - dnssec-secure-to-insecure boolean; - dnssec-update-mode ( maintain | no-resign ); - dnssec-validation ( yes | no | auto ); - dnstap { ( all | auth | client | forwarder | - resolver | update ) [ ( query | response ) ]; - ... }; - dnstap-identity ( quoted_string | none | - hostname ); - dnstap-output ( file | unix ) quoted_string [ - size ( unlimited | size ) ] [ versions ( - unlimited | integer ) ] [ suffix ( increment - | timestamp ) ]; - dnstap-version ( quoted_string | none ); - dscp integer; - dual-stack-servers [ port integer ] { ( quoted_string [ port - integer ] [ dscp integer ] | ipv4_address [ port - integer ] [ dscp integer ] | ipv6_address [ port - integer ] [ dscp integer ] ); ... }; - dump-file quoted_string; - edns-udp-size integer; - empty-contact string; - empty-server string; - empty-zones-enable boolean; - fetch-quota-params integer fixedpoint fixedpoint fixedpoint; - fetches-per-server integer [ ( drop | fail ) ]; - fetches-per-zone integer [ ( drop | fail ) ]; - files ( default | unlimited | sizeval ); - flush-zones-on-shutdown boolean; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address - | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - fstrm-set-buffer-hint integer; - fstrm-set-flush-timeout integer; - fstrm-set-input-queue-size integer; - fstrm-set-output-notify-threshold integer; - fstrm-set-output-queue-model ( mpsc | spsc ); - fstrm-set-output-queue-size integer; - fstrm-set-reopen-interval duration; - geoip-directory ( quoted_string | none ); - glue-cache boolean; - heartbeat-interval integer; - hostname ( quoted_string | none ); - inline-signing boolean; - interface-interval duration; - ixfr-from-differences ( primary | master | secondary | slave | - boolean ); - keep-response-order { address_match_element; ... }; - key-directory quoted_string; - lame-ttl duration; - listen-on [ port integer ] [ dscp - integer ] { - address_match_element; ... }; - listen-on-v6 [ port integer ] [ dscp - integer ] { - address_match_element; ... }; - lmdb-mapsize sizeval; - lock-file ( quoted_string | none ); - managed-keys-directory quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - match-mapped-addresses boolean; - max-cache-size ( default | unlimited | sizeval | percentage ); - max-cache-ttl duration; - max-clients-per-query integer; - max-journal-size ( default | unlimited | sizeval ); - max-ncache-ttl duration; - max-records integer; - max-recursion-depth integer; - max-recursion-queries integer; - max-refresh-time integer; - max-retry-time integer; - max-rsa-exponent-size integer; - max-stale-ttl duration; - max-transfer-idle-in integer; - max-transfer-idle-out integer; - max-transfer-time-in integer; - max-transfer-time-out integer; - max-udp-size integer; - max-zone-ttl ( unlimited | duration ); - memstatistics boolean; - memstatistics-file quoted_string; - message-compression boolean; - min-cache-ttl duration; - min-ncache-ttl duration; - min-refresh-time integer; - min-retry-time integer; - minimal-any boolean; - minimal-responses ( no-auth | no-auth-recursive | boolean ); - multi-master boolean; - new-zones-directory quoted_string; - no-case-compress { address_match_element; ... }; - nocookie-udp-size integer; - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-rate integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] - [ dscp integer ]; - notify-to-soa boolean; - nta-lifetime duration; - nta-recheck duration; - nxdomain-redirect string; - pid-file ( quoted_string | none ); - port integer; - preferred-glue string; - prefetch integer [ integer ]; - provide-ixfr boolean; - qname-minimization ( strict | relaxed | disabled | off ); - query-source ( ( [ address ] ( ipv4_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - querylog boolean; - random-device ( quoted_string | none ); - rate-limit { - all-per-second integer; - errors-per-second integer; - exempt-clients { address_match_element; ... }; - ipv4-prefix-length integer; - ipv6-prefix-length integer; - log-only boolean; - max-table-size integer; - min-table-size integer; - nodata-per-second integer; - nxdomains-per-second integer; - qps-scale integer; - referrals-per-second integer; - responses-per-second integer; - slip integer; - window integer; - }; - recursing-file quoted_string; - recursion boolean; - recursive-clients integer; - request-expire boolean; - request-ixfr boolean; - request-nsid boolean; - require-server-cookie boolean; - reserved-sockets integer; - resolver-nonbackoff-tries integer; - resolver-query-timeout integer; - resolver-retry-interval integer; - response-padding { address_match_element; ... } block-size - integer; - response-policy { zone string [ add-soa boolean ] [ log - boolean ] [ max-policy-ttl duration ] [ min-update-interval - duration ] [ policy ( cname | disabled | drop | given | no-op - | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [ - recursive-only boolean ] [ nsip-enable boolean ] [ - nsdname-enable boolean ]; ... } [ add-soa boolean ] [ - break-dnssec boolean ] [ max-policy-ttl duration ] [ - min-update-interval duration ] [ min-ns-dots integer ] [ - nsip-wait-recurse boolean ] [ qname-wait-recurse boolean ] - [ recursive-only boolean ] [ nsip-enable boolean ] [ - nsdname-enable boolean ] [ dnsrps-enable boolean ] [ - dnsrps-options { unspecified-text } ]; - root-delegation-only [ exclude { string; ... } ]; - root-key-sentinel boolean; - rrset-order { [ class string ] [ type string ] [ name - quoted_string ] string string; ... }; - secroots-file quoted_string; - send-cookie boolean; - serial-query-rate integer; - serial-update-method ( date | increment | unixtime ); - server-id ( quoted_string | none | hostname ); - servfail-ttl duration; - session-keyalg string; - session-keyfile ( quoted_string | none ); - session-keyname string; - sig-signing-nodes integer; - sig-signing-signatures integer; - sig-signing-type integer; - sig-validity-interval integer [ integer ]; - sortlist { address_match_element; ... }; - stacksize ( default | unlimited | sizeval ); - stale-answer-enable boolean; - stale-answer-ttl duration; - startup-notify-rate integer; - statistics-file quoted_string; - synth-from-dnssec boolean; - tcp-advertised-timeout integer; - tcp-clients integer; - tcp-idle-timeout integer; - tcp-initial-timeout integer; - tcp-keepalive-timeout integer; - tcp-listen-queue integer; - tkey-dhkey quoted_string integer; - tkey-domain quoted_string; - tkey-gssapi-credential quoted_string; - tkey-gssapi-keytab quoted_string; - transfer-format ( many-answers | one-answer ); - transfer-message-size integer; - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - transfers-in integer; - transfers-out integer; - transfers-per-ns integer; - trust-anchor-telemetry boolean; // experimental - try-tcp-refresh boolean; - update-check-ksk boolean; - use-alt-transfer-source boolean; - use-v4-udp-ports { portrange; ... }; - use-v6-udp-ports { portrange; ... }; - v6-bias integer; - validate-except { string; ... }; - version ( quoted_string | none ); - zero-no-soa-ttl boolean; - zero-no-soa-ttl-cache boolean; - zone-statistics ( full | terse | none | boolean ); -}; - diff --git a/doc/arm/pkcs11.rst b/doc/arm/pkcs11.rst new file mode 100644 index 0000000000..15bf04981a --- /dev/null +++ b/doc/arm/pkcs11.rst @@ -0,0 +1,521 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _pkcs11: + +PKCS#11 (Cryptoki) support +-------------------------- + +PKCS#11 (Public Key Cryptography Standard #11) defines a +platform-independent API for the control of hardware security modules +(HSMs) and other cryptographic support devices. + +BIND 9 is known to work with three HSMs: The AEP Keyper, which has been +tested with Debian Linux, Solaris x86 and Windows Server 2003; the +Thales nShield, tested with Debian Linux; and the Sun SCA 6000 +cryptographic acceleration board, tested with Solaris x86. In addition, +BIND can be used with all current versions of SoftHSM, a software-based +HSM simulator library produced by the OpenDNSSEC project. + +PKCS#11 makes use of a "provider library": a dynamically loadable +library which provides a low-level PKCS#11 interface to drive the HSM +hardware. The PKCS#11 provider library comes from the HSM vendor, and it +is specific to the HSM to be controlled. + +There are two available mechanisms for PKCS#11 support in BIND 9: +OpenSSL-based PKCS#11 and native PKCS#11. When using the first +mechanism, BIND uses a modified version of OpenSSL, which loads the +provider library and operates the HSM indirectly; any cryptographic +operations not supported by the HSM can be carried out by OpenSSL +instead. The second mechanism enables BIND to bypass OpenSSL completely; +BIND loads the provider library itself, and uses the PKCS#11 API to +drive the HSM directly. + +Prerequisites +~~~~~~~~~~~~~ + +See the documentation provided by your HSM vendor for information about +installing, initializing, testing and troubleshooting the HSM. + +Native PKCS#11 +~~~~~~~~~~~~~~ + +Native PKCS#11 mode will only work with an HSM capable of carrying out +*every* cryptographic operation BIND 9 may need. The HSM's provider +library must have a complete implementation of the PKCS#11 API, so that +all these functions are accessible. As of this writing, only the Thales +nShield HSM and SoftHSMv2 can be used in this fashion. For other HSMs, +including the AEP Keyper, Sun SCA 6000 and older versions of SoftHSM, +use OpenSSL-based PKCS#11. (Note: Eventually, when more HSMs become +capable of supporting native PKCS#11, it is expected that OpenSSL-based +PKCS#11 will be deprecated.) + +To build BIND with native PKCS#11, configure as follows: + +:: + + $ cd bind9 + $ ./configure --enable-native-pkcs11 \ + --with-pkcs11=provider-library-path + + +This will cause all BIND tools, including ``named`` and the ``dnssec-*`` +and ``pkcs11-*`` tools, to use the PKCS#11 provider library specified in +provider-library-path for cryptography. (The provider library path can +be overridden using the ``-E`` in ``named`` and the ``dnssec-*`` tools, +or the ``-m`` in the ``pkcs11-*`` tools.) + +Building SoftHSMv2 +^^^^^^^^^^^^^^^^^^ + +SoftHSMv2, the latest development version of SoftHSM, is available from +https://github.com/opendnssec/SoftHSMv2. It is a software library +developed by the OpenDNSSEC project (http://www.opendnssec.org) which +provides a PKCS#11 interface to a virtual HSM, implemented in the form +of a SQLite3 database on the local filesystem. It provides less security +than a true HSM, but it allows you to experiment with native PKCS#11 +when an HSM is not available. SoftHSMv2 can be configured to use either +OpenSSL or the Botan library to perform cryptographic functions, but +when using it for native PKCS#11 in BIND, OpenSSL is required. + +By default, the SoftHSMv2 configuration file is prefix/etc/softhsm2.conf +(where prefix is configured at compile time). This location can be +overridden by the SOFTHSM2_CONF environment variable. The SoftHSMv2 +cryptographic store must be installed and initialized before using it +with BIND. + +:: + + $ cd SoftHSMv2 + $ configure --with-crypto-backend=openssl --prefix=/opt/pkcs11/usr + $ make + $ make install + $ /opt/pkcs11/usr/bin/softhsm-util --init-token 0 --slot 0 --label softhsmv2 + + +OpenSSL-based PKCS#11 +~~~~~~~~~~~~~~~~~~~~~ + +OpenSSL-based PKCS#11 mode uses a modified version of the OpenSSL +library; stock OpenSSL does not fully support PKCS#11. ISC provides a +patch to OpenSSL to correct this. This patch is based on work originally +done by the OpenSolaris project; it has been modified by ISC to provide +new features such as PIN management and key-by-reference. + +There are two "flavors" of PKCS#11 support provided by the patched +OpenSSL, one of which must be chosen at configuration time. The correct +choice depends on the HSM hardware: + +- Use 'crypto-accelerator' with HSMs that have hardware cryptographic + acceleration features, such as the SCA 6000 board. This causes + OpenSSL to run all supported cryptographic operations in the HSM. + +- Use 'sign-only' with HSMs that are designed to function primarily as + secure key storage devices, but lack hardware acceleration. These + devices are highly secure, but are not necessarily any faster at + cryptography than the system CPU MDASH often, they are slower. It is + therefore most efficient to use them only for those cryptographic + functions that require access to the secured private key, such as + zone signing, and to use the system CPU for all other + computationally-intensive operations. The AEP Keyper is an example of + such a device. + +The modified OpenSSL code is included in the BIND 9 release, in the form +of a context diff against the latest versions of OpenSSL. OpenSSL 0.9.8, +1.0.0, 1.0.1 and 1.0.2 are supported; there are separate diffs for each +version. In the examples to follow, we use OpenSSL 0.9.8, but the same +methods work with OpenSSL 1.0.0 through 1.0.2. + +.. note:: + + The OpenSSL patches as of this writing (January 2016) support + versions 0.9.8zh, 1.0.0t, 1.0.1q and 1.0.2f. ISC will provide updated + patches as new versions of OpenSSL are released. The version number + in the following examples is expected to change. + +Before building BIND 9 with PKCS#11 support, it will be necessary to +build OpenSSL with the patch in place, and configure it with the path to +your HSM's PKCS#11 provider library. + +Patching OpenSSL +^^^^^^^^^^^^^^^^ + +:: + + $ wget http://www.openssl.org/source/openssl-0.9.8zc.tar.gz + + +Extract the tarball: + +:: + + $ tar zxf openssl-0.9.8zc.tar.gz + +Apply the patch from the BIND 9 release: + +:: + + $ patch -p1 -d openssl-0.9.8zc \ + < bind9/bin/pkcs11/openssl-0.9.8zc-patch + +.. + +.. note:: + + The patch file may not be compatible with the "patch" utility on all + operating systems. You may need to install GNU patch. + +When building OpenSSL, place it in a non-standard location so that it +does not interfere with OpenSSL libraries elsewhere on the system. In +the following examples, we choose to install into "/opt/pkcs11/usr". We +will use this location when we configure BIND 9. + +Later, when building BIND 9, the location of the custom-built OpenSSL +library will need to be specified via configure. + +Building OpenSSL for the AEP Keyper on Linux +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +The AEP Keyper is a highly secure key storage device, but does not +provide hardware cryptographic acceleration. It can carry out +cryptographic operations, but it is probably slower than your system's +CPU. Therefore, we choose the 'sign-only' flavor when building OpenSSL. + +The Keyper-specific PKCS#11 provider library is delivered with the +Keyper software. In this example, we place it /opt/pkcs11/usr/lib: + +:: + + $ cp pkcs11.GCC4.0.2.so.4.05 /opt/pkcs11/usr/lib/libpkcs11.so + +:: + + $ cd openssl-0.9.8zc + $ ./Configure linux-x86_64 \ + --pk11-libname=/opt/pkcs11/usr/lib/libpkcs11.so \ + --pk11-flavor=sign-only \ + --prefix=/opt/pkcs11/usr + +Building OpenSSL for the SCA 6000 on Solaris +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +The SCA-6000 PKCS#11 provider is installed as a system library, +libpkcs11. It is a true crypto accelerator, up to 4 times faster than +any CPU, so the flavor shall be 'crypto-accelerator'. + +In this example, we are building on Solaris x86 on an AMD64 system. + +:: + + $ cd openssl-0.9.8zc + $ ./Configure solaris64-x86_64-cc \ + --pk11-libname=/usr/lib/64/libpkcs11.so \ + --pk11-flavor=crypto-accelerator \ + --prefix=/opt/pkcs11/usr + +(For a 32-bit build, use "solaris-x86-cc" and /usr/lib/libpkcs11.so.) + +After configuring, run ``make`` and ``make test``. + +Building OpenSSL for SoftHSM +^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +SoftHSM (version 1) is a software library developed by the OpenDNSSEC +project (http://www.opendnssec.org) which provides a PKCS#11 interface +to a virtual HSM, implemented in the form of a SQLite3 database on the +local filesystem. SoftHSM uses the Botan library to perform +cryptographic functions. Though less secure than a true HSM, it can +allow you to experiment with PKCS#11 when an HSM is not available. + +The SoftHSM cryptographic store must be installed and initialized before +using it with OpenSSL, and the SOFTHSM_CONF environment variable must +always point to the SoftHSM configuration file: + +:: + + $ cd softhsm-1.3.7 + $ configure --prefix=/opt/pkcs11/usr + $ make + $ make install + $ export SOFTHSM_CONF=/opt/pkcs11/softhsm.conf + $ echo "0:/opt/pkcs11/softhsm.db" > $SOFTHSM_CONF + $ /opt/pkcs11/usr/bin/softhsm --init-token 0 --slot 0 --label softhsm + +SoftHSM can perform all cryptographic operations, but since it only uses +your system CPU, there is no advantage to using it for anything but +signing. Therefore, we choose the 'sign-only' flavor when building +OpenSSL. + +:: + + $ cd openssl-0.9.8zc + $ ./Configure linux-x86_64 \ + --pk11-libname=/opt/pkcs11/usr/lib/libsofthsm.so \ + --pk11-flavor=sign-only \ + --prefix=/opt/pkcs11/usr + +After configuring, run "``make``" and "``make test``". + +Once you have built OpenSSL, run "``apps/openssl engine pkcs11``" to +confirm that PKCS#11 support was compiled in correctly. The output +should be one of the following lines, depending on the flavor selected: + +:: + + (pkcs11) PKCS #11 engine support (sign only) + +Or: + +:: + + (pkcs11) PKCS #11 engine support (crypto accelerator) + +Next, run "``apps/openssl engine pkcs11 -t``". This will attempt to +initialize the PKCS#11 engine. If it is able to do so successfully, it +will report “``[ available ]``â€. + +If the output is correct, run "``make install``" which will install the +modified OpenSSL suite to ``/opt/pkcs11/usr``. + +Configuring BIND 9 for Linux with the AEP Keyper +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +:: + + $ cd ../bind9 + $ ./configure \ + --with-openssl=/opt/pkcs11/usr \ + --with-pkcs11=/opt/pkcs11/usr/lib/libpkcs11.so + +Configuring BIND 9 for Solaris with the SCA 6000 +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +:: + + $ cd ../bind9 + $ ./configure CC="cc -xarch=amd64" \ + --with-openssl=/opt/pkcs11/usr \ + --with-pkcs11=/usr/lib/64/libpkcs11.so + +(For a 32-bit build, omit CC="cc -xarch=amd64".) + +If configure complains about OpenSSL not working, you may have a +32/64-bit architecture mismatch. Or, you may have incorrectly specified +the path to OpenSSL (it should be the same as the --prefix argument to +the OpenSSL Configure). + +Configuring BIND 9 for SoftHSM +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +:: + + $ cd ../bind9 + $ ./configure \ + --with-openssl=/opt/pkcs11/usr \ + --with-pkcs11=/opt/pkcs11/usr/lib/libsofthsm.so + +After configuring, run "``make``", "``make test``" and +"``make install``". + +(Note: If "make test" fails in the "pkcs11" system test, you may have +forgotten to set the SOFTHSM_CONF environment variable.) + +PKCS#11 Tools +~~~~~~~~~~~~~ + +BIND 9 includes a minimal set of tools to operate the HSM, including +``pkcs11-keygen`` to generate a new key pair within the HSM, +``pkcs11-list`` to list objects currently available, ``pkcs11-destroy`` +to remove objects, and ``pkcs11-tokens`` to list available tokens. + +In UNIX/Linux builds, these tools are built only if BIND 9 is configured +with the --with-pkcs11 option. (Note: If --with-pkcs11 is set to "yes", +rather than to the path of the PKCS#11 provider, then the tools will be +built but the provider will be left undefined. Use the -m option or the +PKCS11_PROVIDER environment variable to specify the path to the +provider.) + +Using the HSM +~~~~~~~~~~~~~ + +For OpenSSL-based PKCS#11, we must first set up the runtime environment +so the OpenSSL and PKCS#11 libraries can be loaded: + +:: + + $ export LD_LIBRARY_PATH=/opt/pkcs11/usr/lib:${LD_LIBRARY_PATH} + +This causes ``named`` and other binaries to load the OpenSSL library +from ``/opt/pkcs11/usr/lib`` rather than from the default location. This +step is not necessary when using native PKCS#11. + +Some HSMs require other environment variables to be set. For example, +when operating an AEP Keyper, it is necessary to specify the location of +the "machine" file, which stores information about the Keyper for use by +the provider library. If the machine file is in +``/opt/Keyper/PKCS11Provider/machine``, use: + +:: + + $ export KEYPER_LIBRARY_PATH=/opt/Keyper/PKCS11Provider + +Such environment variables must be set whenever running any tool that +uses the HSM, including ``pkcs11-keygen``, ``pkcs11-list``, +``pkcs11-destroy``, ``dnssec-keyfromlabel``, ``dnssec-signzone``, +``dnssec-keygen``, and ``named``. + +We can now create and use keys in the HSM. In this case, we will create +a 2048 bit key and give it the label "sample-ksk": + +:: + + $ pkcs11-keygen -b 2048 -l sample-ksk + +To confirm that the key exists: + +:: + + $ pkcs11-list + Enter PIN: + object[0]: handle 2147483658 class 3 label[8] 'sample-ksk' id[0] + object[1]: handle 2147483657 class 2 label[8] 'sample-ksk' id[0] + +Before using this key to sign a zone, we must create a pair of BIND 9 +key files. The "dnssec-keyfromlabel" utility does this. In this case, we +will be using the HSM key "sample-ksk" as the key-signing key for +"example.net": + +:: + + $ dnssec-keyfromlabel -l sample-ksk -f KSK example.net + +The resulting K*.key and K*.private files can now be used to sign the +zone. Unlike normal K\* files, which contain both public and private key +data, these files will contain only the public key data, plus an +identifier for the private key which remains stored within the HSM. +Signing with the private key takes place inside the HSM. + +If you wish to generate a second key in the HSM for use as a +zone-signing key, follow the same procedure above, using a different +keylabel, a smaller key size, and omitting "-f KSK" from the +dnssec-keyfromlabel arguments: + +(Note: When using OpenSSL-based PKCS#11 the label is an arbitrary string +which identifies the key. With native PKCS#11, the label is a PKCS#11 +URI string which may include other details about the key and the HSM, +including its PIN. See :ref:`man_dnssec-keyfromlabel` for details.) + +:: + + $ pkcs11-keygen -b 1024 -l sample-zsk + $ dnssec-keyfromlabel -l sample-zsk example.net + +Alternatively, you may prefer to generate a conventional on-disk key, +using dnssec-keygen: + +:: + + $ dnssec-keygen example.net + +This provides less security than an HSM key, but since HSMs can be slow +or cumbersome to use for security reasons, it may be more efficient to +reserve HSM keys for use in the less frequent key-signing operation. The +zone-signing key can be rolled more frequently, if you wish, to +compensate for a reduction in key security. (Note: When using native +PKCS#11, there is no speed advantage to using on-disk keys, as +cryptographic operations will be done by the HSM regardless.) + +Now you can sign the zone. (Note: If not using the -S option to +``dnssec-signzone``, it will be necessary to add the contents of both +``K*.key`` files to the zone master file before signing it.) + +:: + + $ dnssec-signzone -S example.net + Enter PIN: + Verifying the zone using the following algorithms: + NSEC3RSASHA1. + Zone signing complete: + Algorithm: NSEC3RSASHA1: ZSKs: 1, KSKs: 1 active, 0 revoked, 0 stand-by + example.net.signed + +Specifying the engine on the command line +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +When using OpenSSL-based PKCS#11, the "engine" to be used by OpenSSL can +be specified in ``named`` and all of the BIND ``dnssec-*`` tools by +using the "-E " command line option. If BIND 9 is built with the +--with-pkcs11 option, this option defaults to "pkcs11". Specifying the +engine will generally not be necessary unless for some reason you wish +to use a different OpenSSL engine. + +If you wish to disable use of the "pkcs11" engine MDASH for +troubleshooting purposes, or because the HSM is unavailable MDASH set +the engine to the empty string. For example: + +:: + + $ dnssec-signzone -E '' -S example.net + +This causes ``dnssec-signzone`` to run as if it were compiled without +the --with-pkcs11 option. + +When built with native PKCS#11 mode, the "engine" option has a different +meaning: it specifies the path to the PKCS#11 provider library. This may +be useful when testing a new provider library. + +Running named with automatic zone re-signing +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +If you want ``named`` to dynamically re-sign zones using HSM keys, +and/or to to sign new records inserted via nsupdate, then ``named`` must +have access to the HSM PIN. In OpenSSL-based PKCS#11, this is +accomplished by placing the PIN into the openssl.cnf file (in the above +examples, ``/opt/pkcs11/usr/ssl/openssl.cnf``). + +The location of the openssl.cnf file can be overridden by setting the +OPENSSL_CONF environment variable before running ``named``. + +Sample openssl.cnf: + +:: + + openssl_conf = openssl_def + [ openssl_def ] + engines = engine_section + [ engine_section ] + pkcs11 = pkcs11_section + [ pkcs11_section ] + PIN = + +This will also allow the dnssec-\* tools to access the HSM without PIN +entry. (The pkcs11-\* tools access the HSM directly, not via OpenSSL, so +a PIN will still be required to use them.) + +In native PKCS#11 mode, the PIN can be provided in a file specified as +an attribute of the key's label. For example, if a key had the label +``pkcs11:object=local-zsk;pin-source=/etc/hsmpin``, then the PIN would +be read from the file ``/etc/hsmpin``. + +.. warning:: + + Placing the HSM's PIN in a text file in this manner may reduce the + security advantage of using an HSM. Be sure this is what you want to + do before configuring the system in this way. diff --git a/doc/arm/pkcs11.xml b/doc/arm/pkcs11.xml deleted file mode 100644 index 28f1ede561..0000000000 --- a/doc/arm/pkcs11.xml +++ /dev/null @@ -1,613 +0,0 @@ -]> - - - -
PKCS#11 (Cryptoki) support - - - PKCS#11 (Public Key Cryptography Standard #11) defines a - platform-independent API for the control of hardware security - modules (HSMs) and other cryptographic support devices. - - - BIND 9 is known to work with three HSMs: The AEP Keyper, which has - been tested with Debian Linux, Solaris x86 and Windows Server 2003; - the Thales nShield, tested with Debian Linux; and the Sun SCA 6000 - cryptographic acceleration board, tested with Solaris x86. In - addition, BIND can be used with all current versions of SoftHSM, - a software-based HSM simulator library produced by the OpenDNSSEC - project. - - - PKCS#11 makes use of a "provider library": a dynamically loadable - library which provides a low-level PKCS#11 interface to drive the HSM - hardware. The PKCS#11 provider library comes from the HSM vendor, and - it is specific to the HSM to be controlled. - - - There are two available mechanisms for PKCS#11 support in BIND 9: - OpenSSL-based PKCS#11 and native PKCS#11. When using the first - mechanism, BIND uses a modified version of OpenSSL, which loads - the provider library and operates the HSM indirectly; any - cryptographic operations not supported by the HSM can be carried - out by OpenSSL instead. The second mechanism enables BIND to bypass - OpenSSL completely; BIND loads the provider library itself, and uses - the PKCS#11 API to drive the HSM directly. - -
Prerequisites - - - See the documentation provided by your HSM vendor for - information about installing, initializing, testing and - troubleshooting the HSM. - -
-
Native PKCS#11 - - - Native PKCS#11 mode will only work with an HSM capable of carrying - out every cryptographic operation BIND 9 may - need. The HSM's provider library must have a complete implementation - of the PKCS#11 API, so that all these functions are accessible. As of - this writing, only the Thales nShield HSM and SoftHSMv2 can be used - in this fashion. For other HSMs, including the AEP Keyper, Sun SCA - 6000 and older versions of SoftHSM, use OpenSSL-based PKCS#11. - (Note: Eventually, when more HSMs become capable of supporting - native PKCS#11, it is expected that OpenSSL-based PKCS#11 will - be deprecated.) - - - To build BIND with native PKCS#11, configure as follows: - - -$ cd bind9 -$ ./configure --enable-native-pkcs11 \ - --with-pkcs11=provider-library-path - - - This will cause all BIND tools, including named - and the dnssec-* and pkcs11-* - tools, to use the PKCS#11 provider library specified in - provider-library-path for cryptography. - (The provider library path can be overridden using the - in named and the - dnssec-* tools, or the in - the pkcs11-* tools.) - -
Building SoftHSMv2 - - - SoftHSMv2, the latest development version of SoftHSM, is available - from - - https://github.com/opendnssec/SoftHSMv2 - . - It is a software library developed by the OpenDNSSEC project - ( - http://www.opendnssec.org - ) - which provides a PKCS#11 interface to a virtual HSM, implemented in - the form of a SQLite3 database on the local filesystem. It provides - less security than a true HSM, but it allows you to experiment with - native PKCS#11 when an HSM is not available. SoftHSMv2 can be - configured to use either OpenSSL or the Botan library to perform - cryptographic functions, but when using it for native PKCS#11 in - BIND, OpenSSL is required. - - - By default, the SoftHSMv2 configuration file is - prefix/etc/softhsm2.conf (where - prefix is configured at compile time). - This location can be overridden by the SOFTHSM2_CONF environment - variable. The SoftHSMv2 cryptographic store must be installed and - initialized before using it with BIND. - - -$ cd SoftHSMv2 -$ configure --with-crypto-backend=openssl --prefix=/opt/pkcs11/usr -$ make -$ make install -$ /opt/pkcs11/usr/bin/softhsm-util --init-token 0 --slot 0 --label softhsmv2 - -
-
-
OpenSSL-based PKCS#11 - - - OpenSSL-based PKCS#11 mode uses a modified version of the - OpenSSL library; stock OpenSSL does not fully support PKCS#11. - ISC provides a patch to OpenSSL to correct this. This patch is - based on work originally done by the OpenSolaris project; it has been - modified by ISC to provide new features such as PIN management and - key-by-reference. - - - There are two "flavors" of PKCS#11 support provided by - the patched OpenSSL, one of which must be chosen at - configuration time. The correct choice depends on the HSM - hardware: - - - - - Use 'crypto-accelerator' with HSMs that have hardware - cryptographic acceleration features, such as the SCA 6000 - board. This causes OpenSSL to run all supported - cryptographic operations in the HSM. - - - - - Use 'sign-only' with HSMs that are designed to - function primarily as secure key storage devices, but lack - hardware acceleration. These devices are highly secure, but - are not necessarily any faster at cryptography than the - system CPU — often, they are slower. It is therefore - most efficient to use them only for those cryptographic - functions that require access to the secured private key, - such as zone signing, and to use the system CPU for all - other computationally-intensive operations. The AEP Keyper - is an example of such a device. - - - - - The modified OpenSSL code is included in the BIND 9 release, - in the form of a context diff against the latest versions of - OpenSSL. OpenSSL 0.9.8, 1.0.0, 1.0.1 and 1.0.2 are supported; - there are separate diffs for each version. In the examples to - follow, we use OpenSSL 0.9.8, but the same methods work with - OpenSSL 1.0.0 through 1.0.2. - - - The OpenSSL patches as of this writing (January 2016) - support versions 0.9.8zh, 1.0.0t, 1.0.1q and 1.0.2f. - ISC will provide updated patches as new versions of OpenSSL - are released. The version number in the following examples - is expected to change. - - - Before building BIND 9 with PKCS#11 support, it will be - necessary to build OpenSSL with the patch in place, and configure - it with the path to your HSM's PKCS#11 provider library. - -
Patching OpenSSL - - -$ wget http://www.openssl.org/source/openssl-0.9.8zc.tar.gz - - Extract the tarball: - -$ tar zxf openssl-0.9.8zc.tar.gz - - Apply the patch from the BIND 9 release: - -$ patch -p1 -d openssl-0.9.8zc \ - < bind9/bin/pkcs11/openssl-0.9.8zc-patch - - - The patch file may not be compatible with the - "patch" utility on all operating systems. You may need to - install GNU patch. - - - When building OpenSSL, place it in a non-standard - location so that it does not interfere with OpenSSL libraries - elsewhere on the system. In the following examples, we choose - to install into "/opt/pkcs11/usr". We will use this location - when we configure BIND 9. - - - Later, when building BIND 9, the location of the custom-built - OpenSSL library will need to be specified via configure. - -
-
Building OpenSSL for the AEP Keyper on Linux - - - - The AEP Keyper is a highly secure key storage device, - but does not provide hardware cryptographic acceleration. It - can carry out cryptographic operations, but it is probably - slower than your system's CPU. Therefore, we choose the - 'sign-only' flavor when building OpenSSL. - - - The Keyper-specific PKCS#11 provider library is - delivered with the Keyper software. In this example, we place - it /opt/pkcs11/usr/lib: - - -$ cp pkcs11.GCC4.0.2.so.4.05 /opt/pkcs11/usr/lib/libpkcs11.so - - -$ cd openssl-0.9.8zc -$ ./Configure linux-x86_64 \ - --pk11-libname=/opt/pkcs11/usr/lib/libpkcs11.so \ - --pk11-flavor=sign-only \ - --prefix=/opt/pkcs11/usr - -
-
Building OpenSSL for the SCA 6000 on Solaris - - - - The SCA-6000 PKCS#11 provider is installed as a system - library, libpkcs11. It is a true crypto accelerator, up to 4 - times faster than any CPU, so the flavor shall be - 'crypto-accelerator'. - - - In this example, we are building on Solaris x86 on an - AMD64 system. - - -$ cd openssl-0.9.8zc -$ ./Configure solaris64-x86_64-cc \ - --pk11-libname=/usr/lib/64/libpkcs11.so \ - --pk11-flavor=crypto-accelerator \ - --prefix=/opt/pkcs11/usr - - - (For a 32-bit build, use "solaris-x86-cc" and /usr/lib/libpkcs11.so.) - - - After configuring, run - make and - make test. - -
-
Building OpenSSL for SoftHSM - - - - SoftHSM (version 1) is a software library developed by the - OpenDNSSEC project - ( - http://www.opendnssec.org - ) - which provides a - PKCS#11 interface to a virtual HSM, implemented in the form of - a SQLite3 database on the local filesystem. SoftHSM uses - the Botan library to perform cryptographic functions. Though - less secure than a true HSM, it can allow you to experiment - with PKCS#11 when an HSM is not available. - - - The SoftHSM cryptographic store must be installed and - initialized before using it with OpenSSL, and the SOFTHSM_CONF - environment variable must always point to the SoftHSM configuration - file: - - -$ cd softhsm-1.3.7 -$ configure --prefix=/opt/pkcs11/usr -$ make -$ make install -$ export SOFTHSM_CONF=/opt/pkcs11/softhsm.conf -$ echo "0:/opt/pkcs11/softhsm.db" > $SOFTHSM_CONF -$ /opt/pkcs11/usr/bin/softhsm --init-token 0 --slot 0 --label softhsm - - - SoftHSM can perform all cryptographic operations, but - since it only uses your system CPU, there is no advantage to using - it for anything but signing. Therefore, we choose the 'sign-only' - flavor when building OpenSSL. - - -$ cd openssl-0.9.8zc -$ ./Configure linux-x86_64 \ - --pk11-libname=/opt/pkcs11/usr/lib/libsofthsm.so \ - --pk11-flavor=sign-only \ - --prefix=/opt/pkcs11/usr - - - After configuring, run "make" - and "make test". - -
- - Once you have built OpenSSL, run - "apps/openssl engine pkcs11" to confirm - that PKCS#11 support was compiled in correctly. The output - should be one of the following lines, depending on the flavor - selected: - - - (pkcs11) PKCS #11 engine support (sign only) - - Or: - - (pkcs11) PKCS #11 engine support (crypto accelerator) - - - Next, run - "apps/openssl engine pkcs11 -t". This will - attempt to initialize the PKCS#11 engine. If it is able to - do so successfully, it will report - [ available ]. - - - If the output is correct, run - "make install" which will install the - modified OpenSSL suite to /opt/pkcs11/usr. - -
Configuring BIND 9 for Linux with the AEP Keyper - - - -$ cd ../bind9 -$ ./configure \ - --with-openssl=/opt/pkcs11/usr \ - --with-pkcs11=/opt/pkcs11/usr/lib/libpkcs11.so - -
-
Configuring BIND 9 for Solaris with the SCA 6000 - - - -$ cd ../bind9 -$ ./configure CC="cc -xarch=amd64" \ - --with-openssl=/opt/pkcs11/usr \ - --with-pkcs11=/usr/lib/64/libpkcs11.so - - (For a 32-bit build, omit CC="cc -xarch=amd64".) - - If configure complains about OpenSSL not working, you - may have a 32/64-bit architecture mismatch. Or, you may have - incorrectly specified the path to OpenSSL (it should be the - same as the --prefix argument to the OpenSSL - Configure). - -
-
Configuring BIND 9 for SoftHSM - - - -$ cd ../bind9 -$ ./configure \ - --with-openssl=/opt/pkcs11/usr \ - --with-pkcs11=/opt/pkcs11/usr/lib/libsofthsm.so - -
- - After configuring, run - "make", - "make test" and - "make install". - - - (Note: If "make test" fails in the "pkcs11" system test, you may - have forgotten to set the SOFTHSM_CONF environment variable.) - -
-
PKCS#11 Tools - - - BIND 9 includes a minimal set of tools to operate the - HSM, including - pkcs11-keygen to generate a new key pair - within the HSM, - pkcs11-list to list objects currently - available, - pkcs11-destroy to remove objects, and - pkcs11-tokens to list available tokens. - - - In UNIX/Linux builds, these tools are built only if BIND - 9 is configured with the --with-pkcs11 option. (Note: If - --with-pkcs11 is set to "yes", rather than to the path of the - PKCS#11 provider, then the tools will be built but the - provider will be left undefined. Use the -m option or the - PKCS11_PROVIDER environment variable to specify the path to the - provider.) - -
-
Using the HSM - - - For OpenSSL-based PKCS#11, we must first set up the runtime - environment so the OpenSSL and PKCS#11 libraries can be loaded: - - -$ export LD_LIBRARY_PATH=/opt/pkcs11/usr/lib:${LD_LIBRARY_PATH} - - - This causes named and other binaries to load - the OpenSSL library from /opt/pkcs11/usr/lib - rather than from the default location. This step is not necessary - when using native PKCS#11. - - - Some HSMs require other environment variables to be set. - For example, when operating an AEP Keyper, it is necessary to - specify the location of the "machine" file, which stores - information about the Keyper for use by the provider - library. If the machine file is in - /opt/Keyper/PKCS11Provider/machine, - use: - - -$ export KEYPER_LIBRARY_PATH=/opt/Keyper/PKCS11Provider - - - Such environment variables must be set whenever running - any tool that uses the HSM, including - pkcs11-keygen, - pkcs11-list, - pkcs11-destroy, - dnssec-keyfromlabel, - dnssec-signzone, - dnssec-keygen, and - named. - - - We can now create and use keys in the HSM. In this case, - we will create a 2048 bit key and give it the label - "sample-ksk": - - -$ pkcs11-keygen -b 2048 -l sample-ksk - - To confirm that the key exists: - -$ pkcs11-list -Enter PIN: -object[0]: handle 2147483658 class 3 label[8] 'sample-ksk' id[0] -object[1]: handle 2147483657 class 2 label[8] 'sample-ksk' id[0] - - - Before using this key to sign a zone, we must create a - pair of BIND 9 key files. The "dnssec-keyfromlabel" utility - does this. In this case, we will be using the HSM key - "sample-ksk" as the key-signing key for "example.net": - - -$ dnssec-keyfromlabel -l sample-ksk -f KSK example.net - - - The resulting K*.key and K*.private files can now be used - to sign the zone. Unlike normal K* files, which contain both - public and private key data, these files will contain only the - public key data, plus an identifier for the private key which - remains stored within the HSM. Signing with the private key takes - place inside the HSM. - - - If you wish to generate a second key in the HSM for use - as a zone-signing key, follow the same procedure above, using a - different keylabel, a smaller key size, and omitting "-f KSK" - from the dnssec-keyfromlabel arguments: - - - (Note: When using OpenSSL-based PKCS#11 the label is an arbitrary - string which identifies the key. With native PKCS#11, the label is - a PKCS#11 URI string which may include other details about the key - and the HSM, including its PIN. See - for details.) - - -$ pkcs11-keygen -b 1024 -l sample-zsk -$ dnssec-keyfromlabel -l sample-zsk example.net - - - Alternatively, you may prefer to generate a conventional - on-disk key, using dnssec-keygen: - - -$ dnssec-keygen example.net - - - This provides less security than an HSM key, but since - HSMs can be slow or cumbersome to use for security reasons, it - may be more efficient to reserve HSM keys for use in the less - frequent key-signing operation. The zone-signing key can be - rolled more frequently, if you wish, to compensate for a - reduction in key security. (Note: When using native PKCS#11, - there is no speed advantage to using on-disk keys, as cryptographic - operations will be done by the HSM regardless.) - - - Now you can sign the zone. (Note: If not using the -S - option to dnssec-signzone, it will be - necessary to add the contents of both K*.key - files to the zone master file before signing it.) - - -$ dnssec-signzone -S example.net -Enter PIN: -Verifying the zone using the following algorithms: -NSEC3RSASHA1. -Zone signing complete: -Algorithm: NSEC3RSASHA1: ZSKs: 1, KSKs: 1 active, 0 revoked, 0 stand-by -example.net.signed - -
-
Specifying the engine on the command line - - - When using OpenSSL-based PKCS#11, the "engine" to be used by - OpenSSL can be specified in named and all of - the BIND dnssec-* tools by using the "-E - <engine>" command line option. If BIND 9 is built with - the --with-pkcs11 option, this option defaults to "pkcs11". - Specifying the engine will generally not be necessary unless - for some reason you wish to use a different OpenSSL - engine. - - - If you wish to disable use of the "pkcs11" engine — - for troubleshooting purposes, or because the HSM is unavailable - — set the engine to the empty string. For example: - - -$ dnssec-signzone -E '' -S example.net - - - This causes - dnssec-signzone to run as if it were compiled - without the --with-pkcs11 option. - - - When built with native PKCS#11 mode, the "engine" option has a - different meaning: it specifies the path to the PKCS#11 provider - library. This may be useful when testing a new provider library. - -
-
Running named with automatic zone re-signing - - - If you want named to dynamically re-sign zones - using HSM keys, and/or to to sign new records inserted via nsupdate, - then named must have access to the HSM PIN. In OpenSSL-based PKCS#11, - this is accomplished by placing the PIN into the openssl.cnf file - (in the above examples, - /opt/pkcs11/usr/ssl/openssl.cnf). - - - The location of the openssl.cnf file can be overridden by - setting the OPENSSL_CONF environment variable before running - named. - - Sample openssl.cnf: - - openssl_conf = openssl_def - [ openssl_def ] - engines = engine_section - [ engine_section ] - pkcs11 = pkcs11_section - [ pkcs11_section ] - PIN = <PLACE PIN HERE> - - - This will also allow the dnssec-* tools to access the HSM - without PIN entry. (The pkcs11-* tools access the HSM directly, - not via OpenSSL, so a PIN will still be required to use - them.) - - - In native PKCS#11 mode, the PIN can be provided in a file specified - as an attribute of the key's label. For example, if a key had the label - pkcs11:object=local-zsk;pin-source=/etc/hsmpin, - then the PIN would be read from the file - /etc/hsmpin. - - - - Placing the HSM's PIN in a text file in this manner may reduce the - security advantage of using an HSM. Be sure this is what you want to - do before configuring the system in this way. - - -
-
diff --git a/doc/arm/pkgversion.xml.in b/doc/arm/pkgversion.xml.in deleted file mode 100644 index 74abbfcdc6..0000000000 --- a/doc/arm/pkgversion.xml.in +++ /dev/null @@ -1,12 +0,0 @@ - - - This version of the manual corresponds to BIND version @PACKAGE_VERSION@. diff --git a/doc/arm/plugins.rst b/doc/arm/plugins.rst new file mode 100644 index 0000000000..354d129b0d --- /dev/null +++ b/doc/arm/plugins.rst @@ -0,0 +1,91 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. _module-info: + +Plugins +------- + +Plugins are a mechanism to extend the functionality of ``named`` using +dynamically loadable libraries. By using plugins, core server +functionality can be kept simple for the majority of users; more complex +code implementing optional features need only be installed by users that +need those features. + +The plugin interface is a work in progress, and is expected to evolve as +more plugins are added. Currently, only "query plugins" are supported; +these modify the name server query logic. Other plugin types may be +added in the future. + +The only plugin currently included in BIND is ``filter-aaaa.so``, which +replaces the ``filter-aaaa`` feature that previously existed natively as +part of ``named``. The code for this feature has been removed from +``named``, and can no longer be configured using standard ``named.conf`` +syntax, but linking in the ``filter-aaaa.so`` plugin provides identical +functionality. + +Configuring Plugins +~~~~~~~~~~~~~~~~~~~ + +A plugin is configured with the ``plugin`` statement in ``named.conf``: + +:: + + plugin query "library.so" { + parameters + }; + + +In this example, file ``library.so`` is the plugin library. ``query`` +indicates that this is a query plugin. + +Multiple ``plugin`` statements can be specified, to load different +plugins or multiple instances of the same plugin. + +*parameters* are passed as an opaque string to the plugin's initialization +routine. Configuration syntax will differ depending on the module. + +Developing Plugins +~~~~~~~~~~~~~~~~~~ + +Each plugin implements four functions: + +- plugin_register + to allocate memory, configure a plugin instance, and attach to hook + points within + named + , +- plugin_destroy + to tear down the plugin instance and free memory, +- plugin_version + to check that the plugin is compatible with the current version of + the plugin API, +- plugin_check + to test syntactic correctness of the plugin parameters. + +At various locations within the ``named`` source code, there are "hook +points" at which a plugin may register itself. When a hook point is +reached while ``named`` is running, it is checked to see whether any +plugins have registered themselves there; if so, the associated "hook +action" is called - this is a function within the plugin library. Hook +actions may examine the runtime state and make changes - for example, +modifying the answers to be sent back to a client or forcing a query to +be aborted. More details can be found in the file +``lib/ns/include/ns/hooks.h``. diff --git a/doc/arm/plugins.xml b/doc/arm/plugins.xml deleted file mode 100644 index 507970b85d..0000000000 --- a/doc/arm/plugins.xml +++ /dev/null @@ -1,95 +0,0 @@ - - - -
Plugins - - - Plugins are a mechanism to extend the functionality of - named using dynamically loadable libraries. - By using plugins, core server functionality can be kept simple - for the majority of users; more complex code implementing optional - features need only be installed by users that need those features. - - - The plugin interface is a work in progress, and is expected to evolve - as more plugins are added. Currently, only "query plugins" are supported; - these modify the name server query logic. Other plugin types may be added - in the future. - - - The only plugin currently included in BIND is - filter-aaaa.so, which replaces the - filter-aaaa feature that previously existed natively - as part of named. - The code for this feature has been removed from named, - and can no longer be configured using standard - named.conf syntax, but linking in the - filter-aaaa.so plugin provides identical - functionality. - - -
Configuring Plugins - - A plugin is configured with the plugin - statement in named.conf: - - - plugin query "library.so" { - parameters - }; - - - In this example, file library.so is the plugin - library. query indicates that this is a query - plugin. - - - Multiple plugin statements can be specified, to load - different plugins or multiple instances of the same plugin. - - - parameters are passed as an opaque - string to the plugin's initialization routine. Configuration - syntax will differ depending on the module. - -
- -
Developing Plugins - - Each plugin implements four functions: - - plugin_register to allocate memory, - configure a plugin instance, and attach to hook points within - named, - plugin_destroy to tear down the plugin - instance and free memory, - plugin_version to check that the plugin - is compatible with the current version of the plugin API, - plugin_check to test syntactic - correctness of the plugin parameters. - - - - At various locations within the named source code, - there are "hook points" at which a plugin may register itself. - When a hook point is reached while named is - running, it is checked to see whether any plugins have registered - themselves there; if so, the associated "hook action" is called - - this is a function within the plugin library. Hook actions may - examine the runtime state and make changes - for example, modifying - the answers to be sent back to a client or forcing a query to be - aborted. More details can be found in the file - lib/ns/include/ns/hooks.h. - -
- -
diff --git a/doc/arm/redirect.zoneopt.xml b/doc/arm/redirect.zoneopt.xml deleted file mode 100644 index 91622cc2c1..0000000000 --- a/doc/arm/redirect.zoneopt.xml +++ /dev/null @@ -1,27 +0,0 @@ - - - - -zone string [ class ] { - type redirect; - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - dlz string; - file quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... }; - max-records integer; - max-zone-ttl ( unlimited | duration ); - zone-statistics ( full | terse | none | boolean ); -}; - diff --git a/doc/arm/reference.rst b/doc/arm/reference.rst new file mode 100644 index 0000000000..cb94dd6d40 --- /dev/null +++ b/doc/arm/reference.rst @@ -0,0 +1,6982 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. Reference: + +BIND 9 Configuration Reference +============================== + +BIND 9 configuration is broadly similar to BIND 8; however, there are a +few new areas of configuration, such as views. BIND 8 configuration +files should work with few alterations in BIND 9, although more complex +configurations should be reviewed to check if they can be more +efficiently implemented using the new features found in BIND 9. + +BIND 4 configuration files can be converted to the new format using the +shell script ``contrib/named-bootconf/named-bootconf.sh``. + +.. _configuration_file_elements: + +Configuration File Elements +--------------------------- + +Following is a list of elements used throughout the BIND configuration +file documentation: + +.. glossary:: + + ``acl_name`` + The name of an ``address_match_list`` as defined by the ``acl`` statement. + + ``address_match_list`` + A list of one or more ``ip_addr``, ``ip_prefix``, ``key_id``, or ``acl_name`` elements, see :ref:`address_match_lists`. + + ``masters_list`` + A named list of one or more ``ip_addr`` with optional ``key_id`` and/or ``ip_port``. A ``masters_list`` may include other ``masters_lists``. + + ``domain_name`` + A quoted string which will be used as a DNS name, for example "``my.test.domain``". + + ``namelist`` + A list of one or more ``domain_name`` elements. + + ``dotted_decimal`` + One to four integers valued 0 through 255 separated by dots ('.'), such as ``123``, ``45.67`` or ``89.123.45.67``. + + ``ip4_addr`` + An IPv4 address with exactly four elements in ``dotted_decimal`` notation. + + ``ip6_addr`` + An IPv6 address, such as ``2001:db8::1234` IPv6 scoped addresses that have ambiguity on their scope zones must be disambiguated by an appropriate zone ID with the percent character ('%') as delimiter. It is strongly recommended to use string zone names rather than numeric identifiers, in order to be robust against system configuration changes. However, since there is no standard mapping for such names and identifier values, currently only interface names as link identifiers are supported, assuming one-to-one mapping between interfaces and links. For example, a link-local address ``fe80::1`` on the link attached to the interface ``ne0`` can be specified as ``fe80::1%ne0``. Note that on most systems link-local addresses always have the ambiguity, and need to be disambiguated. + + ``ip_addr`` + An ``ip4_addr`` or ``ip6_addr``. + + ``ip_dscp`` + A ``number`` between 0 and 63, used to select a differentiated services code point (DSCP) value for use with outgoing traffic on operating systems that support DSCP. + + ``ip_port`` + An IP port ``number``. The ``number`` is limited to 0 through 65535, with values below 1024 typically restricted to use by processes running as root. In some cases, an asterisk (``*``) character can be used as a placeholder to select a random high-numbered port. + + ``ip_prefix`` + An IP network specified as an ``ip_addr``, followed by a slash ('/') and then the number of bits in the netmask. Trailing zeros in an``ip_addr`` may omitted. For example, ``127/8`` is the network ``127.0.0.0`` with network ``1.2.3.0`` with netmask ``255.255.255.240``. + When specifying a prefix involving a IPv6 scoped address the scope may be omitted. In that case the prefix will match packets from any scope. + + ``key_id`` + A ``domain_name`` representing the name of a shared key, to be used for transaction security. + + ``key_list`` + A list of one or more ``key_id``\ s, separated by semicolons and ending with a semicolon. + + ``number`` + A non-negative 32-bit integer (i.e., a number between 0 and 4294967295, inclusive). Its acceptable value might be further limited by the context in which it is used. + + ``fixedpoint`` + A non-negative real number that can be specified to the nearest one hundredth. Up to five digits can be specified before a decimal point, and up to two digits after, so the maximum value is 99999.99. Acceptable values might be further limited by the context in which it is used. + + ``path_name`` + A quoted string which will be used as a pathname, such as ``zones/master/my.test.domain``. + + ``port_list`` + A list of an ``ip_port`` or a port range. A port range is specified in the form of ``range`` followed by two ``ip_port``\ s, ``port_low`` and ``port_high``, which represents port numbers from ``port_low`` through ``port_high``, inclusive. ``port_low`` must not be larger than ``port_high``. For example, ``range 1024 65535`` represents ports from 1024 through 65535. In either case an asterisk ('\*') character is not allowed as a valid ``ip_port``. + + ``size_spec`` + A 64-bit unsigned integer, or the keywords ``unlimited`` or ``default``. Integers may take values 0 <= value <= 18446744073709551615, though certain parameters (such as ``max-journal-size``) may use a more limited range within these extremes. In most cases, setting a value to 0 does not literally mean zero; it means "undefined" or "as big as possible", depending on the context. See the explanations of particular parameters that use ``size_spec`` for details on how they interpret its use. Numeric values can optionally be followed by a scaling factor: ``K`` or ``k`` for kilobytes, ``M`` or ``m`` for megabytes, and ``G`` or ``g`` for gigabytes, which scale by 1024, 1024*1024, and 1024*1024*1024 respectively. + ``unlimited`` generally means "as big as possible", and is usually the best way to safely set a very large number. + ``default`` uses the limit that was in force when the server was started. + + ``size_or_percent`` + ``size_spec`` or integer value followed by'%' to represent percents. The behavior is exactly the same as ``size_spec``, but ``size_or_percent`` allows also to specify a positive integer value followed by '%' sign to represent percents. + + ``yes_or_no`` + Either ``yes`` or ``no``. The words ``true`` numbers ``1`` and ``0``. The words ``true`` and ``false`` are also accepted, as are the numbers ``1`` and ``0``. + + ``dialup_option`` + One of ``yes``, ``no``, ``notify``, ``notify-passive``, ``refresh`` or ``passive``. When used in a zone, ``notify-passive``, ``refresh``, and ``passive`` are restricted to slave and stub zones. + +.. _address_match_lists: + +Address Match Lists +~~~~~~~~~~~~~~~~~~~ + +Syntax +^^^^^^ + +:: + + address_match_list = address_match_list_element ; ... + + address_match_list_element = [ ! ] ( ip_address | ip_prefix | + key key_id | acl_name | { address_match_list } ) + +Definition and Usage +^^^^^^^^^^^^^^^^^^^^ + +Address match lists are primarily used to determine access control for +various server operations. They are also used in the ``listen-on`` and +``sortlist`` statements. The elements which constitute an address match +list can be any of the following: + +- an IP address (IPv4 or IPv6) + +- an IP prefix (in '/' notation) + +- a key ID, as defined by the ``key`` statement + +- the name of an address match list defined with the ``acl`` statement + +- a nested address match list enclosed in braces + +Elements can be negated with a leading exclamation mark (``!``), and the +match list names "any", "none", "localhost", and "localnets" are +predefined. More information on those names can be found in the +description of the acl statement. + +The addition of the key clause made the name of this syntactic element +something of a misnomer, since security keys can be used to validate +access without regard to a host or network address. Nonetheless, the +term "address match list" is still used throughout the documentation. + +When a given IP address or prefix is compared to an address match list, +the comparison takes place in approximately O(1) time. However, key +comparisons require that the list of keys be traversed until a matching +key is found, and therefore may be somewhat slower. + +The interpretation of a match depends on whether the list is being used +for access control, defining ``listen-on`` ports, or in a ``sortlist``, +and whether the element was negated. + +When used as an access control list, a non-negated match allows access +and a negated match denies access. If there is no match, access is +denied. The clauses ``allow-notify``, ``allow-recursion``, +``allow-recursion-on``, ``allow-query``, ``allow-query-on``, +``allow-query-cache``, ``allow-query-cache-on``, ``allow-transfer``, +``allow-update``, ``allow-update-forwarding``, ``blackhole``, and +``keep-response-order`` all use address match lists. Similarly, the +``listen-on`` option will cause the server to refuse queries on any of +the machine's addresses which do not match the list. + +Order of insertion is significant. If more than one element in an ACL is +found to match a given IP address or prefix, preference will be given to +the one that came *first* in the ACL definition. Because of this +first-match behavior, an element that defines a subset of another +element in the list should come before the broader element, regardless +of whether either is negated. For example, in ``1.2.3/24; ! 1.2.3.13;`` +the 1.2.3.13 element is completely useless because the algorithm will +match any lookup for 1.2.3.13 to the 1.2.3/24 element. Using +``! 1.2.3.13; 1.2.3/24`` fixes that problem by having 1.2.3.13 blocked +by the negation, but all other 1.2.3.\* hosts fall through. + +.. _comment_syntax: + +Comment Syntax +~~~~~~~~~~~~~~ + +The BIND 9 comment syntax allows for comments to appear anywhere that +whitespace may appear in a BIND configuration file. To appeal to +programmers of all kinds, they can be written in the C, C++, or +shell/perl style. + +Syntax +^^^^^^ + +:: + + /* This is a BIND comment as in C */ + +:: + + // This is a BIND comment as in C++ + +:: + + # This is a BIND comment as in common UNIX shells + # and perl + +Definition and Usage +^^^^^^^^^^^^^^^^^^^^ + +Comments may appear anywhere that whitespace may appear in a BIND +configuration file. + +C-style comments start with the two characters /\* (slash, star) and end +with \*/ (star, slash). Because they are completely delimited with these +characters, they can be used to comment only a portion of a line or to +span multiple lines. + +C-style comments cannot be nested. For example, the following is not +valid because the entire comment ends with the first \*/: + +:: + + /* This is the start of a comment. + This is still part of the comment. + /* This is an incorrect attempt at nesting a comment. */ + This is no longer in any comment. */ + +C++-style comments start with the two characters // (slash, slash) and +continue to the end of the physical line. They cannot be continued +across multiple physical lines; to have one logical comment span +multiple lines, each line must use the // pair. For example: + +:: + + // This is the start of a comment. The next line + // is a new comment, even though it is logically + // part of the previous comment. + +Shell-style (or perl-style, if you prefer) comments start with the +character ``#`` (number sign) and continue to the end of the physical +line, as in C++ comments. For example: + +:: + + # This is the start of a comment. The next line + # is a new comment, even though it is logically + # part of the previous comment. + +.. + +.. warning:: + + You cannot use the semicolon (``;``) character to start a comment such + as you would in a zone file. The semicolon indicates the end of a + configuration statement. + +.. _Configuration_File_Grammar: + +Configuration File Grammar +-------------------------- + +A BIND 9 configuration consists of statements and comments. Statements +end with a semicolon. Statements and comments are the only elements that +can appear without enclosing braces. Many statements contain a block of +sub-statements, which are also terminated with a semicolon. + +The following statements are supported: + + ``acl`` + defines a named IP address matching list, for access control and other uses. + + ``controls`` + declares control channels to be used by the ``rndc`` utility. + + ``dnssec-policy`` + describes a DNSSEC key and signing policy for zones. See :ref:`dnssec-policy Grammar ` for details. + + ``include`` + includes a file. + + ``key`` + specifies key information for use in authentication and authorization using TSIG. + + ``logging`` + specifies what the server logs, and where the log messages are sent. + + ``masters`` + defines a named masters list for inclusion in stub and slave zones' ``masters`` or ``also-notify`` lists. + + ``options`` + controls global server configuration options and sets defaults for other statements. + + ``server`` + sets certain configuration options on a per-server basis. + + ``statistics-channels`` + declares communication channels to get access to ``named`` statistics. + + ``trust-anchors`` + defines DNSSEC trust anchors: if used with the ``initial-key`` or ``initial-ds`` keyword, trust anchors are kept up to date using :rfc:`5011` trust anchor maintenance, and if used with ``static-key`` or ``static-ds``, keys are permanent. + + ``managed-keys`` + is identical to ``trust-anchors``; this option is deprecated in favor of ``trust-anchors`` with the ``initial-key`` keyword, and may be removed in a future release. for backward compatibility. + + ``trusted-keys`` + defines permanent trusted DNSSEC keys; this option is deprecated in favor of ``trust-anchors`` with the ``static-key`` keyword, and may be removed in a future release. | + ``view`` + defines a view. + + ``zone`` + defines a zone. + +The ``logging`` and ``options`` statements may only occur once per +configuration. + +.. _acl_grammar: + +``acl`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/acl.grammar.rst + +.. _acl: + +``acl`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``acl`` statement assigns a symbolic name to an address match list. +It gets its name from a primary use of address match lists: Access +Control Lists (ACLs). + +The following ACLs are built-in: + + ``any`` + Matches all hosts. + + ``none`` + Matches no hosts. + + ``localhost`` + Matches the IPv4 and IPv6 addresses of all network interfaces on the system. When addresses are added or removed, the ``localhost`` ACL element is updated to reflect the changes. + + ``localnets`` + Matches any host on an IPv4 or IPv6 network for which the system has an interface. When addresses are added or removed, the ``localnets`` ACL element is updated to reflect the changes. Some systems do not provide a way to determine the prefix lengths of local IPv6 addresses. In such a case, ``localnets`` only matches the local IPv6 addresses, just like ``localhost``. + +.. _controls_grammar: + +``controls`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/controls.grammar.rst + +.. _controls_statement_definition_and_usage: + +``controls`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``controls`` statement declares control channels to be used by +system administrators to control the operation of the name server. These +control channels are used by the ``rndc`` utility to send commands to +and retrieve non-DNS results from a name server. + +An ``inet`` control channel is a TCP socket listening at the specified +``ip_port`` on the specified ``ip_addr``, which can be an IPv4 or IPv6 +address. An ``ip_addr`` of ``*`` (asterisk) is interpreted as the IPv4 +wildcard address; connections will be accepted on any of the system's +IPv4 addresses. To listen on the IPv6 wildcard address, use an +``ip_addr`` of ``::``. If you will only use ``rndc`` on the local host, +using the loopback address (``127.0.0.1`` or ``::1``) is recommended for +maximum security. + +If no port is specified, port 953 is used. The asterisk "``*``" cannot +be used for ``ip_port``. + +The ability to issue commands over the control channel is restricted by +the ``allow`` and ``keys`` clauses. Connections to the control channel +are permitted based on the ``address_match_list``. This is for simple IP +address based filtering only; any ``key_id`` elements of the +``address_match_list`` are ignored. + +A ``unix`` control channel is a UNIX domain socket listening at the +specified path in the file system. Access to the socket is specified by +the ``perm``, ``owner`` and ``group`` clauses. Note on some platforms +(SunOS and Solaris) the permissions (``perm``) are applied to the parent +directory as the permissions on the socket itself are ignored. + +The primary authorization mechanism of the command channel is the +``key_list``, which contains a list of ``key_id``\ s. Each ``key_id`` in +the ``key_list`` is authorized to execute commands over the control +channel. See :ref:`admin_tools`) for information about +configuring keys in ``rndc``. + +If the ``read-only`` clause is enabled, the control channel is limited +to the following set of read-only commands: ``nta -dump``, ``null``, +``status``, ``showzone``, ``testgen``, and ``zonestatus``. By default, +``read-only`` is not enabled and the control channel allows read-write +access. + +If no ``controls`` statement is present, ``named`` will set up a default +control channel listening on the loopback address 127.0.0.1 and its IPv6 +counterpart ::1. In this case, and also when the ``controls`` statement +is present but does not have a ``keys`` clause, ``named`` will attempt +to load the command channel key from the file ``rndc.key`` in ``/etc`` +(or whatever ``sysconfdir`` was specified as when BIND was built). To +create a ``rndc.key`` file, run ``rndc-confgen -a``. + +The ``rndc.key`` feature was created to ease the transition of systems +from BIND 8, which did not have digital signatures on its command +channel messages and thus did not have a ``keys`` clause. It makes it +possible to use an existing BIND 8 configuration file in BIND 9 +unchanged, and still have ``rndc`` work the same way ``ndc`` worked in +BIND 8, simply by executing the command ``rndc-confgen -a`` after BIND 9 +is installed. + +Since the ``rndc.key`` feature is only intended to allow the +backward-compatible usage of BIND 8 configuration files, this feature +does not have a high degree of configurability. You cannot easily change +the key name or the size of the secret, so you should make a +``rndc.conf`` with your own key if you wish to change those things. The +``rndc.key`` file also has its permissions set such that only the owner +of the file (the user that ``named`` is running as) can access it. If +you desire greater flexibility in allowing other users to access +``rndc`` commands, then you need to create a ``rndc.conf`` file and make +it group readable by a group that contains the users who should have +access. + +To disable the command channel, use an empty ``controls`` statement: +``controls { };``. + +.. _include_grammar: + +``include`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +:: + + include filename; + +.. _include_statement: + +``include`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``include`` statement inserts the specified file (or files if a valid glob +expression is detected) at the point where the ``include`` statement is +encountered. The ``include`` statement facilitates the administration of +configuration files by permitting the reading or writing of some things but not +others. For example, the statement could include private keys that are readable +only by the name server. + +.. _key_grammar: + +``key`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/key.grammar.rst + +.. _key_statement: + +``key`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``key`` statement defines a shared secret key for use with TSIG (see +:ref:`tsig`) or the command channel (see :ref:`controls_statement_definition_and_usage`). + +The ``key`` statement can occur at the top level of the configuration +file or inside a ``view`` statement. Keys defined in top-level ``key`` +statements can be used in all views. Keys intended for use in a +``controls`` statement (see :ref:`controls_statement_definition_and_usage`) +must be defined at the top level. + +The key_id, also known as the key name, is a domain name uniquely +identifying the key. It can be used in a ``server`` statement to cause +requests sent to that server to be signed with this key, or in address +match lists to verify that incoming requests have been signed with a key +matching this name, algorithm, and secret. + +The algorithm_id is a string that specifies a security/authentication +algorithm. The ``named`` server supports ``hmac-md5``, ``hmac-sha1``, +``hmac-sha224``, ``hmac-sha256``, ``hmac-sha384`` and ``hmac-sha512`` +TSIG authentication. Truncated hashes are supported by appending the +minimum number of required bits preceded by a dash, e.g. +``hmac-sha1-80``. The secret_string is the secret to be used by the +algorithm, and is treated as a Base64 encoded string. + +.. _logging_grammar: + +``logging`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/logging.grammar.rst + +.. _logging_statement: + +``logging`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``logging`` statement configures a wide variety of logging options +for the name server. Its ``channel`` phrase associates output methods, +format options and severity levels with a name that can then be used +with the ``category`` phrase to select how various classes of messages +are logged. + +Only one ``logging`` statement is used to define as many channels and +categories as are wanted. If there is no ``logging`` statement, the +logging configuration will be: + +:: + + logging { + category default { default_syslog; default_debug; }; + category unmatched { null; }; + }; + +If ``named`` is started with the ``-L`` option, it logs to the specified +file at startup, instead of using syslog. In this case the logging +configuration will be: + +:: + + logging { + category default { default_logfile; default_debug; }; + category unmatched { null; }; + }; + +The logging configuration is only established when the entire +configuration file has been parsed. When the server is starting up, all +logging messages regarding syntax errors in the configuration file go to +the default channels, or to standard error if the ``-g`` option was +specified. + +.. _channel: + +The ``channel`` Phrase +^^^^^^^^^^^^^^^^^^^^^^ + +All log output goes to one or more *channels*; you can make as many of +them as you want. + +Every channel definition must include a destination clause that says +whether messages selected for the channel go to a file, to a particular +syslog facility, to the standard error stream, or are discarded. It can +optionally also limit the message severity level that will be accepted +by the channel (the default is ``info``), and whether to include a +``named``-generated time stamp, the category name and/or severity level +(the default is not to include any). + +The ``null`` destination clause causes all messages sent to the channel +to be discarded; in that case, other options for the channel are +meaningless. + +The ``file`` destination clause directs the channel to a disk file. It +can include additional arguments to specify how large the file is +allowed to become before it is rolled to a backup file (``size``), how +many backup versions of the file will be saved each time this happens +(``versions``), and the format to use for naming backup versions +(``suffix``). + +The ``size`` option is used to limit log file growth. If the file ever +exceeds the specified size, then ``named`` will stop writing to the file +unless it has a ``versions`` option associated with it. If backup +versions are kept, the files are rolled as described below. If there is +no ``versions`` option, no more data will be written to the log until +some out-of-band mechanism removes or truncates the log to less than the +maximum size. The default behavior is not to limit the size of the file. + +File rolling only occurs when the file exceeds the size specified with +the ``size`` option. No backup versions are kept by default; any +existing log file is simply appended. The ``versions`` option specifies +how many backup versions of the file should be kept. If set to +``unlimited``, there is no limit. + +The ``suffix`` option can be set to either ``increment`` or +``timestamp``. If set to ``timestamp``, then when a log file is rolled, +it is saved with the current timestamp as a file suffix. If set to +``increment``, then backup files are saved with incrementing numbers as +suffixes; older files are renamed when rolling. For example, if +``versions`` is set to 3 and ``suffix`` to ``increment``, then when +``filename.log`` reaches the size specified by ``size``, +``filename.log.1`` is renamed to ``filename.log.2``, ``filename.log.0`` +is renamed to ``filename.log.1``, and ``filename.log`` is renamed to +``filename.log.0``, whereupon a new ``filename.log`` is opened. + +Example usage of the ``size``, ``versions``, and ``suffix`` options: + +:: + + channel an_example_channel { + file "example.log" versions 3 size 20m suffix increment; + print-time yes; + print-category yes; + }; + +The ``syslog`` destination clause directs the channel to the system log. +Its argument is a syslog facility as described in the ``syslog`` man +page. Known facilities are ``kern``, ``user``, ``mail``, ``daemon``, +``auth``, ``syslog``, ``lpr``, ``news``, ``uucp``, ``cron``, +``authpriv``, ``ftp``, ``local0``, ``local1``, ``local2``, ``local3``, +``local4``, ``local5``, ``local6`` and ``local7``, however not all +facilities are supported on all operating systems. How ``syslog`` will +handle messages sent to this facility is described in the +``syslog.conf`` man page. If you have a system which uses a very old +version of ``syslog`` that only uses two arguments to the ``openlog()`` +function, then this clause is silently ignored. + +On Windows machines syslog messages are directed to the EventViewer. + +The ``severity`` clause works like ``syslog``'s "priorities", except +that they can also be used if you are writing straight to a file rather +than using ``syslog``. Messages which are not at least of the severity +level given will not be selected for the channel; messages of higher +severity levels will be accepted. + +If you are using ``syslog``, then the ``syslog.conf`` priorities will +also determine what eventually passes through. For example, defining a +channel facility and severity as ``daemon`` and ``debug`` but only +logging ``daemon.warning`` via ``syslog.conf`` will cause messages of +severity ``info`` and ``notice`` to be dropped. If the situation were +reversed, with ``named`` writing messages of only ``warning`` or higher, +then ``syslogd`` would print all messages it received from the channel. + +The ``stderr`` destination clause directs the channel to the server's +standard error stream. This is intended for use when the server is +running as a foreground process, for example when debugging a +configuration. + +The server can supply extensive debugging information when it is in +debugging mode. If the server's global debug level is greater than zero, +then debugging mode will be active. The global debug level is set either +by starting the ``named`` server with the ``-d`` flag followed by a +positive integer, or by running ``rndc trace``. The global debug level +can be set to zero, and debugging mode turned off, by running ``rndc +notrace``. All debugging messages in the server have a debug level, and +higher debug levels give more detailed output. Channels that specify a +specific debug severity, for example: + +:: + + channel specific_debug_level { + file "foo"; + severity debug 3; + }; + +will get debugging output of level 3 or less any time the server is in +debugging mode, regardless of the global debugging level. Channels with +``dynamic`` severity use the server's global debug level to determine +what messages to print. + +``print-time`` can be set to ``yes``, ``no``, or a time format +specifier, which may be one of ``local``, ``iso8601`` or +``iso8601-utc``. If set to ``no``, then the date and time will not be +logged. If set to ``yes`` or ``local``, the date and time are logged in +a human readable format, using the local time zone. If set to +``iso8601`` the local time is logged in ISO8601 format. If set to +``iso8601-utc``, then the date and time are logged in ISO8601 format, +with time zone set to UTC. The default is ``no``. + +``print-time`` may be specified for a ``syslog`` channel, but it is +usually pointless since ``syslog`` also logs the date and time. + +If ``print-category`` is requested, then the category of the message +will be logged as well. Finally, if ``print-severity`` is on, then the +severity level of the message will be logged. The ``print-`` options may +be used in any combination, and will always be printed in the following +order: time, category, severity. Here is an example where all three +``print-`` options are on: + +``28-Feb-2000 15:05:32.863 general: notice: running`` + +If ``buffered`` has been turned on the output to files will not be +flushed after each log entry. By default all log messages are flushed. + +There are four predefined channels that are used for ``named``'s default +logging as follows. If ``named`` is started with the ``-L`` then a fifth +channel ``default_logfile`` is added. How they are used is described in +:ref:`the_category_phrase`. + +:: + + channel default_syslog { + // send to syslog's daemon facility + syslog daemon; + // only send priority info and higher + severity info; + }; + + channel default_debug { + // write to named.run in the working directory + // Note: stderr is used instead of "named.run" if + // the server is started with the '-g' option. + file "named.run"; + // log at the server's current debug level + severity dynamic; + }; + + channel default_stderr { + // writes to stderr + stderr; + // only send priority info and higher + severity info; + }; + + channel null { + // toss anything sent to this channel + null; + }; + + channel default_logfile { + // this channel is only present if named is + // started with the -L option, whose argument + // provides the file name + file "..."; + // log at the server's current debug level + severity dynamic; + }; + +The ``default_debug`` channel has the special property that it only +produces output when the server's debug level is nonzero. It normally +writes to a file called ``named.run`` in the server's working directory. + +For security reasons, when the ``-u`` command line option is used, the +``named.run`` file is created only after ``named`` has changed to the +new UID, and any debug output generated while ``named`` is starting up +and still running as root is discarded. If you need to capture this +output, you must run the server with the ``-L`` option to specify a +default logfile, or the ``-g`` option to log to standard error which you +can redirect to a file. + +Once a channel is defined, it cannot be redefined. Thus you cannot alter +the built-in channels directly, but you can modify the default logging +by pointing categories at channels you have defined. + +.. _the_category_phrase: + +The ``category`` Phrase +^^^^^^^^^^^^^^^^^^^^^^^ + +There are many categories, so you can send the logs you want to see +wherever you want, without seeing logs you don't want. If you don't +specify a list of channels for a category, then log messages in that +category will be sent to the ``default`` category instead. If you don't +specify a default category, the following "default default" is used: + +:: + + category default { default_syslog; default_debug; }; + +If you start ``named`` with the ``-L`` option then the default category +is: + +:: + + category default { default_logfile; default_debug; }; + +As an example, let's say you want to log security events to a file, but +you also want keep the default logging behavior. You'd specify the +following: + +:: + + channel my_security_channel { + file "my_security_file"; + severity info; + }; + category security { + my_security_channel; + default_syslog; + default_debug; + }; + +To discard all messages in a category, specify the ``null`` channel: + +:: + + category xfer-out { null; }; + category notify { null; }; + +Following are the available categories and brief descriptions of the +types of log information they contain. More categories may be added in +future BIND releases. + +.. include:: logging-categories.rst + +.. _query_errors: + +The ``query-errors`` Category +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +The ``query-errors`` category is used to indicate why and how specific queries +resulted in responses which indicate an error. Normally, these messages will be +logged at ``debug`` logging levels; note, however, that if query logging is +active, some will be logged at ``info``. The logging levels are described below: + +At ``debug`` levels of 1 or higher, - or at ``info``, when query logging is +active - each response with the rcode of SERVFAIL is logged as follows: + +``client 127.0.0.1#61502: query failed (SERVFAIL) for www.example.com/IN/AAAA at query.c:3880`` + +This means an error resulting in SERVFAIL was detected at line 3880 of source +file ``query.c``. Log messages of this level will particularly help identify +the cause of SERVFAIL for an authoritative server. + +At ``debug`` level 2 or higher, detailed context information about recursive +resolutions that resulted in SERVFAIL will be logged. The log message will look +like this: + +:: + + fetch completed at resolver.c:2970 for www.example.com/A + in 10.000183: timed out/success [domain:example.com, + referral:2,restart:7,qrysent:8,timeout:5,lame:0,quota:0,neterr:0, + badresp:1,adberr:0,findfail:0,valfail:0] + +The first part before the colon shows that a recursive resolution for +AAAA records of www.example.com completed in 10.000183 seconds and the +final result that led to the SERVFAIL was determined at line 2970 of +source file ``resolver.c``. + +The following part shows the detected final result and the latest result of +DNSSEC validation. The latter is always "success" when no validation attempt +was made. In this example, this query probably resulted in SERVFAIL because all +name servers are down or unreachable, leading to a timeout in 10 seconds. +DNSSEC validation was probably not attempted. + +The last part, enclosed in square brackets, shows statistics collected for this +particular resolution attempt. The ``domain`` field shows the deepest zone that +the resolver reached; it is the zone where the error was finally detected. The +meaning of the other fields is summarized in the following list. + +``referral`` + The number of referrals the resolver received throughout the resolution process. In the above example.com there are two. + +``restart`` + The number of cycles that the resolver tried remote servers at the ``domain`` zone. In each cycle the resolver sends one query (possibly resending it, depending on the response) to each known name server of the ``domain`` zone. + +``qrysent`` + The number of queries the resolver sent at the ``domain`` zone. + +``timeout`` + The number of timeouts since the resolver received since the last response. + +``lame`` + The number of lame servers the resolver detected at the ``domain`` zone. A server is detected to be lame either by an invalid response or as a result of lookup in BIND9's address database (ADB), where lame servers are cached. + +``quota`` + The number of times the resolver was unable to send a query because it had exceeded the permissible fetch quota for a server. + +``neterr`` + The number of erroneous results that the resolver encountered in sending queries at the ``domain`` zone. One common case is the remote server is unreachable and the resolver receives an ICMP unreachable error message. | + +``badresp`` + The number of unexpected responses (other than``lame``) to queries sent by the resolver at the``domain`` zone. + +``adberr`` + Failures in finding remote server addresses of the``domain`` zone in the ADB. One common case of this is that the remote server's name does not have any address records. + +``findfail`` + Failures of resolving remote server addresses. This is a total number of failures throughout the eesolution process. + +``valfail`` + Failures of DNSSEC validation. Validation failures are counted throughout the resolution process (not limited to the ``domain`` zone), but should only happen in ``domain``. + +At ``debug`` level 3 or higher, the same messages as those at +``debug`` level 1 will be logged for other errors than +SERVFAIL. Note that negative responses such as NXDOMAIN are not errors, and are +not logged at this debug level. + +At ``debug`` level 4 or higher, the detailed context information logged at +``debug`` level 2 will be logged for other errors than SERVFAIL and for negative +resonses such as NXDOMAIN. + +.. _masters_grammar: + +``masters`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/masters.grammar.rst + +.. _masters_statement: + +``masters`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +``masters`` lists allow for a common set of masters to be easily used by +multiple stub and slave zones in their ``masters`` or ``also-notify`` +lists. + +.. _options_grammar: + +``options`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +This is the grammar of the ``options`` statement in the ``named.conf`` +file: + +.. include:: ../misc/options.grammar.rst + +.. _options: + +``options`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``options`` statement sets up global options to be used by BIND. +This statement may appear only once in a configuration file. If there is +no ``options`` statement, an options block with each option set to its +default will be used. + +``attach-cache`` + Allows multiple views to share a single cache database. Each view has + its own cache database by default, but if multiple views have the + same operational policy for name resolution and caching, those views + can share a single cache to save memory and possibly improve + resolution efficiency by using this option. + + The ``attach-cache`` option may also be specified in ``view`` + statements, in which case it overrides the global ``attach-cache`` + option. + + The cache_name specifies the cache to be shared. When the ``named`` + server configures views which are supposed to share a cache, it + creates a cache with the specified name for the first view of these + sharing views. The rest of the views will simply refer to the already + created cache. + + One common configuration to share a cache would be to allow all views + to share a single cache. This can be done by specifying the + ``attach-cache`` as a global option with an arbitrary name. + + Another possible operation is to allow a subset of all views to share + a cache while the others to retain their own caches. For example, if + there are three views A, B, and C, and only A and B should share a + cache, specify the ``attach-cache`` option as a view A (or B)'s + option, referring to the other view name: + + :: + + view "A" { + // this view has its own cache + ... + }; + view "B" { + // this view refers to A's cache + attach-cache "A"; + }; + view "C" { + // this view has its own cache + ... + }; + + Views that share a cache must have the same policy on configurable + parameters that may affect caching. The current implementation + requires the following configurable options be consistent among these + views: ``check-names``, ``dnssec-accept-expired``, + ``dnssec-validation``, ``max-cache-ttl``, ``max-ncache-ttl``, + ``max-stale-ttl``, ``max-cache-size``, and ``min-cache-ttl``, + ``min-ncache-ttl``, ``zero-no-soa-ttl``. + + Note that there may be other parameters that may cause confusion if + they are inconsistent for different views that share a single cache. + For example, if these views define different sets of forwarders that + can return different answers for the same question, sharing the + answer does not make sense or could even be harmful. It is + administrator's responsibility to ensure configuration differences in + different views do not cause disruption with a shared cache. + +``directory`` + The working directory of the server. Any non-absolute pathnames in + the configuration file will be taken as relative to this directory. + The default location for most server output files (e.g. + ``named.run``) is this directory. If a directory is not specified, + the working directory defaults to \`\ ``.``', the directory from + which the server was started. The directory specified should be an + absolute path, and *must* be writable by the effective user ID of the + ``named`` process. + +``dnstap`` + ``dnstap`` is a fast, flexible method for capturing and logging DNS + traffic. Developed by Robert Edmonds at Farsight Security, Inc., and + supported by multiple DNS implementations, ``dnstap`` uses + ``libfstrm`` (a lightweight high-speed framing library, see + https://github.com/farsightsec/fstrm) to send event payloads which + are encoded using Protocol Buffers (``libprotobuf-c``, a mechanism + for serializing structured data developed by Google, Inc.; see + https://developers.google.com/protocol-buffers/). + + To enable ``dnstap`` at compile time, the ``fstrm`` and + ``protobuf-c`` libraries must be available, and BIND must be + configured with ``--enable-dnstap``. + + The ``dnstap`` option is a bracketed list of message types to be + logged. These may be set differently for each view. Supported types + are ``client``, ``auth``, ``resolver``, ``forwarder``, and + ``update``. Specifying type ``all`` will cause all ``dnstap`` + messages to be logged, regardless of type. + + Each type may take an additional argument to indicate whether to log + ``query`` messages or ``response`` messages; if not specified, both + queries and responses are logged. + + Example: To log all authoritative queries and responses, recursive + client responses, and upstream queries sent by the resolver, use: + + :: + + dnstap { + auth; + client response; + resolver query; + }; + + Logged ``dnstap`` messages can be parsed using the ``dnstap-read`` + utility (see :ref:`man_dnstap-read` for details). + + For more information on ``dnstap``, see http://dnstap.info. + + The fstrm library has a number of tunables that are exposed in + ``named.conf``, and can be modified if necessary to improve + performance or prevent loss of data. These are: + + - ``fstrm-set-buffer-hint``: The threshold number of bytes to + accumulate in the output buffer before forcing a buffer flush. The + minimum is 1024, the maximum is 65536, and the default is 8192. + + - ``fstrm-set-flush-timeout``: The number of seconds to allow + unflushed data to remain in the output buffer. The minimum is 1 + second, the maximum is 600 seconds (10 minutes), and the default + is 1 second. + + - ``fstrm-set-output-notify-threshold``: The number of outstanding + queue entries to allow on an input queue before waking the I/O + thread. The minimum is 1 and the default is 32. + + - ``fstrm-set-output-queue-model``: Controls the queuing semantics + to use for queue objects. The default is ``mpsc`` (multiple + producer, single consumer); the other option is ``spsc`` (single + producer, single consumer). + + - ``fstrm-set-input-queue-size``: The number of queue entries to + allocate for each input queue. This value must be a power of 2. + The minimum is 2, the maximum is 16384, and the default is 512. + + - ``fstrm-set-output-queue-size``: The number of queue entries to + allocate for each output queue. The minimum is 2, the maximum is + system-dependent and based on ``IOV_MAX``, and the default is 64. + + - ``fstrm-set-reopen-interval``: The number of seconds to wait + between attempts to reopen a closed output stream. The minimum is + 1 second, the maximum is 600 seconds (10 minutes), and the default + is 5 seconds. For convenience, TTL-style time unit suffixes may be + used to specify the value. + + Note that all of the above minimum, maximum, and default values are + set by the ``libfstrm`` library, and may be subject to change in + future versions of the library. See the ``libfstrm`` documentation + for more information. + +``dnstap-output`` + Configures the path to which the ``dnstap`` frame stream will be sent + if ``dnstap`` is enabled at compile time and active. + + The first argument is either ``file`` or ``unix``, indicating whether + the destination is a file or a UNIX domain socket. The second + argument is the path of the file or socket. (Note: when using a + socket, ``dnstap`` messages will only be sent if another process such + as ``fstrm_capture`` (provided with ``libfstrm``) is listening on the + socket.) + + If the first argument is ``file``, then up to three additional + options can be added: ``size`` indicates the size to which a + ``dnstap`` log file can grow before being rolled to a new file; + ``versions`` specifies the number of rolled log files to retain; and + ``suffix`` indicates whether to retain rolled log files with an + incrementing counter as the suffix (``increment``) or with the + current timestamp (``timestamp``). These are similar to the ``size``, + ``versions``, and ``suffix`` options in a ``logging`` channel. The + default is to allow ``dnstap`` log files to grow to any size without + rolling. + + ``dnstap-output`` can only be set globally in ``options``. Currently, + it can only be set once while ``named`` is running; once set, it + cannot be changed by ``rndc reload`` or ``rndc reconfig``. + +``dnstap-identity`` + Specifies an ``identity`` string to send in ``dnstap`` messages. If + set to ``hostname``, which is the default, the server's hostname will + be sent. If set to ``none``, no identity string will be sent. + +``dnstap-version`` + Specifies a ``version`` string to send in ``dnstap`` messages. The + default is the version number of the BIND release. If set to + ``none``, no version string will be sent. + +``geoip-directory`` + When ``named`` is compiled using the MaxMind GeoIP2 geolocation API, this + specifies the directory containing GeoIP database files. By default, the + option is set based on the prefix used to build the ``libmaxminddb`` module: + for example, if the library is installed in ``/usr/local/lib``, then the + default ``geoip-directory`` will be ``/usr/local/share/GeoIP``. On Windows, + the default is the ``named`` working directory. See :ref:`acl` + for details about ``geoip`` ACLs. + +``key-directory`` + When performing dynamic update of secure zones, the directory where + the public and private DNSSEC key files should be found, if different + than the current working directory. (Note that this option has no + effect on the paths for files containing non-DNSSEC keys such as + ``bind.keys``, ``rndc.key`` or ``session.key``.) + +``lmdb-mapsize`` + When ``named`` is built with liblmdb, this option sets a maximum size + for the memory map of the new-zone database (NZD) in LMDB database + format. This database is used to store configuration information for + zones added using ``rndc addzone``. Note that this is not the NZD + database file size, but the largest size that the database may grow + to. + + Because the database file is memory mapped, its size is limited by + the address space of the named process. The default of 32 megabytes + was chosen to be usable with 32-bit ``named`` builds. The largest + permitted value is 1 terabyte. Given typical zone configurations + without elaborate ACLs, a 32 MB NZD file ought to be able to hold + configurations of about 100,000 zones. + +``managed-keys-directory`` + Specifies the directory in which to store the files that track managed DNSSEC + keys (i.e., those configured using the ``initial-key`` or ``initial-ds`` + keywords in a ``trust-anchors`` statement). By default, this is the working + directory. The directory *must* be writable by the effective user ID of the + ``named`` process. + + If ``named`` is not configured to use views, then managed keys for + the server will be tracked in a single file called + ``managed-keys.bind``. Otherwise, managed keys will be tracked in + separate files, one file per view; each file name will be the view + name (or, if it contains characters that are incompatible with use as + a file name, the SHA256 hash of the view name), followed by the + extension ``.mkeys``. + + (Note: in previous releases, file names for views always used the + SHA256 hash of the view name. To ensure compatibility after upgrade, + if a file using the old name format is found to exist, it will be + used instead of the new format.) + +``max-ixfr-ratio`` + Sets the size threshold (expressed as a percentage of the size of the full + zone) beyond which ``named`` will choose to use an AXFR response rather than + IXFR when answering zone transfer requests. See + :ref:`incremental_zone_transfers`. + +``new-zones-directory`` + Specifies the directory in which to store the configuration + parameters for zones added via ``rndc addzone``. By default, this is + the working directory. If set to a relative path, it will be relative + to the working directory. The directory *must* be writable by the + effective user ID of the ``named`` process. + +``qname-minimization`` + This option controls QNAME minimization behaviour in the BIND + resolver. When set to ``strict``, BIND will follow the QNAME + minimization algorithm to the letter, as specified in :rfc:`7816`. + Setting this option to ``relaxed`` will cause BIND to fall back to + normal (non-minimized) query mode when it receives either NXDOMAIN or + other unexpected responses (e.g. SERVFAIL, improper zone cut, + REFUSED) to a minimized query. ``disabled`` disables QNAME + minimization completely. The current default is ``relaxed``, but it + might be changed to ``strict`` in a future release. + +``tkey-gssapi-keytab`` + The KRB5 keytab file to use for GSS-TSIG updates. If this option is + set and tkey-gssapi-credential is not set, then updates will be + allowed with any key matching a principal in the specified keytab. + +``tkey-gssapi-credential`` + The security credential with which the server should authenticate + keys requested by the GSS-TSIG protocol. Currently only Kerberos 5 + authentication is available and the credential is a Kerberos + principal which the server can acquire through the default system key + file, normally ``/etc/krb5.keytab``. The location keytab file can be + overridden using the tkey-gssapi-keytab option. Normally this + principal is of the form "``DNS/``\ ``server.domain``". To use + GSS-TSIG, ``tkey-domain`` must also be set if a specific keytab is + not set with tkey-gssapi-keytab. + +``tkey-domain`` + The domain appended to the names of all shared keys generated with + ``TKEY``. When a client requests a ``TKEY`` exchange, it may or may + not specify the desired name for the key. If present, the name of the + shared key will be ``client specified part`` + ``tkey-domain``. + Otherwise, the name of the shared key will be ``random hex digits`` + + ``tkey-domain``. In most cases, the ``domainname`` + should be the server's domain name, or an otherwise non-existent + subdomain like "_tkey.``domainname``". If you are using GSS-TSIG, + this variable must be defined, unless you specify a specific keytab + using tkey-gssapi-keytab. + +``tkey-dhkey`` + The Diffie-Hellman key used by the server to generate shared keys + with clients using the Diffie-Hellman mode of ``TKEY``. The server + must be able to load the public and private keys from files in the + working directory. In most cases, the ``key_name`` should be the + server's host name. + +``cache-file`` + This is for testing only. Do not use. + +``dump-file`` + The pathname of the file the server dumps the database to when + instructed to do so with ``rndc dumpdb``. If not specified, the + default is ``named_dump.db``. + +``memstatistics-file`` + The pathname of the file the server writes memory usage statistics to + on exit. If not specified, the default is ``named.memstats``. + +``lock-file`` + The pathname of a file on which ``named`` will attempt to acquire a + file lock when starting up for the first time; if unsuccessful, the + server will will terminate, under the assumption that another server + is already running. If not specified, the default is + ``none``. + + Specifying ``lock-file none`` disables the use of a lock file. + ``lock-file`` is ignored if ``named`` was run using the ``-X`` + option, which overrides it. Changes to ``lock-file`` are ignored if + ``named`` is being reloaded or reconfigured; it is only effective + when the server is first started up. + +``pid-file`` + The pathname of the file the server writes its process ID in. If not + specified, the default is ``/var/run/named/named.pid``. The PID file + is used by programs that want to send signals to the running name + server. Specifying ``pid-file none`` disables the use of a PID file — + no file will be written and any existing one will be removed. Note + that ``none`` is a keyword, not a filename, and therefore is not + enclosed in double quotes. + +``recursing-file`` + The pathname of the file the server dumps the queries that are + currently recursing when instructed to do so with ``rndc recursing``. + If not specified, the default is ``named.recursing``. + +``statistics-file`` + The pathname of the file the server appends statistics to when + instructed to do so using ``rndc stats``. If not specified, the + default is ``named.stats`` in the server's current directory. The + format of the file is described in :ref:`statsfile`. + +``bindkeys-file`` + The pathname of a file to override the built-in trusted keys provided + by ``named``. See the discussion of ``dnssec-validation`` for + details. If not specified, the default is ``/etc/bind.keys``. + +``secroots-file`` + The pathname of the file the server dumps security roots to when + instructed to do so with ``rndc secroots``. If not specified, the + default is ``named.secroots``. + +``session-keyfile`` + The pathname of the file into which to write a TSIG session key + generated by ``named`` for use by ``nsupdate -l``. If not specified, + the default is ``/var/run/named/session.key``. (See :ref:`dynamic_update_policies`, + and in particular the discussion of the ``update-policy`` statement's + ``local`` option for more information about this feature.) + +``session-keyname`` + The key name to use for the TSIG session key. If not specified, the + default is "local-ddns". + +``session-keyalg`` + The algorithm to use for the TSIG session key. Valid values are + hmac-sha1, hmac-sha224, hmac-sha256, hmac-sha384, hmac-sha512 and + hmac-md5. If not specified, the default is hmac-sha256. + +``port`` + The UDP/TCP port number the server uses for receiving and sending DNS + protocol traffic. The default is 53. This option is mainly intended + for server testing; a server using a port other than 53 will not be + able to communicate with the global DNS. + +``dscp`` + The global Differentiated Services Code Point (DSCP) value to + classify outgoing DNS traffic on operating systems that support DSCP. + Valid values are 0 through 63. It is not configured by default. + +``random-device`` + Specifies a source of entropy to be used by the server. This is a + device or file from which to read entropy. If it is a file, + operations requiring entropy will fail when the file has been + exhausted. + + Entropy is needed for cryptographic operations such as TKEY + transactions, dynamic update of signed zones, and generation of TSIG + session keys. It is also used for seeding and stirring the + pseudo-random number generator, which is used for less critical + functions requiring randomness such as generation of DNS message + transaction ID's. + + If ``random-device`` is not specified, or if it is set to ``none``, + entropy will be read from the random number generation function + supplied by the cryptographic library with which BIND was linked + (i.e. OpenSSL or a PKCS#11 provider). + + The ``random-device`` option takes effect during the initial + configuration load at server startup time and is ignored on + subsequent reloads. + +``preferred-glue`` + If specified, the listed type (A or AAAA) will be emitted before + other glue in the additional section of a query response. The default + is to prefer A records when responding to queries that arrived via + IPv4 and AAAA when responding to queries that arrived via IPv6. + +.. _root-delegation-only: + +``root-delegation-only`` + Turn on enforcement of delegation-only in TLDs (top level domains) + and root zones with an optional exclude list. + + DS queries are expected to be made to and be answered by delegation + only zones. Such queries and responses are treated as an exception to + delegation-only processing and are not converted to NXDOMAIN + responses provided a CNAME is not discovered at the query name. + + If a delegation only zone server also serves a child zone it is not + always possible to determine whether an answer comes from the + delegation only zone or the child zone. SOA NS and DNSKEY records are + apex only records and a matching response that contains these records + or DS is treated as coming from a child zone. RRSIG records are also + examined to see if they are signed by a child zone or not. The + authority section is also examined to see if there is evidence that + the answer is from the child zone. Answers that are determined to be + from a child zone are not converted to NXDOMAIN responses. Despite + all these checks there is still a possibility of false negatives when + a child zone is being served. + + Similarly false positives can arise from empty nodes (no records at + the name) in the delegation only zone when the query type is not ANY. + + Note some TLDs are not delegation only (e.g. "DE", "LV", "US" and + "MUSEUM"). This list is not exhaustive. + + :: + + options { + root-delegation-only exclude { "de"; "lv"; "us"; "museum"; }; + }; + +``disable-algorithms`` + Disable the specified DNSSEC algorithms at and below the specified + name. Multiple ``disable-algorithms`` statements are allowed. Only + the best match ``disable-algorithms`` clause will be used to + determine which algorithms are used. + + If all supported algorithms are disabled, the zones covered by the + ``disable-algorithms`` will be treated as insecure. + + Configured trust anchors in ``trusted-anchors`` (or ``managed-keys`` or + ``trusted-keys``) that match a disabled algorithm will be ignored and treated + as if they were not configured at all. + +``disable-ds-digests`` + Disable the specified DS digest types at and below the specified + name. Multiple ``disable-ds-digests`` statements are allowed. Only + the best match ``disable-ds-digests`` clause will be used to + determine which digest types are used. + + If all supported digest types are disabled, the zones covered by the + ``disable-ds-digests`` will be treated as insecure. + +``dnssec-must-be-secure`` + Specify hierarchies which must be or may not be secure (signed and + validated). If ``yes``, then ``named`` will only accept answers if + they are secure. If ``no``, then normal DNSSEC validation applies + allowing for insecure answers to be accepted. The specified domain + must be defined as a trust anchor, for instance in a ``trust-anchors`` + statement, or ``dnssec-validation auto`` must be active. + +``dns64`` + This directive instructs ``named`` to return mapped IPv4 addresses to + AAAA queries when there are no AAAA records. It is intended to be + used in conjunction with a NAT64. Each ``dns64`` defines one DNS64 + prefix. Multiple DNS64 prefixes can be defined. + + Compatible IPv6 prefixes have lengths of 32, 40, 48, 56, 64 and 96 as per + :rfc:`6052`. Bits 64..71 inclusive must be zero with the most significate bit + of the prefix in position 0. + + Additionally a reverse IP6.ARPA zone will be created for the prefix + to provide a mapping from the IP6.ARPA names to the corresponding + IN-ADDR.ARPA names using synthesized CNAMEs. ``dns64-server`` and + ``dns64-contact`` can be used to specify the name of the server and + contact for the zones. These are settable at the view / options + level. These are not settable on a per-prefix basis. + + Each ``dns64`` supports an optional ``clients`` ACL that determines + which clients are affected by this directive. If not defined, it + defaults to ``any;``. + + Each ``dns64`` supports an optional ``mapped`` ACL that selects which + IPv4 addresses are to be mapped in the corresponding A RRset. If not + defined it defaults to ``any;``. + + Normally, DNS64 won't apply to a domain name that owns one or more + AAAA records; these records will simply be returned. The optional + ``exclude`` ACL allows specification of a list of IPv6 addresses that + will be ignored if they appear in a domain name's AAAA records, and + DNS64 will be applied to any A records the domain name owns. If not + defined, ``exclude`` defaults to ::ffff:0.0.0.0/96. + + A optional ``suffix`` can also be defined to set the bits trailing + the mapped IPv4 address bits. By default these bits are set to + ``::``. The bits matching the prefix and mapped IPv4 address must be + zero. + + If ``recursive-only`` is set to ``yes`` the DNS64 synthesis will only + happen for recursive queries. The default is ``no``. + + If ``break-dnssec`` is set to ``yes`` the DNS64 synthesis will happen + even if the result, if validated, would cause a DNSSEC validation + failure. If this option is set to ``no`` (the default), the DO is set + on the incoming query, and there are RRSIGs on the applicable + records, then synthesis will not happen. + + :: + + acl rfc1918 { 10/8; 192.168/16; 172.16/12; }; + + dns64 64:FF9B::/96 { + clients { any; }; + mapped { !rfc1918; any; }; + exclude { 64:FF9B::/96; ::ffff:0000:0000/96; }; + suffix ::; + }; + +``dnssec-loadkeys-interval`` + When a zone is configured with ``auto-dnssec maintain;`` its key + repository must be checked periodically to see if any new keys have + been added or any existing keys' timing metadata has been updated + (see :ref:`man_dnssec-keygen` and :ref:`man_dnssec-settime`). + The ``dnssec-loadkeys-interval`` option + sets the frequency of automatic repository checks, in minutes. The + default is ``60`` (1 hour), the minimum is ``1`` (1 minute), and + the maximum is ``1440`` (24 hours); any higher value is silently + reduced. + +``dnssec-policy`` + Specifies which key and signing policy (KASP) should be used for this zone. + This is a string referring to a ``dnssec-policy`` statement. There are two + built-in policies: ``default`` allows you to use the default policy, and + ``none`` means not to use any DNSSEC policy, keeping the zone unsigned. The + default is ``none``. See :ref:`dnssec-policy Grammar + ` for more details. + +``dnssec-update-mode`` + If this option is set to its default value of ``maintain`` in a zone + of type ``master`` which is DNSSEC-signed and configured to allow + dynamic updates (see :ref:`dynamic_update_policies`), and if ``named`` has access + to the private signing key(s) for the zone, then ``named`` will + automatically sign all new or changed records and maintain signatures + for the zone by regenerating RRSIG records whenever they approach + their expiration date. + + If the option is changed to ``no-resign``, then ``named`` will sign + all new or changed records, but scheduled maintenance of signatures + is disabled. + + With either of these settings, ``named`` will reject updates to a + DNSSEC-signed zone when the signing keys are inactive or unavailable + to ``named``. (A planned third option, ``external``, will disable all + automatic signing and allow DNSSEC data to be submitted into a zone + via dynamic update; this is not yet implemented.) + +``nta-lifetime`` + Species the default lifetime, in seconds, that will be used for + negative trust anchors added via ``rndc nta``. + + A negative trust anchor selectively disables DNSSEC validation for + zones that are known to be failing because of misconfiguration rather + than an attack. When data to be validated is at or below an active + NTA (and above any other configured trust anchors), ``named`` will + abort the DNSSEC validation process and treat the data as insecure + rather than bogus. This continues until the NTA's lifetime is + elapsed. NTAs persist across ``named`` restarts. + + For convenience, TTL-style time unit suffixes can be used to specify the NTA + lifetime in seconds, minutes or hours. It also accepts ISO 8601 duration + formats. + + ``nta-lifetime`` defaults to one hour. It cannot exceed one week. + +``nta-recheck`` + Species how often to check whether negative trust anchors added via + ``rndc nta`` are still necessary. + + A negative trust anchor is normally used when a domain has stopped + validating due to operator error; it temporarily disables DNSSEC + validation for that domain. In the interest of ensuring that DNSSEC + validation is turned back on as soon as possible, ``named`` will + periodically send a query to the domain, ignoring negative trust + anchors, to find out whether it can now be validated. If so, the + negative trust anchor is allowed to expire early. + + Validity checks can be disabled for an individual NTA by using + ``rndc nta -f``, or for all NTAs by setting ``nta-recheck`` to zero. + + For convenience, TTL-style time unit suffixes can be used to specify the NTA + recheck interval in seconds, minutes or hours. It also accepts ISO 8601 + duration formats. + + The default is five minutes. It cannot be longer than ``nta-lifetime`` (which + cannot be longer than a week). + +``max-zone-ttl`` + Specifies a maximum permissible TTL value in seconds. For + convenience, TTL-style time unit suffixes may be used to specify the + maximum value. When loading a zone file using a ``masterfile-format`` + of ``text`` or ``raw``, any record encountered with a TTL higher than + ``max-zone-ttl`` will cause the zone to be rejected. + + This is useful in DNSSEC-signed zones because when rolling to a new + DNSKEY, the old key needs to remain available until RRSIG records + have expired from caches. The ``max-zone-ttl`` option guarantees that + the largest TTL in the zone will be no higher than the set value. + + (NOTE: Because ``map``-format files load directly into memory, this + option cannot be used with them.) + + The default value is ``unlimited``. A ``max-zone-ttl`` of zero is + treated as ``unlimited``. + +``stale-answer-ttl`` + Specifies the TTL to be returned on stale answers. The default is 1 + second. The minimum allowed is also 1 second; a value of 0 will be + updated silently to 1 second. + + For stale answers to be returned, they must be enabled, either in the + configuration file using ``stale-answer-enable`` or via + ``rndc serve-stale on``. + +``serial-update-method`` + Zones configured for dynamic DNS may use this option to set the + update method that will be used for the zone serial number in the SOA + record. + + With the default setting of ``serial-update-method increment;``, the + SOA serial number will be incremented by one each time the zone is + updated. + + When set to ``serial-update-method unixtime;``, the SOA serial number + will be set to the number of seconds since the UNIX epoch, unless the + serial number is already greater than or equal to that value, in + which case it is simply incremented by one. + + When set to ``serial-update-method date;``, the new SOA serial number + will be the current date in the form "YYYYMMDD", followed by two + zeroes, unless the existing serial number is already greater than or + equal to that value, in which case it is incremented by one. + +``zone-statistics`` + If ``full``, the server will collect statistical data on all zones + (unless specifically turned off on a per-zone basis by specifying + ``zone-statistics terse`` or ``zone-statistics none`` in the ``zone`` + statement). The default is ``terse``, providing minimal statistics on + zones (including name and current serial number, but not query type + counters). + + These statistics may be accessed via the ``statistics-channel`` or + using ``rndc stats``, which will dump them to the file listed in the + ``statistics-file``. See also :ref:`statsfile`. + + For backward compatibility with earlier versions of BIND 9, the + ``zone-statistics`` option can also accept ``yes`` or ``no``; ``yes`` + has the same meaning as ``full``. As of BIND 9.10, ``no`` has the + same meaning as ``none``; previously, it was the same as ``terse``. + +.. _boolean_options: + +Boolean Options +^^^^^^^^^^^^^^^ + +``automatic-interface-scan`` + + If ``yes`` and and supported by the operating system, automatically rescan + network interfaces when the interface addresses are added or removed. The + default is ``yes``. This configuration option does not affect time based + ``interface-interval`` option, and it is recommended to set the time based + ``interface-interval`` to 0 when the operator confirms that automatic + interface scanning is supported by the operating system. + + The ``automatic-interface-scan`` implementation uses routing sockets for the + network interface discovery, and therefore the operating system has to + support the routing sockets for this feature to work. + +``allow-new-zones`` + If ``yes``, then zones can be added at runtime via ``rndc addzone``. + The default is ``no``. + + Newly added zones' configuration parameters are stored so that they + can persist after the server is restarted. The configuration + information is saved in a file called ``viewname.nzf`` (or, if + ``named`` is compiled with liblmdb, in an LMDB database file called + ``viewname.nzd``). viewname is the name of the view, unless the view + name contains characters that are incompatible with use as a file + name, in which case a cryptographic hash of the view name is used + instead. + + Zones added at runtime will have their configuration stored either in + a new-zone file (NZF) or a new-zone database (NZD) depending on + whether ``named`` was linked with liblmdb at compile time. See + :ref:`man_rndc` for further details about ``rndc addzone``. + +``auth-nxdomain`` + If ``yes``, then the ``AA`` bit is always set on NXDOMAIN responses, + even if the server is not actually authoritative. The default is + ``no``. If you are using very old DNS software, you may need to set + it to ``yes``. + +``deallocate-on-exit`` + This option was used in BIND 8 to enable checking for memory leaks on + exit. BIND 9 ignores the option and always performs the checks. + +``memstatistics`` + Write memory statistics to the file specified by + ``memstatistics-file`` at exit. The default is ``no`` unless '-m + record' is specified on the command line in which case it is ``yes``. + +``dialup`` + If ``yes``, then the server treats all zones as if they are doing + zone transfers across a dial-on-demand dialup link, which can be + brought up by traffic originating from this server. This has + different effects according to zone type and concentrates the zone + maintenance so that it all happens in a short interval, once every + ``heartbeat-interval`` and hopefully during the one call. It also + suppresses some of the normal zone maintenance traffic. The default + is ``no``. + + The ``dialup`` option may also be specified in the ``view`` and + ``zone`` statements, in which case it overrides the global ``dialup`` + option. + + If the zone is a master zone, then the server will send out a NOTIFY + request to all the slaves (default). This should trigger the zone + serial number check in the slave (providing it supports NOTIFY) + allowing the slave to verify the zone while the connection is active. + The set of servers to which NOTIFY is sent can be controlled by + ``notify`` and ``also-notify``. + + If the zone is a slave or stub zone, then the server will suppress + the regular "zone up to date" (refresh) queries and only perform them + when the ``heartbeat-interval`` expires in addition to sending NOTIFY + requests. + + Finer control can be achieved by using ``notify`` which only sends + NOTIFY messages, ``notify-passive`` which sends NOTIFY messages and + suppresses the normal refresh queries, ``refresh`` which suppresses + normal refresh processing and sends refresh queries when the + ``heartbeat-interval`` expires, and ``passive`` which just disables + normal refresh processing. + + +--------------------+-----------------+-----------------+-----------------+ + | dialup mode | normal refresh | heart-beat | heart-beat | + | | | refresh | notify | + +--------------------+-----------------+-----------------+-----------------+ + | ``no`` | yes | no | no | + | (default) | | | | + +--------------------+-----------------+-----------------+-----------------+ + | ``yes`` | no | yes | yes | + +--------------------+-----------------+-----------------+-----------------+ + | ``notify`` | yes | no | yes | + +--------------------+-----------------+-----------------+-----------------+ + | ``refresh`` | no | yes | no | + +--------------------+-----------------+-----------------+-----------------+ + | ``passive`` | no | no | no | + +--------------------+-----------------+-----------------+-----------------+ + | ``notify-passive`` | no | no | yes | + +--------------------+-----------------+-----------------+-----------------+ + + Note that normal NOTIFY processing is not affected by ``dialup``. + +``flush-zones-on-shutdown`` + When the nameserver exits due receiving SIGTERM, flush or do not + flush any pending zone writes. The default is + ``flush-zones-on-shutdown`` ``no``. + +``geoip-use-ecs`` + This option was part of an experimental implementation of the EDNS + CLIENT-SUBNET for authoritative servers, but is now obsolete. + +``root-key-sentinel`` + Respond to root key sentinel probes as described in + draft-ietf-dnsop-kskroll-sentinel-08. The default is ``yes``. + +``message-compression`` + If ``yes``, DNS name compression is used in responses to regular + queries (not including AXFR or IXFR, which always uses compression). + Setting this option to ``no`` reduces CPU usage on servers and may + improve throughput. However, it increases response size, which may + cause more queries to be processed using TCP; a server with + compression disabled is out of compliance with :rfc:`1123` Section + 6.1.3.2. The default is ``yes``. + +``minimal-responses`` + This option controls the addition of records to the authority and + additional sections of responses. Such records may be included in + responses to be helpful to clients; for example, NS or MX records may + have associated address records included in the additional section, + obviating the need for a separate address lookup. However, adding + these records to responses is not mandatory and requires additional + database lookups, causing extra latency when marshalling responses. + ``minimal-responses`` takes one of four values: + + - ``no``: the server will be as complete as possible when generating + responses. + - ``yes``: the server will only add records to the authority and additional + sections when such records are required by the DNS protocol (for + example, when returning delegations or negative responses). This + provides the best server performance but may result in more client + queries. + - ``no-auth``: the server will omit records from the authority section except + when they are required, but it may still add records to the + additional section. + - ``no-auth-recursive``: the same as ``no-auth`` when recursion is requested + in the query (RD=1), or the same as ``no`` if recursion is not requested. + + ``no-auth`` and ``no-auth-recursive`` are useful when answering stub + clients, which usually ignore the authority section. + ``no-auth-recursive`` is meant for use in mixed-mode servers that + handle both authoritative and recursive queries. + + The default is ``no-auth-recursive``. + +``glue-cache`` + When set to ``yes``, a cache is used to improve query performance + when adding address-type (A and AAAA) glue records to the additional + section of DNS response messages that delegate to a child zone. + + The glue cache uses memory proportional to the number of delegations + in the zone. The default setting is ``yes``, which improves + performance at the cost of increased memory usage for the zone. If + you don't want this, set it to ``no``. + +``minimal-any`` + If set to ``yes``, then when generating a positive response to a + query of type ANY over UDP, the server will reply with only one of + the RRsets for the query name, and its covering RRSIGs if any, + instead of replying with all known RRsets for the name. Similarly, a + query for type RRSIG will be answered with the RRSIG records covering + only one type. This can reduce the impact of some kinds of attack + traffic, without harming legitimate clients. (Note, however, that the + RRset returned is the first one found in the database; it is not + necessarily the smallest available RRset.) Additionally, + ``minimal-responses`` is turned on for these queries, so no + unnecessary records will be added to the authority or additional + sections. The default is ``no``. + +``notify`` + If ``yes`` (the default), DNS NOTIFY messages are sent when a zone + the server is authoritative for changes, see :ref:`notify`. + The messages are sent to the servers listed in the zone's NS records + (except the master server identified in the SOA MNAME field), and to + any servers listed in the ``also-notify`` option. + + If ``master-only``, notifies are only sent for master zones. If + ``explicit``, notifies are sent only to servers explicitly listed + using ``also-notify``. If ``no``, no notifies are sent. + + The ``notify`` option may also be specified in the ``zone`` + statement, in which case it overrides the ``options notify`` + statement. It would only be necessary to turn off this option if it + caused slaves to crash. + +``notify-to-soa`` + If ``yes`` do not check the nameservers in the NS RRset against the + SOA MNAME. Normally a NOTIFY message is not sent to the SOA MNAME + (SOA ORIGIN) as it is supposed to contain the name of the ultimate + master. Sometimes, however, a slave is listed as the SOA MNAME in + hidden master configurations and in that case you would want the + ultimate master to still send NOTIFY messages to all the nameservers + listed in the NS RRset. + +``recursion`` + If ``yes``, and a DNS query requests recursion, then the server will + attempt to do all the work required to answer the query. If recursion + is off and the server does not already know the answer, it will + return a referral response. The default is ``yes``. Note that setting + ``recursion no`` does not prevent clients from getting data from the + server's cache; it only prevents new data from being cached as an + effect of client queries. Caching may still occur as an effect the + server's internal operation, such as NOTIFY address lookups. + +``request-nsid`` + If ``yes``, then an empty EDNS(0) NSID (Name Server Identifier) + option is sent with all queries to authoritative name servers during + iterative resolution. If the authoritative server returns an NSID + option in its response, then its contents are logged in the ``nsid`` + category at level ``info``. The default is ``no``. + +``request-sit`` + This experimental option is obsolete. + +``require-server-cookie`` + Require a valid server cookie before sending a full response to a UDP + request from a cookie aware client. BADCOOKIE is sent if there is a + bad or no existent server cookie. + + The default is ``no``. + + Set this to ``yes`` to test that DNS COOKIE clients correctly handle + BADCOOKIE or if you are getting a lot of forged DNS requests with DNS COOKIES + present. Setting this to ``yes`` will result in reduced amplification effect + in a reflection attack, as the BADCOOKIE response will be smaller than a full + response, while also requiring a legitimate client to follow up with a second + query with the new, valid, cookie. + +``answer-cookie`` + When set to the default value of ``yes``, COOKIE EDNS options will be + sent when applicable in replies to client queries. If set to ``no``, + COOKIE EDNS options will not be sent in replies. This can only be set + at the global options level, not per-view. + + ``answer-cookie no`` is intended as a temporary measure, for use when + ``named`` shares an IP address with other servers that do not yet + support DNS COOKIE. A mismatch between servers on the same address is + not expected to cause operational problems, but the option to disable + COOKIE responses so that all servers have the same behavior is + provided out of an abundance of caution. DNS COOKIE is an important + security mechanism, and should not be disabled unless absolutely + necessary. + +``send-cookie`` + If ``yes``, then a COOKIE EDNS option is sent along with the query. + If the resolver has previously talked to the server, the COOKIE + returned in the previous transaction is sent. This is used by the + server to determine whether the resolver has talked to it before. A + resolver sending the correct COOKIE is assumed not to be an off-path + attacker sending a spoofed-source query; the query is therefore + unlikely to be part of a reflection/amplification attack, so + resolvers sending a correct COOKIE option are not subject to response + rate limiting (RRL). Resolvers which do not send a correct COOKIE + option may be limited to receiving smaller responses via the + ``nocookie-udp-size`` option. + + The default is ``yes``. + +``stale-answer-enable`` + Enable the returning of "stale" cached answers when the nameservers + for a zone are not answering. The default is not to return stale + answers. + + Stale answers can also be enabled or disabled at runtime via + ``rndc serve-stale on`` or ``rndc serve-stale off``; these override + the configured setting. ``rndc serve-stale reset`` restores the + setting to the one specified in ``named.conf``. Note that if stale + answers have been disabled by ``rndc``, then they cannot be + re-enabled by reloading or reconfiguring ``named``; they must be + re-enabled with ``rndc serve-stale on``, or the server must be + restarted. + + Information about stale answers is logged under the ``serve-stale`` + log category. + +``nocookie-udp-size`` + Sets the maximum size of UDP responses that will be sent to queries + without a valid server COOKIE. A value below 128 will be silently + raised to 128. The default value is 4096, but the ``max-udp-size`` + option may further limit the response size. + +``sit-secret`` + This experimental option is obsolete. + +``cookie-algorithm`` + Set the algorithm to be used when generating the server cookie. One + of "aes", "sha1" or "sha256". The default is "aes" if supported by + the cryptographic library or otherwise "sha256". + +``cookie-secret`` + If set, this is a shared secret used for generating and verifying + EDNS COOKIE options within an anycast cluster. If not set, the system + will generate a random secret at startup. The shared secret is + encoded as a hex string and needs to be 128 bits for AES128, 160 bits + for SHA1 and 256 bits for SHA256. + + If there are multiple secrets specified, the first one listed in + ``named.conf`` is used to generate new server cookies. The others + will only be used to verify returned cookies. + +``response-padding`` + The EDNS Padding option is intended to improve confidentiality when + DNS queries are sent over an encrypted channel by reducing the + variability in packet sizes. If a query: + + 1. contains an EDNS Padding option, + 2. includes a valid server cookie or uses TCP, + 3. is not signed using TSIG or SIG(0), and + 4. is from a client whose address matches the specified ACL, + + then the response is padded with an EDNS Padding option to a multiple + of ``block-size`` bytes. If these conditions are not met, the + response is not padded. + + If ``block-size`` is 0 or the ACL is ``none;``, then this feature is + disabled and no padding will occur; this is the default. If + ``block-size`` is greater than 512, a warning is logged and the value + is truncated to 512. Block sizes are ordinarily expected to be powers + of two (for instance, 128), but this is not mandatory. + +``trust-anchor-telemetry`` + Causes ``named`` to send specially-formed queries once per day to + domains for which trust anchors have been configured via, e.g., + ``dnssec-keys`` or ``dnssec-validation auto``. + + The query name used for these queries has the form + "_ta-xxxx(-xxxx)(...)"., where each "xxxx" is a group of four + hexadecimal digits representing the key ID of a trusted DNSSEC key. + The key IDs for each domain are sorted smallest to largest prior to + encoding. The query type is NULL. + + By monitoring these queries, zone operators will be able to see which + resolvers have been updated to trust a new key; this may help them + decide when it is safe to remove an old one. + + The default is ``yes``. + +``use-ixfr`` + *This option is obsolete*. If you need to disable IXFR to a + particular server or servers, see the information on the + ``provide-ixfr`` option in :ref:`server_statement_definition_and_usage`. + See also :ref:`incremental_zone_transfers`. + +``provide-ixfr`` + See the description of ``provide-ixfr`` in :ref:`server_statement_definition_and_usage`. + +``request-ixfr`` + See the description of ``request-ixfr`` in :ref:`server_statement_definition_and_usage`. + +``request-expire`` + See the description of ``request-expire`` in :ref:`server_statement_definition_and_usage`. + +``match-mapped-addresses`` + If ``yes``, then an IPv4-mapped IPv6 address will match any address + match list entries that match the corresponding IPv4 address. + + This option was introduced to work around a kernel quirk in some + operating systems that causes IPv4 TCP connections, such as zone + transfers, to be accepted on an IPv6 socket using mapped addresses. + This caused address match lists designed for IPv4 to fail to match. + However, ``named`` now solves this problem internally. The use of + this option is discouraged. + +``ixfr-from-differences`` + When ``yes`` and the server loads a new version of a master zone from + its zone file or receives a new version of a slave file via zone + transfer, it will compare the new version to the previous one and + calculate a set of differences. The differences are then logged in + the zone's journal file such that the changes can be transmitted to + downstream slaves as an incremental zone transfer. + + By allowing incremental zone transfers to be used for non-dynamic + zones, this option saves bandwidth at the expense of increased CPU + and memory consumption at the master. In particular, if the new + version of a zone is completely different from the previous one, the + set of differences will be of a size comparable to the combined size + of the old and new zone version, and the server will need to + temporarily allocate memory to hold this complete difference set. + + ``ixfr-from-differences`` also accepts ``master`` (or ``primary``) + and ``slave`` (or ``secondary``) at the view and options levels, + which causes ``ixfr-from-differences`` to be enabled for all primary + or secondary zones, respectively. It is off for all zones by default. + + Note: if inline signing is enabled for a zone, the user-provided + ``ixfr-from-differences`` setting is ignored for that zone. + +``multi-master`` + This should be set when you have multiple masters for a zone and the + addresses refer to different machines. If ``yes``, ``named`` will not + log when the serial number on the master is less than what ``named`` + currently has. The default is ``no``. + +``auto-dnssec`` + Zones configured for dynamic DNS may use this option to allow varying + levels of automatic DNSSEC key management. There are three possible + settings: + + ``auto-dnssec allow;`` permits keys to be updated and the zone fully + re-signed whenever the user issues the command ``rndc sign zonename``. + + ``auto-dnssec maintain;`` includes the above, but also + automatically adjusts the zone's DNSSEC keys on schedule, according + to the keys' timing metadata (see :ref:`man_dnssec-keygen` and + :ref:`man_dnssec-settime`). The command ``rndc sign zonename`` + causes ``named`` to load keys from the key repository and sign the + zone with all keys that are active. ``rndc loadkeys zonename`` + causes ``named`` to load keys from the key repository and schedule + key maintenance events to occur in the future, but it does not sign + the full zone immediately. Note: once keys have been loaded for a + zone the first time, the repository will be searched for changes + periodically, regardless of whether ``rndc loadkeys`` is used. The + recheck interval is defined by ``dnssec-loadkeys-interval``.) + + The default setting is ``auto-dnssec off``. + +``dnssec-enable`` + This option is obsolete and has no effect. + +.. _dnssec-validation-option: + +``dnssec-validation`` + This option enables DNSSEC validation in ``named``. + + If set to ``auto``, DNSSEC validation is enabled, and a default trust + anchor for the DNS root zone is used. + + If set to ``yes``, DNSSEC validation is enabled, but a trust anchor must be + manually configured using a ``trust-anchors`` statement (or the + ``managed-keys``, or the ``trusted-keys`` statements, both deprecated). If + there is no configured trust anchor, validation will not take place. + + If set to ``no``, DNSSEC validation is disabled. + + The default is ``auto``, unless BIND is built with + ``configure --disable-auto-validation``, in which case the default is + ``yes``. + + The default root trust anchor is stored in the file ``bind.keys``. + ``named`` will load that key at startup if ``dnssec-validation`` is + set to ``auto``. A copy of the file is installed along with BIND 9, + and is current as of the release date. If the root key expires, a new + copy of ``bind.keys`` can be downloaded from + https://www.isc.org/bind-keys. + + (To prevent problems if ``bind.keys`` is not found, the current trust + anchor is also compiled in to ``named``. Relying on this is not + recommended, however, as it requires ``named`` to be recompiled with + a new key when the root key expires.) + + .. note:: ``named`` loads *only* the root key from ``bind.keys``. The file + cannot be used to store keys for other zones. The root key in + ``bind.keys`` is ignored if ``dnssec-validation auto`` is not in + use. + + Whenever the resolver sends out queries to an EDNS-compliant + server, it always sets the DO bit indicating it can support DNSSEC + responses even if ``dnssec-validation`` is off. + +``validate-except`` + Specifies a list of domain names at and beneath which DNSSEC + validation should *not* be performed, regardless of the presence of a + trust anchor at or above those names. This may be used, for example, + when configuring a top-level domain intended only for local use, so + that the lack of a secure delegation for that domain in the root zone + will not cause validation failures. (This is similar to setting a + negative trust anchor, except that it is a permanent configuration, + whereas negative trust anchors expire and are removed after a set + period of time.) + +``dnssec-accept-expired`` + Accept expired signatures when verifying DNSSEC signatures. The + default is ``no``. Setting this option to ``yes`` leaves ``named`` + vulnerable to replay attacks. + +``querylog`` + Query logging provides a complete log of all incoming queries and all query + errors. This provides more insight into the server's activity, but with a + cost to performance which may be significant on heavily-loaded servers. + + The ``querylog`` option specifies whether query logging should be active when + ``named`` first starts. If ``querylog`` is not specified, then query logging + is determined by the presence of the logging category ``queries``. Query + logging can also be activated at runtime using the command ``rndc querylog + on``, or deactivated with ``rndc querylog off``. + +``check-names`` + This option is used to restrict the character set and syntax of + certain domain names in master files and/or DNS responses received + from the network. The default varies according to usage area. For + ``master`` zones the default is ``fail``. For ``slave`` zones the + default is ``warn``. For answers received from the network + (``response``) the default is ``ignore``. + + The rules for legal hostnames and mail domains are derived from + :rfc:`952` and :rfc:`821` as modified by :rfc:`1123`. + + ``check-names`` applies to the owner names of A, AAAA and MX records. + It also applies to the domain names in the RDATA of NS, SOA, MX, and + SRV records. It also applies to the RDATA of PTR records where the + owner name indicated that it is a reverse lookup of a hostname (the + owner name ends in IN-ADDR.ARPA, IP6.ARPA, or IP6.INT). + +``check-dup-records`` + Check master zones for records that are treated as different by + DNSSEC but are semantically equal in plain DNS. The default is to + ``warn``. Other possible values are ``fail`` and ``ignore``. + +``check-mx`` + Check whether the MX record appears to refer to a IP address. The + default is to ``warn``. Other possible values are ``fail`` and + ``ignore``. + +``check-wildcard`` + This option is used to check for non-terminal wildcards. The use of + non-terminal wildcards is almost always as a result of a failure to + understand the wildcard matching algorithm (:rfc:`1034`). This option + affects master zones. The default (``yes``) is to check for + non-terminal wildcards and issue a warning. + +``check-integrity`` + Perform post load zone integrity checks on master zones. This checks + that MX and SRV records refer to address (A or AAAA) records and that + glue address records exist for delegated zones. For MX and SRV + records only in-zone hostnames are checked (for out-of-zone hostnames + use ``named-checkzone``). For NS records only names below top of zone + are checked (for out-of-zone names and glue consistency checks use + ``named-checkzone``). The default is ``yes``. + + The use of the SPF record for publishing Sender Policy Framework is + deprecated as the migration from using TXT records to SPF records was + abandoned. Enabling this option also checks that a TXT Sender Policy + Framework record exists (starts with "v=spf1") if there is an SPF + record. Warnings are emitted if the TXT record does not exist and can + be suppressed with ``check-spf``. + +``check-mx-cname`` + If ``check-integrity`` is set then fail, warn or ignore MX records + that refer to CNAMES. The default is to ``warn``. + +``check-srv-cname`` + If ``check-integrity`` is set then fail, warn or ignore SRV records + that refer to CNAMES. The default is to ``warn``. + +``check-sibling`` + When performing integrity checks, also check that sibling glue + exists. The default is ``yes``. + +``check-spf`` + If ``check-integrity`` is set then check that there is a TXT Sender + Policy Framework record present (starts with "v=spf1") if there is an + SPF record present. The default is ``warn``. + +``zero-no-soa-ttl`` + When returning authoritative negative responses to SOA queries set + the TTL of the SOA record returned in the authority section to zero. + The default is ``yes``. + +``zero-no-soa-ttl-cache`` + When caching a negative response to a SOA query set the TTL to zero. + The default is ``no``. + +``update-check-ksk`` + When set to the default value of ``yes``, check the KSK bit in each + key to determine how the key should be used when generating RRSIGs + for a secure zone. + + Ordinarily, zone-signing keys (that is, keys without the KSK bit set) + are used to sign the entire zone, while key-signing keys (keys with + the KSK bit set) are only used to sign the DNSKEY RRset at the zone + apex. However, if this option is set to ``no``, then the KSK bit is + ignored; KSKs are treated as if they were ZSKs and are used to sign + the entire zone. This is similar to the ``dnssec-signzone -z`` + command line option. + + When this option is set to ``yes``, there must be at least two active + keys for every algorithm represented in the DNSKEY RRset: at least + one KSK and one ZSK per algorithm. If there is any algorithm for + which this requirement is not met, this option will be ignored for + that algorithm. + +``dnssec-dnskey-kskonly`` + When this option and ``update-check-ksk`` are both set to ``yes``, + only key-signing keys (that is, keys with the KSK bit set) will be + used to sign the DNSKEY, CDNSKEY, and CDS RRsets at the zone apex. + Zone-signing keys (keys without the KSK bit set) will be used to sign + the remainder of the zone, but not the DNSKEY RRset. This is similar + to the ``dnssec-signzone -x`` command line option. + + The default is ``no``. If ``update-check-ksk`` is set to ``no``, this + option is ignored. + +``try-tcp-refresh`` + Try to refresh the zone using TCP if UDP queries fail. The default is + ``yes``. + +``dnssec-secure-to-insecure`` + Allow a dynamic zone to transition from secure to insecure (i.e., + signed to unsigned) by deleting all of the DNSKEY records. The + default is ``no``. If set to ``yes``, and if the DNSKEY RRset at the + zone apex is deleted, all RRSIG and NSEC records will be removed from + the zone as well. + + If the zone uses NSEC3, then it is also necessary to delete the + NSEC3PARAM RRset from the zone apex; this will cause the removal of + all corresponding NSEC3 records. (It is expected that this + requirement will be eliminated in a future release.) + + Note that if a zone has been configured with ``auto-dnssec maintain`` + and the private keys remain accessible in the key repository, then + the zone will be automatically signed again the next time ``named`` + is started. + +``synth-from-dnssec`` + Synthesize answers from cached NSEC, NSEC3 and other RRsets that have been + proved to be correct using DNSSEC. The default is ``no``, but it will become + ``yes`` again in future releases. + + .. note:: DNSSEC validation must be enabled for this option to be effective. + This initial implementation only covers synthesis of answers from + NSEC records. Synthesis from NSEC3 is planned for the future. This + will also be controlled by ``synth-from-dnssec``. + +Forwarding +^^^^^^^^^^ + +The forwarding facility can be used to create a large site-wide cache on +a few servers, reducing traffic over links to external name servers. It +can also be used to allow queries by servers that do not have direct +access to the Internet, but wish to look up exterior names anyway. +Forwarding occurs only on those queries for which the server is not +authoritative and does not have the answer in its cache. + +``forward`` + This option is only meaningful if the forwarders list is not empty. A + value of ``first``, the default, causes the server to query the + forwarders first — and if that doesn't answer the question, the + server will then look for the answer itself. If ``only`` is + specified, the server will only query the forwarders. + +``forwarders`` + Specifies a list of IP addresses to which queries shall be forwarded. The + default is the empty list (no forwarding). Each address in the list can be + associated with an optional port number and/or DSCP value, and a default port + number and DSCP value can be set for the entire list. + +Forwarding can also be configured on a per-domain basis, allowing for +the global forwarding options to be overridden in a variety of ways. You +can set particular domains to use different forwarders, or have a +different ``forward only/first`` behavior, or not forward at all, see +:ref:`zone_statement_grammar`. + +.. _dual_stack: + +Dual-stack Servers +^^^^^^^^^^^^^^^^^^ + +Dual-stack servers are used as servers of last resort to work around +problems in reachability due the lack of support for either IPv4 or IPv6 +on the host machine. + +``dual-stack-servers`` + Specifies host names or addresses of machines with access to both + IPv4 and IPv6 transports. If a hostname is used, the server must be + able to resolve the name using only the transport it has. If the + machine is dual stacked, then the ``dual-stack-servers`` have no + effect unless access to a transport has been disabled on the command + line (e.g. ``named -4``). + +.. _access_control: + +Access Control +^^^^^^^^^^^^^^ + +Access to the server can be restricted based on the IP address of the +requesting system. See :ref:`address_match_lists` +for details on how to specify IP address lists. + +``allow-notify`` + This ACL specifies which hosts may send NOTIFY messages to inform + this server of changes to zones for which it is acting as a secondary + server. This is only applicable for secondary zones (i.e., type + ``secondary`` or ``slave``). + + If this option is set in ``view`` or ``options``, it is globally + applied to all secondary zones. If set in the ``zone`` statement, the + global value is overridden. + + If not specified, the default is to process NOTIFY messages only from + the configured ``masters`` for the zone. ``allow-notify`` can be used + to expand the list of permitted hosts, not to reduce it. + +``allow-query`` + Specifies which hosts are allowed to ask ordinary DNS questions. + ``allow-query`` may also be specified in the ``zone`` statement, in + which case it overrides the ``options allow-query`` statement. If not + specified, the default is to allow queries from all hosts. + + .. note:: ``allow-query-cache`` is now used to specify access to the cache. + +``allow-query-on`` + Specifies which local addresses can accept ordinary DNS questions. + This makes it possible, for instance, to allow queries on + internal-facing interfaces but disallow them on external-facing ones, + without necessarily knowing the internal network's addresses. + + Note that ``allow-query-on`` is only checked for queries that are + permitted by ``allow-query``. A query must be allowed by both ACLs, + or it will be refused. + + ``allow-query-on`` may also be specified in the ``zone`` statement, + in which case it overrides the ``options allow-query-on`` statement. + + If not specified, the default is to allow queries on all addresses. + + .. note:: ``allow-query-cache`` is used to specify access to the cache. + +``allow-query-cache`` + Specifies which hosts are allowed to get answers from the cache. If + ``allow-query-cache`` is not set then ``allow-recursion`` is used if + set, otherwise ``allow-query`` is used if set unless + ``recursion no;`` is set in which case ``none;`` is used, otherwise + the default (``localnets;`` ``localhost;``) is used. + +``allow-query-cache-on`` + Specifies which local addresses can send answers from the cache. If + ``allow-query-cache-on`` is not set, then ``allow-recursion-on`` is + used if set. Otherwise, the default is to allow cache responses to be + sent from any address. Note: Both ``allow-query-cache`` and + ``allow-query-cache-on`` must be satisfied before a cache response + can be sent; a client that is blocked by one cannot be allowed by the + other. + +``allow-recursion`` + Specifies which hosts are allowed to make recursive queries through + this server. If ``allow-recursion`` is not set then + ``allow-query-cache`` is used if set, otherwise ``allow-query`` is + used if set, otherwise the default (``localnets;`` ``localhost;``) is + used. + +``allow-recursion-on`` + Specifies which local addresses can accept recursive queries. If + ``allow-recursion-on`` is not set, then ``allow-query-cache-on`` is + used if set; otherwise, the default is to allow recursive queries on + all addresses: Any client permitted to send recursive queries can + send them to any address on which ``named`` is listening. Note: Both + ``allow-recursion`` and ``allow-recursion-on`` must be satisfied + before recursion is allowed; a client that is blocked by one cannot + be allowed by the other. + +``allow-update`` + When set in the ``zone`` statement for a master zone, specifies which + hosts are allowed to submit Dynamic DNS updates to that zone. The + default is to deny updates from all hosts. + + Note that allowing updates based on the requestor's IP address is + insecure; see :ref:`dynamic_update_security` for details. + + In general this option should only be set at the ``zone`` level. + While a default value can be set at the ``options`` or ``view`` level + and inherited by zones, this could lead to some zones unintentionally + allowing updates. + +``allow-update-forwarding`` + When set in the ``zone`` statement for a slave zone, specifies which + hosts are allowed to submit Dynamic DNS updates and have them be + forwarded to the master. The default is ``{ none; }``, which means + that no update forwarding will be performed. + + To enable update forwarding, specify + ``allow-update-forwarding { any; };``. in the ``zone`` statement. + Specifying values other than ``{ none; }`` or ``{ any; }`` is usually + counterproductive; the responsibility for update access control + should rest with the master server, not the slave. + + Note that enabling the update forwarding feature on a slave server + may expose master servers to attacks if they rely on insecure + IP-address-based access control; see :ref:`dynamic_update_security` for more details. + + In general this option should only be set at the ``zone`` level. + While a default value can be set at the ``options`` or ``view`` level + and inherited by zones, this can lead to some zones unintentionally + forwarding updates. + +``allow-v6-synthesis`` + This option was introduced for the smooth transition from AAAA to A6 + and from "nibble labels" to binary labels. However, since both A6 and + binary labels were then deprecated, this option was also deprecated. + It is now ignored with some warning messages. + +.. _allow-transfer-access: + +``allow-transfer`` + Specifies which hosts are allowed to receive zone transfers from the + server. ``allow-transfer`` may also be specified in the ``zone`` + statement, in which case it overrides the ``allow-transfer`` + statement set in ``options`` or ``view``. If not specified, the + default is to allow transfers to all hosts. + +``blackhole`` + Specifies a list of addresses that the server will not accept queries + from or use to resolve a query. Queries from these addresses will not + be responded to. The default is ``none``. + +``keep-response-order`` + Specifies a list of addresses to which the server will send responses + to TCP queries in the same order in which they were received. This + disables the processing of TCP queries in parallel. The default is + ``none``. + +``no-case-compress`` + Specifies a list of addresses which require responses to use + case-insensitive compression. This ACL can be used when ``named`` + needs to work with clients that do not comply with the requirement in + :rfc:`1034` to use case-insensitive name comparisons when checking for + matching domain names. + + If left undefined, the ACL defaults to ``none``: case-insensitive + compression will be used for all clients. If the ACL is defined and + matches a client, then case will be ignored when compressing domain + names in DNS responses sent to that client. + + This can result in slightly smaller responses: if a response contains + the names "example.com" and "example.COM", case-insensitive + compression would treat the second one as a duplicate. It also + ensures that the case of the query name exactly matches the case of + the owner names of returned records, rather than matching the case of + the records entered in the zone file. This allows responses to + exactly match the query, which is required by some clients due to + incorrect use of case-sensitive comparisons. + + Case-insensitive compression is *always* used in AXFR and IXFR + responses, regardless of whether the client matches this ACL. + + There are circumstances in which ``named`` will not preserve the case + of owner names of records: if a zone file defines records of + different types with the same name, but the capitalization of the + name is different (e.g., "www.example.com/A" and + "WWW.EXAMPLE.COM/AAAA"), then all responses for that name will use + the *first* version of the name that was used in the zone file. This + limitation may be addressed in a future release. However, domain + names specified in the rdata of resource records (i.e., records of + type NS, MX, CNAME, etc) will always have their case preserved unless + the client matches this ACL. + +``resolver-query-timeout`` + The amount of time in milliseconds that the resolver will spend + attempting to resolve a recursive query before failing. The default + and minimum is ``10000`` and the maximum is ``30000``. Setting it to + ``0`` will result in the default being used. + + This value was originally specified in seconds. Values less than or + equal to 300 will be be treated as seconds and converted to + milliseconds before applying the above limits. + +Interfaces +^^^^^^^^^^ + +The interfaces and ports that the server will answer queries from may be +specified using the ``listen-on`` option. ``listen-on`` takes an +optional port and an ``address_match_list`` of IPv4 addresses. (IPv6 +addresses are ignored, with a logged warning.) The server will listen on +all interfaces allowed by the address match list. If a port is not +specified, port 53 will be used. + +Multiple ``listen-on`` statements are allowed. For example, + +:: + + listen-on { 5.6.7.8; }; + listen-on port 1234 { !1.2.3.4; 1.2/16; }; + +will enable the name server on port 53 for the IP address 5.6.7.8, and +on port 1234 of an address on the machine in net 1.2 that is not +1.2.3.4. + +If no ``listen-on`` is specified, the server will listen on port 53 on +all IPv4 interfaces. + +The ``listen-on-v6`` option is used to specify the interfaces and the +ports on which the server will listen for incoming queries sent using +IPv6. If not specified, the server will listen on port 53 on all IPv6 +interfaces. + +When + +:: + + { any; } + +is specified as the ``address_match_list`` for the ``listen-on-v6`` +option, the server does not bind a separate socket to each IPv6 +interface address as it does for IPv4 if the operating system has enough +API support for IPv6 (specifically if it conforms to :rfc:`3493` and +:rfc:`3542`). Instead, it listens on the IPv6 wildcard address. If the system +only has incomplete API support for IPv6, however, the behavior is the +same as that for IPv4. + +A list of particular IPv6 addresses can also be specified, in which case +the server listens on a separate socket for each specified address, +regardless of whether the desired API is supported by the system. IPv4 +addresses specified in ``listen-on-v6`` will be ignored, with a logged +warning. + +Multiple ``listen-on-v6`` options can be used. For example, + +:: + + listen-on-v6 { any; }; + listen-on-v6 port 1234 { !2001:db8::/32; any; }; + +will enable the name server on port 53 for any IPv6 addresses (with a +single wildcard socket), and on port 1234 of IPv6 addresses that is not +in the prefix 2001:db8::/32 (with separate sockets for each matched +address.) + +To make the server not listen on any IPv6 address, use + +:: + + listen-on-v6 { none; }; + +.. _query_address: + +Query Address +^^^^^^^^^^^^^ + +If the server doesn't know the answer to a question, it will query other +name servers. ``query-source`` specifies the address and port used for +such queries. For queries sent over IPv6, there is a separate +``query-source-v6`` option. If ``address`` is ``*`` (asterisk) or is +omitted, a wildcard IP address (``INADDR_ANY``) will be used. + +If ``port`` is ``*`` or is omitted, a random port number from a +pre-configured range is picked up and will be used for each query. The +port range(s) is that specified in the ``use-v4-udp-ports`` (for IPv4) +and ``use-v6-udp-ports`` (for IPv6) options, excluding the ranges +specified in the ``avoid-v4-udp-ports`` and ``avoid-v6-udp-ports`` +options, respectively. + +The defaults of the ``query-source`` and ``query-source-v6`` options +are: + +:: + + query-source address * port *; + query-source-v6 address * port *; + +If ``use-v4-udp-ports`` or ``use-v6-udp-ports`` is unspecified, +``named`` will check if the operating system provides a programming +interface to retrieve the system's default range for ephemeral ports. If +such an interface is available, ``named`` will use the corresponding +system default range; otherwise, it will use its own defaults: + +:: + + use-v4-udp-ports { range 1024 65535; }; + use-v6-udp-ports { range 1024 65535; }; + +.. note:: Make sure the ranges be sufficiently large for security. A + desirable size depends on various parameters, but we generally recommend + it contain at least 16384 ports (14 bits of entropy). Note also that the + system's default range when used may be too small for this purpose, and + that the range may even be changed while ``named`` is running; the new + range will automatically be applied when ``named`` is reloaded. It is + encouraged to configure ``use-v4-udp-ports`` and ``use-v6-udp-ports`` + explicitly so that the ranges are sufficiently large and are reasonably + independent from the ranges used by other applications. + +.. note:: The operational configuration where ``named`` runs may prohibit + the use of some ports. For example, UNIX systems will not allow + ``named`` running without a root privilege to use ports less than 1024. + If such ports are included in the specified (or detected) set of query + ports, the corresponding query attempts will fail, resulting in + resolution failures or delay. It is therefore important to configure the + set of ports that can be safely used in the expected operational + environment. + +The defaults of the ``avoid-v4-udp-ports`` and ``avoid-v6-udp-ports`` +options are: + +:: + + avoid-v4-udp-ports {}; + avoid-v6-udp-ports {}; + +.. note:: BIND 9.5.0 introduced the ``use-queryport-pool`` option to support + a pool of such random ports, but this option is now obsolete because + reusing the same ports in the pool may not be sufficiently secure. For + the same reason, it is generally strongly discouraged to specify a + particular port for the ``query-source`` or ``query-source-v6`` options; + it implicitly disables the use of randomized port numbers. + +``use-queryport-pool`` + This option is obsolete. + +``queryport-pool-ports`` + This option is obsolete. + +``queryport-pool-updateinterval`` + This option is obsolete. + + .. note:: The address specified in the ``query-source`` option is used for both + UDP and TCP queries, but the port applies only to UDP queries. TCP + queries always use a random unprivileged port. + + .. note:: Solaris 2.5.1 and earlier does not support setting the source address + for TCP sockets. + + .. note:: See also ``transfer-source`` and ``notify-source``. + +.. _zone_transfers: + +Zone Transfers +^^^^^^^^^^^^^^ + +BIND has mechanisms in place to facilitate zone transfers and set limits +on the amount of load that transfers place on the system. The following +options apply to zone transfers. + +``also-notify`` + Defines a global list of IP addresses of name servers that are also + sent NOTIFY messages whenever a fresh copy of the zone is loaded, in + addition to the servers listed in the zone's NS records. This helps + to ensure that copies of the zones will quickly converge on stealth + servers. Optionally, a port may be specified with each + ``also-notify`` address to send the notify messages to a port other + than the default of 53. An optional TSIG key can also be specified + with each address to cause the notify messages to be signed; this can + be useful when sending notifies to multiple views. In place of + explicit addresses, one or more named ``masters`` lists can be used. + + If an ``also-notify`` list is given in a ``zone`` statement, it will + override the ``options also-notify`` statement. When a + ``zone notify`` statement is set to ``no``, the IP addresses in the + global ``also-notify`` list will not be sent NOTIFY messages for that + zone. The default is the empty list (no global notification list). + +``max-transfer-time-in`` + Inbound zone transfers running longer than this many minutes will be + terminated. The default is 120 minutes (2 hours). The maximum value + is 28 days (40320 minutes). + +``max-transfer-idle-in`` + Inbound zone transfers making no progress in this many minutes will + be terminated. The default is 60 minutes (1 hour). The maximum value + is 28 days (40320 minutes). + +``max-transfer-time-out`` + Outbound zone transfers running longer than this many minutes will be + terminated. The default is 120 minutes (2 hours). The maximum value + is 28 days (40320 minutes). + +``max-transfer-idle-out`` + Outbound zone transfers making no progress in this many minutes will + be terminated. The default is 60 minutes (1 hour). The maximum value + is 28 days (40320 minutes). + +``notify-rate`` + The rate at which NOTIFY requests will be sent during normal zone + maintenance operations. (NOTIFY requests due to initial zone loading + are subject to a separate rate limit; see below.) The default is 20 + per second. The lowest possible rate is one per second; when set to + zero, it will be silently raised to one. + +``startup-notify-rate`` + The rate at which NOTIFY requests will be sent when the name server + is first starting up, or when zones have been newly added to the + nameserver. The default is 20 per second. The lowest possible rate is + one per second; when set to zero, it will be silently raised to one. + +``serial-query-rate`` + Slave servers will periodically query master servers to find out if + zone serial numbers have changed. Each such query uses a minute + amount of the slave server's network bandwidth. To limit the amount + of bandwidth used, BIND 9 limits the rate at which queries are sent. + The value of the ``serial-query-rate`` option, an integer, is the + maximum number of queries sent per second. The default is 20 per + second. The lowest possible rate is one per second; when set to zero, + it will be silently raised to one. + +``transfer-format`` + Zone transfers can be sent using two different formats, + ``one-answer`` and ``many-answers``. The ``transfer-format`` option + is used on the master server to determine which format it sends. + ``one-answer`` uses one DNS message per resource record transferred. + ``many-answers`` packs as many resource records as possible into a + message. ``many-answers`` is more efficient, but is only supported by + relatively new slave servers, such as BIND 9, BIND 8.x and BIND 4.9.5 + onwards. The ``many-answers`` format is also supported by recent + Microsoft Windows nameservers. The default is ``many-answers``. + ``transfer-format`` may be overridden on a per-server basis by using + the ``server`` statement. + +``transfer-message-size`` + This is an upper bound on the uncompressed size of DNS messages used + in zone transfers over TCP. If a message grows larger than this size, + additional messages will be used to complete the zone transfer. + (Note, however, that this is a hint, not a hard limit; if a message + contains a single resource record whose RDATA does not fit within the + size limit, a larger message will be permitted so the record can be + transferred.) + + Valid values are between 512 and 65535 octets, and any values outside + that range will be adjusted to the nearest value within it. The + default is ``20480``, which was selected to improve message + compression: most DNS messages of this size will compress to less + than 16536 bytes. Larger messages cannot be compressed as + effectively, because 16536 is the largest permissible compression + offset pointer in a DNS message. + + This option is mainly intended for server testing; there is rarely + any benefit in setting a value other than the default. + +``transfers-in`` + The maximum number of inbound zone transfers that can be running + concurrently. The default value is ``10``. Increasing + ``transfers-in`` may speed up the convergence of slave zones, but it + also may increase the load on the local system. + +``transfers-out`` + The maximum number of outbound zone transfers that can be running + concurrently. Zone transfer requests in excess of the limit will be + refused. The default value is ``10``. + +``transfers-per-ns`` + The maximum number of inbound zone transfers that can be concurrently + transferring from a given remote name server. The default value is + ``2``. Increasing ``transfers-per-ns`` may speed up the convergence + of slave zones, but it also may increase the load on the remote name + server. ``transfers-per-ns`` may be overridden on a per-server basis + by using the ``transfers`` phrase of the ``server`` statement. + +``transfer-source`` + ``transfer-source`` determines which local address will be bound to + IPv4 TCP connections used to fetch zones transferred inbound by the + server. It also determines the source IPv4 address, and optionally + the UDP port, used for the refresh queries and forwarded dynamic + updates. If not set, it defaults to a system controlled value which + will usually be the address of the interface "closest to" the remote + end. This address must appear in the remote end's ``allow-transfer`` + option for the zone being transferred, if one is specified. This + statement sets the ``transfer-source`` for all zones, but can be + overridden on a per-view or per-zone basis by including a + ``transfer-source`` statement within the ``view`` or ``zone`` block + in the configuration file. + + .. note:: Solaris 2.5.1 and earlier does not support setting the source + address for TCP sockets. + +``transfer-source-v6`` + The same as ``transfer-source``, except zone transfers are performed + using IPv6. + +``alt-transfer-source`` + An alternate transfer source if the one listed in ``transfer-source`` + fails and ``use-alt-transfer-source`` is set. + + .. note:: If you do not wish the alternate transfer source to be used, you + should set ``use-alt-transfer-source`` appropriately and you + should not depend upon getting an answer back to the first refresh + query. + +``alt-transfer-source-v6`` + An alternate transfer source if the one listed in + ``transfer-source-v6`` fails and ``use-alt-transfer-source`` is set. + +``use-alt-transfer-source`` + Use the alternate transfer sources or not. If views are specified + this defaults to ``no``, otherwise it defaults to ``yes``. + +``notify-source`` + ``notify-source`` determines which local source address, and + optionally UDP port, will be used to send NOTIFY messages. This + address must appear in the slave server's ``masters`` zone clause or + in an ``allow-notify`` clause. This statement sets the + ``notify-source`` for all zones, but can be overridden on a per-zone + or per-view basis by including a ``notify-source`` statement within + the ``zone`` or ``view`` block in the configuration file. + + .. note:: Solaris 2.5.1 and earlier does not support setting the source + address for TCP sockets. + +``notify-source-v6`` + Like ``notify-source``, but applies to notify messages sent to IPv6 + addresses. + +.. _port_lists: + +UDP Port Lists +^^^^^^^^^^^^^^ + +``use-v4-udp-ports``, ``avoid-v4-udp-ports``, ``use-v6-udp-ports``, and +``avoid-v6-udp-ports`` specify a list of IPv4 and IPv6 UDP ports that +will be used or not used as source ports for UDP messages. See +:ref:`query_address` about how the available ports are +determined. For example, with the following configuration + +:: + + use-v6-udp-ports { range 32768 65535; }; + avoid-v6-udp-ports { 40000; range 50000 60000; }; + +UDP ports of IPv6 messages sent from ``named`` will be in one of the +following ranges: 32768 to 39999, 40001 to 49999, and 60001 to 65535. + +``avoid-v4-udp-ports`` and ``avoid-v6-udp-ports`` can be used to prevent +``named`` from choosing as its random source port a port that is blocked +by your firewall or a port that is used by other applications; if a +query went out with a source port blocked by a firewall, the answer +would not get by the firewall and the name server would have to query +again. Note: the desired range can also be represented only with +``use-v4-udp-ports`` and ``use-v6-udp-ports``, and the ``avoid-`` +options are redundant in that sense; they are provided for backward +compatibility and to possibly simplify the port specification. + +.. _resource_limits: + +Operating System Resource Limits +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +The server's usage of many system resources can be limited. Scaled +values are allowed when specifying resource limits. For example, ``1G`` +can be used instead of ``1073741824`` to specify a limit of one +gigabyte. ``unlimited`` requests unlimited use, or the maximum available +amount. ``default`` uses the limit that was in force when the server was +started. See the description of ``size_spec`` in :ref:`configuration_file_elements`. + +The following options set operating system resource limits for the name +server process. Some operating systems don't support some or any of the +limits. On such systems, a warning will be issued if the unsupported +limit is used. + +``coresize`` + The maximum size of a core dump. The default is ``default``. + +``datasize`` + The maximum amount of data memory the server may use. The default is + ``default``. This is a hard limit on server memory usage. If the + server attempts to allocate memory in excess of this limit, the + allocation will fail, which may in turn leave the server unable to + perform DNS service. Therefore, this option is rarely useful as a way + of limiting the amount of memory used by the server, but it can be + used to raise an operating system data size limit that is too small + by default. If you wish to limit the amount of memory used by the + server, use the ``max-cache-size`` and ``recursive-clients`` options + instead. + +``files`` + The maximum number of files the server may have open concurrently. + The default is ``unlimited``. + +``stacksize`` + The maximum amount of stack memory the server may use. The default is + ``default``. + +.. _server_resource_limits: + +Server Resource Limits +^^^^^^^^^^^^^^^^^^^^^^ + +The following options set limits on the server's resource consumption +that are enforced internally by the server rather than the operating +system. + +``max-journal-size`` + Sets a maximum size for each journal file (see :ref:`journal`), + expressed in bytes or, if followed by an + optional unit suffix ('k', 'm', or 'g'), in kilobytes, megabytes, or + gigabytes. When the journal file approaches the specified size, some + of the oldest transactions in the journal will be automatically + removed. The largest permitted value is 2 gigabytes. Very small + values are rounded up to 4096 bytes. You can specify ``unlimited``, + which also means 2 gigabytes. If you set the limit to ``default`` or + leave it unset, the journal is allowed to grow up to twice as large + as the zone. (There is little benefit in storing larger journals.) + + This option may also be set on a per-zone basis. + +``max-records`` + The maximum number of records permitted in a zone. The default is + zero which means unlimited. + +``recursive-clients`` + The maximum number ("hard quota") of simultaneous recursive lookups + the server will perform on behalf of clients. The default is + ``1000``. Because each recursing client uses a fair bit of memory (on + the order of 20 kilobytes), the value of the ``recursive-clients`` + option may have to be decreased on hosts with limited memory. + + ``recursive-clients`` defines a "hard quota" limit for pending + recursive clients: when more clients than this are pending, new + incoming requests will not be accepted, and for each incoming request + a previous pending request will also be dropped. + + A "soft quota" is also set. When this lower quota is exceeded, + incoming requests are accepted, but for each one, a pending request + will be dropped. If ``recursive-clients`` is greater than 1000, the + soft quota is set to ``recursive-clients`` minus 100; otherwise it is + set to 90% of ``recursive-clients``. + +``tcp-clients`` + The maximum number of simultaneous client TCP connections that the + server will accept. The default is ``150``. + +.. _clients-per-query: + +``clients-per-query``; \ ``max-clients-per-query`` + These set the initial value (minimum) and maximum number of recursive + simultaneous clients for any given query () that + the server will accept before dropping additional clients. ``named`` + will attempt to self tune this value and changes will be logged. The + default values are 10 and 100. + + This value should reflect how many queries come in for a given name + in the time it takes to resolve that name. If the number of queries + exceed this value, ``named`` will assume that it is dealing with a + non-responsive zone and will drop additional queries. If it gets a + response after dropping queries, it will raise the estimate. The + estimate will then be lowered in 20 minutes if it has remained + unchanged. + + If ``clients-per-query`` is set to zero, then there is no limit on + the number of clients per query and no queries will be dropped. + + If ``max-clients-per-query`` is set to zero, then there is no upper + bound other than imposed by ``recursive-clients``. + +``fetches-per-zone`` + The maximum number of simultaneous iterative queries to any one + domain that the server will permit before blocking new queries for + data in or beneath that zone. This value should reflect how many + fetches would normally be sent to any one zone in the time it would + take to resolve them. It should be smaller than + ``recursive-clients``. + + When many clients simultaneously query for the same name and type, + the clients will all be attached to the same fetch, up to the + ``max-clients-per-query`` limit, and only one iterative query will be + sent. However, when clients are simultaneously querying for + *different* names or types, multiple queries will be sent and + ``max-clients-per-query`` is not effective as a limit. + + Optionally, this value may be followed by the keyword ``drop`` or + ``fail``, indicating whether queries which exceed the fetch quota for + a zone will be dropped with no response, or answered with SERVFAIL. + The default is ``drop``. + + If ``fetches-per-zone`` is set to zero, then there is no limit on the + number of fetches per query and no queries will be dropped. The + default is zero. + + The current list of active fetches can be dumped by running + ``rndc recursing``. The list includes the number of active fetches + for each domain and the number of queries that have been passed or + dropped as a result of the ``fetches-per-zone`` limit. (Note: these + counters are not cumulative over time; whenever the number of active + fetches for a domain drops to zero, the counter for that domain is + deleted, and the next time a fetch is sent to that domain, it is + recreated with the counters set to zero.) + +``fetches-per-server`` + The maximum number of simultaneous iterative queries that the server + will allow to be sent to a single upstream name server before + blocking additional queries. This value should reflect how many + fetches would normally be sent to any one server in the time it would + take to resolve them. It should be smaller than + ``recursive-clients``. + + Optionally, this value may be followed by the keyword ``drop`` or + ``fail``, indicating whether queries will be dropped with no + response, or answered with SERVFAIL, when all of the servers + authoritative for a zone are found to have exceeded the per-server + quota. The default is ``fail``. + + If ``fetches-per-server`` is set to zero, then there is no limit on + the number of fetches per query and no queries will be dropped. The + default is zero. + + The ``fetches-per-server`` quota is dynamically adjusted in response + to detected congestion. As queries are sent to a server and are + either answered or time out, an exponentially weighted moving average + is calculated of the ratio of timeouts to responses. If the current + average timeout ratio rises above a "high" threshold, then + ``fetches-per-server`` is reduced for that server. If the timeout + ratio drops below a "low" threshold, then ``fetches-per-server`` is + increased. The ``fetch-quota-params`` options can be used to adjust + the parameters for this calculation. + +``fetch-quota-params`` + Sets the parameters to use for dynamic resizing of the + ``fetches-per-server`` quota in response to detected congestion. + + The first argument is an integer value indicating how frequently to + recalculate the moving average of the ratio of timeouts to responses + for each server. The default is 100, meaning we recalculate the + average ratio after every 100 queries have either been answered or + timed out. + + The remaining three arguments represent the "low" threshold + (defaulting to a timeout ratio of 0.1), the "high" threshold + (defaulting to a timeout ratio of 0.3), and the discount rate for the + moving average (defaulting to 0.7). A higher discount rate causes + recent events to weigh more heavily when calculating the moving + average; a lower discount rate causes past events to weigh more + heavily, smoothing out short-term blips in the timeout ratio. These + arguments are all fixed-point numbers with precision of 1/100: at + most two places after the decimal point are significant. + +``reserved-sockets`` + The number of file descriptors reserved for TCP, stdio, etc. This + needs to be big enough to cover the number of interfaces ``named`` + listens on plus ``tcp-clients``, as well as to provide room for + outgoing TCP queries and incoming zone transfers. The default is + ``512``. The minimum value is ``128`` and the maximum value is + ``128`` less than maxsockets (-S). This option may be removed in the + future. + + This option has little effect on Windows. + +``max-cache-size`` + The maximum amount of memory to use for the server's cache, in bytes + or % of total physical memory. When the amount of data in the cache + reaches this limit, the server will cause records to expire + prematurely based on an LRU based strategy so that the limit is not + exceeded. The keyword ``unlimited``, or the value 0, will place no + limit on cache size; records will be purged from the cache only when + their TTLs expire. Any positive values less than 2MB will be ignored + and reset to 2MB. In a server with multiple views, the limit applies + separately to the cache of each view. The default is ``90%``. On + systems where detection of amount of physical memory is not supported + values represented as % fall back to unlimited. Note that the + detection of physical memory is done only once at startup, so + ``named`` will not adjust the cache size if the amount of physical + memory is changed during runtime. + +``tcp-listen-queue`` + The listen queue depth. The default and minimum is 10. If the kernel + supports the accept filter "dataready" this also controls how many + TCP connections that will be queued in kernel space waiting for some + data before being passed to accept. Nonzero values less than 10 will + be silently raised. A value of 0 may also be used; on most platforms + this sets the listen queue length to a system-defined default value. + +``tcp-initial-timeout`` + The amount of time (in units of 100 milliseconds) the server waits on + a new TCP connection for the first message from the client. The + default is 300 (30 seconds), the minimum is 25 (2.5 seconds), and the + maximum is 1200 (two minutes). Values above the maximum or below the + minimum will be adjusted with a logged warning. (Note: This value + must be greater than the expected round trip delay time; otherwise no + client will ever have enough time to submit a message.) This value + can be updated at runtime by using ``rndc tcp-timeouts``. + +``tcp-idle-timeout`` + The amount of time (in units of 100 milliseconds) the server waits on + an idle TCP connection before closing it when the client is not using + the EDNS TCP keepalive option. The default is 300 (30 seconds), the + maximum is 1200 (two minutes), and the minimum is 1 (one tenth of a + second). Values above the maximum or below the minimum will be + adjusted with a logged warning. See ``tcp-keepalive-timeout`` for + clients using the EDNS TCP keepalive option. This value can be + updated at runtime by using ``rndc tcp-timeouts``. + +``tcp-keepalive-timeout`` + The amount of time (in units of 100 milliseconds) the server waits on + an idle TCP connection before closing it when the client is using the + EDNS TCP keepalive option. The default is 300 (30 seconds), the + maximum is 65535 (about 1.8 hours), and the minimum is 1 (one tenth + of a second). Values above the maximum or below the minimum will be + adjusted with a logged warning. This value may be greater than + ``tcp-idle-timeout``, because clients using the EDNS TCP keepalive + option are expected to use TCP connections for more than one message. + This value can be updated at runtime by using ``rndc tcp-timeouts``. + +``tcp-advertised-timeout`` + The timeout value (in units of 100 milliseconds) the server will send + in respones containing the EDNS TCP keepalive option. This informs a + client of the amount of time it may keep the session open. The + default is 300 (30 seconds), the maximum is 65535 (about 1.8 hours), + and the minimum is 0, which signals that the clients must close TCP + connections immediately. Ordinarily this should be set to the same + value as ``tcp-keepalive-timeout``. This value can be updated at + runtime by using ``rndc tcp-timeouts``. + +.. _intervals: + +Periodic Task Intervals +^^^^^^^^^^^^^^^^^^^^^^^ + +``cleaning-interval`` + This option is obsolete. + +``heartbeat-interval`` + The server will perform zone maintenance tasks for all zones marked + as ``dialup`` whenever this interval expires. The default is 60 + minutes. Reasonable values are up to 1 day (1440 minutes). The + maximum value is 28 days (40320 minutes). If set to 0, no zone + maintenance for these zones will occur. + +``interface-interval`` + The server will scan the network interface list every ``interface-interval`` + minutes. The default is 60 minutes. The maximum value is 28 days (40320 + minutes). If set to 0, interface scanning will only occur the configuration + file is loaded, or when ``automatic-interface-scan`` is enabled and supported + by the operating system. After the scan, the server will begin listening for + queries on any newly discovered interfaces (provided they are allowed by the + ``listen-on`` configuration), and will stop listening on interfaces that have + gone away. For convenience, TTL-style time unit suffixes may be used to + specify the value. It also accepts ISO 8601 duration formats. + +.. _the_sortlist_statement: + +The ``sortlist`` Statement +^^^^^^^^^^^^^^^^^^^^^^^^^^ + +The response to a DNS query may consist of multiple resource records +(RRs) forming a resource record set (RRset). The name server will +normally return the RRs within the RRset in an indeterminate order (but +see the ``rrset-order`` statement in :ref:`rrset_ordering`). The client resolver code should +rearrange the RRs as appropriate, that is, using any addresses on the +local net in preference to other addresses. However, not all resolvers +can do this or are correctly configured. When a client is using a local +server, the sorting can be performed in the server, based on the +client's address. This only requires configuring the name servers, not +all the clients. + +The ``sortlist`` statement (see below) takes an ``address_match_list`` and +interprets it in a special way. Each top level statement in the ``sortlist`` +must itself be an explicit ``address_match_list`` with one or two elements. The +first element (which may be an IP address, an IP prefix, an ACL name or a nested +``address_match_list``) of each top level list is checked against the source +address of the query until a match is found. When the addresses in the first +element overlap, the first rule to match gets selected. + +Once the source address of the query has been matched, if the top level +statement contains only one element, the actual primitive element that +matched the source address is used to select the address in the response +to move to the beginning of the response. If the statement is a list of +two elements, then the second element is interpreted as a topology +preference list. Each top level element is assigned a distance and the +address in the response with the minimum distance is moved to the +beginning of the response. + +In the following example, any queries received from any of the addresses +of the host itself will get responses preferring addresses on any of the +locally connected networks. Next most preferred are addresses on the +192.168.1/24 network, and after that either the 192.168.2/24 or +192.168.3/24 network with no preference shown between these two +networks. Queries received from a host on the 192.168.1/24 network will +prefer other addresses on that network to the 192.168.2/24 and +192.168.3/24 networks. Queries received from a host on the 192.168.4/24 +or the 192.168.5/24 network will only prefer other addresses on their +directly connected networks. + +:: + + sortlist { + // IF the local host + // THEN first fit on the following nets + { localhost; + { localnets; + 192.168.1/24; + { 192.168.2/24; 192.168.3/24; }; }; }; + // IF on class C 192.168.1 THEN use .1, or .2 or .3 + { 192.168.1/24; + { 192.168.1/24; + { 192.168.2/24; 192.168.3/24; }; }; }; + // IF on class C 192.168.2 THEN use .2, or .1 or .3 + { 192.168.2/24; + { 192.168.2/24; + { 192.168.1/24; 192.168.3/24; }; }; }; + // IF on class C 192.168.3 THEN use .3, or .1 or .2 + { 192.168.3/24; + { 192.168.3/24; + { 192.168.1/24; 192.168.2/24; }; }; }; + // IF .4 or .5 THEN prefer that net + { { 192.168.4/24; 192.168.5/24; }; + }; + }; + +The following example will give reasonable behavior for the local host +and hosts on directly connected networks. It is similar to the behavior +of the address sort in BIND 4.9.x. Responses sent to queries from the +local host will favor any of the directly connected networks. Responses +sent to queries from any other hosts on a directly connected network +will prefer addresses on that same network. Responses to other queries +will not be sorted. + +:: + + sortlist { + { localhost; localnets; }; + { localnets; }; + }; + +.. _rrset_ordering: + +RRset Ordering +^^^^^^^^^^^^^^ + +When multiple records are returned in an answer it may be useful to +configure the order of the records placed into the response. The +``rrset-order`` statement permits configuration of the ordering of the +records in a multiple-record response. See also the ``sortlist`` +statement, :ref:`the_sortlist_statement`. + +An ``order_spec`` is defined as follows: + +[class *class_name*] [type *type_name*] [name "*domain_name*"] order *ordering* + +If no class is specified, the default is ``ANY``. If no type is +specified, the default is ``ANY``. If no name is specified, the default +is "``*``" (asterisk). + +The legal values for ``ordering`` are: + +``fixed`` + Records are returned in the order they are defined in the zone file. This option is only available if BIND is configured with "--enable-fixed-rrset" at compile time. + +``random`` + Records are returned in some random order. + +``cyclic`` + Records are returned in a cyclic round-robin order, rotating by one record per query. If BIND is configured with "--enable-fixed-rrset" at compile time, then the initial ordering of the RRset will match the one specified in the zone file; otherwise the initial ordering is indeterminate. + +``none`` + Records are returned in whatever order they were retrieved from the database. This order is indeterminate, but will be consistent as long as the database is not modified. When no ordering is specified, this is the default. + +For example: + +:: + + rrset-order { + class IN type A name "host.example.com" order random; + order cyclic; + }; + +will cause any responses for type A records in class IN that have +"``host.example.com``" as a suffix, to always be returned in random +order. All other records are returned in cyclic order. + +If multiple ``rrset-order`` statements appear, they are not combined — +the last one applies. + +By default, records are returned in ``random`` order. + +.. note:: + + In this release of BIND 9, the ``rrset-order`` statement does not + support "fixed" ordering by default. Fixed ordering can be enabled at + compile time by specifying "--enable-fixed-rrset" on the "configure" + command line. + +.. _tuning: + +Tuning +^^^^^^ + +``lame-ttl`` + Sets the number of seconds to cache a lame server indication. 0 + disables caching. (This is **NOT** recommended.) The default is + ``600`` (10 minutes) and the maximum value is ``1800`` (30 minutes). + +``servfail-ttl`` + Sets the number of seconds to cache a SERVFAIL response due to DNSSEC + validation failure or other general server failure. If set to ``0``, + SERVFAIL caching is disabled. The SERVFAIL cache is not consulted if + a query has the CD (Checking Disabled) bit set; this allows a query + that failed due to DNSSEC validation to be retried without waiting + for the SERVFAIL TTL to expire. + + The maximum value is ``30`` seconds; any higher value will be + silently reduced. The default is ``1`` second. + +``min-ncache-ttl`` + To reduce network traffic and increase performance, the server stores + negative answers. ``min-ncache-ttl`` is used to set a minimum + retention time for these answers in the server in seconds. For + convenience, TTL-style time unit suffixes may be used to specify the + value. It also accepts ISO 8601 duration formats. + + The default ``min-ncache-ttl`` is ``0`` seconds. ``min-ncache-ttl`` cannot + exceed 90 seconds and will be truncated to 90 seconds if set to a greater + value. + +``min-cache-ttl`` + Sets the minimum time for which the server will cache ordinary (positive) + answers in seconds. For convenience, TTL-style time unit suffixes may be used + to specify the value. It also accepts ISO 8601 duration formats. + + The default ``min-cache-ttl`` is ``0`` seconds. ``min-cache-ttl`` cannot + exceed 90 seconds and will be truncated to 90 seconds if set to a greater + value. + +``max-ncache-ttl`` + To reduce network traffic and increase performance, the server stores + negative answers. ``max-ncache-ttl`` is used to set a maximum retention time + for these answers in the server in seconds. For convenience, TTL-style time + unit suffixes may be used to specify the value. It also accepts ISO 8601 + duration formats. + + The default ``max-ncache-ttl`` is 10800 seconds (3 hours). ``max-ncache-ttl`` + cannot exceed 7 days and will be silently truncated to 7 days if set to a + greater value. + +``max-cache-ttl`` + Sets the maximum time for which the server will cache ordinary (positive) + answers in seconds. For convenience, TTL-style time unit suffixes may be used + to specify the value. It also accepts ISO 8601 duration formats. + + The default ``max-cache-ttl`` is 604800 (one week). A value of zero may cause + all queries to return SERVFAIL, because of lost caches of intermediate RRsets + (such as NS and glue AAAA/A records) in the resolution process. + +``max-stale-ttl`` + If stale answers are enabled, ``max-stale-ttl`` sets the maximum time + for which the server will retain records past their normal expiry to + return them as stale records when the servers for those records are + not reachable. The default is 1 week. The minimum allowed is 1 + second; a value of 0 will be updated silently to 1 second. + + For stale answers to be returned, they must be enabled, either in the + configuration file using ``stale-answer-enable`` or via + ``rndc serve-stale on``. + +``resolver-nonbackoff-tries`` + Specifies how many retries occur before exponential backoff kicks in. The + default is ``3``. + +``resolver-retry-interval`` + The base retry interval in milliseconds. The default is ``800``. + +``sig-validity-interval`` + Specifies the number of days into the future when DNSSEC signatures + automatically generated as a result of dynamic updates + (:ref:`dynamic_update`) will expire. There is an optional second + field which specifies how long before expiry that the signatures will + be regenerated. If not specified, the signatures will be regenerated + at 1/4 of base interval. The second field is specified in days if the + base interval is greater than 7 days otherwise it is specified in + hours. The default base interval is ``30`` days giving a re-signing + interval of 7 1/2 days. The maximum values are 10 years (3660 days). + + The signature inception time is unconditionally set to one hour + before the current time to allow for a limited amount of clock skew. + + The ``sig-validity-interval`` can be overridden for DNSKEY records by + setting ``dnskey-sig-validity``. + + The ``sig-validity-interval`` should be, at least, several multiples + of the SOA expire interval to allow for reasonable interaction + between the various timer and expiry dates. + +``dnskey-sig-validity`` + Specifies the number of days into the future when DNSSEC signatures + that are automatically generated for DNSKEY RRsets as a result of + dynamic updates (:ref:`dynamic_update`) will expire. + If set to a non-zero value, this overrides the value set by + ``sig-validity-interval``. The default is zero, meaning + ``sig-validity-interval`` is used. The maximum value is 3660 days (10 + years), and higher values will be rejected. + +``sig-signing-nodes`` + Specify the maximum number of nodes to be examined in each quantum + when signing a zone with a new DNSKEY. The default is ``100``. + +``sig-signing-signatures`` + Specify a threshold number of signatures that will terminate + processing a quantum when signing a zone with a new DNSKEY. The + default is ``10``. + +``sig-signing-type`` + Specify a private RDATA type to be used when generating signing state + records. The default is ``65534``. + + It is expected that this parameter may be removed in a future version + once there is a standard type. + + Signing state records are used to internally by ``named`` to track + the current state of a zone-signing process, i.e., whether it is + still active or has been completed. The records can be inspected + using the command ``rndc signing -list zone``. Once ``named`` has + finished signing a zone with a particular key, the signing state + record associated with that key can be removed from the zone by + running ``rndc signing -clear keyid/algorithm zone``. To clear all of + the completed signing state records for a zone, use + ``rndc signing -clear all zone``. + +``min-refresh-time``; \ ``max-refresh-time``; \ ``min-retry-time``; \ ``max-retry-time`` + These options control the server's behavior on refreshing a zone + (querying for SOA changes) or retrying failed transfers. Usually the + SOA values for the zone are used, up to a hard-coded maximum expiry + of 24 weeks. However, these values are set by the master, giving + slave server administrators little control over their contents. + + These options allow the administrator to set a minimum and maximum + refresh and retry time in seconds per-zone, per-view, or globally. + These options are valid for slave and stub zones, and clamp the SOA + refresh and retry times to the specified values. + + The following defaults apply. ``min-refresh-time`` 300 seconds, + ``max-refresh-time`` 2419200 seconds (4 weeks), ``min-retry-time`` + 500 seconds, and ``max-retry-time`` 1209600 seconds (2 weeks). + +``edns-udp-size`` + Sets the maximum advertised EDNS UDP buffer size in bytes, to control + the size of packets received from authoritative servers in response + to recursive queries. Valid values are 512 to 4096 (values outside + this range will be silently adjusted to the nearest value within it). + The default value is 4096. + + The usual reason for setting ``edns-udp-size`` to a non-default value + is to get UDP answers to pass through broken firewalls that block + fragmented packets and/or block UDP DNS packets that are greater than + 512 bytes. + + When ``named`` first queries a remote server, it will advertise a UDP + buffer size of 512, as this has the greatest chance of success on the + first try. + + If the initial query is successful with EDNS advertising a buffer size of + 512, then ``named`` will advertise progressively larger buffer sizes on + successive queries, until responses begin timing out or ``edns-udp-size`` is + reached. + + The default buffer sizes used by ``named`` are 512, 1232, 1432, and + 4096, but never exceeding ``edns-udp-size``. (The values 1232 and + 1432 are chosen to allow for an IPv4/IPv6 encapsulated UDP message to + be sent without fragmentation at the minimum MTU sizes for Ethernet + and IPv6 networks.) + +``max-udp-size`` + Sets the maximum EDNS UDP message size ``named`` will send in bytes. + Valid values are 512 to 4096 (values outside this range will be + silently adjusted to the nearest value within it). The default value + is 4096. + + This value applies to responses sent by a server; to set the + advertised buffer size in queries, see ``edns-udp-size``. + + The usual reason for setting ``max-udp-size`` to a non-default value + is to get UDP answers to pass through broken firewalls that block + fragmented packets and/or block UDP packets that are greater than 512 + bytes. This is independent of the advertised receive buffer + (``edns-udp-size``). + + Setting this to a low value will encourage additional TCP traffic to + the nameserver. + +``masterfile-format`` + Specifies the file format of zone files (see :ref:`zonefile_format`). + The default value is ``text``, which + is the standard textual representation, except for slave zones, in + which the default value is ``raw``. Files in other formats than + ``text`` are typically expected to be generated by the + ``named-compilezone`` tool, or dumped by ``named``. + + Note that when a zone file in a different format than ``text`` is + loaded, ``named`` may omit some of the checks which would be + performed for a file in the ``text`` format. In particular, + ``check-names`` checks do not apply for the ``raw`` format. This + means a zone file in the ``raw`` format must be generated with the + same check level as that specified in the ``named`` configuration + file. Also, ``map`` format files are loaded directly into memory via + memory mapping, with only minimal checking. + + This statement sets the ``masterfile-format`` for all zones, but can + be overridden on a per-zone or per-view basis by including a + ``masterfile-format`` statement within the ``zone`` or ``view`` block + in the configuration file. + +``masterfile-style`` + Specifies the formatting of zone files during dump when the + ``masterfile-format`` is ``text``. (This option is ignored with any + other ``masterfile-format``.) + + When set to ``relative``, records are printed in a multi-line format + with owner names expressed relative to a shared origin. When set to + ``full``, records are printed in a single-line format with absolute + owner names. The ``full`` format is most suitable when a zone file + needs to be processed automatically by a script. The ``relative`` + format is more human-readable, and is thus suitable when a zone is to + be edited by hand. The default is ``relative``. + +``max-recursion-depth`` + Sets the maximum number of levels of recursion that are permitted at + any one time while servicing a recursive query. Resolving a name may + require looking up a name server address, which in turn requires + resolving another name, etc; if the number of indirections exceeds + this value, the recursive query is terminated and returns SERVFAIL. + The default is 7. + +``max-recursion-queries`` + Sets the maximum number of iterative queries that may be sent while + servicing a recursive query. If more queries are sent, the recursive + query is terminated and returns SERVFAIL. Queries to look up top + level domains such as "com" and "net" and the DNS root zone are + exempt from this limitation. The default is 75. + +``notify-delay`` + The delay, in seconds, between sending sets of notify messages for a + zone. The default is five (5) seconds. + + The overall rate that NOTIFY messages are sent for all zones is + controlled by ``serial-query-rate``. + +``max-rsa-exponent-size`` + The maximum RSA exponent size, in bits, that will be accepted when + validating. Valid values are 35 to 4096 bits. The default zero (0) is + also accepted and is equivalent to 4096. + +``prefetch`` + When a query is received for cached data which is to expire shortly, + ``named`` can refresh the data from the authoritative server + immediately, ensuring that the cache always has an answer available. + + The ``prefetch`` specifies the "trigger" TTL value at which prefetch + of the current query will take place: when a cache record with a + lower TTL value is encountered during query processing, it will be + refreshed. Valid trigger TTL values are 1 to 10 seconds. Values + larger than 10 seconds will be silently reduced to 10. Setting a + trigger TTL to zero (0) causes prefetch to be disabled. The default + trigger TTL is ``2``. + + An optional second argument specifies the "eligibility" TTL: the + smallest *original* TTL value that will be accepted for a record to + be eligible for prefetching. The eligibility TTL must be at least six + seconds longer than the trigger TTL; if it isn't, ``named`` will + silently adjust it upward. The default eligibility TTL is ``9``. + +``v6-bias`` + When determining the next nameserver to try preference IPv6 + nameservers by this many milliseconds. The default is ``50`` + milliseconds. + +.. _builtin: + +Built-in server information zones +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +The server provides some helpful diagnostic information through a number +of built-in zones under the pseudo-top-level-domain ``bind`` in the +``CHAOS`` class. These zones are part of a built-in view +(see :ref:`view_statement_grammar`) of class ``CHAOS`` which is +separate from the default view of class ``IN``. Most global +configuration options (``allow-query``, etc) will apply to this view, +but some are locally overridden: ``notify``, ``recursion`` and +``allow-new-zones`` are always set to ``no``, and ``rate-limit`` is set +to allow three responses per second. + +If you need to disable these zones, use the options below, or hide the +built-in ``CHAOS`` view by defining an explicit view of class ``CHAOS`` +that matches all clients. + +``version`` + The version the server should report via a query of the name + ``version.bind`` with type ``TXT``, class ``CHAOS``. The default is + the real version number of this server. Specifying ``version none`` + disables processing of the queries. + + Setting ``version`` to any value (including ``none``) will also disable + queries for ``authors.bind TXT CH``. + +``hostname`` + The hostname the server should report via a query of the name + ``hostname.bind`` with type ``TXT``, class ``CHAOS``. This defaults + to the hostname of the machine hosting the name server as found by + the gethostname() function. The primary purpose of such queries is to + identify which of a group of anycast servers is actually answering + your queries. Specifying ``hostname none;`` disables processing of + the queries. + +``server-id`` + The ID the server should report when receiving a Name Server + Identifier (NSID) query, or a query of the name ``ID.SERVER`` with + type ``TXT``, class ``CHAOS``. The primary purpose of such queries is + to identify which of a group of anycast servers is actually answering + your queries. Specifying ``server-id none;`` disables processing of + the queries. Specifying ``server-id hostname;`` will cause ``named`` + to use the hostname as found by the gethostname() function. The + default ``server-id`` is ``none``. + +.. _empty: + +Built-in Empty Zones +^^^^^^^^^^^^^^^^^^^^ + +The ``named`` server has some built-in empty zones (SOA and NS records +only). These are for zones that should normally be answered locally and +which queries should not be sent to the Internet's root servers. The +official servers which cover these namespaces return NXDOMAIN responses +to these queries. In particular, these cover the reverse namespaces for +addresses from :rfc:`1918`, :rfc:`4193`, :rfc:`5737` and :rfc:`6598`. They also +include the reverse namespace for IPv6 local address (locally assigned), +IPv6 link local addresses, the IPv6 loopback address and the IPv6 +unknown address. + +The server will attempt to determine if a built-in zone already exists +or is active (covered by a forward-only forwarding declaration) and will +not create an empty zone in that case. + +The current list of empty zones is: + +- 10.IN-ADDR.ARPA +- 16.172.IN-ADDR.ARPA +- 17.172.IN-ADDR.ARPA +- 18.172.IN-ADDR.ARPA +- 19.172.IN-ADDR.ARPA +- 20.172.IN-ADDR.ARPA +- 21.172.IN-ADDR.ARPA +- 22.172.IN-ADDR.ARPA +- 23.172.IN-ADDR.ARPA +- 24.172.IN-ADDR.ARPA +- 25.172.IN-ADDR.ARPA +- 26.172.IN-ADDR.ARPA +- 27.172.IN-ADDR.ARPA +- 28.172.IN-ADDR.ARPA +- 29.172.IN-ADDR.ARPA +- 30.172.IN-ADDR.ARPA +- 31.172.IN-ADDR.ARPA +- 168.192.IN-ADDR.ARPA +- 64.100.IN-ADDR.ARPA +- 65.100.IN-ADDR.ARPA +- 66.100.IN-ADDR.ARPA +- 67.100.IN-ADDR.ARPA +- 68.100.IN-ADDR.ARPA +- 69.100.IN-ADDR.ARPA +- 70.100.IN-ADDR.ARPA +- 71.100.IN-ADDR.ARPA +- 72.100.IN-ADDR.ARPA +- 73.100.IN-ADDR.ARPA +- 74.100.IN-ADDR.ARPA +- 75.100.IN-ADDR.ARPA +- 76.100.IN-ADDR.ARPA +- 77.100.IN-ADDR.ARPA +- 78.100.IN-ADDR.ARPA +- 79.100.IN-ADDR.ARPA +- 80.100.IN-ADDR.ARPA +- 81.100.IN-ADDR.ARPA +- 82.100.IN-ADDR.ARPA +- 83.100.IN-ADDR.ARPA +- 84.100.IN-ADDR.ARPA +- 85.100.IN-ADDR.ARPA +- 86.100.IN-ADDR.ARPA +- 87.100.IN-ADDR.ARPA +- 88.100.IN-ADDR.ARPA +- 89.100.IN-ADDR.ARPA +- 90.100.IN-ADDR.ARPA +- 91.100.IN-ADDR.ARPA +- 92.100.IN-ADDR.ARPA +- 93.100.IN-ADDR.ARPA +- 94.100.IN-ADDR.ARPA +- 95.100.IN-ADDR.ARPA +- 96.100.IN-ADDR.ARPA +- 97.100.IN-ADDR.ARPA +- 98.100.IN-ADDR.ARPA +- 99.100.IN-ADDR.ARPA +- 100.100.IN-ADDR.ARPA +- 101.100.IN-ADDR.ARPA +- 102.100.IN-ADDR.ARPA +- 103.100.IN-ADDR.ARPA +- 104.100.IN-ADDR.ARPA +- 105.100.IN-ADDR.ARPA +- 106.100.IN-ADDR.ARPA +- 107.100.IN-ADDR.ARPA +- 108.100.IN-ADDR.ARPA +- 109.100.IN-ADDR.ARPA +- 110.100.IN-ADDR.ARPA +- 111.100.IN-ADDR.ARPA +- 112.100.IN-ADDR.ARPA +- 113.100.IN-ADDR.ARPA +- 114.100.IN-ADDR.ARPA +- 115.100.IN-ADDR.ARPA +- 116.100.IN-ADDR.ARPA +- 117.100.IN-ADDR.ARPA +- 118.100.IN-ADDR.ARPA +- 119.100.IN-ADDR.ARPA +- 120.100.IN-ADDR.ARPA +- 121.100.IN-ADDR.ARPA +- 122.100.IN-ADDR.ARPA +- 123.100.IN-ADDR.ARPA +- 124.100.IN-ADDR.ARPA +- 125.100.IN-ADDR.ARPA +- 126.100.IN-ADDR.ARPA +- 127.100.IN-ADDR.ARPA +- 0.IN-ADDR.ARPA +- 127.IN-ADDR.ARPA +- 254.169.IN-ADDR.ARPA +- 2.0.192.IN-ADDR.ARPA +- 100.51.198.IN-ADDR.ARPA +- 113.0.203.IN-ADDR.ARPA +- 255.255.255.255.IN-ADDR.ARPA +- 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA +- 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA +- 8.B.D.0.1.0.0.2.IP6.ARPA +- D.F.IP6.ARPA +- 8.E.F.IP6.ARPA +- 9.E.F.IP6.ARPA +- A.E.F.IP6.ARPA +- B.E.F.IP6.ARPA +- EMPTY.AS112.ARPA +- HOME.ARPA + +Empty zones are settable at the view level and only apply to views of +class IN. Disabled empty zones are only inherited from options if there +are no disabled empty zones specified at the view level. To override the +options list of disabled zones, you can disable the root zone at the +view level, for example: + +:: + + disable-empty-zone "."; + +If you are using the address ranges covered here, you should already +have reverse zones covering the addresses you use. In practice this +appears to not be the case with many queries being made to the +infrastructure servers for names in these spaces. So many in fact that +sacrificial servers were needed to be deployed to channel the query load +away from the infrastructure servers. + +.. note:: + + The real parent servers for these zones should disable all empty zone + under the parent zone they serve. For the real root servers, this is + all built-in empty zones. This will enable them to return referrals + to deeper in the tree. + +``empty-server`` + Specify what server name will appear in the returned SOA record for + empty zones. If none is specified, then the zone's name will be used. + +``empty-contact`` + Specify what contact name will appear in the returned SOA record for + empty zones. If none is specified, then "." will be used. + +``empty-zones-enable`` + Enable or disable all empty zones. By default, they are enabled. + +``disable-empty-zone`` + Disable individual empty zones. By default, none are disabled. This + option can be specified multiple times. + +.. _content_filtering: + +Content Filtering +^^^^^^^^^^^^^^^^^ + +BIND 9 provides the ability to filter out DNS responses from external +DNS servers containing certain types of data in the answer section. +Specifically, it can reject address (A or AAAA) records if the +corresponding IPv4 or IPv6 addresses match the given +``address_match_list`` of the ``deny-answer-addresses`` option. It can +also reject CNAME or DNAME records if the "alias" name (i.e., the CNAME +alias or the substituted query name due to DNAME) matches the given +``namelist`` of the ``deny-answer-aliases`` option, where "match" means +the alias name is a subdomain of one of the ``name_list`` elements. If +the optional ``namelist`` is specified with ``except-from``, records +whose query name matches the list will be accepted regardless of the +filter setting. Likewise, if the alias name is a subdomain of the +corresponding zone, the ``deny-answer-aliases`` filter will not apply; +for example, even if "example.com" is specified for +``deny-answer-aliases``, + +:: + + www.example.com. CNAME xxx.example.com. + +returned by an "example.com" server will be accepted. + +In the ``address_match_list`` of the ``deny-answer-addresses`` option, +only ``ip_addr`` and ``ip_prefix`` are meaningful; any ``key_id`` will +be silently ignored. + +If a response message is rejected due to the filtering, the entire +message is discarded without being cached, and a SERVFAIL error will be +returned to the client. + +This filtering is intended to prevent "DNS rebinding attacks," in which +an attacker, in response to a query for a domain name the attacker +controls, returns an IP address within your own network or an alias name +within your own domain. A naive web browser or script could then serve +as an unintended proxy, allowing the attacker to get access to an +internal node of your local network that couldn't be externally accessed +otherwise. See the paper available at +http://portal.acm.org/citation.cfm?id=1315245.1315298 for more details +about the attacks. + +For example, if you own a domain named "example.net" and your internal +network uses an IPv4 prefix 192.0.2.0/24, you might specify the +following rules: + +:: + + deny-answer-addresses { 192.0.2.0/24; } except-from { "example.net"; }; + deny-answer-aliases { "example.net"; }; + +If an external attacker lets a web browser in your local network look up +an IPv4 address of "attacker.example.com", the attacker's DNS server +would return a response like this: + +:: + + attacker.example.com. A 192.0.2.1 + +in the answer section. Since the rdata of this record (the IPv4 address) +matches the specified prefix 192.0.2.0/24, this response will be +ignored. + +On the other hand, if the browser looks up a legitimate internal web +server "www.example.net" and the following response is returned to the +BIND 9 server + +:: + + www.example.net. A 192.0.2.2 + +it will be accepted since the owner name "www.example.net" matches the +``except-from`` element, "example.net". + +Note that this is not really an attack on the DNS per se. In fact, there +is nothing wrong for an "external" name to be mapped to your "internal" +IP address or domain name from the DNS point of view. It might actually +be provided for a legitimate purpose, such as for debugging. As long as +the mapping is provided by the correct owner, it is not possible or does +not make sense to detect whether the intent of the mapping is legitimate +or not within the DNS. The "rebinding" attack must primarily be +protected at the application that uses the DNS. For a large site, +however, it may be difficult to protect all possible applications at +once. This filtering feature is provided only to help such an +operational environment; it is generally discouraged to turn it on +unless you are very sure you have no other choice and the attack is a +real threat for your applications. + +Care should be particularly taken if you want to use this option for +addresses within 127.0.0.0/8. These addresses are obviously "internal", +but many applications conventionally rely on a DNS mapping from some +name to such an address. Filtering out DNS records containing this +address spuriously can break such applications. + +.. _rpz: + +Response Policy Zone (RPZ) Rewriting +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +BIND 9 includes a limited mechanism to modify DNS responses for requests +analogous to email anti-spam DNS blacklists. Responses can be changed to +deny the existence of domains (NXDOMAIN), deny the existence of IP +addresses for domains (NODATA), or contain other IP addresses or data. + +Response policy zones are named in the ``response-policy`` option for +the view or among the global options if there is no response-policy +option for the view. Response policy zones are ordinary DNS zones +containing RRsets that can be queried normally if allowed. It is usually +best to restrict those queries with something like +``allow-query { localhost; };``. Note that zones using +``masterfile-format map`` cannot be used as policy zones. + +A ``response-policy`` option can support multiple policy zones. To +maximize performance, a radix tree is used to quickly identify response +policy zones containing triggers that match the current query. This +imposes an upper limit of 64 on the number of policy zones in a single +``response-policy`` option; more than that is a configuration error. + +Rules encoded in response policy zones are processed after +:ref:`access_control`. All queries from clients which are not permitted access +to the resolver will be answered with a status code of REFUSED, regardless of +configured RPZ rules. + +Five policy triggers can be encoded in RPZ records. + +``RPZ-CLIENT-IP`` + IP records are triggered by the IP address of the DNS client. Client + IP address triggers are encoded in records that have owner names that + are subdomains of ``rpz-client-ip`` relativized to the policy zone + origin name and encode an address or address block. IPv4 addresses + are represented as ``prefixlength.B4.B3.B2.B1.rpz-client-ip``. The + IPv4 prefix length must be between 1 and 32. All four bytes, B4, B3, + B2, and B1, must be present. B4 is the decimal value of the least + significant byte of the IPv4 address as in IN-ADDR.ARPA. + + IPv6 addresses are encoded in a format similar to the standard IPv6 + text representation, + ``prefixlength.W8.W7.W6.W5.W4.W3.W2.W1.rpz-client-ip``. Each of + W8,...,W1 is a one to four digit hexadecimal number representing 16 + bits of the IPv6 address as in the standard text representation of + IPv6 addresses, but reversed as in IP6.ARPA. (Note that this + representation of IPv6 address is different from IP6.ARPA where each + hex digit occupies a label.) All 8 words must be present except when + one set of consecutive zero words is replaced with ``.zz.`` analogous + to double colons (::) in standard IPv6 text encodings. The IPv6 + prefix length must be between 1 and 128. + +``QNAME`` + QNAME policy records are triggered by query names of requests and + targets of CNAME records resolved to generate the response. The owner + name of a QNAME policy record is the query name relativized to the + policy zone. + +``RPZ-IP`` + IP triggers are IP addresses in an A or AAAA record in the ANSWER + section of a response. They are encoded like client-IP triggers + except as subdomains of ``rpz-ip``. + +``RPZ-NSDNAME`` + NSDNAME triggers match names of authoritative servers for the query name, a + parent of the query name, a CNAME for query name, or a parent of a CNAME. + They are encoded as subdomains of rpz-nsdname relativized + to the RPZ origin name. NSIP triggers match IP addresses in A and AAAA + RRsets for domains that can be checked against NSDNAME policy records. The + ``nsdname-enable`` phrase turns NSDNAME triggers off or on for a single + policy zone or all zones. + + If authoritative nameservers for the query name are not yet known, ``named`` + will recursively look up the authoritative servers for the query name before + applying an RPZ-NSDNAME rule. This can cause a processing delay. To speed up + processing at the cost of precision, the ``nsdname-wait-recurse`` option can + be used: when set to ``no``, RPZ-NSDNAME rules will only be applied when + authoritative servers for the query name have already been looked up and + cached. If authoritative servers for the query name are not in the cache, + then the RPZ-NSDNAME rule will be ignored, but the authoritative servers for + the query name will be looked up in the background, and the rule will be + applied to subsequent queries. The default is ``yes``, + meaning RPZ-NSDNAME rules should always be applied even if authoritative + servers for the query name need to be looked up first. + +``RPZ-NSIP`` + NSIP triggers match the IP addresses of authoritative servers. They + are enncoded like IP triggers, except as subdomains of ``rpz-nsip``. + NSDNAME and NSIP triggers are checked only for names with at least + ``min-ns-dots`` dots. The default value of ``min-ns-dots`` is 1, to + exclude top level domains. The ``nsip-enable`` phrase turns NSIP + triggers off or on for a single policy zone or all zones. + + If a name server's IP address is not yet known, ``named`` will + recursively look up the IP address before applying an RPZ-NSIP rule. + This can cause a processing delay. To speed up processing at the cost + of precision, the ``nsip-wait-recurse`` option can be used: when set + to ``no``, RPZ-NSIP rules will only be applied when a name servers's + IP address has already been looked up and cached. If a server's IP + address is not in the cache, then the RPZ-NSIP rule will be ignored, + but the address will be looked up in the background, and the rule + will be applied to subsequent queries. The default is ``yes``, + meaning RPZ-NSIP rules should always be applied even if an address + needs to be looked up first. + +The query response is checked against all response policy zones, so two +or more policy records can be triggered by a response. Because DNS +responses are rewritten according to at most one policy record, a single +record encoding an action (other than ``DISABLED`` actions) must be +chosen. Triggers or the records that encode them are chosen for the +rewriting in the following order: + +1. Choose the triggered record in the zone that appears first in the + response-policy + option. +2. Prefer CLIENT-IP to QNAME to IP to NSDNAME to NSIP triggers in a + single zone. +3. Among NSDNAME triggers, prefer the trigger that matches the smallest + name under the DNSSEC ordering. +4. Among IP or NSIP triggers, prefer the trigger with the longest + prefix. +5. Among triggers with the same prefix length, prefer the IP or NSIP + trigger that matches the smallest IP address. + +When the processing of a response is restarted to resolve DNAME or CNAME +records and a policy record set has not been triggered, all response +policy zones are again consulted for the DNAME or CNAME names and +addresses. + +RPZ record sets are any types of DNS record except DNAME or DNSSEC that +encode actions or responses to individual queries. Any of the policies +can be used with any of the triggers. For example, while the +``TCP-only`` policy is commonly used with ``client-IP`` triggers, it can +be used with any type of trigger to force the use of TCP for responses +with owner names in a zone. + +``PASSTHRU`` + The whitelist policy is specified by a CNAME whose target is + ``rpz-passthru``. It causes the response to not be rewritten and is + most often used to "poke holes" in policies for CIDR blocks. + +``DROP`` + The blacklist policy is specified by a CNAME whose target is + ``rpz-drop``. It causes the response to be discarded. Nothing is sent + to the DNS client. + +``TCP-Only`` + The "slip" policy is specified by a CNAME whose target is + ``rpz-tcp-only``. It changes UDP responses to short, truncated DNS + responses that require the DNS client to try again with TCP. It is + used to mitigate distributed DNS reflection attacks. + +``NXDOMAIN`` + The domain undefined response is encoded by a CNAME whose target is + the root domain (.) + +``NODATA`` + The empty set of resource records is specified by CNAME whose target + is the wildcard top-level domain (``*.``). It rewrites the response to + NODATA or ANCOUNT=0. + +``Local Data`` + A set of ordinary DNS records can be used to answer queries. Queries + for record types not the set are answered with NODATA. + + A special form of local data is a CNAME whose target is a wildcard + such as \*.example.com. It is used as if were an ordinary CNAME after + the asterisk (\*) has been replaced with the query name. The purpose + for this special form is query logging in the walled garden's + authority DNS server. + +All of the actions specified in all of the individual records in a +policy zone can be overridden with a ``policy`` clause in the +``response-policy`` option. An organization using a policy zone provided +by another organization might use this mechanism to redirect domains to +its own walled garden. + +``GIVEN`` + The placeholder policy says "do not override but perform the action + specified in the zone." + +``DISABLED`` + The testing override policy causes policy zone records to do nothing + but log what they would have done if the policy zone were not + disabled. The response to the DNS query will be written (or not) + according to any triggered policy records that are not disabled. + Disabled policy zones should appear first, because they will often + not be logged if a higher precedence trigger is found first. + +``PASSTHRU``; \ ``DROP``; \ ``TCP-Only``; \ ``NXDOMAIN``; \ ``NODATA`` + override with the corresponding per-record policy. + +``CNAME domain`` + causes all RPZ policy records to act as if they were "cname domain" + records. + +By default, the actions encoded in a response policy zone are applied +only to queries that ask for recursion (RD=1). That default can be +changed for a single policy zone or all response policy zones in a view +with a ``recursive-only no`` clause. This feature is useful for serving +the same zone files both inside and outside an :rfc:`1918` cloud and using +RPZ to delete answers that would otherwise contain :rfc:`1918` values on +the externally visible name server or view. + +Also by default, RPZ actions are applied only to DNS requests that +either do not request DNSSEC metadata (DO=0) or when no DNSSEC records +are available for request name in the original zone (not the response +policy zone). This default can be changed for all response policy zones +in a view with a ``break-dnssec yes`` clause. In that case, RPZ actions +are applied regardless of DNSSEC. The name of the clause option reflects +the fact that results rewritten by RPZ actions cannot verify. + +No DNS records are needed for a QNAME or Client-IP trigger. The name or +IP address itself is sufficient, so in principle the query name need not +be recursively resolved. However, not resolving the requested name can +leak the fact that response policy rewriting is in use and that the name +is listed in a policy zone to operators of servers for listed names. To +prevent that information leak, by default any recursion needed for a +request is done before any policy triggers are considered. Because +listed domains often have slow authoritative servers, this behavior can +cost significant time. The ``qname-wait-recurse yes`` option overrides +the default and enables that behavior when recursion cannot change a +non-error response. The option does not affect QNAME or client-IP +triggers in policy zones listed after other zones containing IP, NSIP +and NSDNAME triggers, because those may depend on the A, AAAA, and NS +records that would be found during recursive resolution. It also does +not affect DNSSEC requests (DO=1) unless ``break-dnssec yes`` is in use, +because the response would depend on whether or not RRSIG records were +found during resolution. Using this option can cause error responses +such as SERVFAIL to appear to be rewritten, since no recursion is being +done to discover problems at the authoritative server. + +The ``dnsrps-enable yes`` option turns on the DNS Rsponse Policy Service +(DNSRPS) interface, if it has been compiled in to ``named`` using +``configure --enable-dnsrps``. + +The ``dnsrps-options`` block provides additional RPZ configuration +settings, which are passed through to the DNSRPS provider library. +Multiple DNSRPS settings in an ``dnsrps-options`` string should be +separated with semi-colons. The DNSRPS provider, librpz, is passed a +configuration string consisting of the ``dnsrps-options`` text, +concatenated with settings derived from the ``response-policy`` +statement. + +Note: The ``dnsrps-options`` text should only include configuration +settings that are specific to the DNSRPS provider. For example, the +DNSRPS provider from Farsight Security takes options such as +``dnsrpzd-conf``, ``dnsrpzd-sock``, and ``dnzrpzd-args`` (for details of +these options, see the ``librpz`` documentation). Other RPZ +configuration settings could be included in ``dnsrps-options`` as well, +but if ``named`` were switched back to traditional RPZ by setting +``dnsrps-enable`` to "no", those options would be ignored. + +The TTL of a record modified by RPZ policies is set from the TTL of the +relevant record in policy zone. It is then limited to a maximum value. +The ``max-policy-ttl`` clause changes the maximum seconds from its +default of 5. For convenience, TTL-style time unit suffixes may be used +to specify the value. It also accepts ISO 8601 duration formats. + +For example, you might use this option statement + +:: + + response-policy { zone "badlist"; }; + +and this zone statement + +:: + + zone "badlist" {type master; file "master/badlist"; allow-query {none;}; }; + +with this zone file + +:: + + $TTL 1H + @ SOA LOCALHOST. named-mgr.example.com (1 1h 15m 30d 2h) + NS LOCALHOST. + + ; QNAME policy records. There are no periods (.) after the owner names. + nxdomain.domain.com CNAME . ; NXDOMAIN policy + *.nxdomain.domain.com CNAME . ; NXDOMAIN policy + nodata.domain.com CNAME *. ; NODATA policy + *.nodata.domain.com CNAME *. ; NODATA policy + bad.domain.com A 10.0.0.1 ; redirect to a walled garden + AAAA 2001:2::1 + bzone.domain.com CNAME garden.example.com. + + ; do not rewrite (PASSTHRU) OK.DOMAIN.COM + ok.domain.com CNAME rpz-passthru. + + ; redirect x.bzone.domain.com to x.bzone.domain.com.garden.example.com + *.bzone.domain.com CNAME *.garden.example.com. + + ; IP policy records that rewrite all responses containing A records in 127/8 + ; except 127.0.0.1 + 8.0.0.0.127.rpz-ip CNAME . + 32.1.0.0.127.rpz-ip CNAME rpz-passthru. + + ; NSDNAME and NSIP policy records + ns.domain.com.rpz-nsdname CNAME . + 48.zz.2.2001.rpz-nsip CNAME . + + ; blacklist and whitelist some DNS clients + 112.zz.2001.rpz-client-ip CNAME rpz-drop. + 8.0.0.0.127.rpz-client-ip CNAME rpz-drop. + + ; force some DNS clients and responses in the example.com zone to TCP + 16.0.0.1.10.rpz-client-ip CNAME rpz-tcp-only. + example.com CNAME rpz-tcp-only. + *.example.com CNAME rpz-tcp-only. + +RPZ can affect server performance. Each configured response policy zone +requires the server to perform one to four additional database lookups +before a query can be answered. For example, a DNS server with four +policy zones, each with all four kinds of response triggers, QNAME, IP, +NSIP, and NSDNAME, requires a total of 17 times as many database lookups +as a similar DNS server with no response policy zones. A BIND9 server +with adequate memory and one response policy zone with QNAME and IP +triggers might achieve a maximum queries-per-second rate about 20% +lower. A server with four response policy zones with QNAME and IP +triggers might have a maximum QPS rate about 50% lower. + +Responses rewritten by RPZ are counted in the ``RPZRewrites`` +statistics. + +The ``log`` clause can be used to optionally turn off rewrite logging +for a particular response policy zone. By default, all rewrites are +logged. + +The ``add-soa`` option controls whether the RPZ's SOA record is added to +the additional section for traceback of changes from this zone or not. +This can be set at the individual policy zone level or at the +response-policy level. The default is ``yes``. + +Updates to RPZ zones are processed asynchronously; if there is more than +one update pending they are bundled together. If an update to a RPZ zone +(for example, via IXFR) happens less than ``min-update-interval`` +seconds after the most recent update, then the changes will not be +carried out until this interval has elapsed. The default is ``60`` +seconds. For convenience, TTL-style time unit suffixes may be used to +specify the value. It also accepts ISO 8601 duration formats. + +.. _rrl: + +Response Rate Limiting +^^^^^^^^^^^^^^^^^^^^^^ + +Excessive almost identical UDP *responses* can be controlled by +configuring a ``rate-limit`` clause in an ``options`` or ``view`` +statement. This mechanism keeps authoritative BIND 9 from being used in +amplifying reflection denial of service (DoS) attacks. Short truncated +(TC=1) responses can be sent to provide rate-limited responses to +legitimate clients within a range of forged, attacked IP addresses. +Legitimate clients react to dropped or truncated response by retrying +with UDP or with TCP respectively. + +This mechanism is intended for authoritative DNS servers. It can be used +on recursive servers but can slow applications such as SMTP servers +(mail receivers) and HTTP clients (web browsers) that repeatedly request +the same domains. When possible, closing "open" recursive servers is +better. + +Response rate limiting uses a "credit" or "token bucket" scheme. Each +combination of identical response and client has a conceptual account +that earns a specified number of credits every second. A prospective +response debits its account by one. Responses are dropped or truncated +while the account is negative. Responses are tracked within a rolling +window of time which defaults to 15 seconds, but can be configured with +the ``window`` option to any value from 1 to 3600 seconds (1 hour). The +account cannot become more positive than the per-second limit or more +negative than ``window`` times the per-second limit. When the specified +number of credits for a class of responses is set to 0, those responses +are not rate limited. + +The notions of "identical response" and "DNS client" for rate limiting +are not simplistic. All responses to an address block are counted as if +to a single client. The prefix lengths of addresses blocks are specified +with ``ipv4-prefix-length`` (default 24) and ``ipv6-prefix-length`` +(default 56). + +All non-empty responses for a valid domain name (qname) and record type +(qtype) are identical and have a limit specified with +``responses-per-second`` (default 0 or no limit). All empty (NODATA) +responses for a valid domain, regardless of query type, are identical. +Responses in the NODATA class are limited by ``nodata-per-second`` +(default ``responses-per-second``). Requests for any and all undefined +subdomains of a given valid domain result in NXDOMAIN errors, and are +identical regardless of query type. They are limited by +``nxdomains-per-second`` (default ``responses-per-second``). This +controls some attacks using random names, but can be relaxed or turned +off (set to 0) on servers that expect many legitimate NXDOMAIN +responses, such as from anti-spam blacklists. Referrals or delegations +to the server of a given domain are identical and are limited by +``referrals-per-second`` (default ``responses-per-second``). + +Responses generated from local wildcards are counted and limited as if +they were for the parent domain name. This controls flooding using +random.wild.example.com. + +All requests that result in DNS errors other than NXDOMAIN, such as +SERVFAIL and FORMERR, are identical regardless of requested name (qname) +or record type (qtype). This controls attacks using invalid requests or +distant, broken authoritative servers. By default the limit on errors is +the same as the ``responses-per-second`` value, but it can be set +separately with ``errors-per-second``. + +Many attacks using DNS involve UDP requests with forged source +addresses. Rate limiting prevents the use of BIND 9 to flood a network +with responses to requests with forged source addresses, but could let a +third party block responses to legitimate requests. There is a mechanism +that can answer some legitimate requests from a client whose address is +being forged in a flood. Setting ``slip`` to 2 (its default) causes +every other UDP request to be answered with a small truncated (TC=1) +response. The small size and reduced frequency, and so lack of +amplification, of "slipped" responses make them unattractive for +reflection DoS attacks. ``slip`` must be between 0 and 10. A value of 0 +does not "slip": no truncated responses are sent due to rate limiting, +all responses are dropped. A value of 1 causes every response to slip; +values between 2 and 10 cause every n'th response to slip. Some error +responses including REFUSED and SERVFAIL cannot be replaced with +truncated responses and are instead leaked at the ``slip`` rate. + +(NOTE: Dropped responses from an authoritative server may reduce the +difficulty of a third party successfully forging a response to a +recursive resolver. The best security against forged responses is for +authoritative operators to sign their zones using DNSSEC and for +resolver operators to validate the responses. When this is not an +option, operators who are more concerned with response integrity than +with flood mitigation may consider setting ``slip`` to 1, causing all +rate-limited responses to be truncated rather than dropped. This reduces +the effectiveness of rate-limiting against reflection attacks.) + +When the approximate query per second rate exceeds the ``qps-scale`` +value, then the ``responses-per-second``, ``errors-per-second``, +``nxdomains-per-second`` and ``all-per-second`` values are reduced by +the ratio of the current rate to the ``qps-scale`` value. This feature +can tighten defenses during attacks. For example, with +``qps-scale 250; responses-per-second 20;`` and a total query rate of +1000 queries/second for all queries from all DNS clients including via +TCP, then the effective responses/second limit changes to (250/1000)*20 +or 5. Responses sent via TCP are not limited but are counted to compute +the query per second rate. + +Communities of DNS clients can be given their own parameters or no rate +limiting by putting ``rate-limit`` statements in ``view`` statements +instead of the global ``option`` statement. A ``rate-limit`` statement +in a view replaces, rather than supplementing, a ``rate-limit`` +statement among the main options. DNS clients within a view can be +exempted from rate limits with the ``exempt-clients`` clause. + +UDP responses of all kinds can be limited with the ``all-per-second`` +phrase. This rate limiting is unlike the rate limiting provided by +``responses-per-second``, ``errors-per-second``, and +``nxdomains-per-second`` on a DNS server which are often invisible to +the victim of a DNS reflection attack. Unless the forged requests of the +attack are the same as the legitimate requests of the victim, the +victim's requests are not affected. Responses affected by an +``all-per-second`` limit are always dropped; the ``slip`` value has no +effect. An ``all-per-second`` limit should be at least 4 times as large +as the other limits, because single DNS clients often send bursts of +legitimate requests. For example, the receipt of a single mail message +can prompt requests from an SMTP server for NS, PTR, A, and AAAA records +as the incoming SMTP/TCP/IP connection is considered. The SMTP server +can need additional NS, A, AAAA, MX, TXT, and SPF records as it +considers the STMP ``Mail From`` command. Web browsers often repeatedly +resolve the same names that are repeated in HTML tags in a page. +``all-per-second`` is similar to the rate limiting offered by firewalls +but often inferior. Attacks that justify ignoring the contents of DNS +responses are likely to be attacks on the DNS server itself. They +usually should be discarded before the DNS server spends resources make +TCP connections or parsing DNS requests, but that rate limiting must be +done before the DNS server sees the requests. + +The maximum size of the table used to track requests and rate limit +responses is set with ``max-table-size``. Each entry in the table is +between 40 and 80 bytes. The table needs approximately as many entries +as the number of requests received per second. The default is 20,000. To +reduce the cold start of growing the table, ``min-table-size`` (default +500) can set the minimum table size. Enable ``rate-limit`` category +logging to monitor expansions of the table and inform choices for the +initial and maximum table size. + +Use ``log-only yes`` to test rate limiting parameters without actually +dropping any requests. + +Responses dropped by rate limits are included in the ``RateDropped`` and +``QryDropped`` statistics. Responses that truncated by rate limits are +included in ``RateSlipped`` and ``RespTruncated``. + +Named supports NXDOMAIN redirection via two methods: + +- Redirect zone :ref:`zone_statement_grammar` +- Redirect namespace + +With both methods when named gets a NXDOMAIN response it examines a +separate namespace to see if the NXDOMAIN response should be replaced +with an alternative response. + +With a redirect zone (``zone "." { type redirect; };``), the data used +to replace the NXDOMAIN is held in a single zone which is not part of +the normal namespace. All the redirect information is contained in the +zone; there are no delegations. + +With a redirect namespace (``option { nxdomain-redirect };``) +the data used to replace the NXDOMAIN is part of the normal namespace +and is looked up by appending the specified suffix to the original +query name. This roughly doubles the cache required to process +NXDOMAIN responses as you have the original NXDOMAIN response and the +replacement data or a NXDOMAIN indicating that there is no +replacement. + +If both a redirect zone and a redirect namespace are configured, the +redirect zone is tried first. + +.. _server_statement_grammar: + +``server`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/server.grammar.rst + +.. _server_statement_definition_and_usage: + +``server`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``server`` statement defines characteristics to be associated with a +remote name server. If a prefix length is specified, then a range of +servers is covered. Only the most specific server clause applies +regardless of the order in ``named.conf``. + +The ``server`` statement can occur at the top level of the configuration +file or inside a ``view`` statement. If a ``view`` statement contains +one or more ``server`` statements, only those apply to the view and any +top-level ones are ignored. If a view contains no ``server`` statements, +any top-level ``server`` statements are used as defaults. + +If you discover that a remote server is giving out bad data, marking it +as bogus will prevent further queries to it. The default value of +``bogus`` is ``no``. + +The ``provide-ixfr`` clause determines whether the local server, acting +as master, will respond with an incremental zone transfer when the given +remote server, a slave, requests it. If set to ``yes``, incremental +transfer will be provided whenever possible. If set to ``no``, all +transfers to the remote server will be non-incremental. If not set, the +value of the ``provide-ixfr`` option in the view or global options block +is used as a default. + +The ``request-ixfr`` clause determines whether the local server, acting +as a slave, will request incremental zone transfers from the given +remote server, a master. If not set, the value of the ``request-ixfr`` +option in the view or global options block is used as a default. It may +also be set in the zone block and, if set there, it will override the +global or view setting for that zone. + +IXFR requests to servers that do not support IXFR will automatically +fall back to AXFR. Therefore, there is no need to manually list which +servers support IXFR and which ones do not; the global default of +``yes`` should always work. The purpose of the ``provide-ixfr`` and +``request-ixfr`` clauses is to make it possible to disable the use of +IXFR even when both master and slave claim to support it, for example if +one of the servers is buggy and crashes or corrupts data when IXFR is +used. + +The ``request-expire`` clause determines whether the local server, when +acting as a slave, will request the EDNS EXPIRE value. The EDNS EXPIRE +value indicates the remaining time before the zone data will expire and +need to be be refreshed. This is used when a secondary server transfers +a zone from another secondary server; when transferring from the +primary, the expiration timer is set from the EXPIRE field of the SOA +record instead. The default is ``yes``. + +The ``edns`` clause determines whether the local server will attempt to +use EDNS when communicating with the remote server. The default is +``yes``. + +The ``edns-udp-size`` option sets the EDNS UDP size that is advertised +by ``named`` when querying the remote server. Valid values are 512 to +4096 bytes (values outside this range will be silently adjusted to the +nearest value within it). This option is useful when you wish to +advertise a different value to this server than the value you advertise +globally, for example, when there is a firewall at the remote site that +is blocking large replies. (Note: Currently, this sets a single UDP size +for all packets sent to the server; ``named`` will not deviate from this +value. This differs from the behavior of ``edns-udp-size`` in +``options`` or ``view`` statements, where it specifies a maximum value. +The ``server`` statement behavior may be brought into conformance with +the ``options/view`` behavior in future releases.) + +The ``edns-version`` option sets the maximum EDNS VERSION that will be +sent to the server(s) by the resolver. The actual EDNS version sent is +still subject to normal EDNS version negotiation rules (see :rfc:`6891`), +the maximum EDNS version supported by the server, and any other +heuristics that indicate that a lower version should be sent. This +option is intended to be used when a remote server reacts badly to a +given EDNS version or higher; it should be set to the highest version +the remote server is known to support. Valid values are 0 to 255; higher +values will be silently adjusted. This option will not be needed until +higher EDNS versions than 0 are in use. + +The ``max-udp-size`` option sets the maximum EDNS UDP message size +``named`` will send. Valid values are 512 to 4096 bytes (values outside +this range will be silently adjusted). This option is useful when you +know that there is a firewall that is blocking large replies from +``named``. + +The ``padding`` option adds EDNS Padding options to outgoing messages, +increasing the packet size to a multiple of the specified block size. +Valid block sizes range from 0 (the default, which disables the use of +EDNS Padding) to 512 bytes. Larger values will be reduced to 512, with a +logged warning. Note: This option is not currently compatible with no +TSIG or SIG(0), as the EDNS OPT record containing the padding would have +to be added to the packet after it had already been signed. + +The ``tcp-only`` option sets the transport protocol to TCP. The default +is to use the UDP transport and to fallback on TCP only when a truncated +response is received. + +The ``tcp-keepalive`` option adds EDNS TCP keepalive to messages sent +over TCP. Note currently idle timeouts in responses are ignored. + +The server supports two zone transfer methods. The first, +``one-answer``, uses one DNS message per resource record transferred. +``many-answers`` packs as many resource records as possible into a +message. ``many-answers`` is more efficient, but is only known to be +understood by BIND 9, BIND 8.x, and patched versions of BIND 4.9.5. You +can specify which method to use for a server with the +``transfer-format`` option. If ``transfer-format`` is not specified, the +``transfer-format`` specified by the ``options`` statement will be used. + +``transfers`` is used to limit the number of concurrent inbound zone +transfers from the specified server. If no ``transfers`` clause is +specified, the limit is set according to the ``transfers-per-ns`` +option. + +The ``keys`` clause identifies a ``key_id`` defined by the ``key`` +statement, to be used for transaction security (:ref:`tsig`) +when talking to the remote server. When a request is sent to the remote +server, a request signature will be generated using the key specified +here and appended to the message. A request originating from the remote +server is not required to be signed by this key. + +Only a single key per server is currently supported. + +The ``transfer-source`` and ``transfer-source-v6`` clauses specify the +IPv4 and IPv6 source address to be used for zone transfer with the +remote server, respectively. For an IPv4 remote server, only +``transfer-source`` can be specified. Similarly, for an IPv6 remote +server, only ``transfer-source-v6`` can be specified. For more details, +see the description of ``transfer-source`` and ``transfer-source-v6`` in +:ref:`zone_transfers`. + +The ``notify-source`` and ``notify-source-v6`` clauses specify the IPv4 +and IPv6 source address to be used for notify messages sent to remote +servers, respectively. For an IPv4 remote server, only ``notify-source`` +can be specified. Similarly, for an IPv6 remote server, only +``notify-source-v6`` can be specified. + +The ``query-source`` and ``query-source-v6`` clauses specify the IPv4 +and IPv6 source address to be used for queries sent to remote servers, +respectively. For an IPv4 remote server, only ``query-source`` can be +specified. Similarly, for an IPv6 remote server, only +``query-source-v6`` can be specified. + +The ``request-nsid`` clause determines whether the local server will add +a NSID EDNS option to requests sent to the server. This overrides +``request-nsid`` set at the view or option level. + +The ``send-cookie`` clause determines whether the local server will add +a COOKIE EDNS option to requests sent to the server. This overrides +``send-cookie`` set at the view or option level. The ``named`` server +may determine that COOKIE is not supported by the remote server and not +add a COOKIE EDNS option to requests. + +.. _statschannels: + +``statistics-channels`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/statistics-channels.grammar.rst + +.. _statistics_channels: + +``statistics-channels`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``statistics-channels`` statement declares communication channels to +be used by system administrators to get access to statistics information +of the name server. + +This statement intends to be flexible to support multiple communication +protocols in the future, but currently only HTTP access is supported. It +requires that BIND 9 be compiled with libxml2 and/or json-c (also known +as libjson0); the ``statistics-channels`` statement is still accepted +even if it is built without the library, but any HTTP access will fail +with an error. + +An ``inet`` control channel is a TCP socket listening at the specified +``ip_port`` on the specified ``ip_addr``, which can be an IPv4 or IPv6 +address. An ``ip_addr`` of ``*`` (asterisk) is interpreted as the IPv4 +wildcard address; connections will be accepted on any of the system's +IPv4 addresses. To listen on the IPv6 wildcard address, use an +``ip_addr`` of ``::``. + +If no port is specified, port 80 is used for HTTP channels. The asterisk +"``*``" cannot be used for ``ip_port``. + +The attempt of opening a statistics channel is restricted by the +optional ``allow`` clause. Connections to the statistics channel are +permitted based on the ``address_match_list``. If no ``allow`` clause is +present, ``named`` accepts connection attempts from any address; since +the statistics may contain sensitive internal information, it is highly +recommended to restrict the source of connection requests appropriately. + +If no ``statistics-channels`` statement is present, ``named`` will not +open any communication channels. + +The statistics are available in various formats and views depending on +the URI used to access them. For example, if the statistics channel is +configured to listen on 127.0.0.1 port 8888, then the statistics are +accessible in XML format at http://127.0.0.1:8888/ or +http://127.0.0.1:8888/xml. A CSS file is included which can format the +XML statistics into tables when viewed with a stylesheet-capable +browser, and into charts and graphs using the Google Charts API when +using a javascript-capable browser. + +Broken-out subsets of the statistics can be viewed at +http://127.0.0.1:8888/xml/v3/status (server uptime and last +reconfiguration time), http://127.0.0.1:8888/xml/v3/server (server and +resolver statistics), http://127.0.0.1:8888/xml/v3/zones (zone +statistics), http://127.0.0.1:8888/xml/v3/net (network status and socket +statistics), http://127.0.0.1:8888/xml/v3/mem (memory manager +statistics), http://127.0.0.1:8888/xml/v3/tasks (task manager +statistics), and http://127.0.0.1:8888/xml/v3/traffic (traffic sizes). + +The full set of statistics can also be read in JSON format at +http://127.0.0.1:8888/json, with the broken-out subsets at +http://127.0.0.1:8888/json/v1/status (server uptime and last +reconfiguration time), http://127.0.0.1:8888/json/v1/server (server and +resolver statistics), http://127.0.0.1:8888/json/v1/zones (zone +statistics), http://127.0.0.1:8888/json/v1/net (network status and +socket statistics), http://127.0.0.1:8888/json/v1/mem (memory manager +statistics), http://127.0.0.1:8888/json/v1/tasks (task manager +statistics), and http://127.0.0.1:8888/json/v1/traffic (traffic sizes). + +.. _trust_anchors: + +``trust-anchors`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/trust-anchors.grammar.rst + +.. _trust-anchors: + +``dnssec-keys`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``trust-anchors`` statement defines DNSSEC trust anchors. DNSSEC is +described in :ref:`DNSSEC`. + +A trust anchor is defined when the public key or public key digest for a non-authoritative +zone is known, but cannot be securely obtained through DNS, either +because it is the DNS root zone or because its parent zone is unsigned. +Once a key or digest has been configured as a trust anchor, it is treated as if it +had been validated and proven secure. + +The resolver attempts DNSSEC validation on all DNS data in subdomains of +configured trust anchors. (Validation below specified names can be +temporarily disabled by using ``rndc nta``, or permanently disabled with +the ``validate-except`` option). + +All keys listed in ``trust-anchors``, and their corresponding zones, are +deemed to exist regardless of what parent zones say. Only keys +configured as trust anchors are used to validate the DNSKEY RRset for +the corresponding name. The parent's DS RRset will not be used. + +``trust-anchors`` may be set at the top level of ``named.conf`` or within +a view. If it is set in both places, the configurations are additive: +keys defined at the top level are inherited by all views, but keys +defined in a view are only used within that view. + +The ``trust-anchors`` statement can contain +multiple trust anchor entries, each consisting of a +domain name, followed by an "anchor type" keyword indicating +the trust anchor's format, followed by the key or digest data. + +If the anchor type is ``static-key`` or +``initial-key``, then it is followed with the +key's flags, protocol, algorithm, and the Base64 representation +of the public key data. This is identical to the text +representation of a DNSKEY record. Spaces, tabs, newlines and +carriage returns are ignored in the key data, so the +configuration may be split up into multiple lines. + +If the anchor type is ``static-ds`` or +``initial-ds``, then it is followed with the +key tag, algorithm, digest type, and the hexadecimal +representation of the key digest. This is identical to the +text representation of a DS record. Spaces, tabs, newlines +and carriage returns are ignored. + +Trust anchors configured with the +``static-key`` or ``static-ds`` +anchor types are immutable, while keys configured with +``initial-key`` or ``initial-ds`` +can be kept up +to date automatically, without intervention from the resolver operator. +(``static-key`` keys are identical to keys configured using the +deprecated ``trusted-keys`` statement.) + +Suppose, for example, that a zone's key-signing key was compromised, and +the zone owner had to revoke and replace the key. A resolver which had +the original key +configured using ``static-key`` or +``static-ds`` would be unable to validate +this zone any longer; it would reply with a SERVFAIL response +code. This would continue until the resolver operator had +updated the ``trust-anchors`` statement with +the new key. + +If, however, the trust anchor had been configured +``initial-key`` or ``initial-ds`` +instead, then the zone owner could add a "stand-by" key to +their zone in advance. ``named`` would store +the stand-by key, and when the original key was revoked, +``named`` would be able to transition smoothly +to the new key. It would also recognize that the old key had +been revoked, and cease using that key to validate answers, +minimizing the damage that the compromised key could do. +This is the process used to keep the ICANN root DNSSEC key +up to date. + +Whereas ``static-key`` and +``static-ds`` trust anchors continue +to be trusted until they are removed from +``named.conf``, an +``initial-key`` or ``initial-ds`` +is only trusted once: for as long as it +takes to load the managed key database and start the +:rfc:`5011` key maintenance process. + +It is not possible to mix static with initial trust anchors +for the same domain name. + +The first time ``named`` runs with an +``initial-key`` or ``initial-ds`` +configured in named.conf, it fetches the +DNSKEY RRset directly from the zone apex, +and validates it +using the trust anchor specified in ``trust-anchors``. +If the DNSKEY RRset is validly signed by a key matching +the trust anchor, then it is used as the basis for a new +managed keys database. + +From that point on, whenever ``named`` runs, it sees the ``initial-key`` or ``initial-ds`` +listed in ``trust-anchors``, checks to make sure :rfc:`5011` key maintenance +has already been initialized for the specified domain, and if so, it +simply moves on. The key specified in the ``trust-anchors`` statement is +not used to validate answers; it is superseded by the key or keys stored +in the managed keys database. + +The next time ``named`` runs after an ``initial-key`` or ``initial-ds`` has been *removed* +from the ``dnssec-keys`` statement (or changed to a ``static-key`` or ``static-ds``), the +corresponding zone will be removed from the managed keys database, and +:rfc:`5011` key maintenance will no longer be used for that domain. + +In the current implementation, the managed keys database is stored as a +master-format zone file. + +On servers which do not use views, this file is named +``managed-keys.bind``. When views are in use, there will be a separate +managed keys database for each view; the filename will be the view name +(or, if a view name contains characters which would make it illegal as a +filename, a hash of the view name), followed by the suffix ``.mkeys``. + +When the key database is changed, the zone is updated. As with any other +dynamic zone, changes will be written into a journal file, e.g., +``managed-keys.bind.jnl`` or ``internal.mkeys.jnl``. Changes are +committed to the master file as soon as possible afterward; this will +usually occur within 30 seconds. So, whenever ``named`` is using +automatic key maintenance, the zone file and journal file can be +expected to exist in the working directory. (For this reason among +others, the working directory should be always be writable by +``named``.) + +If the ``dnssec-validation`` option is set to ``auto``, ``named`` will +automatically initialize an ``initial-key`` for the root zone. The key +that is used to initialize the key maintenance process is stored in +``bind.keys``; the location of this file can be overridden with the +``bindkeys-file`` option. As a fallback in the event no ``bind.keys`` +can be found, the initializing key is also compiled directly into +``named``. + +.. _dnssec_policy_grammar: + +.. include:: ../misc/dnssec-policy.grammar.rst + +.. _dnssec_policy: + +The ``dnssec-policy`` statement defines a key and +signing policy (KASP) for zones. + +A KASP determines how one or more zones will be signed +with DNSSEC. For example, it specifies how often keys should +roll, which cryptographic algorithms to use, and how often RRSIG +records need to be refreshed. + +Keys are not shared among zones, which means that one set of keys +per zone will be generated even if they have the same policy. +If multiple views are configured with different versions of the +same zone, each separate version will use the same set of signing +keys. + +Multiple key and signing policies can be configured. To +attach a policy to a zone, add a ``dnssec-policy`` +option to the ``zone`` statement, specifying he +name of the policy that should be used. + +Key rollover timing is computed for each key according to +the key lifetime defined in the KASP. The lifetime may be +modified by zone TTLs and propagation delays, in order to +prevent validation failures. When a key reaches the end of its +lifetime, +``named`` will generate and publish a new key +automatically, then deactivate the old key and activate the +new one, and finally retire the old key according to a computed +schedule. + +Zone-signing key (ZSK) rollovers require no operator input. +Key-signing key (KSK) and combined signing key (CSK) rollovers +require action to be taken to submit a DS record to the parent. +Rollover timing for KSKs and CSKs is adjusted to take into account +delays in processing and propagating DS updates. + +There are two predefined ``dnssec-policy`` names: +``none`` and ``default``. +Setting a zone's policy to +``none`` is the same as not setting +``dnssec-policy`` at all; the zone will not +be signed. Policy ``default`` causes the +zone to be signed with a single combined signing key (CSK) +using algorithm ECDSAP256SHA256; this key will have an +unlimited lifetime. (A verbose copy of this policy +may be found in the source tree, in the file +``doc/misc/dnssec-policy.default.conf``.) + +.. note:: + + The default signing policy may change in future releases. + This could result in changes to your signing policy + occurring when you upgrade to a new version of BIND. Check + the release notes carefully when upgrading to be informed + of such changes. To prevent policy changes on upgrade, + use an explicitly defined ``dnssec-policy`` + rather than ``default``. + +If a ``dnssec-policy`` statement is modified +and the server restarted or reconfigured, ``named`` +will attempt to change the policy smoothly from the old one to +the new. For example, if the key algorithm is changed, then +a new key will be generated with the new algorithm, and the old +algorithm will be retired when the existing key's lifetime ends. + +.. note:: + + Rolling to a new policy while another key rollover is + already in progress is not yet supported, and may result in + unexpected behavior. + +The following options can be specified in a ``dnssec-policy`` statement: + + ``dnskey-ttl`` + The TTL to use when generating DNSKEY resource records. The default is 1 + hour (3600 seconds). + + ``keys`` + A list specifying the algorithms and roles to use when + generating keys and signing the zone. + Entries in this list do not represent specific + DNSSEC keys, which may be changed on a regular basis, + but the roles that keys will play in the signing policy. + For example, configuring a KSK of algorithm RSASHA256 ensures + that the DNSKEY RRset will always include a key-signing key + for that algorithm. + + Here is an example (for illustration purposes only) of + some possible entries in a ``keys`` + list: + + :: + + keys { + ksk key-directory lifetime unlimited algorithm rsasha1 2048; + zsk lifetime P30D algorithm 8; + csk lifetime P6MT12H3M15S algorithm ecdsa256; + }; + + This example specifies that three keys should be used + in the zone. The first token determines which role the + key will play in signing RRsets. If set to + ``ksk``, then this will be + a key-signing key; it will have the KSK flag set and + will only be used to sign DNSKEY, CDS, and CDNSKEY RRsets. + If set to ``zsk``, this will be + a zone-signing key; the KSK flag will be unset, and + the key will sign all RRsets except + DNSKEY, CDS, and CDNSKEY. If set to + ``csk`` the key will have the KSK + flag set and will be used to sign all RRsets. + + An optional second token determines where the key will + be stored. Currently, keys can only be stored in the + configured ``key-directory``. This token + may be used in the future to store keys in hardware + service modules or separate directories. + + The ``lifetime`` parameter specifies how + long a key may be used before rolling over. In the + example above, the first key will have an unlimited + lifetime, the second key may be used for 30 days, and the + third key has a rather peculiar lifetime of 6 months, + 12 hours, 3 minutes and 15 seconds. A lifetime of 0 + seconds is the same as ``unlimited``. + + Note that the lifetime of a key may be extended if + retiring it too soon would cause validation failures. + For example, if the key were configured to roll more + frequently than its own TTL, its lifetime would + automatically be extended to account for this. + + The ``algorithm`` parameter specifies + the key's algorithm, expressed either as a string + ("rsasha256", "ecdsa384", etc) or as a decimal number. + An optional second parameter specifies the key's size + in size in bits. If it is omitted, as shown in the + example for the second and third keys, an appropriate + default size for the algorithm will be used. + + ``publish-safety`` + A margin that is added to the pre-publication + interval in rollover timing calculations to give some + extra time to cover unforeseen events. This increases + the time that keys are published before becoming active. + The default is ``PT1H`` (1 hour). + + ``retire-safety`` + A margin that is added to the post-publication interval + in rollover timing calculations to give some extra time + to cover unforeseen events. This increases the time a key + remains published after it is no longer active. The + default is ``PT1H`` (1 hour). + + ``signatures-refresh`` + This determines how frequently an RRSIG record needs to be + refreshed. The signature is renewed when the time until + the expiration time is closer than the specified interval. + The default is ``P5D`` (5 days), meaning + signatures that will expire in 5 days or sooner will be + refreshed. + + ``signatures-validity`` + The validity period of an RRSIG record (subject to + inception offset and jitter). The default is + ``P2W`` (2 weeks). + + ``signatures-validity-dnskey`` + Similar to ``signatures-validity`` but for + DNSKEY records. The default is ``P2W`` + (2 weeks). + + ``max-zone-ttl`` + Like the ``max-zone-ttl`` zone option, + this specifies the maximum permissible TTL value in + seconds for the zone. When loading a zone file using + a `masterfile-format` of + ``text`` or ``raw``, + any record encountered with a TTL higher than + `max-zone-ttl` will be capped at the + maximum permissible TTL value. + + This is needed in DNSSEC-maintained zones because when + rolling to a new DNSKEY, the old key needs to remain + available until RRSIG records have expired from caches. + The `max-zone-ttl` option guarantees that + the largest TTL in the zone will be no higher than the + set value. + + .. note:: + Because ``map``-format files + load directly into memory, this option cannot be + used with them.) + + The default value is ``PT24H`` (24 hours). + A `max-zone-ttl` of zero is treated as if + the default value were in use. + + ``zone-propagation-delay`` + The expected propagation delay from the time when a zone + is first updated to the time when the new version of the + zone will be served by all secondary servers. The default + is ``PT5M`` (5 minutes). + + ``parent-ds-ttl`` + The TTL of the DS RRset that the parent zone uses. The + default is ``P1D`` (1 day). + + ``parent-propagation-delay`` + The expected propagation delay from the time when the + parent zone is updated to the time when the new version + is served by all of the parent zone's name servers. + The default is ``PT1H`` (1 hour). + + ``parent-registration-delay`` + The expected registration delay from the time when a DS + RRset change is requested to the time when the DS RRset + will be updated in the parent zone. The default is + ``P1D`` (1 day). + +.. _managed-keys: + +``managed-keys`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/managed-keys.grammar.rst + +.. _managed_keys: + +``managed-keys`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``managed-keys`` statement has been +deprecated in favor of :ref:`trust_anchors` +with the ``initial-key`` keyword. + +.. _trusted-keys: + +``trusted-keys`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/trusted-keys.grammar.rst + +.. _trusted_keys: + +``trusted-keys`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``trusted-keys`` statement has been deprecated in favor of +:ref:`trust_anchors` with the ``static-key`` keyword. + +.. _view_statement_grammar: + +``view`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +:: + + view view_name [ class ] { + match-clients { address_match_list } ; + match-destinations { address_match_list } ; + match-recursive-only yes_or_no ; + [ view_option ; ... ] + [ zone_statement ; ... ] + } ; + +.. _view_statement: + +``view`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The ``view`` statement is a powerful feature of BIND 9 that lets a name +server answer a DNS query differently depending on who is asking. It is +particularly useful for implementing split DNS setups without having to +run multiple servers. + +Each ``view`` statement defines a view of the DNS namespace that will be +seen by a subset of clients. A client matches a view if its source IP +address matches the ``address_match_list`` of the view's +``match-clients`` clause and its destination IP address matches the +``address_match_list`` of the view's ``match-destinations`` clause. If +not specified, both ``match-clients`` and ``match-destinations`` default +to matching all addresses. In addition to checking IP addresses +``match-clients`` and ``match-destinations`` can also take ``keys`` +which provide an mechanism for the client to select the view. A view can +also be specified as ``match-recursive-only``, which means that only +recursive requests from matching clients will match that view. The order +of the ``view`` statements is significant — a client request will be +resolved in the context of the first ``view`` that it matches. + +Zones defined within a ``view`` statement will only be accessible to +clients that match the ``view``. By defining a zone of the same name in +multiple views, different zone data can be given to different clients, +for example, "internal" and "external" clients in a split DNS setup. + +Many of the options given in the ``options`` statement can also be used +within a ``view`` statement, and then apply only when resolving queries +with that view. When no view-specific value is given, the value in the +``options`` statement is used as a default. Also, zone options can have +default values specified in the ``view`` statement; these view-specific +defaults take precedence over those in the ``options`` statement. + +Views are class specific. If no class is given, class IN is assumed. +Note that all non-IN views must contain a hint zone, since only the IN +class has compiled-in default hints. + +If there are no ``view`` statements in the config file, a default view +that matches any client is automatically created in class IN. Any +``zone`` statements specified on the top level of the configuration file +are considered to be part of this default view, and the ``options`` +statement will apply to the default view. If any explicit ``view`` +statements are present, all ``zone`` statements must occur inside +``view`` statements. + +Here is an example of a typical split DNS setup implemented using +``view`` statements: + +:: + + view "internal" { + // This should match our internal networks. + match-clients { 10.0.0.0/8; }; + + // Provide recursive service to internal + // clients only. + recursion yes; + + // Provide a complete view of the example.com + // zone including addresses of internal hosts. + zone "example.com" { + type master; + file "example-internal.db"; + }; + }; + + view "external" { + // Match all clients not matched by the + // previous view. + match-clients { any; }; + + // Refuse recursive service to external clients. + recursion no; + + // Provide a restricted view of the example.com + // zone containing only publicly accessible hosts. + zone "example.com" { + type master; + file "example-external.db"; + }; + }; + +.. _zone_statement_grammar: + +``zone`` Statement Grammar +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. include:: ../misc/master.zoneopt.rst +.. include:: ../misc/slave.zoneopt.rst +.. include:: ../misc/mirror.zoneopt.rst +.. include:: ../misc/hint.zoneopt.rst +.. include:: ../misc/stub.zoneopt.rst +.. include:: ../misc/static-stub.zoneopt.rst +.. include:: ../misc/forward.zoneopt.rst +.. include:: ../misc/redirect.zoneopt.rst +.. include:: ../misc/delegation-only.zoneopt.rst +.. include:: ../misc/in-view.zoneopt.rst + +.. _zone_statement: + +``zone`` Statement Definition and Usage +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. _zone_types: + +Zone Types +^^^^^^^^^^ + +The ``type`` keyword is required for the ``zone`` configuration unless +it is an ``in-view`` configuration. Its acceptable values include: +``primary`` (or ``master``), ``secondary`` (or ``slave``), ``mirror``, +``delegation-only``, ``forward``, ``hint``, ``redirect``, +``static-stub``, and ``stub``. + +``primary`` + The server has a master copy of the data for the zone and will be able + to provide authoritative answers for it. Type ``master`` is a synonym + for ``primary``. + +``secondary`` + A secondary zone is a replica of a primary zone. Type ``slave`` is a + synonym for ``secondary``. The ``masters`` list specifies one or more IP + addresses of master servers that the slave contacts to update + its copy of the zone. Masters list elements can + also be names of other masters lists. By default, + transfers are made from port 53 on the servers; + this can be changed for all servers by specifying + a port number before the list of IP addresses, + or on a per-server basis after the IP address. + Authentication to the master can also be done with + per-server TSIG keys. If a file is specified, then the + replica will be written to this file + whenever the zone + is changed, and reloaded from this file on a server + restart. Use of a file is recommended, since it + often speeds server startup and eliminates a + needless waste of bandwidth. Note that for large + numbers (in the tens or hundreds of thousands) of + zones per server, it is best to use a two-level + naming scheme for zone filenames. For example, + a slave server for the zone + ``example.com`` might place + the zone contents into a file called + ``ex/example.com`` where + ``ex/`` is just the first two + letters of the zone name. (Most operating systems + behave very slowly if you put 100000 files into a single directory.) + +``stub`` + A stub zone is similar to a slave zone, except that it replicates only + the NS records of a master zone instead of the entire zone. Stub zones + are not a standard part of the DNS; they are a feature specific to the + BIND implementation. + + Stub zones can be used to eliminate the need for glue NS record in a parent + zone at the expense of maintaining a stub zone entry and a set of name + server addresses in ``named.conf``. This usage is not recommended for + new configurations, and BIND 9 supports it only in a limited way. In BIND + 4/8, zone transfers of a parent zone included the NS records from stub + children of that zone. This meant that, in some cases, users could get + away with configuring child stubs only in the master server for the parent + zone. BIND 9 never mixes together zone data from different zones in this + way. Therefore, if a BIND 9 master serving a parent zone has child stub + zones configured, all the slave servers for the parent zone also need to + have the same child stub zones configured. + + Stub zones can also be used as a way of forcing the resolution of a given + domain to use a particular set of authoritative servers. For example, the + caching name servers on a private network using :rfc:`1918` addressing may be + configured with stub zones for ``10.in-addr.arpa`` to use a set of + internal name servers as the authoritative servers for that domain. + +``mirror`` + + A mirror zone is similar to a zone of type ``secondary``, except its data is + subject to DNSSEC validation before being used in answers. Validation is + applied to the entire zone during the zone transfer process, and again when + the zone file is loaded from disk when ``named`` is restarted. If validation + of a new version of a mirror zone fails, a retransfer is scheduled and the + most recent correctly validated version of that zone is used until it either + expires or a newer version validates correctly. If no usable zone data is + available for a mirror zone at all, either due to transfer failure or + expiration, traditional DNS recursion is used to look up the answers instead. + Mirror zones cannot be used in a view that does not have recursion enabled. + + Answers coming from a mirror zone look almost exactly like answers from a + zone of type ``secondary``, with the notable exceptions that the AA bit + ("authoritative answer") is not set, and the AD bit ("authenticated data") + is. + + Mirror zones are intended to be used to set up a fast local copy of the root + zone, similar to the one described in RFC 7706. A default list of primary + servers for the IANA root zone is built into ``named`` and thus its mirroring + can be enabled using the following configuration: + + + :: + + zone "." { + type mirror; + }; + + Other zones can be configured as mirror zones, but this should be considered + *experimental* and may cause performance issues, especially with zones that + are large and/or frequently updated. Mirroring a zone other than root + requires an explicit list of primary servers to be provided using the + ``masters`` option (see :ref:`masters_grammar` for details), and a + key-signing key (KSK) for the specified zone to be explicitly configured as a + trust anchor. + + To make mirror zone contents persist between ``named`` restarts, use the + :ref:`file ` option. + + + When configuring NOTIFY for a mirror zone, only ``notify no;`` and ``notify + explicit;`` can be used at the zone level. Using any other ``notify`` + setting at the zone level is a configuration error. Using any other + ``notify`` setting at the ``options`` or ``view`` level will cause that + setting to be overridden with ``notify explicit;`` for the mirror zone. The + global default for the ``notify`` option is ``yes``, so mirror zones are by + default configured with ``notify explicit;``. + + Outgoing transfers of mirror zones are disabled by default but may be + enabled using :ref:`allow-transfer `. + + .. note:: + Using this zone type with any zone other than the root zone should + be considered *experimental* and may cause performance issues, especially + for zones which are large and/or frequently updated. + +``static-stub`` + A static-stub zone is similar to a stub zone with the following + exceptions: the zone data is statically configured, rather than + transferred from a master server; when recursion is necessary for a query + that matches a static-stub zone, the locally configured data (nameserver + names and glue addresses) is always used even if different authoritative + information is cached. + + Zone data is configured via the ``server-addresses`` and ``server-names`` + zone options. + + The zone data is maintained in the form of NS and (if necessary) glue A or + AAAA RRs internally, which can be seen by dumping zone databases by + ``rndc dumpdb -all``. The configured RRs are considered local configuration + parameters rather than public data. Non recursive queries (i.e., those + with the RD bit off) to a static-stub zone are therefore prohibited and + will be responded with REFUSED. + + Since the data is statically configured, no zone maintenance action takes + place for a static-stub zone. For example, there is no periodic refresh + attempt, and an incoming notify message will be rejected with an rcode + of NOTAUTH. + + Each static-stub zone is configured with internally generated NS and (if + necessary) glue A or AAAA RRs + +``forward`` + A "forward zone" is a way to configure forwarding on a per-domain basis. + A ``zone`` statement of type ``forward`` can contain a ``forward`` and/or + ``forwarders`` statement, which will apply to queries within the domain + given by the zone name. If no ``forwarders`` statement is present or an + empty list for ``forwarders`` is given, then no forwarding will be done + for the domain, canceling the effects of any forwarders in the ``options`` + statement. Thus if you want to use this type of zone to change the + behavior of the global ``forward`` option (that is, "forward first" to, + then "forward only", or vice versa, but want to use the same servers as set + globally) you need to re-specify the global forwarders. + +``hint`` + The initial set of root name servers is specified using a "hint zone". + When the server starts up, it uses the root hints to find a root name + server and get the most recent list of root name servers. If no hint zone + is specified for class IN, the server uses a compiled-in default set of + root servers hints. Classes other than IN have no built-in defaults hints. + +``redirect`` + Redirect zones are used to provide answers to queries when normal + resolution would result in NXDOMAIN being returned. Only one redirect zone + is supported per view. ``allow-query`` can be used to restrict which + clients see these answers. + + If the client has requested DNSSEC records (DO=1) and the NXDOMAIN response + is signed then no substitution will occur. + + To redirect all NXDOMAIN responses to 100.100.100.2 and + 2001:ffff:ffff::100.100.100.2, one would configure a type redirect zone + named ".", with the zone file containing wildcard records that point to + the desired addresses: ``"*. IN A 100.100.100.2"`` and + ``"*. IN AAAA 2001:ffff:ffff::100.100.100.2"``. + + To redirect all Spanish names (under .ES) one would use similar entries + but with the names ``*.ES.`` instead of ``*.``. To redirect all commercial + Spanish names (under COM.ES) one would use wildcard entries + called ``*.COM.ES.``. + + Note that the redirect zone supports all possible types; it is not + limited to A and AAAA records. + + If a redirect zone is configured with a ``masters`` option, then it is + transferred in as if it were a slave zone. Otherwise, it is loaded from a + file as if it were a master zone. + + Because redirect zones are not referenced directly by name, they are not + kept in the zone lookup table with normal master and slave zones. To reload + a redirect zone, use ``rndc reload -redirect``, and to retransfer a + redirect zone configured as slave, use ``rndc retransfer -redirect``. + When using ``rndc reload`` without specifying a zone name, redirect + zones will be reloaded along with other zones. + +``delegation-only`` + This is used to enforce the delegation-only status of infrastructure + zones (e.g. COM, NET, ORG). Any answer that is received without an + explicit or implicit delegation in the authority section will be treated + as NXDOMAIN. This does not apply to the zone apex. This should not be + applied to leaf zones. + + ``delegation-only`` has no effect on answers received from forwarders. + + See caveats in :ref:`root-delegation-only `. + +Class +^^^^^ + +The zone's name may optionally be followed by a class. If a class is not +specified, class ``IN`` (for ``Internet``), is assumed. This is correct +for the vast majority of cases. + +The ``hesiod`` class is named for an information service from MIT's +Project Athena. It is used to share information about various systems +databases, such as users, groups, printers and so on. The keyword ``HS`` +is a synonym for hesiod. + +Another MIT development is Chaosnet, a LAN protocol created in the +mid-1970s. Zone data for it can be specified with the ``CHAOS`` class. + +.. _zone_options: + +Zone Options +^^^^^^^^^^^^ + +``allow-notify`` + See the description of ``allow-notify`` in :ref:`access_control`. + +``allow-query`` + See the description of ``allow-query`` in :ref:`access_control`. + +``allow-query-on`` + See the description of ``allow-query-on`` in :ref:`access_control`. + +``allow-transfer`` + See the description of ``allow-transfer`` in :ref:`access_control`. + +``allow-update`` + See the description of ``allow-update`` in :ref:`access_control`. + +``update-policy`` + Specifies a "Simple Secure Update" policy. See :ref:`dynamic_update_policies`. + +``allow-update-forwarding`` + See the description of ``allow-update-forwarding`` in :ref:`access_control`. + +``also-notify`` + Only meaningful if ``notify`` is active for this zone. The set of + machines that will receive a ``DNS NOTIFY`` message for this zone is + made up of all the listed name servers (other than the primary + master) for the zone plus any IP addresses specified with + ``also-notify``. A port may be specified with each ``also-notify`` + address to send the notify messages to a port other than the default + of 53. A TSIG key may also be specified to cause the ``NOTIFY`` to be + signed by the given key. ``also-notify`` is not meaningful for stub + zones. The default is the empty list. + +``check-names`` + This option is used to restrict the character set and syntax of + certain domain names in master files and/or DNS responses received + from the network. The default varies according to zone type. For + ``master`` zones the default is ``fail``. For ``slave`` zones the + default is ``warn``. It is not implemented for ``hint`` zones. + +``check-mx`` + See the description of ``check-mx`` in :ref:`boolean_options`. + +``check-spf`` + See the description of ``check-spf`` in :ref:`boolean_options`. + +``check-wildcard`` + See the description of ``check-wildcard`` in :ref:`boolean_options`. + +``check-integrity`` + See the description of ``check-integrity`` in :ref:`boolean_options`. + +``check-sibling`` + See the description of ``check-sibling`` in :ref:`boolean_options`. + +``zero-no-soa-ttl`` + See the description of ``zero-no-soa-ttl`` in :ref:`boolean_options`. + +``update-check-ksk`` + See the description of ``update-check-ksk`` in :ref:`boolean_options`. + +``dnssec-loadkeys-interval`` + See the description of ``dnssec-loadkeys-interval`` in :ref:`options`. + +``dnssec-update-mode`` + See the description of ``dnssec-update-mode`` in :ref:`options`. + +``dnssec-dnskey-kskonly`` + See the description of ``dnssec-dnskey-kskonly`` in :ref:`boolean_options`. + +``try-tcp-refresh`` + See the description of ``try-tcp-refresh`` in :ref:`boolean_options`. + +``database`` + Specify the type of database to be used for storing the zone data. + The string following the ``database`` keyword is interpreted as a + list of whitespace-delimited words. The first word identifies the + database type, and any subsequent words are passed as arguments to + the database to be interpreted in a way specific to the database + type. + + The default is ``"rbt"``, BIND 9's native in-memory red-black-tree + database. This database does not take arguments. + + Other values are possible if additional database drivers have been + linked into the server. Some sample drivers are included with the + distribution but none are linked in by default. + +``dialup`` + See the description of ``dialup`` in :ref:`boolean_options`. + +``delegation-only`` + The flag only applies to forward, hint and stub zones. If set to + ``yes``, then the zone will also be treated as if it is also a + delegation-only type zone. + + See caveats in :ref:`root-delegation-only `. + +.. _file-option: + +``file`` + Set the zone's filename. In ``master``, ``hint``, and ``redirect`` + zones which do not have ``masters`` defined, zone data is loaded from + this file. In ``slave``, ``mirror``, ``stub``, and ``redirect`` zones + which do have ``masters`` defined, zone data is retrieved from + another server and saved in this file. This option is not applicable + to other zone types. + +``forward`` + Only meaningful if the zone has a forwarders list. The ``only`` value + causes the lookup to fail after trying the forwarders and getting no + answer, while ``first`` would allow a normal lookup to be tried. + +``forwarders`` + Used to override the list of global forwarders. If it is not + specified in a zone of type ``forward``, no forwarding is done for + the zone and the global options are not used. + +``journal`` + Allow the default journal's filename to be overridden. The default is + the zone's filename with "``.jnl``" appended. This is applicable to + ``master`` and ``slave`` zones. + +``max-ixfr-ratio`` + See the description of ``max-ixfr-ratio`` in :ref:`options`. + +``max-journal-size`` + See the description of ``max-journal-size`` in :ref:`server_resource_limits`. + +``max-records`` + See the description of ``max-records`` in :ref:`server_resource_limits`. + +``max-transfer-time-in`` + See the description of ``max-transfer-time-in`` in :ref:`zone_transfers`. + +``max-transfer-idle-in`` + See the description of ``max-transfer-idle-in`` in :ref:`zone_transfers`. + +``max-transfer-time-out`` + See the description of ``max-transfer-time-out`` in :ref:`zone_transfers`. + +``max-transfer-idle-out`` + See the description of ``max-transfer-idle-out`` in :ref:`zone_transfers`. + +``notify`` + See the description of ``notify`` in :ref:`boolean_options`. + +``notify-delay`` + See the description of ``notify-delay`` in :ref:`tuning`. + +``notify-to-soa`` + See the description of ``notify-to-soa`` in :ref:`boolean_options`. + +``zone-statistics`` + See the description of ``zone-statistics`` in :ref:`options`. + +``server-addresses`` + Only meaningful for static-stub zones. This is a list of IP addresses + to which queries should be sent in recursive resolution for the zone. + A non empty list for this option will internally configure the apex + NS RR with associated glue A or AAAA RRs. + + For example, if "example.com" is configured as a static-stub zone + with 192.0.2.1 and 2001:db8::1234 in a ``server-addresses`` option, + the following RRs will be internally configured. + + :: + + example.com. NS example.com. + example.com. A 192.0.2.1 + example.com. AAAA 2001:db8::1234 + + These records are internally used to resolve names under the + static-stub zone. For instance, if the server receives a query for + "www.example.com" with the RD bit on, the server will initiate + recursive resolution and send queries to 192.0.2.1 and/or + 2001:db8::1234. + +``server-names`` + Only meaningful for static-stub zones. This is a list of domain names + of nameservers that act as authoritative servers of the static-stub + zone. These names will be resolved to IP addresses when ``named`` + needs to send queries to these servers. To make this supplemental + resolution successful, these names must not be a subdomain of the + origin name of static-stub zone. That is, when "example.net" is the + origin of a static-stub zone, "ns.example" and "master.example.com" + can be specified in the ``server-names`` option, but "ns.example.net" + cannot, and will be rejected by the configuration parser. + + A non empty list for this option will internally configure the apex + NS RR with the specified names. For example, if "example.com" is + configured as a static-stub zone with "ns1.example.net" and + "ns2.example.net" in a ``server-names`` option, the following RRs + will be internally configured. + + :: + + example.com. NS ns1.example.net. + example.com. NS ns2.example.net. + + These records are internally used to resolve names under the + static-stub zone. For instance, if the server receives a query for + "www.example.com" with the RD bit on, the server initiate recursive + resolution, resolve "ns1.example.net" and/or "ns2.example.net" to IP + addresses, and then send queries to (one or more of) these addresses. + +``sig-validity-interval`` + See the description of ``sig-validity-interval`` in :ref:`tuning`. + +``sig-signing-nodes`` + See the description of ``sig-signing-nodes`` in :ref:`tuning`. + +``sig-signing-signatures`` + See the description of ``sig-signing-signatures`` in + :ref:`tuning`. + +``sig-signing-type`` + See the description of ``sig-signing-type`` in :ref:`tuning`. + +``transfer-source`` + See the description of ``transfer-source`` in :ref:`zone_transfers`. + +``transfer-source-v6`` + See the description of ``transfer-source-v6`` in :ref:`zone_transfers`. + +``alt-transfer-source`` + See the description of ``alt-transfer-source`` in :ref:`zone_transfers`. + +``alt-transfer-source-v6`` + See the description of ``alt-transfer-source-v6`` in :ref:`zone_transfers`. + +``use-alt-transfer-source`` + See the description of ``use-alt-transfer-source`` in :ref:`zone_transfers`. + +``notify-source`` + See the description of ``notify-source`` in :ref:`zone_transfers`. + +``notify-source-v6`` + See the description of ``notify-source-v6`` in :ref:`zone_transfers`. + +``min-refresh-time``; \ ``max-refresh-time``; \ ``min-retry-time``; \ ``max-retry-time`` + See the description in :ref:`tuning`. + +``ixfr-from-differences`` + See the description of ``ixfr-from-differences`` in :ref:`boolean_options`. + (Note that the ``ixfr-from-differences`` ``master`` and ``slave`` + choices are not available at the zone level.) + +``key-directory`` + See the description of ``key-directory`` in :ref:`options`. + +``auto-dnssec`` + See the description of ``auto-dnssec`` in :ref:`options`. + +``serial-update-method`` + See the description of ``serial-update-method`` in :ref:`options`. + +``inline-signing`` + If ``yes``, this enables "bump in the wire" signing of a zone, where + a unsigned zone is transferred in or loaded from disk and a signed + version of the zone is served, with possibly, a different serial + number. This behavior is disabled by default. + +``multi-master`` + See the description of ``multi-master`` in :ref:`boolean_options`. + +``masterfile-format`` + See the description of ``masterfile-format`` in :ref:`tuning`. + +``max-zone-ttl`` + See the description of ``max-zone-ttl`` in :ref:`options`. + +``dnssec-secure-to-insecure`` + See the description of ``dnssec-secure-to-insecure`` in :ref:`boolean_options`. + +.. _dynamic_update_policies: + +Dynamic Update Policies +^^^^^^^^^^^^^^^^^^^^^^^ + +BIND 9 supports two alternative methods of granting clients the right to +perform dynamic updates to a zone, configured by the ``allow-update`` +and ``update-policy`` option, respectively. + +The ``allow-update`` clause is a simple access control list. Any client +that matches the ACL is granted permission to update any record in the +zone. + +The ``update-policy`` clause allows more fine-grained control over what +updates are allowed. It specifies a set of rules, in which each rule +either grants or denies permission for one or more names in the zone to +be updated by one or more identities. Identity is determined by the key +that signed the update request using either TSIG or SIG(0). In most +cases, ``update-policy`` rules only apply to key-based identities. There +is no way to specify update permissions based on client source address. + +``update-policy`` rules are only meaningful for zones of type +``master``, and are not allowed in any other zone type. It is a +configuration error to specify both ``allow-update`` and +``update-policy`` at the same time. + +A pre-defined ``update-policy`` rule can be switched on with the command +``update-policy local;``. Using this in a zone causes ``named`` to +generate a TSIG session key when starting up and store it in a file; +this key can then be used by local clients to update the zone while +``named`` is running. By default, the session key is stored in the file +``/var/run/named/session.key``, the key name is "local-ddns", and the +key algorithm is HMAC-SHA256. These values are configurable with the +``session-keyfile``, ``session-keyname`` and ``session-keyalg`` options, +respectively. A client running on the local system, if run with +appropriate permissions, may read the session key from the key file and +use it to sign update requests. The zone's update policy will be set to +allow that key to change any record within the zone. Assuming the key +name is "local-ddns", this policy is equivalent to: + +:: + + update-policy { grant local-ddns zonesub any; }; + +...with the additional restriction that only clients connecting from the +local system will be permitted to send updates. + +Note that only one session key is generated by ``named``; all zones +configured to use ``update-policy local`` will accept the same key. + +The command ``nsupdate -l`` implements this feature, sending requests to +localhost and signing them using the key retrieved from the session key +file. + +Other rule definitions look like this: + +:: + + ( grant | deny ) identity ruletype name types + +Each rule grants or denies privileges. Rules are checked in the order in +which they are specified in the ``update-policy`` statement. Once a +message has successfully matched a rule, the operation is immediately +granted or denied, and no further rules are examined. There are 13 types +of rules; the rule type is specified by the ``ruletype`` field, and the +interpretation of other fields varies depending on the rule type. + +In general, a rule is matched when the key that signed an update request +matches the ``identity`` field, the name of the record to be updated +matches the ``name`` field (in the manner specified by the ``ruletype`` +field), and the type of the record to be updated matches the ``types`` +field. Details for each rule type are described below. + +The ``identity`` field must be set to a fully-qualified domain name. In +most cases, this represensts the name of the TSIG or SIG(0) key that +must be used to sign the update request. If the specified name is a +wildcard, it is subject to DNS wildcard expansion, and the rule may +apply to multiple identities. When a TKEY exchange has been used to +create a shared secret, the identity of the key used to authenticate the +TKEY exchange will be used as the identity of the shared secret. Some +rule types use identities matching the client's Kerberos principal (e.g, +``"host/machine@REALM"``) or Windows realm (``machine$@REALM``). + +The name field also specifies a fully-qualified domain name. This often +represents the name of the record to be updated. Interpretation of this +field is dependent on rule type. + +If no ``types`` are explicitly specified, then a rule matches all types +except RRSIG, NS, SOA, NSEC and NSEC3. Types may be specified by name, +including "ANY" (ANY matches all types except NSEC and NSEC3, which can +never be updated). Note that when an attempt is made to delete all +records associated with a name, the rules are checked for each existing +record type. + +The ruletype field has 16 values: ``name``, ``subdomain``, ``wildcard``, +``self``, ``selfsub``, ``selfwild``, ``krb5-self``, ``ms-self``, +``krb5-selfsub``, ``ms-selfsub``, ``krb5-subdomain``, ``ms-subdomain``, +``tcp-self``, ``6to4-self``, ``zonesub``, and ``external``. + +``name`` + Exact-match semantics. This rule matches when the name being updated is identical to the contents of the name field. + +``subdomain`` + This rule matches when the name being updated is a subdomain of, or identical to, the contents of the name field. + +``zonesub`` + This rule is similar to subdomain, except that it matches when the name being updated is a subdomain of the zone in which the ``update-policy`` statement appears. This obviates the need to type the zone name twice, and enables the use of a standard ``update-policy`` statement in multiple zones without modification. + When this rule is used, the name field is omitted. + +``wildcard`` + The name field is subject to DNS wildcard expansion, and this rule matches when the name being updated is a valid expansion of the wildcard. + + ``self`` + This rule matches when the name of the record being pdated matches the contents of the identity field. The name field is ignored. To avoid confusion, it is recommended that this field be set to the same value as the identity field or to "." + The ``self`` rule type is most useful when allowing one key per name to update, where the key has the same name as the record to be updated. In this case, the identity field can be specified as ``*`` (an asterisk). + +``selfsub`` + This rule is similar to ``self`` except that subdomains of ``self`` can also be updated. + +``selfwild`` + This rule is similar to ``self`` except that only subdomains of ``self`` can be updated. + +``ms-self`` + When a client sends an UPDATE using a Windows machine principal (for example, 'machine$@REALM'), this rule allows records with the absolute name of 'machine.REALM' to be updated. + + The realm to be matched is specified in the identity field. + + The name field has no effect on this rule; it should be set to "." as a placeholder. + + For example, ``grant EXAMPLE.COM ms-self . A AAAA`` allows any machine with a valid principal in the realm ``EXAMPLE.COM`` to update its own address records. + +``ms-selfsub`` + This is similar to ``ms-self`` except it also allows updates to any subdomain of the name specified in the Windows machine principal, not just to the name itself. + +``ms-subdomain`` + When a client sends an UPDATE using a Windows machine principal (for example, 'machine$@REALM'), this rule allows any machine in the specified realm to update any record in the zone or in a specified subdomain of the zone. + + The realm to be matched is specified in the identity field. + + The name field specifies the subdomain that may be updated. If set to "." (or any other name at or above the zone apex), any name in the zone can be updated. + + For example, if ``update-policy`` for the zone "example.com" includes ``grant EXAMPLE.COM ms-subdomain hosts.example.com. AA AAAA``, any machine with a valid principal in the realm ``EXAMPLE.COM`` will be able to update address records at or below "hosts.example.com". + +``krb5-self`` + When a client sends an UPDATE using a Kerberos machine principal (for example, 'host/machine@REALM'), this rule allows records with the absolute name of 'machine' to be updated provided it has been authenticated by REALM. This is similar but not identical to ``ms-self`` due to the 'machine' part of the Kerberos principal being an absolute name instead of a unqualified name. + + The realm to be matched is specified in the identity field. + + The name field has no effect on this rule; it should be set to "." as a placeholder. + + For example, ``grant EXAMPLE.COM krb5-self . A AAAA`` allows any machine with a valid principal in the realm ``EXAMPLE.COM`` to update its own address records. + +``krb5-selfsub`` + This is similar to ``krb5-self`` except it also allows updates to any subdomain of the name specified in the 'machine' part of the Kerberos principal, not just to the name itself. + +``krb5-subdomain`` + This rule is identical to ``ms-subdomain``, except that it works with Kerberos machine principals (i.e., 'host/machine@REALM') rather than Windows machine principals. + +``tcp-self`` + This rule allows updates that have been sent via TCP and for which the standard mapping from the client's IP address into the ``in-addr.arpa`` and ``ip6.arpa`` namespaces match the name to be updated. The ``identity`` field must match that name. The ``name`` field should be set to ".". Note that, since identity is based on the client's IP address, it is not necessary for update request messages to be signed. + + .. note:: + It is theoretically possible to spoof these TCP sessions. + +``6to4-self`` + This allows the name matching a 6to4 IPv6 prefix, as specified in :rfc:`3056`, to be updated by any TCP connection from either the 6to4 network or from the corresponding IPv4 address. This is intended to allow NS or DNAME RRsets to be added to the ``ip6.arpa`` reverse tree. + + The ``identity`` field must match the 6to4 prefix in ``ip6.arpa``. The ``name`` field should be set to ".". Note that, since identity is based on the client's IP address, it is not necessary for update request messages to be signed. + + In addition, if specified for an ``ip6.arpa`` name outside of the ``2.0.0.2.ip6.arpa`` namespace, the corresponding /48 reverse name can be updated. For example, TCP/IPv6 connections from 2001:DB8:ED0C::/48 can update records at ``C.0.D.E.8.B.D.0.1.0.0.2.ip6.arpa``. + + .. note:: + It is theoretically possible to spoof these TCP sessions. + +``external`` + This rule allows ``named`` to defer the decision of whether to allow a given update to an external daemon. + + The method of communicating with the daemon is specified in the identity field, the format of which is "``local:``\ path", where path is the location of a UNIX-domain socket. (Currently, "local" is the only supported mechanism.) + + Requests to the external daemon are sent over the UNIX-domain socket as datagrams with the following format: + + :: + + Protocol version number (4 bytes, network byte order, currently 1) + Request length (4 bytes, network byte order) + Signer (null-terminated string) + Name (null-terminated string) + TCP source address (null-terminated string) + Rdata type (null-terminated string) + Key (null-terminated string) + TKEY token length (4 bytes, network byte order) + TKEY token (remainder of packet) + + The daemon replies with a four-byte value in network byte order, containing either 0 or 1; 0 indicates that the specified update is not permitted, and 1 indicates that it is. + +.. _multiple_views: + +Multiple views +^^^^^^^^^^^^^^ + +When multiple views are in use, a zone may be referenced by more than +one of them. Often, the views will contain different zones with the same +name, allowing different clients to receive different answers for the +same queries. At times, however, it is desirable for multiple views to +contain identical zones. The ``in-view`` zone option provides an +efficient way to do this: it allows a view to reference a zone that was +defined in a previously configured view. Example: + +:: + + view internal { + match-clients { 10/8; }; + + zone example.com { + type master; + file "example-external.db"; + }; + }; + + view external { + match-clients { any; }; + + zone example.com { + in-view internal; + }; + }; + +An ``in-view`` option cannot refer to a view that is configured later in +the configuration file. + +A ``zone`` statement which uses the ``in-view`` option may not use any +other options with the exception of ``forward`` and ``forwarders``. +(These options control the behavior of the containing view, rather than +changing the zone object itself.) + +Zone level acls (e.g. allow-query, allow-transfer) and other +configuration details of the zone are all set in the view the referenced +zone is defined in. Care need to be taken to ensure that acls are wide +enough for all views referencing the zone. + +An ``in-view`` zone cannot be used as a response policy zone. + +An ``in-view`` zone is not intended to reference a ``forward`` zone. + +.. _zone_file: + +Zone File +--------- + +.. _types_of_resource_records_and_when_to_use_them: + +Types of Resource Records and When to Use Them +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +This section, largely borrowed from :rfc:`1034`, describes the concept of a +Resource Record (RR) and explains when each is used. Since the +publication of :rfc:`1034`, several new RRs have been identified and +implemented in the DNS. These are also included. + +Resource Records +^^^^^^^^^^^^^^^^ + +A domain name identifies a node. Each node has a set of resource +information, which may be empty. The set of resource information +associated with a particular name is composed of separate RRs. The order +of RRs in a set is not significant and need not be preserved by name +servers, resolvers, or other parts of the DNS. However, sorting of +multiple RRs is permitted for optimization purposes, for example, to +specify that a particular nearby server be tried first. See +:ref:`the_sortlist_statement` and :ref:`rrset_ordering`. + +The components of a Resource Record are: + +owner name + The domain name where the RR is found. + +type + An encoded 16-bit value that specifies the type of the resource record. + +TTL + The time-to-live of the RR. This field is a 32-bit integer in units of seconds, and is primarily used by resolvers when they cache RRs. The TTL describes how long a RR can be cached before it should be discarded. + +class + An encoded 16-bit value that identifies a protocol family or instance of a protocol. + +RDATA + The resource data. The format of the data is type (and sometimes class) specific. + +The following are *types* of valid RRs: + +A + A host address. In the IN class, this is a 32-bit IP address. Described in :rfc:`1035`. + +AAAA + IPv6 address. Described in :rfc:`1886`. + +A6 + IPv6 address. This can be a partial address (a suffix) and an indirection to the name where the rest of the address (the prefix) can be found. Experimental. Described in :rfc:`2874`. + +AFSDB + Location of AFS database servers. Experimental. Described in :rfc:`1183`. + +AMTRELAY + Automatic Multicast Tunneling Relay discovery record. Work in progress draft-ietf-mboned-driad-amt-discovery. + +APL + Address prefix list. Experimental. Described in :rfc:`3123`. + +ATMA + ATM Address. + +AVC + Application Visibility and Control record. + +CAA + Identifies which Certificate Authorities can issue certificates for this domain and what rules they need to follow when doing so. Defined in :rfc:`6844`. + +CDNSKEY + Identifies which DNSKEY records should be published as DS records in the parent zone. + +CDS + Contains the set of DS records that should be published by the parent zone. + +CERT + Holds a digital certificate. Described in :rfc:`2538`. + +CNAME + Identifies the canonical name of an alias. Described in :rfc:`1035`. + +CSYNC + Child-to-Parent Synchronization in DNS as described in :rfc:`7477`. + +DHCID + Is used for identifying which DHCP client is associated with this name. Described in :rfc:`4701`. + +DLV + A DNS Lookaside Validation record which contains the records that are used as trust anchors for zones in a DLV namespace. Described in :rfc:`4431`. Historical. + +DNAME + Replaces the domain name specified with another name to be looked up, effectively aliasing an entire subtree of the domain name space rather than a single record as in the case of the CNAME RR. Described in :rfc:`2672`. + +DNSKEY + Stores a public key associated with a signed DNS zone. Described in :rfc:`4034`. + +DOA + Implements the Digital Object Architecture over DNS. Experimental. + +DS + Stores the hash of a public key associated with a signed DNS zone. Described in :rfc:`4034`. + +EID + End Point Identifier. + +EUI48 + A 48-bit EUI address. Described in :rfc:`7043`. + +EUI64 + A 64-bit EUI address. Described in :rfc:`7043`. + +GID + Reserved. + +GPOS + Specifies the global position. Superseded by LOC. + +HINFO + Identifies the CPU and OS used by a host. Described in :rfc:`1035`. + +HIP + Host Identity Protocol Address. Described in :rfc:`5205`. + +IPSECKEY + Provides a method for storing IPsec keying material in DNS. Described in :rfc:`4025`. + +ISDN + Representation of ISDN addresses. Experimental. Described in :rfc:`1183`. + + KEY + Stores a public key associated with a DNS name. Used in original DNSSEC; replaced by DNSKEY in DNSSECbis, but still used with SIG(0). Described in :rfc:`2535` and :rfc:`2931`. + +KX + Identifies a key exchanger for this DNS name. Described in :rfc:`2230`. + +L32 + Holds 32-bit Locator values for Identifier-Locator Network Protocol. Described in :rfc:`6742`. + +L64 + Holds 64-bit Locator values for Identifier-Locator Network Protocol. Described in :rfc:`6742`. +LOC + For storing GPS info. Described in :rfc:`1876`. Experimental. + +LP + Identifier-Locator Network Protocol. Described in :rfc:`6742`. + +MB + Mail Box. Historical. + +MD + Mail Destination. Historical. + +MF + Mail Forwarder. Historical. + +MG + Mail Group. Historical. + +MINFO + Mail Information. + +MR + Mail Rename. Historical. + +MX + Identifies a mail exchange for the domain with a 16-bit preference value (lower is better) followed by the host name of the mail exchange. Described in :rfc:`974`, :rfc:`1035`. + +NAPTR + Name authority pointer. Described in :rfc:`2915`. + +NID + Holds values for Node Identifiers in Identifier-Locator Network Protocol. Described in :rfc:`6742`. + +NINFO + Contains zone status information. + +NIMLOC + Nimrod Locator. + +NSAP + A network service access point. Described in :rfc:`1706`. + +NSAP-PTR + Historical. + +NS + The authoritative name server for the domain. Described in :rfc:`1035`. + +NSEC + Used in DNSSECbis to securely indicate that RRs with an owner name in a certain name interval do not exist in a zone and indicate what RR types are present for an existing name. Described in :rfc:`4034`. + +NSEC3 + Used in DNSSECbis to securely indicate that RRs with an owner name in a certain name interval do not exist in a zone and indicate what RR types are present for an existing name. NSEC3 differs from NSEC in that it prevents zone enumeration but is more computationally expensive on both the server and the client than NSEC. Described in :rfc:`5155`. + +NSEC3PARAM + Used in DNSSECbis to tell the authoritative server which NSEC3 chains are available to use. Described in :rfc:`5155`. + +NULL + This is an opaque container. + +NXT + Used in DNSSEC to securely indicate that RRs with anowner name in a certain name interval do not exist in a zone and indicate what RR types are present for an existing name. Used in original DNSSEC; replaced by NSEC in DNSSECbis. Described in :rfc:`2535`. + +OPENPGPKEY + Used to hold an OPENPGPKEY. + +PTR + A pointer to another part of the domain name space. Described in :rfc:`1035`. + +PX + Provides mappings between :rfc:`822` and X.400 addresses. Described in :rfc:`2163`. addresses. Described in :rfc:`2163`. + +RKEY + Resource key. + +RP + Information on persons responsible for the domain. Experimental. Described in :rfc:`1183`. + +RRSIG + Contains DNSSECbis signature data. Described in :rfc:`4034`. + +RT + Route-through binding for hosts that do not have their own direct wide area network addresses. Experimental. Described in :rfc:`1183`. + +SIG + Contains DNSSEC signature data. Used in original DNSSEC; replaced by RRSIG in DNSSECbis, but still used for SIG(0). Described in :rfc:`2535` and :rfc:`2931`. + +SINK + The kitchen sink record. + +SMIMEA + The S/MIME Security Certificate Association. + +SOA + Identifies the start of a zone of authority. Described in :rfc:`1035`. + +SPF + Contains the Sender Policy Framework information for a given email domain. Described in :rfc:`4408`. + +SRV + Information about well known network services (replaces WKS). Described in :rfc:`2782`. + +SSHFP + Provides a way to securely publish a secure shell key's fingerprint. Described in :rfc:`4255`. +TA + Trust Anchor. Experimental. + +TALINK + Trust Anchor Link. Experimental. + +TLSA + Transport Layer Security Certificate Association. Described in :rfc:`6698`. + +TXT + Text records. Described in :rfc:`1035`. + +UID + Reserved. + +UINFO + Reserved. + +UNSPEC + Reserved. Historical. + +URI + Holds a URI. Described in :rfc:`7553`. + +WKS + Information about which well known network services, such as SMTP, that a domain supports. Historical. + +X25 + Representation of X.25 network addresses. Experimental. Described in :rfc:`1183`. + +ZONEMD + Zone Message Digest. Work in progress draft-wessels-dns-zone-digest. + +The following *classes* of resource records are currently valid in the +DNS: + +IN + The Internet. + +CH + Chaosnet, a LAN protocol created at MIT in the mid-1970s. Rarely used for its historical purpose, but reused for BIND's built-in server information zones, e.g., ``version.bind``. + +HS + Hesiod, an information service developed by MIT's Project Athena. It is used to share information about various systems databases, such as users, groups, printers and so on. + +The owner name is often implicit, rather than forming an integral part +of the RR. For example, many name servers internally form tree or hash +structures for the name space, and chain RRs off nodes. The remaining RR +parts are the fixed header (type, class, TTL) which is consistent for +all RRs, and a variable part (RDATA) that fits the needs of the resource +being described. + +The meaning of the TTL field is a time limit on how long an RR can be +kept in a cache. This limit does not apply to authoritative data in +zones; it is also timed out, but by the refreshing policies for the +zone. The TTL is assigned by the administrator for the zone where the +data originates. While short TTLs can be used to minimize caching, and a +zero TTL prohibits caching, the realities of Internet performance +suggest that these times should be on the order of days for the typical +host. If a change can be anticipated, the TTL can be reduced prior to +the change to minimize inconsistency during the change, and then +increased back to its former value following the change. + +The data in the RDATA section of RRs is carried as a combination of +binary strings and domain names. The domain names are frequently used as +"pointers" to other data in the DNS. + +.. _rr_text: + +Textual expression of RRs +^^^^^^^^^^^^^^^^^^^^^^^^^ + +RRs are represented in binary form in the packets of the DNS protocol, +and are usually represented in highly encoded form when stored in a name +server or resolver. In the examples provided in :rfc:`1034`, a style +similar to that used in master files was employed in order to show the +contents of RRs. In this format, most RRs are shown on a single line, +although continuation lines are possible using parentheses. + +The start of the line gives the owner of the RR. If a line begins with a +blank, then the owner is assumed to be the same as that of the previous +RR. Blank lines are often included for readability. + +Following the owner, we list the TTL, type, and class of the RR. Class +and type use the mnemonics defined above, and TTL is an integer before +the type field. In order to avoid ambiguity in parsing, type and class +mnemonics are disjoint, TTLs are integers, and the type mnemonic is +always last. The IN class and TTL values are often omitted from examples +in the interests of clarity. + +The resource data or RDATA section of the RR are given using knowledge +of the typical representation for the data. + +For example, we might show the RRs carried in a message as: + + +---------------------+---------------+--------------------------------+ + | ``ISI.EDU.`` | ``MX`` | ``10 VENERA.ISI.EDU.`` | + +---------------------+---------------+--------------------------------+ + | | ``MX`` | ``10 VAXA.ISI.EDU`` | + +---------------------+---------------+--------------------------------+ + | ``VENERA.ISI.EDU`` | ``A`` | ``128.9.0.32`` | + +---------------------+---------------+--------------------------------+ + | | ``A`` | ``10.1.0.52`` | + +---------------------+---------------+--------------------------------+ + | ``VAXA.ISI.EDU`` | ``A`` | ``10.2.0.27`` | + +---------------------+---------------+--------------------------------+ + | | ``A`` | ``128.9.0.33`` | + +---------------------+---------------+--------------------------------+ + +The MX RRs have an RDATA section which consists of a 16-bit number +followed by a domain name. The address RRs use a standard IP address +format to contain a 32-bit internet address. + +The above example shows six RRs, with two RRs at each of three domain +names. + +Similarly we might see: + + +----------------------+---------------+-------------------------------+ + | ``XX.LCS.MIT.EDU.`` | ``IN A`` | ``10.0.0.44`` | + +----------------------+---------------+-------------------------------+ + | | ``CH A`` | ``MIT.EDU. 2420`` | + +----------------------+---------------+-------------------------------+ + +This example shows two addresses for ``XX.LCS.MIT.EDU``, each of a +different class. + +.. _mx_records: + +Discussion of MX Records +~~~~~~~~~~~~~~~~~~~~~~~~ + +As described above, domain servers store information as a series of +resource records, each of which contains a particular piece of +information about a given domain name (which is usually, but not always, +a host). The simplest way to think of a RR is as a typed pair of data, a +domain name matched with a relevant datum, and stored with some +additional type information to help systems determine when the RR is +relevant. + +MX records are used to control delivery of email. The data specified in +the record is a priority and a domain name. The priority controls the +order in which email delivery is attempted, with the lowest number +first. If two priorities are the same, a server is chosen randomly. If +no servers at a given priority are responding, the mail transport agent +will fall back to the next largest priority. Priority numbers do not +have any absolute meaning — they are relevant only respective to other +MX records for that domain name. The domain name given is the machine to +which the mail will be delivered. It *must* have an associated address +record (A or AAAA) — CNAME is not sufficient. + +For a given domain, if there is both a CNAME record and an MX record, +the MX record is in error, and will be ignored. Instead, the mail will +be delivered to the server specified in the MX record pointed to by the +CNAME. For example: + + +------------------------+--------+--------+--------------+------------------------+ + | ``example.com.`` | ``IN`` | ``MX`` | ``10`` | ``mail.example.com.`` | + +------------------------+--------+--------+--------------+------------------------+ + | | ``IN`` | ``MX`` | ``10`` | ``mail2.example.com.`` | + +------------------------+--------+--------+--------------+------------------------+ + | | ``IN`` | ``MX`` | ``20`` | ``mail.backup.org.`` | + +------------------------+--------+--------+--------------+------------------------+ + | ``mail.example.com.`` | ``IN`` | ``A`` | ``10.0.0.1`` | | + +------------------------+--------+--------+--------------+------------------------+ + | ``mail2.example.com.`` | ``IN`` | ``A`` | ``10.0.0.2`` | | + +------------------------+--------+--------+--------------+------------------------+ + +Mail delivery will be attempted to ``mail.example.com`` and +``mail2.example.com`` (in any order), and if neither of those succeed, +delivery to ``mail.backup.org`` will be attempted. + +.. _Setting_TTLs: + +Setting TTLs +~~~~~~~~~~~~ + +The time-to-live of the RR field is a 32-bit integer represented in +units of seconds, and is primarily used by resolvers when they cache +RRs. The TTL describes how long a RR can be cached before it should be +discarded. The following three types of TTL are currently used in a zone +file. + +SOA + The last field in the SOA is the negative caching TTL. This controls how long other servers will cache no-such-domain (NXDOMAIN) responses from you. + + The maximum time for negative caching is 3 hours (3h). + +$TTL + The $TTL directive at the top of the zone file (before the SOA) gives a default TTL for every RR without a specific TTL set. + +RR TTLs + Each RR can have a TTL as the second field in the RR, which will control how long other servers can cache it. + +All of these TTLs default to units of seconds, though units can be +explicitly specified, for example, ``1h30m``. + +.. _ipv4_reverse: + +Inverse Mapping in IPv4 +~~~~~~~~~~~~~~~~~~~~~~~ + +Reverse name resolution (that is, translation from IP address to name) +is achieved by means of the *in-addr.arpa* domain and PTR records. +Entries in the in-addr.arpa domain are made in least-to-most significant +order, read left to right. This is the opposite order to the way IP +addresses are usually written. Thus, a machine with an IP address of +10.1.2.3 would have a corresponding in-addr.arpa name of +3.2.1.10.in-addr.arpa. This name should have a PTR resource record whose +data field is the name of the machine or, optionally, multiple PTR +records if the machine has more than one name. For example, in the +[example.com] domain: + + +--------------+-------------------------------------------------------+ + | ``$ORIGIN`` | ``2.1.10.in-addr.arpa`` | + +--------------+-------------------------------------------------------+ + | ``3`` | ``IN PTR foo.example.com.`` | + +--------------+-------------------------------------------------------+ + +.. note:: + + The ``$ORIGIN`` lines in the examples are for providing context to + the examples only — they do not necessarily appear in the actual + usage. They are only used here to indicate that the example is + relative to the listed origin. + +.. _zone_directives: + +Other Zone File Directives +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The Master File Format was initially defined in :rfc:`1035` and has +subsequently been extended. While the Master File Format itself is class +independent all records in a Master File must be of the same class. + +Master File Directives include ``$ORIGIN``, ``$INCLUDE``, and ``$TTL.`` + +.. _atsign: + +The ``@`` (at-sign) +^^^^^^^^^^^^^^^^^^^ + +When used in the label (or name) field, the asperand or at-sign (@) +symbol represents the current origin. At the start of the zone file, it +is the <``zone_name``> (followed by trailing dot). + +.. _origin_directive: + +The ``$ORIGIN`` Directive +^^^^^^^^^^^^^^^^^^^^^^^^^ + +Syntax: ``$ORIGIN`` domain-name [comment] + +``$ORIGIN`` sets the domain name that will be appended to any +unqualified records. When a zone is first read in there is an implicit +``$ORIGIN`` <``zone_name``>\ ``.`` (followed by trailing dot). The +current ``$ORIGIN`` is appended to the domain specified in the +``$ORIGIN`` argument if it is not absolute. + +:: + + $ORIGIN example.com. + WWW CNAME MAIN-SERVER + +is equivalent to + +:: + + WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM. + +.. _include_directive: + +The ``$INCLUDE`` Directive +^^^^^^^^^^^^^^^^^^^^^^^^^^ + +Syntax: ``$INCLUDE`` filename [origin] [comment] + +Read and process the file ``filename`` as if it were included into the +file at this point. If ``origin`` is specified the file is processed +with ``$ORIGIN`` set to that value, otherwise the current ``$ORIGIN`` is +used. + +The origin and the current domain name revert to the values they had +prior to the ``$INCLUDE`` once the file has been read. + + **Note** + + :rfc:`1035` specifies that the current origin should be restored after + an ``$INCLUDE``, but it is silent on whether the current domain name + should also be restored. BIND 9 restores both of them. This could be + construed as a deviation from :rfc:`1035`, a feature, or both. + +.. _ttl_directive: + +The ``$TTL`` Directive +^^^^^^^^^^^^^^^^^^^^^^ + +Syntax: ``$TTL`` default-ttl [comment] + +Set the default Time To Live (TTL) for subsequent records with undefined +TTLs. Valid TTLs are of the range 0-2147483647 seconds. + +``$TTL`` is defined in :rfc:`2308`. + +.. _generate_directive: + +BIND Master File Extension: the ``$GENERATE`` Directive +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Syntax: ``$GENERATE`` range lhs [ttl] [class] type rhs [comment] + +``$GENERATE`` is used to create a series of resource records that only +differ from each other by an iterator. ``$GENERATE`` can be used to +easily generate the sets of records required to support sub /24 reverse +delegations described in :rfc:`2317`: Classless IN-ADDR.ARPA delegation. + +:: + + $ORIGIN 0.0.192.IN-ADDR.ARPA. + $GENERATE 1-2 @ NS SERVER$.EXAMPLE. + $GENERATE 1-127 $ CNAME $.0 + +is equivalent to + +:: + + 0.0.0.192.IN-ADDR.ARPA. NS SERVER1.EXAMPLE. + 0.0.0.192.IN-ADDR.ARPA. NS SERVER2.EXAMPLE. + 1.0.0.192.IN-ADDR.ARPA. CNAME 1.0.0.0.192.IN-ADDR.ARPA. + 2.0.0.192.IN-ADDR.ARPA. CNAME 2.0.0.0.192.IN-ADDR.ARPA. + ... + 127.0.0.192.IN-ADDR.ARPA. CNAME 127.0.0.0.192.IN-ADDR.ARPA. + +Generate a set of A and MX records. Note the MX's right hand side is a +quoted string. The quotes will be stripped when the right hand side is +processed. + +:: + + $ORIGIN EXAMPLE. + $GENERATE 1-127 HOST-$ A 1.2.3.$ + $GENERATE 1-127 HOST-$ MX "0 ." + +is equivalent to + +:: + + HOST-1.EXAMPLE. A 1.2.3.1 + HOST-1.EXAMPLE. MX 0 . + HOST-2.EXAMPLE. A 1.2.3.2 + HOST-2.EXAMPLE. MX 0 . + HOST-3.EXAMPLE. A 1.2.3.3 + HOST-3.EXAMPLE. MX 0 . + ... + HOST-127.EXAMPLE. A 1.2.3.127 + HOST-127.EXAMPLE. MX 0 . + +``range`` + This can be one of two forms: start-stop or start-stop/step. If the first form is used, then step is set to 1. start, stop and step must be positive integers between 0 and (2^31)-1. start must not be larger than stop. + +``lhs`` + This describes the owner name of the resource records to be created. Any single ``$`` (dollar sign) symbols within the ``lhs`` string are replaced by the iterator value. To get a $ in the output, you need to escape the ``$`` using a backslash ``\``, e.g. ``\$``. The ``$`` may optionally be followed by modifiers which change the offset from the iterator, field width and base. + + Modifiers are introduced by a ``{`` (left brace) immediately following the ``$`` as ``${offset[,width[,base]]}``. For example, ``${-20,3,d}`` subtracts 20 from the current value, prints the result as a decimal in a zero-padded field of width 3. Available output forms are decimal (``d``), octal (``o``), hexadecimal (``x`` or ``X`` for uppercase) and nibble (``n`` or ``N``\\ for uppercase). + + The default modifier is ``${0,0,d}``. If the ``lhs`` is not absolute, the current ``$ORIGIN`` is appended to the name. + + In nibble mode the value will be treated as if it was a reversed hexadecimal string with each hexadecimal digit as a separate label. The width field includes the label separator. + + For compatibility with earlier versions, ``$$`` is still recognized as indicating a literal $ in the output. + +``ttl`` + Specifies the time-to-live of the generated records. If not specified this will be inherited using the normal TTL inheritance rules. + + ``class`` and ``ttl`` can be entered in either order. + +``class`` + Specifies the class of the generated records. This must match the zone class if it is specified. + + ``class`` and ``ttl`` can be entered in either order. + +``type`` + Any valid type. + +``rhs`` + ``rhs``, optionally, quoted string. + +The ``$GENERATE`` directive is a BIND extension and not part of the +standard zone file format. + +.. _zonefile_format: + +Additional File Formats +~~~~~~~~~~~~~~~~~~~~~~~ + +In addition to the standard textual format, BIND 9 supports the ability +to read or dump to zone files in other formats. + +The ``raw`` format is a binary representation of zone data in a manner +similar to that used in zone transfers. Since it does not require +parsing text, load time is significantly reduced. + +An even faster alternative is the ``map`` format, which is an image of a +BIND 9 in-memory zone database; it is capable of being loaded directly +into memory via the ``mmap()`` function; the zone can begin serving +queries almost immediately. + +For a primary server, a zone file in ``raw`` or ``map`` format is +expected to be generated from a textual zone file by the +``named-compilezone`` command. For a secondary server or for a dynamic +zone, it is automatically generated (if this format is specified by the +``masterfile-format`` option) when ``named`` dumps the zone contents +after zone transfer or when applying prior updates. + +If a zone file in a binary format needs manual modification, it first +must be converted to a textual form by the ``named-compilezone`` +command. All necessary modification should go to the text file, which +should then be converted to the binary form by the ``named-compilezone`` +command again. + +Note that ``map`` format is extremely architecture-specific. A ``map`` +file *cannot* be used on a system with different pointer size, +endianness or data alignment than the system on which it was generated, +and should in general be used only inside a single system. While ``raw`` +format uses network byte order and avoids architecture-dependent data +alignment so that it is as portable as possible, it is also primarily +expected to be used inside the same single system. To export a zone file +in either ``raw`` or ``map`` format, or make a portable backup of such a +file, conversion to ``text`` format is recommended. + +.. _statistics: + +BIND9 Statistics +---------------- + +BIND 9 maintains lots of statistics information and provides several +interfaces for users to get access to the statistics. The available +statistics include all statistics counters that were available in BIND 8 +and are meaningful in BIND 9, and other information that is considered +useful. + +The statistics information is categorized into the following sections: + +Incoming Requests + The number of incoming DNS requests for each OPCODE. + +Incoming Queries + The number of incoming queries for each RR type. + +Outgoing Queries + The number of outgoing queries for each RR type sent from the internal + resolver. Maintained per view. + +Name Server Statistics + Statistics counters about incoming request processing. + +Zone Maintenance Statistics + Statistics counters regarding zone maintenance operations such as zone + transfers. + +Resolver Statistics + Statistics counters about name resolution performed in the internal resolver. + Maintained per view. + +Cache DB RRsets + + Statistics counters related to cache contents; maintained per view. + + The "NXDOMAIN" counter is the number of names that have been cached as + nonexistent. Counters named for RR types indicate the number of active + RRsets for each type in the cache database. + + If an RR type name is preceded by an exclamation mark (!), it represents the + number of records in the cache which indicate that the type does not exist + for a particular name (this is also known as "NXRRSET"). If an RR type name + is preceded by a hash mark (#), it represents the number of RRsets for this + type that are present in the cache but whose TTLs have expired; these RRsets + may only be used if stale answers are enabled. If an RR type name is + preceded by a tilde (~), it represents the number of RRsets for this type + that are present in the cache database but are marked for garbage collection; + these RRsets cannot be used. + +Socket I/O Statistics + Statistics counters about network related events. + + +A subset of Name Server Statistics is collected and shown per zone for +which the server has the authority when ``zone-statistics`` is set to +``full`` (or ``yes`` for backward compatibility. See the description of +``zone-statistics`` in :ref:`options` for further details. + +These statistics counters are shown with their zone and view names. The +view name is omitted when the server is not configured with explicit +views. + +There are currently two user interfaces to get access to the statistics. +One is in the plain text format dumped to the file specified by the +``statistics-file`` configuration option. The other is remotely +accessible via a statistics channel when the ``statistics-channels`` +statement is specified in the configuration file (see :ref:`statschannels`.) + +.. _statsfile: + +The Statistics File +~~~~~~~~~~~~~~~~~~~ + +The text format statistics dump begins with a line, like: + +``+++ Statistics Dump +++ (973798949)`` + +The number in parentheses is a standard Unix-style timestamp, measured +as seconds since January 1, 1970. Following that line is a set of +statistics information, which is categorized as described above. Each +section begins with a line, like: + +``++ Name Server Statistics ++`` + +Each section consists of lines, each containing the statistics counter +value followed by its textual description. See below for available +counters. For brevity, counters that have a value of 0 are not shown in +the statistics file. + +The statistics dump ends with the line where the number is identical to +the number in the beginning line; for example: + +``--- Statistics Dump --- (973798949)`` + +.. _statistics_counters: + +Statistics Counters +~~~~~~~~~~~~~~~~~~~ + +The following tables summarize statistics counters that BIND 9 provides. +For each row of the tables, the leftmost column is the abbreviated +symbol name of that counter. These symbols are shown in the statistics +information accessed via an HTTP statistics channel. The rightmost +column gives the description of the counter, which is also shown in the +statistics file (but, in this document, possibly with slight +modification for better readability). Additional notes may also be +provided in this column. When a middle column exists between these two +columns, it gives the corresponding counter name of the BIND 8 +statistics, if applicable. + +.. _stats_counters: + +Name Server Statistics Counters +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + ++------------------------+-------------+------------------------------------------------+ +| *Symbol* | *BIND8* | *Description* | +| | *Symbol* | | ++------------------------+-------------+------------------------------------------------+ +| ``Requestv4`` | ``RQ`` | IPv4 requests received. Note: this also | +| | | counts non query requests. | ++------------------------+-------------+------------------------------------------------+ +| ``Requestv6`` | ``RQ`` | IPv6 requests received. Note: this also | +| | | counts non query requests. | ++------------------------+-------------+------------------------------------------------+ +| ``ReqEdns0`` | | Requests with EDNS(0) received. | ++------------------------+-------------+------------------------------------------------+ +| ``ReqBadEDN SVer`` | | Requests with unsupported EDNS version | +| | | received. | ++------------------------+-------------+------------------------------------------------+ +| ``ReqTSIG`` | | Requests with TSIG received. | ++------------------------+-------------+------------------------------------------------+ +| ``ReqSIG0`` | | Requests with SIG(0) received. | ++------------------------+-------------+------------------------------------------------+ +| ``ReqBadSIG`` | | Requests with invalid (TSIG or SIG(0)) | +| | | signature. | ++------------------------+-------------+------------------------------------------------+ +| ``ReqTCP`` | ``RTCP`` | TCP requests received. | ++------------------------+-------------+------------------------------------------------+ +| ``AuthQryRej`` | ``RUQ`` | Authoritative (non recursive) queries | +| | | rejected. | ++------------------------+-------------+------------------------------------------------+ +| ``RecQryRej`` | ``RURQ`` | Recursive queries rejected. | ++------------------------+-------------+------------------------------------------------+ +| ``XfrRej`` | ``RUXFR`` | Zone transfer requests rejected. | ++------------------------+-------------+------------------------------------------------+ +| ``UpdateRej`` | ``RUUpd`` | Dynamic update requests rejected. | ++------------------------+-------------+------------------------------------------------+ +| ``Response`` | ``SAns`` | Responses sent. | ++------------------------+-------------+------------------------------------------------+ +| ``RespTruncated`` | | Truncated responses sent. | ++------------------------+-------------+------------------------------------------------+ +| ``RespEDNS0`` | | Responses with EDNS(0) sent. | ++------------------------+-------------+------------------------------------------------+ +| ``RespTSIG`` | | Responses with TSIG sent. | ++------------------------+-------------+------------------------------------------------+ +| ``RespSIG0`` | | Responses with SIG(0) sent. | ++------------------------+-------------+------------------------------------------------+ +| ``QrySuccess`` | | Queries resulted in a successful | +| | | answer. This means the query which | +| | | returns a NOERROR response with at | +| | | least one answer RR. This corresponds | +| | | to the ``success`` counter of previous | +| | | versions of BIND 9. | ++------------------------+-------------+------------------------------------------------+ +| ``QryAuthAns`` | | Queries resulted in authoritative | +| | | answer. | ++------------------------+-------------+------------------------------------------------+ +| ``QryNoauthAns`` | ``SNaAns`` | Queries resulted in non authoritative | +| | | answer. | ++------------------------+-------------+------------------------------------------------+ +| ``QryReferral`` | | Queries resulted in referral answer. | +| | | This corresponds to the ``referral`` | +| | | counter of previous versions of BIND 9. | ++------------------------+-------------+------------------------------------------------+ +| ``QryNxrrset`` | | Queries resulted in NOERROR responses | +| | | with no data. This corresponds to the | +| | | ``nxrrset`` counter of previous | +| | | versions of BIND 9. | ++------------------------+-------------+------------------------------------------------+ +| ``QrySERVFAIL`` | ``SFail`` | Queries resulted in SERVFAIL. | ++------------------------+-------------+------------------------------------------------+ +| ``QryFORMERR`` | ``SFErr`` | Queries resulted in FORMERR. | ++------------------------+-------------+------------------------------------------------+ +| ``QryNXDOMAIN`` | ``SNXD`` | Queries resulted in NXDOMAIN. This | +| | | corresponds to the ``nxdomain`` counter | +| | | of previous versions of BIND 9. | ++------------------------+-------------+------------------------------------------------+ +| ``QryRecursion`` | ``RFwdQ`` | Queries which caused the server to | +| | | perform recursion in order to find the | +| | | final answer. This corresponds to the | +| | | ``recursion`` counter of previous | +| | | versions of BIND 9. | ++------------------------+-------------+------------------------------------------------+ +| ``QryDuplicate`` | ``RDupQ`` | Queries which the server attempted to | +| | | recurse but discovered an existing | +| | | query with the same IP address, port, | +| | | query ID, name, type and class already | +| | | being processed. This corresponds to | +| | | the ``duplicate`` counter of previous | +| | | versions of BIND 9. | ++------------------------+-------------+------------------------------------------------+ +| ``QryDropped`` | | Recursive queries for which the server | +| | | discovered an excessive number of | +| | | existing recursive queries for the same | +| | | name, type and class and were | +| | | subsequently dropped. This is the | +| | | number of dropped queries due to the | +| | | reason explained with the | +| | | ``clients-per-query`` and | +| | | ``max-clients-per-query`` options (see | +| | | :ref:`clients-per-query `). | +| | | This corresponds to the ``dropped`` | +| | | counter of previous versions of BIND 9. | ++------------------------+-------------+------------------------------------------------+ +| ``QryFailure`` | | Other query failures. This corresponds | +| | | to the ``failure`` counter of previous | +| | | versions of BIND 9. Note: this counter | +| | | is provided mainly for backward | +| | | compatibility with the previous | +| | | versions. Normally a more fine-grained | +| | | counters such as ``AuthQryRej`` and | +| | | ``RecQryRej`` that would also fall into | +| | | this counter are provided, and so this | +| | | counter would not be of much interest | +| | | in practice. | ++------------------------+-------------+------------------------------------------------+ +| ``QryNXRedir`` | | Queries resulted in NXDOMAIN that were | +| | | redirected. | ++------------------------+-------------+------------------------------------------------+ +| ``QryNXRedirRLookup`` | | Queries resulted in NXDOMAIN that were | +| | | redirected and resulted in a successful | +| | | remote lookup. | ++------------------------+-------------+------------------------------------------------+ +| ``XfrReqDone`` | | Requested zone transfers completed. | ++------------------------+-------------+------------------------------------------------+ +| ``UpdateReqFwd`` | | Update requests forwarded. | ++------------------------+-------------+------------------------------------------------+ +| ``UpdateRespFwd`` | | Update responses forwarded. | ++------------------------+-------------+------------------------------------------------+ +| ``UpdateFwdFail`` | | Dynamic update forward failed. | ++------------------------+-------------+------------------------------------------------+ +| ``UpdateDone`` | | Dynamic updates completed. | ++------------------------+-------------+------------------------------------------------+ +| ``UpdateFail`` | | Dynamic updates failed. | ++------------------------+-------------+------------------------------------------------+ +| ``UpdateBadPrereq`` | | Dynamic updates rejected due to | +| | | prerequisite failure. | ++------------------------+-------------+------------------------------------------------+ +| ``RateDropped`` | | Responses dropped by rate limits. | ++------------------------+-------------+------------------------------------------------+ +| ``RateSlipped`` | | Responses truncated by rate limits. | ++------------------------+-------------+------------------------------------------------+ +| ``RPZRewrites`` | | Response policy zone rewrites. | ++------------------------+-------------+------------------------------------------------+ + +.. _zone_stats: + +Zone Maintenance Statistics Counters +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + + +-----------------+----------------------------------------------------+ + | *Symbol* | *Description* | + +-----------------+----------------------------------------------------+ + | ``NotifyOutv4`` | IPv4 notifies sent. | + +-----------------+----------------------------------------------------+ + | ``NotifyOutv6`` | IPv6 notifies sent. | + +-----------------+----------------------------------------------------+ + | ``NotifyInv4`` | IPv4 notifies received. | + +-----------------+----------------------------------------------------+ + | ``NotifyInv6`` | IPv6 notifies received. | + +-----------------+----------------------------------------------------+ + | ``NotifyRej`` | Incoming notifies rejected. | + +-----------------+----------------------------------------------------+ + | ``SOAOutv4`` | IPv4 SOA queries sent. | + +-----------------+----------------------------------------------------+ + | ``SOAOutv6`` | IPv6 SOA queries sent. | + +-----------------+----------------------------------------------------+ + | ``AXFRReqv4`` | IPv4 AXFR requested. | + +-----------------+----------------------------------------------------+ + | ``AXFRReqv6`` | IPv6 AXFR requested. | + +-----------------+----------------------------------------------------+ + | ``IXFRReqv4`` | IPv4 IXFR requested. | + +-----------------+----------------------------------------------------+ + | ``IXFRReqv6`` | IPv6 IXFR requested. | + +-----------------+----------------------------------------------------+ + | ``XfrSuccess`` | Zone transfer requests succeeded. | + +-----------------+----------------------------------------------------+ + | ``XfrFail`` | Zone transfer requests failed. | + +-----------------+----------------------------------------------------+ + +.. _resolver_stats: + +Resolver Statistics Counters +^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + + +---------------------+-------------+-----------------------------------------+ + | *Symbol* | *BIND8 | *Description* | + | | Symbol* | | + +---------------------+-------------+-----------------------------------------+ + | ``Queryv4`` | ``SFwdQ`` | IPv4 queries sent. | + +---------------------+-------------+-----------------------------------------+ + | ``Queryv6`` | ``SFwdQ`` | IPv6 queries sent. | + +---------------------+-------------+-----------------------------------------+ + | ``Responsev4`` | ``RR`` | IPv4 responses received. | + +---------------------+-------------+-----------------------------------------+ + | ``Responsev6`` | ``RR`` | IPv6 responses received. | + +---------------------+-------------+-----------------------------------------+ + | ``NXDOMAIN`` | ``RNXD`` | NXDOMAIN received. | + +---------------------+-------------+-----------------------------------------+ + | ``SERVFAIL`` | ``RFail`` | SERVFAIL received. | + +---------------------+-------------+-----------------------------------------+ + | ``FORMERR`` | ``RFErr`` | FORMERR received. | + +---------------------+-------------+-----------------------------------------+ + | ``OtherError`` | ``RErr`` | Other errors received. | + +---------------------+-------------+-----------------------------------------+ + | ``EDNS0Fail`` | | EDNS(0) query failures. | + +---------------------+-------------+-----------------------------------------+ + | ``Mismatch`` | ``RDupR`` | Mismatch responses received. The DNS | + | | | ID, response's source address, and/or | + | | | the response's source port does not | + | | | match what was expected. (The port must | + | | | be 53 or as defined by the ``port`` | + | | | option.) This may be an indication of a | + | | | cache poisoning attempt. | + +---------------------+-------------+-----------------------------------------+ + | ``Truncated`` | | Truncated responses received. | + +---------------------+-------------+-----------------------------------------+ + | ``Lame`` | ``RLame`` | Lame delegations received. | + +---------------------+-------------+-----------------------------------------+ + | ``Retry`` | ``SDupQ`` | Query retries performed. | + +---------------------+-------------+-----------------------------------------+ + | ``QueryAbort`` | | Queries aborted due to quota control. | + +---------------------+-------------+-----------------------------------------+ + | ``QuerySockFail`` | | Failures in opening query sockets. One | + | | | common reason for such failures is a | + | | | failure of opening a new socket due to | + | | | a limitation on file descriptors. | + +---------------------+-------------+-----------------------------------------+ + | ``QueryTimeout`` | | Query timeouts. | + +---------------------+-------------+-----------------------------------------+ + | ``GlueFetchv4`` | ``SSysQ`` | IPv4 NS address fetches invoked. | + +---------------------+-------------+-----------------------------------------+ + | ``GlueFetchv6`` | ``SSysQ`` | IPv6 NS address fetches invoked. | + +---------------------+-------------+-----------------------------------------+ + | ``GlueFetchv4Fail`` | | IPv4 NS address fetch failed. | + +---------------------+-------------+-----------------------------------------+ + | ``GlueFetchv6Fail`` | | IPv6 NS address fetch failed. | + +---------------------+-------------+-----------------------------------------+ + | ``ValAttempt`` | | DNSSEC validation attempted. | + +---------------------+-------------+-----------------------------------------+ + | ``ValOk`` | | DNSSEC validation succeeded. | + +---------------------+-------------+-----------------------------------------+ + | ``ValNegOk`` | | DNSSEC validation on negative | + | | | information succeeded. | + +---------------------+-------------+-----------------------------------------+ + | ``ValFail`` | | DNSSEC validation failed. | + +---------------------+-------------+-----------------------------------------+ + | ``QryRTTnn`` | | Frequency table on round trip times | + | | | (RTTs) of queries. Each ``nn`` | + | | | specifies the corresponding frequency. | + | | | In the sequence of ``nn_1``, ``nn_2``, | + | | | ..., ``nn_m``, the value of ``nn_i`` is | + | | | the number of queries whose RTTs are | + | | | between ``nn_(i-1)`` (inclusive) and | + | | | ``nn_i`` (exclusive) milliseconds. For | + | | | the sake of convenience we define | + | | | ``nn_0`` to be 0. The last entry should | + | | | be represented as ``nn_m+``, which | + | | | means the number of queries whose RTTs | + | | | are equal to or over ``nn_m`` | + | | | milliseconds. | + +---------------------+-------------+-----------------------------------------+ + +.. _socket_stats: + +Socket I/O Statistics Counters +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +Socket I/O statistics counters are defined per socket types, which are +``UDP4`` (UDP/IPv4), ``UDP6`` (UDP/IPv6), ``TCP4`` (TCP/IPv4), ``TCP6`` +(TCP/IPv6), ``Unix`` (Unix Domain), and ``FDwatch`` (sockets opened +outside the socket module). In the following table ```` represents +a socket type. Not all counters are available for all socket types; +exceptions are noted in the description field. + + +----------------------+----------------------------------------------------+ + | *Symbol* | *Description* | + +----------------------+----------------------------------------------------+ + | ``Open`` | Sockets opened successfully. This counter is not | + | | applicable to the ``FDwatch`` type. | + +----------------------+----------------------------------------------------+ + | ``OpenFail`` | Failures of opening sockets. This counter is not | + | | applicable to the ``FDwatch`` type. | + +----------------------+----------------------------------------------------+ + | ``Close`` | Sockets closed. | + +----------------------+----------------------------------------------------+ + | ``BindFail`` | Failures of binding sockets. | + +----------------------+----------------------------------------------------+ + | ``ConnFail`` | Failures of connecting sockets. | + +----------------------+----------------------------------------------------+ + | ``Conn`` | Connections established successfully. | + +----------------------+----------------------------------------------------+ + | ``AcceptFail`` | Failures of accepting incoming connection | + | | requests. This counter is not applicable to the | + | | ``UDP`` and ``FDwatch`` types. | + +----------------------+----------------------------------------------------+ + | ``Accept`` | Incoming connections successfully accepted. This | + | | counter is not applicable to the ``UDP`` and | + | | ``FDwatch`` types. | + +----------------------+----------------------------------------------------+ + | ``SendErr`` | Errors in socket send operations. This counter | + | | corresponds to ``SErr`` counter of ``BIND`` 8. | + +----------------------+----------------------------------------------------+ + | ``RecvErr`` | Errors in socket receive operations. This includes | + | | errors of send operations on a connected UDP | + | | socket notified by an ICMP error message. | + +----------------------+----------------------------------------------------+ + +.. _bind8_compatibility: + +Compatibility with *BIND* 8 Counters +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +Most statistics counters that were available in ``BIND`` 8 are also +supported in ``BIND`` 9 as shown in the above tables. Here are notes +about other counters that do not appear in these tables. + +``RFwdR,SFwdR`` + These counters are not supported because ``BIND`` 9 does not adopt + the notion of *forwarding* as ``BIND`` 8 did. + +``RAXFR`` + This counter is accessible in the Incoming Queries section. + +``RIQ`` + This counter is accessible in the Incoming Requests section. + +``ROpts`` + This counter is not supported because ``BIND`` 9 does not care about + IP options in the first place. diff --git a/doc/arm/releaseinfo.xml.in b/doc/arm/releaseinfo.xml.in deleted file mode 100644 index fa7a3cd58c..0000000000 --- a/doc/arm/releaseinfo.xml.in +++ /dev/null @@ -1,12 +0,0 @@ - - -BIND Version @BIND9_VERSION@ diff --git a/doc/arm/requirements.rst b/doc/arm/requirements.rst new file mode 100644 index 0000000000..dfa6d17e72 --- /dev/null +++ b/doc/arm/requirements.rst @@ -0,0 +1,90 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. Requirements: + +BIND Resource Requirements +========================== + +.. _hw_req: + +Hardware Requirements +--------------------- + +DNS hardware requirements have traditionally been quite modest. For many +installations, servers that have been pensioned off from active duty +have performed admirably as DNS servers. + +The DNSSEC features of BIND 9 may prove to be quite CPU intensive +however, so organizations that make heavy use of these features may wish +to consider larger systems for these applications. BIND 9 is fully +multithreaded, allowing full utilization of multiprocessor systems for +installations that need it. + +.. _cpu_req: + +CPU Requirements +---------------- + +CPU requirements for BIND 9 range from i386-class machines for serving +of static zones without caching, to enterprise-class machines if you +intend to process many dynamic updates and DNSSEC signed zones, serving +many thousands of queries per second. + +.. _mem_req: + +Memory Requirements +------------------- + +The memory of the server has to be large enough to fit the cache and +zones loaded off disk. The ``max-cache-size`` option can be used to +limit the amount of memory used by the cache, at the expense of reducing +cache hit rates and causing more DNS traffic. It is still good practice +to have enough memory to load all zone and cache data into memory — +unfortunately, the best way to determine this for a given installation +is to watch the name server in operation. After a few weeks the server +process should reach a relatively stable size where entries are expiring +from the cache as fast as they are being inserted. + +.. _intensive_env: + +Name Server Intensive Environment Issues +---------------------------------------- + +For name server intensive environments, there are two alternative +configurations that may be used. The first is where clients and any +second-level internal name servers query a main name server, which has +enough memory to build a large cache. This approach minimizes the +bandwidth used by external name lookups. The second alternative is to +set up second-level internal name servers to make queries independently. +In this configuration, none of the individual machines needs to have as +much memory or CPU power as in the first alternative, but this has the +disadvantage of making many more external queries, as none of the name +servers share their cached data. + +.. _supported_os: + +Supported Operating Systems +--------------------------- + +ISC BIND 9 compiles and runs on a large number of Unix-like operating +systems and on Microsoft Windows Server 2012 R2, 2016 and Windows 10. +For an up-to-date list of supported systems, see the PLATFORMS.md file +in the top level directory of the BIND 9 source distribution. diff --git a/doc/arm/security.rst b/doc/arm/security.rst new file mode 100644 index 0000000000..015604c26f --- /dev/null +++ b/doc/arm/security.rst @@ -0,0 +1,237 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. Security: + +BIND 9 Security Considerations +============================== + +.. _Access_Control_Lists: + +Access Control Lists +-------------------- + +Access Control Lists (ACLs) are address match lists that you can set up +and nickname for future use in ``allow-notify``, ``allow-query``, +``allow-query-on``, ``allow-recursion``, ``blackhole``, +``allow-transfer``, ``match-clients``, etc. + +Using ACLs allows you to have finer control over who can access your +name server, without cluttering up your config files with huge lists of +IP addresses. + +It is a *good idea* to use ACLs, and to control access to your server. +Limiting access to your server by outside parties can help prevent +spoofing and denial of service (DoS) attacks against your server. + +ACLs match clients on the basis of up to three characteristics: 1) The +client's IP address; 2) the TSIG or SIG(0) key that was used to sign the +request, if any; and 3) an address prefix encoded in an EDNS Client +Subnet option, if any. + +Here is an example of ACLs based on client addresses: + +:: + + // Set up an ACL named "bogusnets" that will block + // RFC1918 space and some reserved space, which is + // commonly used in spoofing attacks. + acl bogusnets { + 0.0.0.0/8; 192.0.2.0/24; 224.0.0.0/3; + 10.0.0.0/8; 172.16.0.0/12; 192.168.0.0/16; + }; + + // Set up an ACL called our-nets. Replace this with the + // real IP numbers. + acl our-nets { x.x.x.x/24; x.x.x.x/21; }; + options { + ... + ... + allow-query { our-nets; }; + allow-recursion { our-nets; }; + ... + blackhole { bogusnets; }; + ... + }; + + zone "example.com" { + type master; + file "m/example.com"; + allow-query { any; }; + }; + +This allows authoritative queries for "example.com" from any address, +but recursive queries only from the networks specified in "our-nets", +and no queries at all from the networks specified in "bogusnets". + +In addition to network addresses and prefixes, which are matched against +the source address of the DNS request, ACLs may include ``key`` +elements, which specify the name of a TSIG or SIG(0) key. + +When BIND 9 is built with GeoIP support, ACLs can also be used for +geographic access restrictions. This is done by specifying an ACL +element of the form: ``geoip db database field value`` + +The ``field`` indicates which field to search for a match. Available fields +are "country", "region", "city", "continent", "postal" (postal code), +"metro" (metro code), "area" (area code), "tz" (timezone), "isp", +"asnum", and "domain". + +``value`` is the value to search for within the database. A string may be quoted +if it contains spaces or other special characters. An "asnum" search for +autonomous system number can be specified using the string "ASNNNN" or the +integer NNNN. When "country" search is specified with a string is two characters +long, then it must be a standard ISO-3166-1 two-letter country code; otherwise +it is interpreted as the full name of the country. Similarly, if this is a +"region" search and the string is two characters long, then it treated as a +standard two-letter state or province abbreviation; otherwise it treated as the +full name of the state or province. + +The ``database`` field indicates which GeoIP database to search for a match. In +most cases this is unnecessary, because most search fields can only be found in +a single database. However, searches for "continent" or "country" can be +answered from either the "city" or "country" databases, so for these search +types, specifying a ``database`` will force the query to be answered from that +database and no other. If ``database`` is not specified, then these queries +will be answered from the "city", database if it is installed, or the "country" +database if it is installed, in that order. Valid database names are "country", +"city", "asnum", "isp", and "domain". + +Some example GeoIP ACLs: + +:: + + geoip country US; + geoip country JP; + geoip db country country Canada; + geoip region WA; + geoip city "San Francisco"; + geoip region Oklahoma; + geoip postal 95062; + geoip tz "America/Los_Angeles"; + geoip org "Internet Systems Consortium"; + +ACLs use a "first-match" logic rather than "best-match": if an address +prefix matches an ACL element, then that ACL is considered to have +matched even if a later element would have matched more specifically. +For example, the ACL ``{ 10/8; !10.0.0.1; }`` would actually match a +query from 10.0.0.1, because the first element indicated that the query +should be accepted, and the second element is ignored. + +When using "nested" ACLs (that is, ACLs included or referenced within +other ACLs), a negative match of a nested ACL will the containing ACL to +continue looking for matches. This enables complex ACLs to be +constructed, in which multiple client characteristics can be checked at +the same time. For example, to construct an ACL which allows queries +only when it originates from a particular network *and* only when it is +signed with a particular key, use: + +:: + + allow-query { !{ !10/8; any; }; key example; }; + +Within the nested ACL, any address that is *not* in the 10/8 network +prefix will be rejected, and this will terminate processing of the ACL. +Any address that *is* in the 10/8 network prefix will be accepted, but +this causes a negative match of the nested ACL, so the containing ACL +continues processing. The query will then be accepted if it is signed by +the key "example", and rejected otherwise. The ACL, then, will only +matches when *both* conditions are true. + +.. _chroot_and_setuid: + +``Chroot`` and ``Setuid`` +------------------------- + +On UNIX servers, it is possible to run BIND in a *chrooted* environment +(using the ``chroot()`` function) by specifying the ``-t`` option for +``named``. This can help improve system security by placing BIND in a +"sandbox", which will limit the damage done if a server is compromised. + +Another useful feature in the UNIX version of BIND is the ability to run +the daemon as an unprivileged user ( ``-u`` user ). We suggest running +as an unprivileged user when using the ``chroot`` feature. + +Here is an example command line to load BIND in a ``chroot`` sandbox, +``/var/named``, and to run ``named`` ``setuid`` to user 202: + +``/usr/local/sbin/named -u 202 -t /var/named`` + +.. _chroot: + +The ``chroot`` Environment +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +In order for a ``chroot`` environment to work properly in a particular +directory (for example, ``/var/named``), you will need to set up an +environment that includes everything BIND needs to run. From BIND's +point of view, ``/var/named`` is the root of the filesystem. You will +need to adjust the values of options like ``directory`` and ``pid-file`` +to account for this. + +Unlike with earlier versions of BIND, you typically will *not* need to +compile ``named`` statically nor install shared libraries under the new +root. However, depending on your operating system, you may need to set +up things like ``/dev/zero``, ``/dev/random``, ``/dev/log``, and +``/etc/localtime``. + +.. _setuid: + +Using the ``setuid`` Function +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Prior to running the ``named`` daemon, use the ``touch`` utility (to +change file access and modification times) or the ``chown`` utility (to +set the user id and/or group id) on files to which you want BIND to +write. + +.. note:: + + If the ``named`` daemon is running as an unprivileged user, it will + not be able to bind to new restricted ports if the server is + reloaded. + +.. _dynamic_update_security: + +Dynamic Update Security +----------------------- + +Access to the dynamic update facility should be strictly limited. In +earlier versions of BIND, the only way to do this was based on the IP +address of the host requesting the update, by listing an IP address or +network prefix in the ``allow-update`` zone option. This method is +insecure since the source address of the update UDP packet is easily +forged. Also note that if the IP addresses allowed by the +``allow-update`` option include the address of a slave server which +performs forwarding of dynamic updates, the master can be trivially +attacked by sending the update to the slave, which will forward it to +the master with its own source IP address causing the master to approve +it without question. + +For these reasons, we strongly recommend that updates be +cryptographically authenticated by means of transaction signatures +(TSIG). That is, the ``allow-update`` option should list only TSIG key +names, not IP addresses or network prefixes. Alternatively, the new +``update-policy`` option can be used. + +Some sites choose to keep all dynamically-updated DNS data in a +subdomain and delegate that subdomain to a separate zone. This way, the +top-level zone containing critical data such as the IP addresses of +public web and mail servers need not allow dynamic update at all. diff --git a/doc/arm/server.grammar.xml b/doc/arm/server.grammar.xml deleted file mode 100644 index acec1e6c1d..0000000000 --- a/doc/arm/server.grammar.xml +++ /dev/null @@ -1,47 +0,0 @@ - - - - - -server netprefix { - bogus boolean; - edns boolean; - edns-udp-size integer; - edns-version integer; - keys server_key; - max-udp-size integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] - [ dscp integer ]; - padding integer; - provide-ixfr boolean; - query-source ( ( [ address ] ( ipv4_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( - integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] - port ( integer | * ) ) ) [ dscp integer ]; - request-expire boolean; - request-ixfr boolean; - request-nsid boolean; - send-cookie boolean; - tcp-keepalive boolean; - tcp-only boolean; - transfer-format ( many-answers | one-answer ); - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ - dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) - ] [ dscp integer ]; - transfers integer; -}; - diff --git a/doc/arm/slave.zoneopt.xml b/doc/arm/slave.zoneopt.xml deleted file mode 100644 index e78f296119..0000000000 --- a/doc/arm/slave.zoneopt.xml +++ /dev/null @@ -1,74 +0,0 @@ - - - - -zone string [ class ] { - type ( slave | secondary ); - allow-notify { address_match_element; ... }; - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - allow-transfer { address_match_element; ... }; - allow-update-forwarding { address_match_element; ... }; - also-notify [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... }; - alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - auto-dnssec ( allow | maintain | off ); - check-names ( fail | warn | ignore ); - database string; - dialup ( notify | notify-passive | passive | refresh | boolean ); - dlz string; - dnskey-sig-validity integer; - dnssec-dnskey-kskonly boolean; - dnssec-loadkeys-interval integer; - dnssec-policy string; - dnssec-update-mode ( maintain | no-resign ); - file quoted_string; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - inline-signing boolean; - ixfr-from-differences boolean; - journal quoted_string; - key-directory quoted_string; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... }; - max-journal-size ( default | unlimited | sizeval ); - max-records integer; - max-refresh-time integer; - max-retry-time integer; - max-transfer-idle-in integer; - max-transfer-idle-out integer; - max-transfer-time-in integer; - max-transfer-time-out integer; - min-refresh-time integer; - min-retry-time integer; - multi-master boolean; - notify ( explicit | master-only | boolean ); - notify-delay integer; - notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - notify-to-soa boolean; - request-expire boolean; - request-ixfr boolean; - sig-signing-nodes integer; - sig-signing-signatures integer; - sig-signing-type integer; - sig-validity-interval integer [ integer ]; - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - try-tcp-refresh boolean; - update-check-ksk boolean; - use-alt-transfer-source boolean; - zero-no-soa-ttl boolean; - zone-statistics ( full | terse | none | boolean ); -}; - diff --git a/doc/arm/static-stub.zoneopt.xml b/doc/arm/static-stub.zoneopt.xml deleted file mode 100644 index beb1f10562..0000000000 --- a/doc/arm/static-stub.zoneopt.xml +++ /dev/null @@ -1,25 +0,0 @@ - - - - -zone string [ class ] { - type static-stub; - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - max-records integer; - server-addresses { ( ipv4_address | ipv6_address ); ... }; - server-names { string; ... }; - zone-statistics ( full | terse | none | boolean ); -}; - diff --git a/doc/arm/statistics-channels.grammar.xml b/doc/arm/statistics-channels.grammar.xml deleted file mode 100644 index d2c381d439..0000000000 --- a/doc/arm/statistics-channels.grammar.xml +++ /dev/null @@ -1,21 +0,0 @@ - - - - - -statistics-channels { - inet ( ipv4_address | ipv6_address | - * ) [ port ( integer | * ) ] [ - allow { address_match_element; ... - } ]; -}; - diff --git a/doc/arm/stub.zoneopt.xml b/doc/arm/stub.zoneopt.xml deleted file mode 100644 index 7365ece526..0000000000 --- a/doc/arm/stub.zoneopt.xml +++ /dev/null @@ -1,41 +0,0 @@ - - - - -zone string [ class ] { - type stub; - allow-query { address_match_element; ... }; - allow-query-on { address_match_element; ... }; - check-names ( fail | warn | ignore ); - database string; - delegation-only boolean; - dialup ( notify | notify-passive | passive | refresh | boolean ); - file quoted_string; - forward ( first | only ); - forwarders [ port integer ] [ dscp integer ] { ( ipv4_address | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; - masterfile-format ( map | raw | text ); - masterfile-style ( full | relative ); - masters [ port integer ] [ dscp integer ] { ( masters | ipv4_address [ port integer ] | ipv6_address [ port integer ] ) [ key string ]; ... }; - max-records integer; - max-refresh-time integer; - max-retry-time integer; - max-transfer-idle-in integer; - max-transfer-time-in integer; - min-refresh-time integer; - min-retry-time integer; - multi-master boolean; - transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] [ dscp integer ]; - use-alt-transfer-source boolean; - zone-statistics ( full | terse | none | boolean ); -}; - diff --git a/doc/arm/troubleshooting.rst b/doc/arm/troubleshooting.rst new file mode 100644 index 0000000000..e7d82a3cbe --- /dev/null +++ b/doc/arm/troubleshooting.rst @@ -0,0 +1,106 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. Troubleshooting: + +Troubleshooting +=============== + +.. _common_problems: + +Common Problems +--------------- + +It's not working; how can I figure out what's wrong? +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +The best solution to solving installation and configuration issues is to +take preventative measures by setting up logging files beforehand. The +log files provide a source of hints and information that can be used to +figure out what went wrong and how to fix the problem. + +EDNS compliance issues +~~~~~~~~~~~~~~~~~~~~~~ + +EDNS (Extended DNS) is a standard that was first specified in 1999. It +is required for DNSSEC validation, DNS COOKIE options, and other +features. There are broken and outdated DNS servers and firewalls still +in use which misbehave when queried with EDNS; for example, they may +drop EDNS queries rather than replying with FORMERR. BIND and other +recursive name servers have traditionally employed workarounds in this +situation, retrying queries in different ways and eventually falling +back to plain DNS queries without EDNS. + +Such workarounds cause unnecessary resolution delays, increase code +complexity, and prevent deployment of new DNS features. As of February +2019, all major DNS software vendors have agreed to remove these +workarounds; see https://dnsflagday.net for further details. This change +was implemented in BIND as of release 9.14.0. + +As a result, some domains may be non-resolvable without manual +intervention. In these cases, resolution can be restored by adding +``server`` clauses for the offending servers, specifying ``edns no`` or +``send-cookie no``, depending on the specific noncompliance. + +To determine which ``server`` clause to use, run the following commands +to send queries to the authoritative servers for the broken domain: + +:: + + dig soa @ +dnssec + dig soa @ +dnssec +nocookie + dig soa @ +noedns + + +If the first command fails but the second succeeds, the server most +likely needs ``send-cookie no``. If the first two fail but the third +succeeds, then the server needs EDNS to be fully disabled with +``edns no``. + +Please contact the administrators of noncompliant domains and encourage +them to upgrade their broken DNS servers. + +Incrementing and Changing the Serial Number +------------------------------------------- + +Zone serial numbers are just numbers — they aren't date related. A lot +of people set them to a number that represents a date, usually of the +form YYYYMMDDRR. Occasionally they will make a mistake and set them to a +"date in the future" then try to correct them by setting them to the +"current date". This causes problems because serial numbers are used to +indicate that a zone has been updated. If the serial number on the slave +server is lower than the serial number on the master, the slave server +will attempt to update its copy of the zone. + +Setting the serial number to a lower number on the master server than +the slave server means that the slave will not perform updates to its +copy of the zone. + +The solution to this is to add 2147483647 (2^31-1) to the number, reload +the zone and make sure all slaves have updated to the new zone serial +number, then reset the number to what you want it to be, and reload the +zone again. + +.. _more_help: + +Where Can I Get Help? +--------------------- +The BIND-users mailing list at lists.isc.org is an excellent resource for +peer user support. In addition, ISC maintains a library of helpful articles +at https://kb.isc.org. + +The Internet Systems Consortium (ISC) offers annual support agreements +for BIND, ISC DHCP and Kea. Four levels of premium support are available. +Each level includes advance security notifications. The higher levels include +greater service level agreements (SLAs), and increased priority on bug fixes +and non-funded feature requests. + +To discuss arrangements for support, contact info@isc.org or visit the +ISC web page at https://www.isc.org/support/ to read more. diff --git a/doc/arm/trust-anchors.grammar.xml b/doc/arm/trust-anchors.grammar.xml deleted file mode 100644 index d25fd5dd44..0000000000 --- a/doc/arm/trust-anchors.grammar.xml +++ /dev/null @@ -1,19 +0,0 @@ - - - - - -trust-anchors { string ( static-key | - initial-key | static-ds | initial-ds ) - integer integer integer - quoted_string; ... }; - diff --git a/doc/arm/trusted-keys.grammar.xml b/doc/arm/trusted-keys.grammar.xml deleted file mode 100644 index 82a502dff0..0000000000 --- a/doc/arm/trusted-keys.grammar.xml +++ /dev/null @@ -1,18 +0,0 @@ - - - - - -trusted-keys { string integer - integer integer - quoted_string; ... }; deprecated - diff --git a/doc/dev/coding.html b/doc/dev/coding.html deleted file mode 100644 index 11a79382ab..0000000000 --- a/doc/dev/coding.html +++ /dev/null @@ -1,558 +0,0 @@ - - -

C Language

- -An ANSI standard C compiler and library are assumed. Feel free to use any -ANSI C feature.

- -

Warnings

-Given a reasonable set of things to warn about (e.g. -W -Wall for gcc), the -goal is to compile with no warnings. - -

C Source Code

- -

Copyright

- -All source files should have a copyright. The copyright year(s) -should be kept current. The files and the copyright year(s) should be -listed in util/copyrights.

- -

Line Formatting

-

Indentation

-Use tabs. Spaces are only allowed when needed to line up a continued -expression. In the following example, spaces used for indentation are -indicated with "_": -

-	printf("this is going to be %s very long %s statement\n",
-	_______"a", "printf");
-
- -

Vertical Whitespace

-Vertical whitespace is also encouraged for improved code legibility by -grouping closely related statements and then separating them with a -single empty line. There should not, however, be more than one empty -adjacent line anywhere. - -

Line Length

-Lines should not be longer than 79 characters, even if it requires -violating the indentation rules to do so. Since ANSI is assumed, the -best way to deal with strings that extend past column 79 is to break -them into two or more sections separated from each other by a newline -and indentation: - -

-        			  puts("This string got very far to the "
-                                       "left and wrapped.  ANSI catenation "
-                                       "rules will turn this into one "
-                                       "long string.");
-
- -

Comments

-Comments should be used anytime they improve the readability of the code.

- -Comments may be single-line or multiline. A single-line comment should be -at the end of the line if there is other text on the line, and should start -in the same column as other nearby end-of-line comments. The comment -should be at the same indentation level as the text it is referring to. -Multiline comments should start with "/*" on a line by itself. Subsequent -lines should have " *" lined-up with the "*" above. The end of the comment -should be " */" on a line by itself, again with the "*" lined-up with the -one above. Comments should start with a capital letter and end with a -period.

-Good:

-


-	/*
-	 * Private variables.
-	 */
-
-	static int		a		/* Description of 'a'. */
-	static int		b		/* Description of 'b'. */
-	static char *		c		/* Description of 'c'. */
-
- -The following lint and lint-like comments should be used where appropriate: -

-	/* ARGSUSED */
-	/* FALLTHROUGH */
-	/* NOTREACHED */
-	/* VARARGS */
-
- -

.h files

-.h files should not rely on other files having been included. .h -files should prevent multiple inclusion. The OS is assumed to prevent -multiple inclusion of its .h files.

-.h files that define modules should have a structure like the -following. Note that <isc/lang.h> should be included by any public -header file to get the ISC_LANG_BEGINDECLS and ISC_LANG_ENDDECLS -macros used so the correct name-mangling happens for function -declarations when C++ programs include the file. <isc/lang.h> should -be included for private header files or for public files that do not -declare any functions.

-


-/*
- * Copyright (C) 1996-2016  Internet Systems Consortium, Inc. ("ISC")
- *
- * This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/.
- */
-
-#ifndef ISC_WHATEVER_H
-#define ISC_WHATEVER_H 1
-
-/*****
- ***** Module Info
- *****/
-
-/*
- * (Module name here.)
- *
- * (One line description here.)
- *
- * (Extended description and notes here.)
- *
- * MP:
- *	(Information about multiprocessing considerations here, e.g. locking
- *	 requirements.)
- *
- * Reliability:
- *	(Any reliability concerns should be mentioned here.)
- *
- * Resources:
- *	(A rough guide to how resources are used by this module.)
- *
- * Security:
- *	(Any security issues are discussed here.)
- *
- * Standards:
- *	(Any standards relevant to the module are listed here.)
- */
-
-/***
- *** Imports
- ***/
-
-/* #includes here. */
-#include <isc/lang.h>
-
-/***
- *** Types
- ***/
-
-/* (Type definitions here.) */
-
-/***
- *** Functions
- ***/
-ISC_LANG_BEGINDECLS
-/* (Function declarations here, with full prototypes.) */
-ISC_LANG_ENDDECLS
-
-#endif /* ISC_WHATEVER_H */
-
-
- -

C Source

-

Including Interfaces (.h files)

-The first file to be included in a C source file must be config.h. -The config.h file must never be included by any public header file -(that is, any header file that will be installed by "make install"). -Try to include only necessary files, not everything under the sun.

-Operating-system-specific files should not be included by most modules.

-Include UNIX "sys" .h files before ordinary C includes.

- -

Statements

-There should be at most one statement per line. The comma operator -should not be used to form compound statements.

-Bad:

-


-	if (i > 0) {
-		printf("yes\n"); i = 0; j = 0;
-                x = 4, y *= 2;
-	}
-
-

Functions

-The use of ANSI C function prototypes is required.

-The return type of the function should be listed on a line by itself when -specifying the implementation of the function. The opening curly brace should -occur on the same line as the argument list, unless the argument list is -more than one line long.

-Good:

-


-static inline void
-f(int i) {
-	/* whatever */
-}
-
-int
-g(int i, /* other args here */
-  int last_argument)
-{
-	return (i * i);
-}
-
- -To suppress compiler warnings, unused function arguments are declared -using the UNUSED() macro.

- -In the function body, local variable declarations are followed by any -REQUIRE()s, UNUSED() declarations, and other -code, in this order. These sections are separated by blank lines.

- -

Curly Braces

-Curly Braces do not get their own indentation. -An opening brace does not start a new line. The statements enclosed -by the braces should not be on the same line as the opening or closing -brace. A closing brace should be the only thing on the line, unless -it's part of an else clause.

- -Generally speaking, when a control statement (if, for or -while) has only a single action associated with it, then no -bracing is used around the statement. Exceptions include when the -compiler would complain about an ambiguous else clause, or when extra -bracing improves the readability (a judgement call biased toward not -having the braces).

- -Good:

-


-static void
-f(int i) {
-	if (i > 0) {
-		printf("yes\n");
-		i = 0;
-	} else
-		printf("no\n");
-}
-
-Bad:

-


-void f(int i)
-  {
-    if(i<0){i=0;printf("was negative\n");}
-    if (i > 0)
-      {
-        printf("yes\n");
-        i = 0;
-      }}
-
- -

Spaces

-
    -
  • Do put a space between operators like '=', '+', '==', etc. -
  • Do put a space after ','. -
  • Do put a space after ';' in a 'for' statement. -
  • Do put a space after 'return', and also parenthesize the return value. -
-
    -
  • Do not put a space between a variable or function name and '(' or '['. -
  • Do not put a space after the "sizeof" operator name, and also -parenthesize its argument, as in malloc(4 * sizeof(long)). -
  • Do not put a space immediately after a '(' or immediately before a ')', -unless it improves readability. The same goes for '[' and ']'. -
  • Do not put a space before '++' or '--' when used in -post-increment/decrement mode, or after them when used in -pre-increment/decrement mode. -
  • Do not put a space before ';' when terminating a statement or in a 'for' -statement. -
  • Do not put a space after '*' when used to dereference a pointer, or on -either side of '->'. -
  • Do not put a space after '~'. -
  • The '|' operator may either have a space on both sides or it may have no -spaces. -
  • Do not put a space after a cast. -
- -

Return Values

-If a function returns a value, it should be cast to (void) if you don't -care what the value is, except for printf and its variants, -fputc, fwrite (when writing text), -fflush, -memcpy, memmove, memset, -strcpy, strncpy, and strcat. -

- -Certain functions return values or not depending on the operating -system or even compiler flags; these include -these include openlog and srandom. -The return value of these should not be used nor cast to (void). -

- -All error conditions must be handled.

- -Mixing of error status and valid results within a single type should be -avoided.

-Good: -


-	os_descriptor_t		s;
-	os_result_t		result;
-
-	result = os_socket_create(AF_INET, SOCK_STREAM, 0, &s);
-	if (result != OS_R_SUCCESS) {
-		/* Do something about the error. */
-		return;
-	}
-
-Not so good: -

-	int s;
-
-	/*
-	 * Obviously using interfaces like socket() (below) is allowed
-	 * since otherwise you couldn't call operating system routines; the
-	 * point is not to write more interfaces like them.
-	 */
-	s = socket(AF_INET, SOCK_STREAM, 0);
-	if (s < 0) {
-		/* Do something about the error using errno. */
-		return;
-	}
-
- -

Integral Types

-Careful thought should be given to whether an integral type should be -signed or unsigned, and to whether a specific size is required. "int" -should be used for generic variables (e.g. iteration counters, array -subscripts). Other than for generic variables, if a negative value isn't -meaningful, the variable should be unsigned. Assignments and -comparisons between signed and unsigned integers should be avoided; -suppressing the warnings with casts is not desirable.

- -

Casting

-Casting should be avoided when possible. When it is necessary, there -should be no space between the cast and what is being cast.

- -Bad (obviously for more than one reason ...): -


-	(void) malloc(SMBUF);
-
- -

Clear Success or Failure

-A function should report success or failure, and do so accurately. It -should never fail silently. Use of Design by Contract can help here.

- -When a function is designed to return results to the caller by -assigning to caller variables through pointer arguments, it should -perform the assignment only if it succeeds and leave the variables -unmodified if it fails.

- -

Testing Bits

-Bit testing should be as follows:

-Good: -


-	/* Test if flag set. */
-	if ((flags & FOO) != 0) {
-
-	}
-	/* Test if flag clear. */
-	if ((flags & BAR) == 0) {
-
-	}
-	/* Test if both flags set. */
-	if ((flags & (FOO|BAR)) == (FOO|BAR)) {
-
-	}
-
-Bad: -

-	/* Test if flag set. */
-	if (flags & FOO) {
-
-	}
-	/* Test if flag clear. */
-	if (! (flags & BAR)) {
-
-	}
-
- -

Pointers

-
Null Pointer
-The null pointer value should be referred to with "NULL", not with "0". -Testing to see whether a pointer is NULL should be explicit.

-Good: -


-	char *c = NULL;
-
-	/* ... */
-
-	if (c == NULL) {
-		/* Do something. */
-	}
-
- -
Invalidating Pointers
-When the data a pointer points to has been freed, or is otherwise no longer -valid, the pointer should be set to NULL unless the pointer is part of a -structure which is itself going to be freed immediately.

-Good: -


-	char *text;
-
-	/* text is initialized here. */
-
-	free(text);
-	text = NULL;
-
- -

Testing for Zero or Non-zero

-Explicit testing against zero is required for numeric, non-boolean variables. -

-Good: -


-	int i = 10;
-
-	/* ... */
-
-	if (i != 0) {
-		/* Do something. */
-	}
-
-Bad: -

-	int i = 10;
-
-	/* ... */
-
-	if (i) {
-		/* Do something. */
-	}
-
- -

The Ternary Operator

-The ?: operator should mostly be avoided. It is tolerated when -deciding what value to pass as a parameter to a function, such as -frequently happens with printf, and also when a simple (non-compound) -value is being used in assignment or as part of a calculation. -In particular, using the ternary operator to specify a return value is -verboten.

- -Good: -


-	printf("%c is%s a number.\n", c, isdigit(c) ? "" " NOT");
-        l = (l1 < l2) ? l1 : l2;
-        if (gp.length + (go < 16384 ? 2 : 3) >= name->length) {
-           ...
-        }
-
- -Bad: -

-	return (success ? ISC_R_SUCESS : ISC_R_FAILURE);
-
- -

Assignment in Parameters

-Variables should not have their values assigned or changed when being -passed as parameters, except perhaps for the increment and decrement -operators.

- -Bad: -


-	malloc(size = 20);
-
- -Ok: -

-	fputc(c++, stdout);
-
- -

Namespace

-

Public Interfaces

-All public interfaces to functions, macros, typedefs, and -variables provided by the library, should use names of the form -{library}_{module}_{what}, such as: -

-	isc_buffer_t				/* typedef */
-        dns_name_setbuffer(name, buffer)	/* function */
-        ISC_LIST_HEAD(list)			/* macro */
-        isc_commandline_argument		/* variable */
-
-however, structures which are typedef'd generally have the name of the -typedef sans the final _t: -

-	struct dns_rbtnode {
-        	/* ... members ... */
-	}
-
-Generally speaking macros are defined with all capital letters, but -this is not universally consistent (eg, numerous isc_buffer_{foo} -macros).

-The {module} and {what} segments of the name do not have underscores -separating natural word elements, as demonstrated in -isc_commandline_argument and dns_name_setbuffer above. The {module} -part is usually the same as the basename of the source file, but -sometimes other {module} interfaces appear within one file, such as -dns_label_* interfaces in lib/dns/name.c. However, in the public -libraries the file name must be the same as some module interface -provided by the file; e.g., dns_rbt_* interfaces would not be declared -in a file named redblack.c (in lieu of any other dns_redblack_* -interfaces in the file).

- -The one notable exception to this naming rule is the interfaces -provided by <isc/util.h>. There's a large caveat associated with the -public description of this file that it is hazardous to use because it -pollutes the general namespace.

- -

Shared Private Interfaces

-When a module provides an interface for internal use by other modules -in the library, it should use the same naming convention -described for the public interfaces, except {library} and {module} -are separated by a double-underscore. This indicates that the name is -internal, its API is not as formal as the public API, and thus it -might change without any sort of notice. - -

Initialization

-When an object is allocated from the heap, all fields in the object must be -initialized.

- -

Dead Code Pruning

-Source which becomes obsolete should be removed, not just disabled with -#if 0 ... #endif.

- -

Log messages

- -Error and warning messages should be logged through the logging -system. Debugging printfs may be used during development, but -must be removed when the debugging is finished. The -UNEXPECTED_ERROR() macro is obsolete and -should not be used in new code.

- -Log messages do not start with a capital letter, nor do they end -in a period.

- -When variable text such as a file name or domain name occurs -as part of an English phrase, it should be enclosed in single -quotes, as in "zone '%s' is lame".

- -When the variable text forms a separate phrase, such as when it -separated from the rest of the message by a colon, it can be left -unquoted. E.g., isc_log_write(... "open: %s: %s", filename, -isc_result_totext(result));

- -Function names, line numbers, memory addresses, and other references -to program internals may be used in debugging messages and in -messages to report programming errors detected at runtime. -They may not be used in messages that indicate errors in the -program's inputs or operation.

- -

Perl source code

- -Perl must not be required for building, installing, or using the BIND 9 -name server. It may be used for things like test scripts and optional -server add-on components.

- -Perl 5 is assumed; Perl scripts do not need to work in Perl 4.

- -Perl source code should follow the conventions for C source code -where applicable.

- - - diff --git a/doc/doxygen/isc-footer.html b/doc/doxygen/isc-footer.html deleted file mode 100644 index 1017636930..0000000000 --- a/doc/doxygen/isc-footer.html +++ /dev/null @@ -1,19 +0,0 @@ - - -


-
- - Generated on $datetime by Doxygen $doxygenversion for $projectname $projectnumber - -
- - diff --git a/doc/doxygen/isc-header.html b/doc/doxygen/isc-header.html deleted file mode 100644 index a8d5cc6662..0000000000 --- a/doc/doxygen/isc-header.html +++ /dev/null @@ -1,19 +0,0 @@ - - - - - - $title - - - - diff --git a/doc/man/.gitignore b/doc/man/.gitignore new file mode 100644 index 0000000000..cd519dabab --- /dev/null +++ b/doc/man/.gitignore @@ -0,0 +1,5 @@ +/_build/ +/*.1 +/*.5 +/*.8 +/manpages.stamp diff --git a/doc/man/Makefile.am b/doc/man/Makefile.am new file mode 100644 index 0000000000..eb31281d0d --- /dev/null +++ b/doc/man/Makefile.am @@ -0,0 +1,165 @@ +include $(top_srcdir)/Makefile.top +include $(top_srcdir)/Makefile.docs + +MANPAGES_RST = \ + arpaname.rst \ + ddns-confgen.rst \ + delv.rst \ + dig.rst \ + dnssec-cds.rst \ + dnssec-dsfromkey.rst \ + dnssec-importkey.rst \ + dnssec-keyfromlabel.rst \ + dnssec-keygen.rst \ + dnssec-revoke.rst \ + dnssec-settime.rst \ + dnssec-signzone.rst \ + dnssec-verify.rst \ + dnstap-read.rst \ + filter-aaaa.rst \ + host.rst \ + mdig.rst \ + named-checkconf.rst \ + named-checkzone.rst \ + named-journalprint.rst \ + named-nzd2nzf.rst \ + named-rrchecker.rst \ + named.conf.rst \ + named.rst \ + nsec3hash.rst \ + nslookup.rst \ + nsupdate.rst \ + pkcs11-destroy.rst \ + pkcs11-keygen.rst \ + pkcs11-list.rst \ + pkcs11-tokens.rst \ + rndc-confgen.rst \ + rndc.conf.rst \ + rndc.rst + +man_MANS = \ + arpaname.1 \ + delv.1 \ + dig.1 \ + dnstap-read.1 \ + host.1 \ + mdig.1 \ + named-rrchecker.1 \ + nslookup.1 \ + nsupdate.1 \ + named.conf.5 \ + rndc.conf.5 \ + ddns-confgen.8 \ + dnssec-cds.8 \ + dnssec-dsfromkey.8 \ + dnssec-importkey.8 \ + dnssec-keyfromlabel.8 \ + dnssec-keygen.8 \ + dnssec-revoke.8 \ + dnssec-settime.8 \ + dnssec-signzone.8 \ + dnssec-verify.8 \ + filter-aaaa.8 \ + named-checkconf.8 \ + named-checkzone.8 \ + named-journalprint.8 \ + named-nzd2nzf.8 \ + named.8 \ + nsec3hash.8 \ + rndc-confgen.8 \ + rndc.8 + +if HAVE_PKCS11 +man_MANS += \ + pkcs11-destroy.8 \ + pkcs11-keygen.8 \ + pkcs11-list.8 \ + pkcs11-tokens.8 +endif HAVE_PKCS11 + +MANPAGES_IN = \ + $(man_MANS:=in) + +EXTRA_DIST = \ + conf.py \ + $(MANPAGES_RST) \ + $(MANPAGES_IN) + +MAINTAINERCLEANFILES = \ + $(MANPAGES_IN) + +CLEANFILES = \ + $(man_MANS) \ + manpages.stamp + +# +# Build rules for pre-generated manpages +# + +man_SUBST = \ + $(AM_V_SED)$(SED) \ + -e 's,[@]PACKAGE_VERSION@,$(PACKAGE_VERSION),' \ + -e 's,[@]RELEASE_DATE@,$(RELEASE_DATE),' \ + $(srcdir)/$@in >$@ + +.1in.1: + $(man_SUBST) + +.5in.5: + $(man_SUBST) + +.8in.8: + $(man_SUBST) + +.NOTPARALLEL: man +man: Makefile $(man_MANS) + +clean-local:: + -rm -rf $(SPHINXBUILDDIR) + +# +# Build rules for generating pre-generated manpages +# + +if HAVE_SPHINX_BUILD +# +# See https://www.gnu.org/software/automake/manual/html_node/Multiple-Outputs.html +# +manpages.stamp: $(MANPAGES_RST) + @rm -f manpages.tmp + @touch manpages.tmp + $(AM_V_SPHINX)$(SPHINX_BUILD) -b man -d $(SPHINXBUILDDIR)/doctrees $(man_SPHINXOPTS) $(SPHINXBUILDDIR)/man + for f in $(SPHINXBUILDDIR)/man/*; do \ + cp -a "$$f" "$(srcdir)/$$(basename $$f)in"; \ + done + @mv -f manpages.tmp $@ + +$(MANPAGES_IN): manpages.stamp +## Recover from the removal of $@ + @dry=; for f in x $$MAKEFLAGS; do \ + case $$f in \ + *=*|--*);; \ + *n*) dry=:;; \ + esac; \ + done; \ + if test -f $@; then :; else \ + $$dry trap 'rm -rf manpages.lock manpages.stamp' 1 2 13 15; \ + if $$dry mkdir manpages.lock 2>/dev/null; then \ +## This code is being executed by the first process. + $$dry rm -f manpages.stamp; \ + $(MAKE) $(AM_MAKEFLAGS) manpages.stamp; \ + $$dry rmdir manpages.lock; \ + else \ +## This code is being executed by the follower processes. +## Wait until the first process is done. + while test -d manpages.lock && test -z "$$dry"; do \ + sleep 1; \ + done; \ +## Succeed if and only if the first process succeeded. + $$dry test -f manpages.stamp; exit $$?; \ + fi; \ + fi +endif HAVE_SPHINX_BUILD + +maintainerclean-local: + -$(RM) diff --git a/doc/man/arpaname.1in b/doc/man/arpaname.1in new file mode 100644 index 0000000000..bec27b1de5 --- /dev/null +++ b/doc/man/arpaname.1in @@ -0,0 +1,48 @@ +.\" Man page generated from reStructuredText. +. +.TH "ARPANAME" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +arpaname \- translate IP addresses to the corresponding ARPA names +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBarpaname\fP {\fIipaddress\fP ...} +.SH DESCRIPTION +.sp +\fBarpaname\fP translates IP addresses (IPv4 and IPv6) to the +corresponding IN\-ADDR.ARPA or IP6.ARPA names. +.SH SEE ALSO +.sp +BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/arpaname.rst b/doc/man/arpaname.rst new file mode 100644 index 0000000000..89d468eee5 --- /dev/null +++ b/doc/man/arpaname.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/tools/arpaname.rst diff --git a/doc/man/conf.py b/doc/man/conf.py new file mode 100644 index 0000000000..0f56c8647b --- /dev/null +++ b/doc/man/conf.py @@ -0,0 +1,96 @@ +############################################################################ +# Copyright (C) Internet Systems Consortium, Inc. ("ISC") +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# See the COPYRIGHT file distributed with this work for additional +# information regarding copyright ownership. +############################################################################ + +# flake8: noqa: E501 + +# +# Configuration file for the Sphinx documentation builder. +# +# This file only contains a selection of the most common options. For a full +# list see the documentation: +# http://www.sphinx-doc.org/en/master/config + +# -- Path setup -------------------------------------------------------------- + +# If extensions (or modules to document with autodoc) are in another directory, +# add these directories to sys.path here. If the directory is relative to the +# documentation root, use os.path.abspath to make it absolute, like shown here. +# +# import os +# import sys +# sys.path.insert(0, os.path.abspath('.')) + +# -- Project information ----------------------------------------------------- + +project = u'BIND 9' +# pylint: disable=redefined-builtin +copyright = u'2020, Internet Systems Consortium' +author = u'Internet Systems Consortium' + +# -- General configuration --------------------------------------------------- + +# Add any Sphinx extension module names here, as strings. They can be +# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom +# ones. +extensions = [] + +# Add any paths that contain templates here, relative to this directory. +templates_path = ['../arm/_templates'] + +# List of patterns, relative to source directory, that match files and +# directories to ignore when looking for source files. +# This pattern also affects html_static_path and html_extra_path. +exclude_patterns = [ + '_build', + 'Thumbs.db', + '.DS_Store', + ] + +# The master toctree document. +master_doc = 'index' + +# pylint: disable=line-too-long +man_pages = [ + ('arpaname', 'arpaname', 'translate IP addresses to the corresponding ARPA names', author, 1), + ('ddns-confgen', 'ddns-confgen', 'ddns key generation tool', author, 8), + ('delv', 'delv', 'DNS lookup and validation utility', author, 1), + ('dig', 'dig', 'DNS lookup utility', author, 1), + ('dnssec-cds', 'dnssec-cds', 'change DS records for a child zone based on CDS/CDNSKEY', author, 8), + ('dnssec-dsfromkey', 'dnssec-dsfromkey', 'DNSSEC DS RR generation tool', author, 8), + ('dnssec-importkey', 'dnssec-importkey', 'import DNSKEY records from external systems so they can be managed', author, 8), + ('dnssec-keyfromlabel', 'dnssec-keyfromlabel', 'DNSSEC key generation tool', author, 8), + ('dnssec-keygen', 'dnssec-keygen', 'DNSSEC key generation tool', author, 8), + ('dnssec-revoke', 'dnssec-revoke', 'set the REVOKED bit on a DNSSEC key', author, 8), + ('dnssec-settime', 'dnssec-settime', 'set the key timing metadata for a DNSSEC key', author, 8), + ('dnssec-signzone', 'dnssec-signzone', 'DNSSEC zone signing tool', author, 8), + ('dnssec-verify', 'dnssec-verify', 'DNSSEC zone verification tool', author, 8), + ('dnstap-read', 'dnstap-read', 'print dnstap data in human-readable form', author, 1), + ('filter-aaaa', 'filter-aaaa', 'filter AAAA in DNS responses when A is present', author, 8), + ('host', 'host', 'DNS lookup utility', author, 1), + ('mdig', 'mdig', 'DNS pipelined lookup utility', author, 1), + ('named-checkconf', 'named-checkconf', 'named configuration file syntax checking tool', author, 8), + ('named-checkzone', 'named-checkzone', 'zone file validity checking or converting tool', author, 8), + ('named-journalprint', 'named-journalprint', 'print zone journal in human-readable form', author, 8), + ('named-nzd2nzf', 'named-nzd2nzf', 'convert an NZD database to NZF text format', author, 8), + ('named-rrchecker', 'named-rrchecker', 'syntax checker for individual DNS resource records', author, 1), + ('named.conf', 'named.conf', 'configuration file for **named**', author, 5), + ('named', 'named', 'Internet domain name server', author, 8), + ('nsec3hash', 'nsec3hash', 'generate NSEC3 hash', author, 8), + ('nslookup', 'nslookup', 'query Internet name servers interactively', author, 1), + ('nsupdate', 'nsupdate', 'dynamic DNS update utility', author, 1), + ('pkcs11-destroy', 'pkcs11-destroy', 'destroy PKCS#11 objects', author, 8), + ('pkcs11-keygen', 'pkcs11-keygen', 'generate keys on a PKCS#11 device', author, 8), + ('pkcs11-list', 'pkcs11-list', 'list PKCS#11 objects', author, 8), + ('pkcs11-tokens', 'pkcs11-tokens', 'list PKCS#11 available tokens', author, 8), + ('rndc-confgen', 'rndc-confgen', 'rndc key generation tool', author, 8), + ('rndc.conf', 'rndc.conf', 'rndc configuration file', author, 5), + ('rndc', 'rndc', 'name server control utility', author, 8), + ] diff --git a/doc/man/ddns-confgen.8in b/doc/man/ddns-confgen.8in new file mode 100644 index 0000000000..a87a1abb6a --- /dev/null +++ b/doc/man/ddns-confgen.8in @@ -0,0 +1,109 @@ +.\" Man page generated from reStructuredText. +. +.TH "DDNS-CONFGEN" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +ddns-confgen \- ddns key generation tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBtsig\-keygen\fP [\fB\-a\fP algorithm] [\fB\-h\fP] [\fB\-r\fP randomfile] [\fB\-s\fP name] +.sp +\fBddns\-confgen\fP [\fB\-a\fP algorithm] [\fB\-h\fP] [\fB\-k\fP keyname] [\fB\-q\fP] [\fB\-r\fP randomfile] [\fB\-s\fP name] [\fB\-z\fP zone] +.SH DESCRIPTION +.sp +\fBtsig\-keygen\fP and \fBddns\-confgen\fP are invocation methods for a +utility that generates keys for use in TSIG signing. The resulting keys +can be used, for example, to secure dynamic DNS updates to a zone or for +the \fBrndc\fP command channel. +.sp +When run as \fBtsig\-keygen\fP, a domain name can be specified on the +command line which will be used as the name of the generated key. If no +name is specified, the default is \fBtsig\-key\fP\&. +.sp +When run as \fBddns\-confgen\fP, the generated key is accompanied by +configuration text and instructions that can be used with \fBnsupdate\fP +and \fBnamed\fP when setting up dynamic DNS, including an example +\fBupdate\-policy\fP statement. (This usage similar to the \fBrndc\-confgen\fP +command for setting up command channel security.) +.sp +Note that \fBnamed\fP itself can configure a local DDNS key for use with +\fBnsupdate \-l\fP: it does this when a zone is configured with +\fBupdate\-policy local;\fP\&. \fBddns\-confgen\fP is only needed when a more +elaborate configuration is required: for instance, if \fBnsupdate\fP is to +be used from a remote system. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-a\fP algorithm +Specifies the algorithm to use for the TSIG key. Available choices +are: hmac\-md5, hmac\-sha1, hmac\-sha224, hmac\-sha256, hmac\-sha384 and +hmac\-sha512. The default is hmac\-sha256. Options are +case\-insensitive, and the "hmac\-" prefix may be omitted. +.TP +\fB\-h\fP +Prints a short summary of options and arguments. +.TP +\fB\-k\fP keyname +Specifies the key name of the DDNS authentication key. The default is +\fBddns\-key\fP when neither the \fB\-s\fP nor \fB\-z\fP option is specified; +otherwise, the default is \fBddns\-key\fP as a separate label followed +by the argument of the option, e.g., \fBddns\-key.example.com.\fP The +key name must have the format of a valid domain name, consisting of +letters, digits, hyphens and periods. +.TP +\fB\-q\fP +(\fBddns\-confgen\fP only.) Quiet mode: Print only the key, with no +explanatory text or usage examples; This is essentially identical to +\fBtsig\-keygen\fP\&. +.TP +\fB\-s\fP name +(\fBddns\-confgen\fP only.) Generate configuration example to allow +dynamic updates of a single hostname. The example \fBnamed.conf\fP text +shows how to set an update policy for the specified name using the +"name" nametype. The default key name is ddns\-key.name. Note that the +"self" nametype cannot be used, since the name to be updated may +differ from the key name. This option cannot be used with the \fB\-z\fP +option. +.TP +\fB\-z\fP zone +(\fBddns\-confgen\fP only.) Generate configuration example to allow +dynamic updates of a zone: The example \fBnamed.conf\fP text shows how +to set an update policy for the specified zone using the "zonesub" +nametype, allowing updates to all subdomain names within that zone. +This option cannot be used with the \fB\-s\fP option. +.UNINDENT +.SH SEE ALSO +.sp +\fBnsupdate(1)\fP, \fBnamed.conf(5)\fP, \fBnamed(8)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/ddns-confgen.rst b/doc/man/ddns-confgen.rst new file mode 100644 index 0000000000..751a7c83da --- /dev/null +++ b/doc/man/ddns-confgen.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/confgen/ddns-confgen.rst \ No newline at end of file diff --git a/doc/man/delv.1in b/doc/man/delv.1in new file mode 100644 index 0000000000..2fa3a22968 --- /dev/null +++ b/doc/man/delv.1in @@ -0,0 +1,345 @@ +.\" Man page generated from reStructuredText. +. +.TH "DELV" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +delv \- DNS lookup and validation utility +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdelv\fP [@server] [ [\fB\-4\fP] | [\fB\-6\fP] ] [\fB\-a\fP anchor\-file] [\fB\-b\fP address] [\fB\-c\fP class] [\fB\-d\fP level] [\fB\-i\fP] [\fB\-m\fP] [\fB\-p\fP port#] [\fB\-q\fP name] [\fB\-t\fP type] [\fB\-x\fP addr] [name] [type] [class] [queryopt...] +.sp +\fBdelv\fP [\fB\-h\fP] +.sp +\fBdelv\fP [\fB\-v\fP] +.sp +\fBdelv\fP [queryopt...] [query...] +.SH DESCRIPTION +.sp +\fBdelv\fP is a tool for sending DNS queries and validating the results, +using the same internal resolver and validator logic as \fBnamed\fP\&. +.sp +\fBdelv\fP will send to a specified name server all queries needed to +fetch and validate the requested data; this includes the original +requested query, subsequent queries to follow CNAME or DNAME chains, and +queries for DNSKEY, and DS records to establish a chain of trust for +DNSSEC validation. It does not perform iterative resolution, but +simulates the behavior of a name server configured for DNSSEC validating +and forwarding. +.sp +By default, responses are validated using built\-in DNSSEC trust anchor +for the root zone ("."). Records returned by \fBdelv\fP are either fully +validated or were not signed. If validation fails, an explanation of the +failure is included in the output; the validation process can be traced +in detail. Because \fBdelv\fP does not rely on an external server to carry +out validation, it can be used to check the validity of DNS responses in +environments where local name servers may not be trustworthy. +.sp +Unless it is told to query a specific name server, \fBdelv\fP will try +each of the servers listed in \fB/etc/resolv.conf\fP\&. If no usable server +addresses are found, \fBdelv\fP will send queries to the localhost +addresses (127.0.0.1 for IPv4, ::1 for IPv6). +.sp +When no command line arguments or options are given, \fBdelv\fP will +perform an NS query for "." (the root zone). +.SH SIMPLE USAGE +.sp +A typical invocation of \fBdelv\fP looks like: +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +delv @server name type +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +where: +.INDENT 0.0 +.TP +.B \fBserver\fP +is the name or IP address of the name server to query. This can be an +IPv4 address in dotted\-decimal notation or an IPv6 address in +colon\-delimited notation. When the supplied \fBserver\fP argument is a +hostname, \fBdelv\fP resolves that name before querying that name +server (note, however, that this initial lookup is \fInot\fP validated by +DNSSEC). +.sp +If no \fBserver\fP argument is provided, \fBdelv\fP consults +\fB/etc/resolv.conf\fP; if an address is found there, it queries the +name server at that address. If either of the \fB\-4\fP or \fB\-6\fP +options are in use, then only addresses for the corresponding +transport will be tried. If no usable addresses are found, \fBdelv\fP +will send queries to the localhost addresses (127.0.0.1 for IPv4, ::1 +for IPv6). +.TP +.B \fBname\fP +is the domain name to be looked up. +.TP +.B \fBtype\fP +indicates what type of query is required MDASH ANY, A, MX, etc. +\fBtype\fP can be any valid query type. If no \fBtype\fP argument is +supplied, \fBdelv\fP will perform a lookup for an A record. +.UNINDENT +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-a\fP anchor\-file +Specifies a file from which to read DNSSEC trust anchors. The default +is \fB/etc/bind.keys\fP, which is included with BIND 9 and contains one +or more trust anchors for the root zone ("."). +.sp +Keys that do not match the root zone name are ignored. An alternate +key name can be specified using the \fB+root=NAME\fP options. +.sp +Note: When reading the trust anchor file, \fBdelv\fP treat \fBtrust\-anchors\fP +\fBinitial\-key\fP and \fBstatic\-key\fP identically. That is, for a managed key, +it is the \fIinitial\fP key that is trusted; \fI\%RFC 5011\fP key management is not +supported. \fBdelv\fP will not consult the managed\-keys database maintained by +\fBnamed\fP\&. This means that if either of the keys in \fB/etc/bind.keys\fP is +revoked and rolled over, it will be necessary to update \fB/etc/bind.keys\fP to +use DNSSEC validation in \fBdelv\fP\&. +.TP +\fB\-b\fP address +Sets the source IP address of the query to \fBaddress\fP\&. This must be +a valid address on one of the host\(aqs network interfaces or "0.0.0.0" +or "::". An optional source port may be specified by appending +"#" +.TP +\fB\-c\fP class +Sets the query class for the requested data. Currently, only class +"IN" is supported in \fBdelv\fP and any other value is ignored. +.TP +\fB\-d\fP level +Set the systemwide debug level to \fBlevel\fP\&. The allowed range is +from 0 to 99. The default is 0 (no debugging). Debugging traces from +\fBdelv\fP become more verbose as the debug level increases. See the +\fB+mtrace\fP, \fB+rtrace\fP, and \fB+vtrace\fP options below for +additional debugging details. +.TP +\fB\-h\fP +Display the \fBdelv\fP help usage output and exit. +.TP +\fB\-i\fP +Insecure mode. This disables internal DNSSEC validation. (Note, +however, this does not set the CD bit on upstream queries. If the +server being queried is performing DNSSEC validation, then it will +not return invalid data; this can cause \fBdelv\fP to time out. When it +is necessary to examine invalid data to debug a DNSSEC problem, use +\fBdig +cd\fP\&.) +.TP +\fB\-m\fP +Enables memory usage debugging. +.TP +\fB\-p\fP port# +Specifies a destination port to use for queries instead of the +standard DNS port number 53. This option would be used with a name +server that has been configured to listen for queries on a +non\-standard port number. +.TP +\fB\-q\fP name +Sets the query name to \fBname\fP\&. While the query name can be +specified without using the \fB\-q\fP, it is sometimes necessary to +disambiguate names from types or classes (for example, when looking +up the name "ns", which could be misinterpreted as the type NS, or +"ch", which could be misinterpreted as class CH). +.TP +\fB\-t\fP type +Sets the query type to \fBtype\fP, which can be any valid query type +supported in BIND 9 except for zone transfer types AXFR and IXFR. As +with \fB\-q\fP, this is useful to distinguish query name type or class +when they are ambiguous. it is sometimes necessary to disambiguate +names from types. +.sp +The default query type is "A", unless the \fB\-x\fP option is supplied +to indicate a reverse lookup, in which case it is "PTR". +.TP +\fB\-v\fP +Print the \fBdelv\fP version and exit. +.TP +\fB\-x\fP addr +Performs a reverse lookup, mapping an addresses to a name. \fBaddr\fP +is an IPv4 address in dotted\-decimal notation, or a colon\-delimited +IPv6 address. When \fB\-x\fP is used, there is no need to provide the +\fBname\fP or \fBtype\fP arguments. \fBdelv\fP automatically performs a +lookup for a name like \fB11.12.13.10.in\-addr.arpa\fP and sets the +query type to PTR. IPv6 addresses are looked up using nibble format +under the IP6.ARPA domain. +.TP +\fB\-4\fP +Forces \fBdelv\fP to only use IPv4. +.TP +\fB\-6\fP +Forces \fBdelv\fP to only use IPv6. +.UNINDENT +.SH QUERY OPTIONS +.sp +\fBdelv\fP provides a number of query options which affect the way results +are displayed, and in some cases the way lookups are performed. +.sp +Each query option is identified by a keyword preceded by a plus sign +(\fB+\fP). Some keywords set or reset an option. These may be preceded by +the string \fBno\fP to negate the meaning of that keyword. Other keywords +assign values to options like the timeout interval. They have the form +\fB+keyword=value\fP\&. The query options are: +.INDENT 0.0 +.TP +.B \fB+[no]cdflag\fP +Controls whether to set the CD (checking disabled) bit in queries +sent by \fBdelv\fP\&. This may be useful when troubleshooting DNSSEC +problems from behind a validating resolver. A validating resolver +will block invalid responses, making it difficult to retrieve them +for analysis. Setting the CD flag on queries will cause the resolver +to return invalid responses, which \fBdelv\fP can then validate +internally and report the errors in detail. +.TP +.B \fB+[no]class\fP +Controls whether to display the CLASS when printing a record. The +default is to display the CLASS. +.TP +.B \fB+[no]ttl\fP +Controls whether to display the TTL when printing a record. The +default is to display the TTL. +.TP +.B \fB+[no]rtrace\fP +Toggle resolver fetch logging. This reports the name and type of each +query sent by \fBdelv\fP in the process of carrying out the resolution +and validation process: this includes including the original query +and all subsequent queries to follow CNAMEs and to establish a chain +of trust for DNSSEC validation. +.sp +This is equivalent to setting the debug level to 1 in the "resolver" +logging category. Setting the systemwide debug level to 1 using the +\fB\-d\fP option will product the same output (but will affect other +logging categories as well). +.TP +.B \fB+[no]mtrace\fP +Toggle message logging. This produces a detailed dump of the +responses received by \fBdelv\fP in the process of carrying out the +resolution and validation process. +.sp +This is equivalent to setting the debug level to 10 for the "packets" +module of the "resolver" logging category. Setting the systemwide +debug level to 10 using the \fB\-d\fP option will produce the same +output (but will affect other logging categories as well). +.TP +.B \fB+[no]vtrace\fP +Toggle validation logging. This shows the internal process of the +validator as it determines whether an answer is validly signed, +unsigned, or invalid. +.sp +This is equivalent to setting the debug level to 3 for the +"validator" module of the "dnssec" logging category. Setting the +systemwide debug level to 3 using the \fB\-d\fP option will produce the +same output (but will affect other logging categories as well). +.TP +.B \fB+[no]short\fP +Provide a terse answer. The default is to print the answer in a +verbose form. +.TP +.B \fB+[no]comments\fP +Toggle the display of comment lines in the output. The default is to +print comments. +.TP +.B \fB+[no]rrcomments\fP +Toggle the display of per\-record comments in the output (for example, +human\-readable key information about DNSKEY records). The default is +to print per\-record comments. +.TP +.B \fB+[no]crypto\fP +Toggle the display of cryptographic fields in DNSSEC records. The +contents of these field are unnecessary to debug most DNSSEC +validation failures and removing them makes it easier to see the +common failures. The default is to display the fields. When omitted +they are replaced by the string "[omitted]" or in the DNSKEY case the +key id is displayed as the replacement, e.g. "[ key id = value ]". +.TP +.B \fB+[no]trust\fP +Controls whether to display the trust level when printing a record. +The default is to display the trust level. +.TP +.B \fB+[no]split[=W]\fP +Split long hex\- or base64\-formatted fields in resource records into +chunks of \fBW\fP characters (where \fBW\fP is rounded up to the nearest +multiple of 4). \fB+nosplit\fP or \fB+split=0\fP causes fields not to be +split at all. The default is 56 characters, or 44 characters when +multiline mode is active. +.TP +.B \fB+[no]all\fP +Set or clear the display options \fB+[no]comments\fP, +\fB+[no]rrcomments\fP, and \fB+[no]trust\fP as a group. +.TP +.B \fB+[no]multiline\fP +Print long records (such as RRSIG, DNSKEY, and SOA records) in a +verbose multi\-line format with human\-readable comments. The default +is to print each record on a single line, to facilitate machine +parsing of the \fBdelv\fP output. +.TP +.B \fB+[no]dnssec\fP +Indicates whether to display RRSIG records in the \fBdelv\fP output. +The default is to do so. Note that (unlike in \fBdig\fP) this does +\fInot\fP control whether to request DNSSEC records or whether to +validate them. DNSSEC records are always requested, and validation +will always occur unless suppressed by the use of \fB\-i\fP or +\fB+noroot\fP\&. +.TP +.B \fB+[no]root[=ROOT]\fP +Indicates whether to perform conventional DNSSEC validation, and if so, +specifies the name of a trust anchor. The default is to validate using a +trust anchor of "." (the root zone), for which there is a built\-in key. If +specifying a different trust anchor, then \fB\-a\fP must be used to specify a +file containing the key. +.TP +.B \fB+[no]tcp\fP +Controls whether to use TCP when sending queries. The default is to +use UDP unless a truncated response has been received. +.TP +.B \fB+[no]unknownformat\fP +Print all RDATA in unknown RR type presentation format (\fI\%RFC 3597\fP). +The default is to print RDATA for known types in the type\(aqs +presentation format. +.TP +.B \fB+[no]yaml\fP +Print response data in YAML format. +.UNINDENT +.SH FILES +.sp +\fB/etc/bind.keys\fP +.sp +\fB/etc/resolv.conf\fP +.SH SEE ALSO +.sp +\fBdig(1)\fP, \fBnamed(8)\fP, \fI\%RFC 4034\fP, \fI\%RFC 4035\fP, \fI\%RFC 4431\fP, \fI\%RFC 5074\fP, \fI\%RFC 5155\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/delv.rst b/doc/man/delv.rst new file mode 100644 index 0000000000..aaa997dd97 --- /dev/null +++ b/doc/man/delv.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/delv/delv.rst \ No newline at end of file diff --git a/doc/man/dig.1in b/doc/man/dig.1in new file mode 100644 index 0000000000..38ab166e92 --- /dev/null +++ b/doc/man/dig.1in @@ -0,0 +1,649 @@ +.\" Man page generated from reStructuredText. +. +.TH "DIG" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dig \- DNS lookup utility +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdig\fP [@server] [\fB\-b\fP address] [\fB\-c\fP class] [\fB\-f\fP filename] [\fB\-k\fP filename] [\fB\-m\fP] [\fB\-p\fP port#] [\fB\-q\fP name] [\fB\-t\fP type] [\fB\-v\fP] [\fB\-x\fP addr] [\fB\-y\fP [hmac:]name:key] [ [\fB\-4\fP] | [\fB\-6\fP] ] [name] [type] [class] [queryopt...] +.sp +\fBdig\fP [\fB\-h\fP] +.sp +\fBdig\fP [global\-queryopt...] [query...] +.SH DESCRIPTION +.sp +\fBdig\fP is a flexible tool for interrogating DNS name servers. It +performs DNS lookups and displays the answers that are returned from the +name server(s) that were queried. Most DNS administrators use \fBdig\fP to +troubleshoot DNS problems because of its flexibility, ease of use and +clarity of output. Other lookup tools tend to have less functionality +than \fBdig\fP\&. +.sp +Although \fBdig\fP is normally used with command\-line arguments, it also +has a batch mode of operation for reading lookup requests from a file. A +brief summary of its command\-line arguments and options is printed when +the \fB\-h\fP option is given. Unlike earlier versions, the BIND 9 +implementation of \fBdig\fP allows multiple lookups to be issued from the +command line. +.sp +Unless it is told to query a specific name server, \fBdig\fP will try each +of the servers listed in \fB/etc/resolv.conf\fP\&. If no usable server +addresses are found, \fBdig\fP will send the query to the local host. +.sp +When no command line arguments or options are given, \fBdig\fP will +perform an NS query for "." (the root). +.sp +It is possible to set per\-user defaults for \fBdig\fP via +\fB${HOME}/.digrc\fP\&. This file is read and any options in it are applied +before the command line arguments. The \fB\-r\fP option disables this +feature, for scripts that need predictable behaviour. +.sp +The IN and CH class names overlap with the IN and CH top level domain +names. Either use the \fB\-t\fP and \fB\-c\fP options to specify the type and +class, use the \fB\-q\fP the specify the domain name, or use "IN." and +"CH." when looking up these top level domains. +.SH SIMPLE USAGE +.sp +A typical invocation of \fBdig\fP looks like: +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +dig @server name type +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +where: +.INDENT 0.0 +.TP +.B \fBserver\fP +is the name or IP address of the name server to query. This can be an +IPv4 address in dotted\-decimal notation or an IPv6 address in +colon\-delimited notation. When the supplied \fBserver\fP argument is a +hostname, \fBdig\fP resolves that name before querying that name +server. +.sp +If no \fBserver\fP argument is provided, \fBdig\fP consults +\fB/etc/resolv.conf\fP; if an address is found there, it queries the +name server at that address. If either of the \fB\-4\fP or \fB\-6\fP +options are in use, then only addresses for the corresponding +transport will be tried. If no usable addresses are found, \fBdig\fP +will send the query to the local host. The reply from the name server +that responds is displayed. +.TP +.B \fBname\fP +is the name of the resource record that is to be looked up. +.TP +.B \fBtype\fP +indicates what type of query is required MDASH ANY, A, MX, SIG, etc. +\fBtype\fP can be any valid query type. If no \fBtype\fP argument is +supplied, \fBdig\fP will perform a lookup for an A record. +.UNINDENT +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-4\fP +Use IPv4 only. +.TP +\fB\-6\fP +Use IPv6 only. +.TP +\fB\-b\fP address[#port] +Set the source IP address of the query. The \fBaddress\fP must be a +valid address on one of the host\(aqs network interfaces, or "0.0.0.0" +or "::". An optional port may be specified by appending "#" +.TP +\fB\-c\fP class +Set the query class. The default \fBclass\fP is IN; other classes are +HS for Hesiod records or CH for Chaosnet records. +.TP +\fB\-f\fP file +Batch mode: \fBdig\fP reads a list of lookup requests to process from +the given \fBfile\fP\&. Each line in the file should be organized in the +same way they would be presented as queries to \fBdig\fP using the +command\-line interface. +.TP +\fB\-k\fP keyfile +Sign queries using TSIG using a key read from the given file. Key +files can be generated using tsig\-keygen8. When using TSIG +authentication with \fBdig\fP, the name server that is queried needs to +know the key and algorithm that is being used. In BIND, this is done +by providing appropriate \fBkey\fP and \fBserver\fP statements in +\fBnamed.conf\fP\&. +.TP +\fB\-m\fP +Enable memory usage debugging. +.TP +\fB\-p\fP port +Send the query to a non\-standard port on the server, instead of the +default port 53. This option would be used to test a name server that +has been configured to listen for queries on a non\-standard port +number. +.TP +\fB\-q\fP name +The domain name to query. This is useful to distinguish the \fBname\fP +from other arguments. +.TP +\fB\-r\fP +Do not read options from \fB${HOME}/.digrc\fP\&. This is useful for +scripts that need predictable behaviour. +.TP +\fB\-t\fP type +The resource record type to query. It can be any valid query type. If +it is a resource record type supported in BIND 9, it can be given by +the type mnemonic (such as "NS" or "AAAA"). The default query type is +"A", unless the \fB\-x\fP option is supplied to indicate a reverse +lookup. A zone transfer can be requested by specifying a type of +AXFR. When an incremental zone transfer (IXFR) is required, set the +\fBtype\fP to \fBixfr=N\fP\&. The incremental zone transfer will contain +the changes made to the zone since the serial number in the zone\(aqs +SOA record was \fBN\fP\&. +.sp +All resource record types can be expressed as "TYPEnn", where "nn" is +the number of the type. If the resource record type is not supported +in BIND 9, the result will be displayed as described in \fI\%RFC 3597\fP\&. +.TP +\fB\-u\fP +Print query times in microseconds instead of milliseconds. +.TP +\fB\-v\fP +Print the version number and exit. +.TP +\fB\-x\fP addr +Simplified reverse lookups, for mapping addresses to names. The +\fBaddr\fP is an IPv4 address in dotted\-decimal notation, or a +colon\-delimited IPv6 address. When the \fB\-x\fP is used, there is no +need to provide the \fBname\fP, \fBclass\fP and \fBtype\fP arguments. +\fBdig\fP automatically performs a lookup for a name like +\fB94.2.0.192.in\-addr.arpa\fP and sets the query type and class to PTR +and IN respectively. IPv6 addresses are looked up using nibble format +under the IP6.ARPA domain. +.TP +\fB\-y\fP [hmac:]keyname:secret +Sign queries using TSIG with the given authentication key. +\fBkeyname\fP is the name of the key, and \fBsecret\fP is the base64 +encoded shared secret. \fBhmac\fP is the name of the key algorithm; +valid choices are \fBhmac\-md5\fP, \fBhmac\-sha1\fP, \fBhmac\-sha224\fP, +\fBhmac\-sha256\fP, \fBhmac\-sha384\fP, or \fBhmac\-sha512\fP\&. If \fBhmac\fP is +not specified, the default is \fBhmac\-md5\fP or if MD5 was disabled +\fBhmac\-sha256\fP\&. +.UNINDENT +.sp +\fBNOTE:\fP +.INDENT 0.0 +.INDENT 3.5 +You should use the \fB\-k\fP option and avoid the \fB\-y\fP option, +because with \fB\-y\fP the shared secret is supplied as a command line +argument in clear text. This may be visible in the output from ps1 or +in a history file maintained by the user\(aqs shell. +.UNINDENT +.UNINDENT +.SH QUERY OPTIONS +.sp +\fBdig\fP provides a number of query options which affect the way in which +lookups are made and the results displayed. Some of these set or reset +flag bits in the query header, some determine which sections of the +answer get printed, and others determine the timeout and retry +strategies. +.sp +Each query option is identified by a keyword preceded by a plus sign +(\fB+\fP). Some keywords set or reset an option. These may be preceded by +the string \fBno\fP to negate the meaning of that keyword. Other keywords +assign values to options like the timeout interval. They have the form +\fB+keyword=value\fP\&. Keywords may be abbreviated, provided the +abbreviation is unambiguous; for example, \fB+cd\fP is equivalent to +\fB+cdflag\fP\&. The query options are: +.INDENT 0.0 +.TP +.B \fB+[no]aaflag\fP +A synonym for \fB+[no]aaonly\fP\&. +.TP +.B \fB+[no]aaonly\fP +Sets the "aa" flag in the query. +.TP +.B \fB+[no]additional\fP +Display [do not display] the additional section of a reply. The +default is to display it. +.TP +.B \fB+[no]adflag\fP +Set [do not set] the AD (authentic data) bit in the query. This +requests the server to return whether all of the answer and authority +sections have all been validated as secure according to the security +policy of the server. AD=1 indicates that all records have been +validated as secure and the answer is not from a OPT\-OUT range. AD=0 +indicate that some part of the answer was insecure or not validated. +This bit is set by default. +.TP +.B \fB+[no]all\fP +Set or clear all display flags. +.TP +.B \fB+[no]answer\fP +Display [do not display] the answer section of a reply. The default +is to display it. +.TP +.B \fB+[no]authority\fP +Display [do not display] the authority section of a reply. The +default is to display it. +.TP +.B \fB+[no]badcookie\fP +Retry lookup with the new server cookie if a BADCOOKIE response is +received. +.TP +.B \fB+[no]besteffort\fP +Attempt to display the contents of messages which are malformed. The +default is to not display malformed answers. +.TP +.B \fB+bufsize=B\fP +Set the UDP message buffer size advertised using EDNS0 to \fBB\fP +bytes. The maximum and minimum sizes of this buffer are 65535 and 0 +respectively. Values outside this range are rounded up or down +appropriately. Values other than zero will cause a EDNS query to be +sent. +.TP +.B \fB+[no]cdflag\fP +Set [do not set] the CD (checking disabled) bit in the query. This +requests the server to not perform DNSSEC validation of responses. +.TP +.B \fB+[no]class\fP +Display [do not display] the CLASS when printing the record. +.TP +.B \fB+[no]cmd\fP +Toggles the printing of the initial comment in the output, identifying the +version of \fBdig\fP and the query options that have been applied. This option +always has global effect; it cannot be set globally and then overridden on a +per\-lookup basis. The default is to print this comment. +.TP +.B \fB+[no]comments\fP +Toggles the display of some comment lines in the output, containing +information about the packet header and OPT pseudosection, and the names of +the response section. The default is to print these comments. +.sp +Other types of comments in the output are not affected by this option, but +can be controlled using other command line switches. These include +\fB+[no]cmd\fP, \fB+[no]question\fP, \fB+[no]stats\fP, and \fB+[no]rrcomments\fP\&. +.TP +.B \fB+[no]cookie=####\fP +Send a COOKIE EDNS option, with optional value. Replaying a COOKIE +from a previous response will allow the server to identify a previous +client. The default is \fB+cookie\fP\&. +.sp +\fB+cookie\fP is also set when +trace is set to better emulate the +default queries from a nameserver. +.TP +.B \fB+[no]crypto\fP +Toggle the display of cryptographic fields in DNSSEC records. The +contents of these field are unnecessary to debug most DNSSEC +validation failures and removing them makes it easier to see the +common failures. The default is to display the fields. When omitted +they are replaced by the string "[omitted]" or in the DNSKEY case the +key id is displayed as the replacement, e.g. "[ key id = value ]". +.TP +.B \fB+[no]defname\fP +Deprecated, treated as a synonym for \fB+[no]search\fP +.TP +.B \fB+[no]dnssec\fP +Requests DNSSEC records be sent by setting the DNSSEC OK bit (DO) in +the OPT record in the additional section of the query. +.TP +.B \fB+domain=somename\fP +Set the search list to contain the single domain \fBsomename\fP, as if +specified in a \fBdomain\fP directive in \fB/etc/resolv.conf\fP, and +enable search list processing as if the \fB+search\fP option were +given. +.TP +.B \fB+dscp=value\fP +Set the DSCP code point to be used when sending the query. Valid DSCP +code points are in the range [0..63]. By default no code point is +explicitly set. +.TP +.B \fB+[no]edns[=#]\fP +Specify the EDNS version to query with. Valid values are 0 to 255. +Setting the EDNS version will cause a EDNS query to be sent. +\fB+noedns\fP clears the remembered EDNS version. EDNS is set to 0 by +default. +.TP +.B \fB+[no]ednsflags[=#]\fP +Set the must\-be\-zero EDNS flags bits (Z bits) to the specified value. +Decimal, hex and octal encodings are accepted. Setting a named flag +(e.g. DO) will silently be ignored. By default, no Z bits are set. +.TP +.B \fB+[no]ednsnegotiation\fP +Enable / disable EDNS version negotiation. By default EDNS version +negotiation is enabled. +.TP +.B \fB+[no]ednsopt[=code[:value]]\fP +Specify EDNS option with code point \fBcode\fP and optionally payload +of \fBvalue\fP as a hexadecimal string. \fBcode\fP can be either an EDNS +option name (for example, \fBNSID\fP or \fBECS\fP), or an arbitrary +numeric value. \fB+noednsopt\fP clears the EDNS options to be sent. +.TP +.B \fB+[no]expire\fP +Send an EDNS Expire option. +.TP +.B \fB+[no]fail\fP +Do not try the next server if you receive a SERVFAIL. The default is +to not try the next server which is the reverse of normal stub +resolver behavior. +.TP +.B \fB+[no]header\-only\fP +Send a query with a DNS header without a question section. The +default is to add a question section. The query type and query name +are ignored when this is set. +.TP +.B \fB+[no]identify\fP +Show [or do not show] the IP address and port number that supplied +the answer when the \fB+short\fP option is enabled. If short form +answers are requested, the default is not to show the source address +and port number of the server that provided the answer. +.TP +.B \fB+[no]idnin\fP +Process [do not process] IDN domain names on input. This requires IDN +SUPPORT to have been enabled at compile time. +.sp +The default is to process IDN input when standard output is a tty. +The IDN processing on input is disabled when dig output is redirected +to files, pipes, and other non\-tty file descriptors. +.TP +.B \fB+[no]idnout\fP +Convert [do not convert] puny code on output. This requires IDN +SUPPORT to have been enabled at compile time. +.sp +The default is to process puny code on output when standard output is +a tty. The puny code processing on output is disabled when dig output +is redirected to files, pipes, and other non\-tty file descriptors. +.TP +.B \fB+[no]ignore\fP +Ignore truncation in UDP responses instead of retrying with TCP. By +default, TCP retries are performed. +.TP +.B \fB+[no]keepalive\fP +Send [or do not send] an EDNS Keepalive option. +.TP +.B \fB+[no]keepopen\fP +Keep the TCP socket open between queries and reuse it rather than +creating a new TCP socket for each lookup. The default is +\fB+nokeepopen\fP\&. +.TP +.B \fB+[no]mapped\fP +Allow mapped IPv4 over IPv6 addresses to be used. The default is +\fB+mapped\fP\&. +.TP +.B \fB+[no]multiline\fP +Print records like the SOA records in a verbose multi\-line format +with human\-readable comments. The default is to print each record on +a single line, to facilitate machine parsing of the \fBdig\fP output. +.TP +.B \fB+ndots=D\fP +Set the number of dots that have to appear in \fBname\fP to \fBD\fP for +it to be considered absolute. The default value is that defined using +the ndots statement in \fB/etc/resolv.conf\fP, or 1 if no ndots +statement is present. Names with fewer dots are interpreted as +relative names and will be searched for in the domains listed in the +\fBsearch\fP or \fBdomain\fP directive in \fB/etc/resolv.conf\fP if +\fB+search\fP is set. +.TP +.B \fB+[no]nsid\fP +Include an EDNS name server ID request when sending a query. +.TP +.B \fB+[no]nssearch\fP +When this option is set, \fBdig\fP attempts to find the authoritative +name servers for the zone containing the name being looked up and +display the SOA record that each name server has for the zone. +Addresses of servers that that did not respond are also printed. +.TP +.B \fB+[no]onesoa\fP +Print only one (starting) SOA record when performing an AXFR. The +default is to print both the starting and ending SOA records. +.TP +.B \fB+[no]opcode=value\fP +Set [restore] the DNS message opcode to the specified value. The +default value is QUERY (0). +.TP +.B \fB+padding=value\fP +Pad the size of the query packet using the EDNS Padding option to +blocks of \fBvalue\fP bytes. For example, \fB+padding=32\fP would cause a +48\-byte query to be padded to 64 bytes. The default block size is 0, +which disables padding. The maximum is 512. Values are ordinarily +expected to be powers of two, such as 128; however, this is not +mandatory. Responses to padded queries may also be padded, but only +if the query uses TCP or DNS COOKIE. +.TP +.B \fB+[no]qr\fP +Toggles the display of the query message as it is sent. By default, the query +is not printed. +.TP +.B \fB+[no]question\fP +Toggles the display of the question section of a query when an answer is +returned. The default is to print the question section as a comment. +.TP +.B \fB+[no]raflag\fP +Set [do not set] the RA (Recursion Available) bit in the query. The +default is +noraflag. This bit should be ignored by the server for +QUERY. +.TP +.B \fB+[no]rdflag\fP +A synonym for \fB+[no]recurse\fP\&. +.TP +.B \fB+[no]recurse\fP +Toggle the setting of the RD (recursion desired) bit in the query. +This bit is set by default, which means \fBdig\fP normally sends +recursive queries. Recursion is automatically disabled when the +\fB+nssearch\fP or \fB+trace\fP query options are used. +.TP +.B \fB+retry=T\fP +Sets the number of times to retry UDP queries to server to \fBT\fP +instead of the default, 2. Unlike \fB+tries\fP, this does not include +the initial query. +.TP +.B \fB+[no]rrcomments\fP +Toggle the display of per\-record comments in the output (for example, +human\-readable key information about DNSKEY records). The default is +not to print record comments unless multiline mode is active. +.TP +.B \fB+[no]search\fP +Use [do not use] the search list defined by the searchlist or domain +directive in \fBresolv.conf\fP (if any). The search list is not used by +default. +.sp +\(aqndots\(aq from \fBresolv.conf\fP (default 1) which may be overridden by +\fB+ndots\fP determines if the name will be treated as relative or not +and hence whether a search is eventually performed or not. +.TP +.B \fB+[no]short\fP +Provide a terse answer. The default is to print the answer in a verbose +form. This option always has global effect; it cannot be set globally and +then overridden on a per\-lookup basis. +.TP +.B \fB+[no]showsearch\fP +Perform [do not perform] a search showing intermediate results. +.TP +.B \fB+[no]sigchase\fP +This feature is now obsolete and has been removed; use \fBdelv\fP +instead. +.TP +.B \fB+split=W\fP +Split long hex\- or base64\-formatted fields in resource records into +chunks of \fBW\fP characters (where \fBW\fP is rounded up to the nearest +multiple of 4). \fB+nosplit\fP or \fB+split=0\fP causes fields not to be +split at all. The default is 56 characters, or 44 characters when +multiline mode is active. +.TP +.B \fB+[no]stats\fP +Toggles the printing of statistics: when the query was made, the size of the +reply and so on. The default behavior is to print the query statistics as a +comment after each lookup. +.TP +.B \fB+[no]subnet=addr[/prefix\-length]\fP +Send (don\(aqt send) an EDNS Client Subnet option with the specified IP +address or network prefix. +.sp +\fBdig +subnet=0.0.0.0/0\fP, or simply \fBdig +subnet=0\fP for short, +sends an EDNS CLIENT\-SUBNET option with an empty address and a source +prefix\-length of zero, which signals a resolver that the client\(aqs +address information must \fInot\fP be used when resolving this query. +.TP +.B \fB+[no]tcflag\fP +Set [do not set] the TC (TrunCation) bit in the query. The default is ++notcflag. This bit should be ignored by the server for QUERY. +.TP +.B \fB+[no]tcp\fP +Use [do not use] TCP when querying name servers. The default behavior +is to use UDP unless a type \fBany\fP or \fBixfr=N\fP query is requested, +in which case the default is TCP. AXFR queries always use TCP. +.TP +.B \fB+timeout=T\fP +Sets the timeout for a query to \fBT\fP seconds. The default timeout is +5 seconds. An attempt to set \fBT\fP to less than 1 will result in a +query timeout of 1 second being applied. +.TP +.B \fB+[no]topdown\fP +This feature is related to \fBdig +sigchase\fP, which is obsolete and +has been removed. Use \fBdelv\fP instead. +.TP +.B \fB+[no]trace\fP +Toggle tracing of the delegation path from the root name servers for +the name being looked up. Tracing is disabled by default. When +tracing is enabled, \fBdig\fP makes iterative queries to resolve the +name being looked up. It will follow referrals from the root servers, +showing the answer from each server that was used to resolve the +lookup. +.sp +If @server is also specified, it affects only the initial query for +the root zone name servers. +.sp +\fB+dnssec\fP is also set when +trace is set to better emulate the +default queries from a nameserver. +.TP +.B \fB+tries=T\fP +Sets the number of times to try UDP queries to server to \fBT\fP +instead of the default, 3. If \fBT\fP is less than or equal to zero, +the number of tries is silently rounded up to 1. +.TP +.B \fB+trusted\-key=####\fP +Formerly specified trusted keys for use with \fBdig +sigchase\fP\&. This +feature is now obsolete and has been removed; use \fBdelv\fP instead. +.TP +.B \fB+[no]ttlid\fP +Display [do not display] the TTL when printing the record. +.TP +.B \fB+[no]ttlunits\fP +Display [do not display] the TTL in friendly human\-readable time +units of "s", "m", "h", "d", and "w", representing seconds, minutes, +hours, days and weeks. Implies +ttlid. +.TP +.B \fB+[no]unexpected\fP +Accept [do not accept] answers from unexpected sources. By default, \fBdig\fP +won\(aqt accept a reply from a source other than the one to which it sent the +query. +.TP +.B \fB+[no]unknownformat\fP +Print all RDATA in unknown RR type presentation format (\fI\%RFC 3597\fP). +The default is to print RDATA for known types in the type\(aqs +presentation format. +.TP +.B \fB+[no]vc\fP +Use [do not use] TCP when querying name servers. This alternate +syntax to \fB+[no]tcp\fP is provided for backwards compatibility. The +"vc" stands for "virtual circuit". +.TP +.B \fB+[no]yaml\fP +Print the responses (and, if is in use, also the +outgoing queries) in a detailed YAML format. +.TP +.B \fB+[no]zflag\fP +Set [do not set] the last unassigned DNS header flag in a DNS query. +This flag is off by default. +.UNINDENT +.SH MULTIPLE QUERIES +.sp +The BIND 9 implementation of \fBdig\fP supports specifying multiple +queries on the command line (in addition to supporting the \fB\-f\fP batch +file option). Each of those queries can be supplied with its own set of +flags, options and query options. +.sp +In this case, each \fBquery\fP argument represent an individual query in +the command\-line syntax described above. Each consists of any of the +standard options and flags, the name to be looked up, an optional query +type and class and any query options that should be applied to that +query. +.sp +A global set of query options, which should be applied to all queries, +can also be supplied. These global query options must precede the first +tuple of name, class, type, options, flags, and query options supplied +on the command line. Any global query options (except \fB+[no]cmd\fP and +\fB+[no]short\fP options) can be overridden by a query\-specific set of +query options. For example: +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +dig +qr www.isc.org any \-x 127.0.0.1 isc.org ns +noqr +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +shows how \fBdig\fP could be used from the command line to make three +lookups: an ANY query for \fBwww.isc.org\fP, a reverse lookup of 127.0.0.1 +and a query for the NS records of \fBisc.org\fP\&. A global query option of +\fB+qr\fP is applied, so that \fBdig\fP shows the initial query it made for +each lookup. The final query has a local query option of \fB+noqr\fP which +means that \fBdig\fP will not print the initial query when it looks up the +NS records for \fBisc.org\fP\&. +.SH IDN SUPPORT +.sp +If \fBdig\fP has been built with IDN (internationalized domain name) +support, it can accept and display non\-ASCII domain names. \fBdig\fP +appropriately converts character encoding of domain name before sending +a request to DNS server or displaying a reply from the server. If you\(aqd +like to turn off the IDN support for some reason, use parameters +\fB+noidnin\fP and \fB+noidnout\fP or define the IDN_DISABLE environment +variable. +.SH FILES +.sp +\fB/etc/resolv.conf\fP +.sp +\fB${HOME}/.digrc\fP +.SH SEE ALSO +.sp +\fBdelv(1)\fP, \fBhost(1)\fP, \fBnamed(8)\fP, \fBdnssec\-keygen(8)\fP, \fI\%RFC 1035\fP\&. +.SH BUGS +.sp +There are probably too many query options. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dig.rst b/doc/man/dig.rst new file mode 100644 index 0000000000..fac4dfe76c --- /dev/null +++ b/doc/man/dig.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dig/dig.rst \ No newline at end of file diff --git a/doc/man/dnssec-cds.8in b/doc/man/dnssec-cds.8in new file mode 100644 index 0000000000..a254fb99f7 --- /dev/null +++ b/doc/man/dnssec-cds.8in @@ -0,0 +1,225 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-CDS" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-cds \- change DS records for a child zone based on CDS/CDNSKEY +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-cds\fP [\fB\-a\fP alg...] [\fB\-c\fP class] [\fB\-D\fP] {\fB\-d\fP dsset\-file} {\fB\-f\fP child\-file} [\fB\-i\fP [extension]] [\fB\-s\fP start\-time] [\fB\-T\fP ttl] [\fB\-u\fP] [\fB\-v\fP level] [\fB\-V\fP] {domain} +.SH DESCRIPTION +.sp +The \fBdnssec\-cds\fP command changes DS records at a delegation point +based on CDS or CDNSKEY records published in the child zone. If both CDS +and CDNSKEY records are present in the child zone, the CDS is preferred. +This enables a child zone to inform its parent of upcoming changes to +its key\-signing keys; by polling periodically with \fBdnssec\-cds\fP, the +parent can keep the DS records up to date and enable automatic rolling +of KSKs. +.sp +Two input files are required. The \fB\-f child\-file\fP option specifies a +file containing the child\(aqs CDS and/or CDNSKEY records, plus RRSIG and +DNSKEY records so that they can be authenticated. The \fB\-d path\fP option +specifies the location of a file containing the current DS records. For +example, this could be a \fBdsset\-\fP file generated by +\fBdnssec\-signzone\fP, or the output of \fBdnssec\-dsfromkey\fP, or the +output of a previous run of \fBdnssec\-cds\fP\&. +.sp +The \fBdnssec\-cds\fP command uses special DNSSEC validation logic +specified by \fI\%RFC 7344\fP\&. It requires that the CDS and/or CDNSKEY records +are validly signed by a key represented in the existing DS records. This +will typically be the pre\-existing key\-signing key (KSK). +.sp +For protection against replay attacks, the signatures on the child +records must not be older than they were on a previous run of +\fBdnssec\-cds\fP\&. This time is obtained from the modification time of the +\fBdsset\-\fP file, or from the \fB\-s\fP option. +.sp +To protect against breaking the delegation, \fBdnssec\-cds\fP ensures that +the DNSKEY RRset can be verified by every key algorithm in the new DS +RRset, and that the same set of keys are covered by every DS digest +type. +.sp +By default, replacement DS records are written to the standard output; +with the \fB\-i\fP option the input file is overwritten in place. The +replacement DS records will be the same as the existing records when no +change is required. The output can be empty if the CDS / CDNSKEY records +specify that the child zone wants to go insecure. +.sp +Warning: Be careful not to delete the DS records when \fBdnssec\-cds\fP +fails! +.sp +Alternatively, \fBdnssec\-cds \-u\fP writes an \fBnsupdate\fP script to the +standard output. You can use the \fB\-u\fP and \fB\-i\fP options together to +maintain a \fBdsset\-\fP file as well as emit an \fBnsupdate\fP script. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-a\fP algorithm +Specify a digest algorithm to use when converting CDNSKEY records to +DS records. This option can be repeated, so that multiple DS records +are created for each CDNSKEY record. This option has no effect when +using CDS records. +.sp +The algorithm must be one of SHA\-1, SHA\-256, or SHA\-384. These values +are case insensitive, and the hyphen may be omitted. If no algorithm +is specified, the default is SHA\-256. +.TP +\fB\-c\fP class +Specifies the DNS class of the zones. +.TP +\fB\-D\fP +Generate DS records from CDNSKEY records if both CDS and CDNSKEY +records are present in the child zone. By default CDS records are +preferred. +.TP +\fB\-d\fP path +Location of the parent DS records. The path can be the name of a file +containing the DS records, or if it is a directory, \fBdnssec\-cds\fP +looks for a \fBdsset\-\fP file for the domain inside the directory. +.sp +To protect against replay attacks, child records are rejected if they +were signed earlier than the modification time of the \fBdsset\-\fP +file. This can be adjusted with the \fB\-s\fP option. +.TP +\fB\-f\fP child\-file +File containing the child\(aqs CDS and/or CDNSKEY records, plus its +DNSKEY records and the covering RRSIG records so that they can be +authenticated. +.sp +The EXAMPLES below describe how to generate this file. +.TP +\fB\-iextension\fP +Update the \fBdsset\-\fP file in place, instead of writing DS records to +the standard output. +.sp +There must be no space between the \fB\-i\fP and the extension. If you +provide no extension then the old \fBdsset\-\fP is discarded. If an +extension is present, a backup of the old \fBdsset\-\fP file is kept +with the extension appended to its filename. +.sp +To protect against replay attacks, the modification time of the +\fBdsset\-\fP file is set to match the signature inception time of the +child records, provided that is later than the file\(aqs current +modification time. +.TP +\fB\-s\fP start\-time +Specify the date and time after which RRSIG records become +acceptable. This can be either an absolute or relative time. An +absolute start time is indicated by a number in YYYYMMDDHHMMSS +notation; 20170827133700 denotes 13:37:00 UTC on August 27th, 2017. A +time relative to the \fBdsset\-\fP file is indicated with \-N, which is N +seconds before the file modification time. A time relative to the +current time is indicated with now+N. +.sp +If no start\-time is specified, the modification time of the +\fBdsset\-\fP file is used. +.TP +\fB\-T\fP ttl +Specifies a TTL to be used for new DS records. If not specified, the +default is the TTL of the old DS records. If they had no explicit TTL +then the new DS records also have no explicit TTL. +.TP +\fB\-u\fP +Write an \fBnsupdate\fP script to the standard output, instead of +printing the new DS reords. The output will be empty if no change is +needed. +.sp +Note: The TTL of new records needs to be specified, either in the +original \fBdsset\-\fP file, or with the \fB\-T\fP option, or using the +\fBnsupdate\fP \fBttl\fP command. +.TP +\fB\-V\fP +Print version information. +.TP +\fB\-v\fP level +Sets the debugging level. Level 1 is intended to be usefully verbose +for general users; higher levels are intended for developers. +.TP +.B domain +The name of the delegation point / child zone apex. +.UNINDENT +.SH EXIT STATUS +.sp +The \fBdnssec\-cds\fP command exits 0 on success, or non\-zero if an error +occurred. +.sp +In the success case, the DS records might or might not need to be +changed. +.SH EXAMPLES +.sp +Before running \fBdnssec\-signzone\fP, you can ensure that the delegations +are up\-to\-date by running \fBdnssec\-cds\fP on every \fBdsset\-\fP file. +.sp +To fetch the child records required by \fBdnssec\-cds\fP you can invoke +\fBdig\fP as in the script below. It\(aqs okay if the \fBdig\fP fails since +\fBdnssec\-cds\fP performs all the necessary checking. +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +for f in dsset\-* +do + d=${f#dsset\-} + dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | + dnssec\-cds \-i \-f /dev/stdin \-d $f $d +done +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +When the parent zone is automatically signed by \fBnamed\fP, you can use +\fBdnssec\-cds\fP with \fBnsupdate\fP to maintain a delegation as follows. +The \fBdsset\-\fP file allows the script to avoid having to fetch and +validate the parent DS records, and it keeps the replay attack +protection time. +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +dig +dnssec +noall +answer $d DNSKEY $d CDNSKEY $d CDS | +dnssec\-cds \-u \-i \-f /dev/stdin \-d $f $d | +nsupdate \-l +.ft P +.fi +.UNINDENT +.UNINDENT +.SH SEE ALSO +.sp +\fBdig(1)\fP, \fBdnssec\-settime(8)\fP, \fBdnssec\-signzone(8)\fP, \fBnsupdate(1)\fP, BIND 9 Administrator +Reference Manual, \fI\%RFC 7344\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-cds.rst b/doc/man/dnssec-cds.rst new file mode 100644 index 0000000000..6d29d64225 --- /dev/null +++ b/doc/man/dnssec-cds.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-cds.rst \ No newline at end of file diff --git a/doc/man/dnssec-dsfromkey.8in b/doc/man/dnssec-dsfromkey.8in new file mode 100644 index 0000000000..aa708b45a8 --- /dev/null +++ b/doc/man/dnssec-dsfromkey.8in @@ -0,0 +1,149 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-DSFROMKEY" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-dsfromkey \- DNSSEC DS RR generation tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-dsfromkey\fP [ \fB\-1\fP | \fB\-2\fP | \fB\-a\fP alg ] [ \fB\-C\fP ] [\fB\-T\fP TTL] [\fB\-v\fP level] [\fB\-K\fP directory] {keyfile} +.sp +\fBdnssec\-dsfromkey\fP [ \fB\-1\fP | \fB\-2\fP | \fB\-a\fP alg ] [ \fB\-C\fP ] [\fB\-T\fP TTL] [\fB\-v\fP level] [\fB\-c\fP class] [\fB\-A\fP] {\fB\-f\fP file} [dnsname] +.sp +\fBdnssec\-dsfromkey\fP [ \fB\-1\fP | \fB\-2\fP | \fB\-a\fP alg ] [ \fB\-C\fP ] [\fB\-T\fP TTL] [\fB\-v\fP level] [\fB\-c\fP class] [\fB\-K\fP directory] {\fB\-s\fP} {dnsname} +.sp +\fBdnssec\-dsfromkey\fP [ \fB\-h\fP | \fB\-V\fP ] +.SH DESCRIPTION +.sp +The \fBdnssec\-dsfromkey\fP command outputs DS (Delegation Signer) resource records +(RRs), or CDS (Child DS) RRs with the \fB\-C\fP option. +.sp +The input keys can be specified in a number of ways: +.sp +By default, \fBdnssec\-dsfromkey\fP reads a key file named like +\fBKnnnn.+aaa+iiiii.key\fP, as generated by \fBdnssec\-keygen\fP\&. +.sp +With the \fB\-f file\fP option, \fBdnssec\-dsfromkey\fP reads keys from a zone +file or partial zone file (which can contain just the DNSKEY records). +.sp +With the \fB\-s\fP option, \fBdnssec\-dsfromkey\fP reads a \fBkeyset\-\fP file, +as generated by \fBdnssec\-keygen\fP \fB\-C\fP\&. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-1\fP +An abbreviation for \fB\-a SHA1\fP +.TP +\fB\-2\fP +An abbreviation for \fB\-a SHA\-256\fP +.TP +\fB\-a\fP algorithm +Specify a digest algorithm to use when converting DNSKEY records to +DS records. This option can be repeated, so that multiple DS records +are created for each DNSKEY record. +.sp +The algorithm must be one of SHA\-1, SHA\-256, or SHA\-384. These values +are case insensitive, and the hyphen may be omitted. If no algorithm +is specified, the default is SHA\-256. +.TP +\fB\-A\fP +Include ZSKs when generating DS records. Without this option, only +keys which have the KSK flag set will be converted to DS records and +printed. Useful only in \fB\-f\fP zone file mode. +.TP +\fB\-c\fP class +Specifies the DNS class (default is IN). Useful only in \fB\-s\fP keyset +or \fB\-f\fP zone file mode. +.TP +\fB\-C\fP +Generate CDS records rather than DS records. +.TP +\fB\-f\fP file +Zone file mode: \fBdnssec\-dsfromkey\fP\(aqs final dnsname argument is the +DNS domain name of a zone whose master file can be read from +\fBfile\fP\&. If the zone name is the same as \fBfile\fP, then it may be +omitted. +.sp +If file is \fB"\-"\fP, then the zone data is read from the standard +input. This makes it possible to use the output of the \fBdig\fP +command as input, as in: +.sp +\fBdig dnskey example.com | dnssec\-dsfromkey \-f \- example.com\fP +.TP +\fB\-h\fP +Prints usage information. +.TP +\fB\-K\fP directory +Look for key files or \fBkeyset\-\fP files in \fBdirectory\fP\&. +.TP +\fB\-s\fP +Keyset mode: \fBdnssec\-dsfromkey\fP\(aqs final dnsname argument is the DNS +domain name used to locate a \fBkeyset\-\fP file. +.TP +\fB\-T\fP TTL +Specifies the TTL of the DS records. By default the TTL is omitted. +.TP +\fB\-v\fP level +Sets the debugging level. +.TP +\fB\-V\fP +Prints version information. +.UNINDENT +.SH EXAMPLE +.sp +To build the SHA\-256 DS RR from the \fBKexample.com.+003+26160\fP keyfile +name, you can issue the following command: +.sp +\fBdnssec\-dsfromkey \-2 Kexample.com.+003+26160\fP +.sp +The command would print something like: +.sp +\fBexample.com. IN DS 26160 5 2 3A1EADA7A74B8D0BA86726B0C227AA85AB8BBD2B2004F41A868A54F0C5EA0B94\fP +.SH FILES +.sp +The keyfile can be designated by the key identification +\fBKnnnn.+aaa+iiiii\fP or the full file name \fBKnnnn.+aaa+iiiii.key\fP as +generated by dnssec\-keygen8. +.sp +The keyset file name is built from the \fBdirectory\fP, the string +\fBkeyset\-\fP and the \fBdnsname\fP\&. +.SH CAVEAT +.sp +A keyfile error can give a "file not found" even if the file exists. +.SH SEE ALSO +.sp +\fBdnssec\-keygen(8)\fP, \fBdnssec\-signzone(8)\fP, BIND 9 Administrator Reference Manual, +\fI\%RFC 3658\fP (DS RRs), \fI\%RFC 4509\fP (SHA\-256 for DS RRs), +\fI\%RFC 6605\fP (SHA\-384 for DS RRs), \fI\%RFC 7344\fP (CDS and CDNSKEY RRs). +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-dsfromkey.rst b/doc/man/dnssec-dsfromkey.rst new file mode 100644 index 0000000000..3e20d69f6e --- /dev/null +++ b/doc/man/dnssec-dsfromkey.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-dsfromkey.rst \ No newline at end of file diff --git a/doc/man/dnssec-importkey.8in b/doc/man/dnssec-importkey.8in new file mode 100644 index 0000000000..73f0d10af4 --- /dev/null +++ b/doc/man/dnssec-importkey.8in @@ -0,0 +1,125 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-IMPORTKEY" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-importkey \- import DNSKEY records from external systems so they can be managed +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-importkey\fP [\fB\-K\fP directory] [\fB\-L\fP ttl] [\fB\-P\fP date/offset] [\fB\-P\fP sync date/offset] [\fB\-D\fP date/offset] [\fB\-D\fP sync date/offset] [\fB\-h\fP] [\fB\-v\fP level] [\fB\-V\fP] {keyfile} +.sp +\fBdnssec\-importkey\fP {\fB\-f\fP filename} [\fB\-K\fP directory] [\fB\-L\fP ttl] [\fB\-P\fP date/offset] [\fB\-P\fP sync date/offset] [\fB\-D\fP date/offset] [\fB\-D\fP sync date/offset] [\fB\-h\fP] [\fB\-v\fP level] [\fB\-V\fP] [dnsname] +.SH DESCRIPTION +.sp +\fBdnssec\-importkey\fP reads a public DNSKEY record and generates a pair +of .key/.private files. The DNSKEY record may be read from an existing +\&.key file, in which case a corresponding .private file will be +generated, or it may be read from any other file or from the standard +input, in which case both .key and .private files will be generated. +.sp +The newly\-created .private file does \fInot\fP contain private key data, and +cannot be used for signing. However, having a .private file makes it +possible to set publication (\fB\-P\fP) and deletion (\fB\-D\fP) times for the +key, which means the public key can be added to and removed from the +DNSKEY RRset on schedule even if the true private key is stored offline. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-f\fP filename +Zone file mode: instead of a public keyfile name, the argument is the +DNS domain name of a zone master file, which can be read from +\fBfile\fP\&. If the domain name is the same as \fBfile\fP, then it may be +omitted. +.sp +If \fBfile\fP is set to \fB"\-"\fP, then the zone data is read from the +standard input. +.TP +\fB\-K\fP directory +Sets the directory in which the key files are to reside. +.TP +\fB\-L\fP ttl +Sets the default TTL to use for this key when it is converted into a +DNSKEY RR. If the key is imported into a zone, this is the TTL that +will be used for it, unless there was already a DNSKEY RRset in +place, in which case the existing TTL would take precedence. Setting +the default TTL to \fB0\fP or \fBnone\fP removes it. +.TP +\fB\-h\fP +Emit usage message and exit. +.TP +\fB\-v\fP level +Sets the debugging level. +.TP +\fB\-V\fP +Prints version information. +.UNINDENT +.SH TIMING OPTIONS +.sp +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a \(aq+\(aq or \(aq\-\(aq, it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes \(aqy\(aq, \(aqmo\(aq, \(aqw\(aq, \(aqd\(aq, \(aqh\(aq, or \(aqmi\(aq, then the offset is +computed in years (defined as 365 24\-hour days, ignoring leap years), +months (defined as 30 24\-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +explicitly prevent a date from being set, use \(aqnone\(aq or \(aqnever\(aq. +.INDENT 0.0 +.TP +\fB\-P\fP date/offset +Sets the date on which a key is to be published to the zone. After +that date, the key will be included in the zone but will not be used +to sign it. +.TP +\fB\-P\fP sync date/offset +Sets the date on which CDS and CDNSKEY records that match this key +are to be published to the zone. +.TP +\fB\-D\fP date/offset +Sets the date on which the key is to be deleted. After that date, the +key will no longer be included in the zone. (It may remain in the key +repository, however.) +.TP +\fB\-D\fP sync date/offset +Sets the date on which the CDS and CDNSKEY records that match this +key are to be deleted. +.UNINDENT +.SH FILES +.sp +A keyfile can be designed by the key identification \fBKnnnn.+aaa+iiiii\fP +or the full file name \fBKnnnn.+aaa+iiiii.key\fP as generated by +dnssec\-keygen8. +.sp +\fBdnssec\-keygen(8)\fP, \fBdnssec\-signzone(8)\fP, BIND 9 Administrator Reference Manual, +\fI\%RFC 5011\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-importkey.rst b/doc/man/dnssec-importkey.rst new file mode 100644 index 0000000000..04c436cf20 --- /dev/null +++ b/doc/man/dnssec-importkey.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-importkey.rst \ No newline at end of file diff --git a/doc/man/dnssec-keyfromlabel.8in b/doc/man/dnssec-keyfromlabel.8in new file mode 100644 index 0000000000..7943796541 --- /dev/null +++ b/doc/man/dnssec-keyfromlabel.8in @@ -0,0 +1,281 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-KEYFROMLABEL" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-keyfromlabel \- DNSSEC key generation tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-keyfromlabel\fP {\fB\-l\fP label} [\fB\-3\fP] [\fB\-a\fP algorithm] [\fB\-A\fP date/offset] [\fB\-c\fP class] [\fB\-D\fP date/offset] [\fB\-D\fP sync date/offset] [\fB\-E\fP engine] [\fB\-f\fP flag] [\fB\-G\fP] [\fB\-I\fP date/offset] [\fB\-i\fP interval] [\fB\-k\fP] [\fB\-K\fP directory] [\fB\-L\fP ttl] [\fB\-n\fP nametype] [\fB\-P\fP date/offset] [\fB\-P\fP sync date/offset] [\fB\-p\fP protocol] [\fB\-R\fP date/offset] [\fB\-S\fP key] [\fB\-t\fP type] [\fB\-v\fP level] [\fB\-V\fP] [\fB\-y\fP] {name} +.SH DESCRIPTION +.sp +\fBdnssec\-keyfromlabel\fP generates a key pair of files that referencing a +key object stored in a cryptographic hardware service module (HSM). The +private key file can be used for DNSSEC signing of zone data as if it +were a conventional signing key created by \fBdnssec\-keygen\fP, but the +key material is stored within the HSM, and the actual signing takes +place there. +.sp +The \fBname\fP of the key is specified on the command line. This must +match the name of the zone for which the key is being generated. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-a\fP algorithm +Selects the cryptographic algorithm. The value of \fBalgorithm\fP must +be one of RSASHA1, NSEC3RSASHA1, RSASHA256, RSASHA512, +ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. +.sp +If no algorithm is specified, then RSASHA1 will be used by default, +unless the \fB\-3\fP option is specified, in which case NSEC3RSASHA1 +will be used instead. (If \fB\-3\fP is used and an algorithm is +specified, that algorithm will be checked for compatibility with +NSEC3.) +.sp +These values are case insensitive. In some cases, abbreviations are +supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for +ECDSAP384SHA384. If RSASHA1 is specified along with the \fB\-3\fP +option, then NSEC3RSASHA1 will be used instead. +.sp +As of BIND 9.12.0, this option is mandatory except when using the +\fB\-S\fP option (which copies the algorithm from the predecessory key). +Previously, the default for newly generated keys was RSASHA1. +.TP +\fB\-3\fP +Use an NSEC3\-capable algorithm to generate a DNSSEC key. If this +option is used with an algorithm that has both NSEC and NSEC3 +versions, then the NSEC3 version will be used; for example, +\fBdnssec\-keygen \-3a RSASHA1\fP specifies the NSEC3RSASHA1 algorithm. +.TP +\fB\-E\fP engine +Specifies the cryptographic hardware to use. +.sp +When BIND is built with OpenSSL PKCS#11 support, this defaults to the +string "pkcs11", which identifies an OpenSSL engine that can drive a +cryptographic accelerator or hardware service module. When BIND is +built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it +defaults to the path of the PKCS#11 provider library specified via +"\-\-with\-pkcs11". +.TP +\fB\-l\fP label +Specifies the label for a key pair in the crypto hardware. +.sp +When BIND 9 is built with OpenSSL\-based PKCS#11 support, the label is +an arbitrary string that identifies a particular key. It may be +preceded by an optional OpenSSL engine name, followed by a colon, as +in "pkcs11:keylabel". +.sp +When BIND 9 is built with native PKCS#11 support, the label is a +PKCS#11 URI string in the format +"pkcs11:\fBkeyword\fP=value[;\fBkeyword\fP=value;...]" Keywords +include "token", which identifies the HSM; "object", which identifies +the key; and "pin\-source", which identifies a file from which the +HSM\(aqs PIN code can be obtained. The label will be stored in the +on\-disk "private" file. +.sp +If the label contains a \fBpin\-source\fP field, tools using the +generated key files will be able to use the HSM for signing and other +operations without any need for an operator to manually enter a PIN. +Note: Making the HSM\(aqs PIN accessible in this manner may reduce the +security advantage of using an HSM; be sure this is what you want to +do before making use of this feature. +.TP +\fB\-n\fP nametype +Specifies the owner type of the key. The value of \fBnametype\fP must +either be ZONE (for a DNSSEC zone key (KEY/DNSKEY)), HOST or ENTITY +(for a key associated with a host (KEY)), USER (for a key associated +with a user(KEY)) or OTHER (DNSKEY). These values are case +insensitive. +.TP +\fB\-C\fP +Compatibility mode: generates an old\-style key, without any metadata. +By default, \fBdnssec\-keyfromlabel\fP will include the key\(aqs creation +date in the metadata stored with the private key, and other dates may +be set there as well (publication date, activation date, etc). Keys +that include this data may be incompatible with older versions of +BIND; the \fB\-C\fP option suppresses them. +.TP +\fB\-c\fP class +Indicates that the DNS record containing the key should have the +specified class. If not specified, class IN is used. +.TP +\fB\-f\fP flag +Set the specified flag in the flag field of the KEY/DNSKEY record. +The only recognized flags are KSK (Key Signing Key) and REVOKE. +.TP +\fB\-G\fP +Generate a key, but do not publish it or sign with it. This option is +incompatible with \-P and \-A. +.TP +\fB\-h\fP +Prints a short summary of the options and arguments to +\fBdnssec\-keyfromlabel\fP\&. +.TP +\fB\-K\fP directory +Sets the directory in which the key files are to be written. +.TP +\fB\-k\fP +Generate KEY records rather than DNSKEY records. +.TP +\fB\-L\fP ttl +Sets the default TTL to use for this key when it is converted into a +DNSKEY RR. If the key is imported into a zone, this is the TTL that +will be used for it, unless there was already a DNSKEY RRset in +place, in which case the existing TTL would take precedence. Setting +the default TTL to \fB0\fP or \fBnone\fP removes it. +.TP +\fB\-p\fP protocol +Sets the protocol value for the key. The protocol is a number between +0 and 255. The default is 3 (DNSSEC). Other possible values for this +argument are listed in \fI\%RFC 2535\fP and its successors. +.TP +\fB\-S\fP key +Generate a key as an explicit successor to an existing key. The name, +algorithm, size, and type of the key will be set to match the +predecessor. The activation date of the new key will be set to the +inactivation date of the existing one. The publication date will be +set to the activation date minus the prepublication interval, which +defaults to 30 days. +.TP +\fB\-t\fP type +Indicates the use of the key. \fBtype\fP must be one of AUTHCONF, +NOAUTHCONF, NOAUTH, or NOCONF. The default is AUTHCONF. AUTH refers +to the ability to authenticate data, and CONF the ability to encrypt +data. +.TP +\fB\-v\fP level +Sets the debugging level. +.TP +\fB\-V\fP +Prints version information. +.TP +\fB\-y\fP +Allows DNSSEC key files to be generated even if the key ID would +collide with that of an existing key, in the event of either key +being revoked. (This is only safe to use if you are sure you won\(aqt be +using \fI\%RFC 5011\fP trust anchor maintenance with either of the keys +involved.) +.UNINDENT +.SH TIMING OPTIONS +.sp +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a \(aq+\(aq or \(aq\-\(aq, it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes \(aqy\(aq, \(aqmo\(aq, \(aqw\(aq, \(aqd\(aq, \(aqh\(aq, or \(aqmi\(aq, then the offset is +computed in years (defined as 365 24\-hour days, ignoring leap years), +months (defined as 30 24\-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +explicitly prevent a date from being set, use \(aqnone\(aq or \(aqnever\(aq. +.INDENT 0.0 +.TP +\fB\-P\fP date/offset +Sets the date on which a key is to be published to the zone. After +that date, the key will be included in the zone but will not be used +to sign it. If not set, and if the \-G option has not been used, the +default is "now". +.TP +\fB\-P\fP sync date/offset +Sets the date on which the CDS and CDNSKEY records which match this +key are to be published to the zone. +.TP +\fB\-A\fP date/offset +Sets the date on which the key is to be activated. After that date, +the key will be included in the zone and used to sign it. If not set, +and if the \-G option has not been used, the default is "now". +.TP +\fB\-R\fP date/offset +Sets the date on which the key is to be revoked. After that date, the +key will be flagged as revoked. It will be included in the zone and +will be used to sign it. +.TP +\fB\-I\fP date/offset +Sets the date on which the key is to be retired. After that date, the +key will still be included in the zone, but it will not be used to +sign it. +.TP +\fB\-D\fP date/offset +Sets the date on which the key is to be deleted. After that date, the +key will no longer be included in the zone. (It may remain in the key +repository, however.) +.TP +\fB\-D\fP sync date/offset +Sets the date on which the CDS and CDNSKEY records which match this +key are to be deleted. +.TP +\fB\-i\fP interval +Sets the prepublication interval for a key. If set, then the +publication and activation dates must be separated by at least this +much time. If the activation date is specified but the publication +date isn\(aqt, then the publication date will default to this much time +before the activation date; conversely, if the publication date is +specified but activation date isn\(aqt, then activation will be set to +this much time after publication. +.sp +If the key is being created as an explicit successor to another key, +then the default prepublication interval is 30 days; otherwise it is +zero. +.sp +As with date offsets, if the argument is followed by one of the +suffixes \(aqy\(aq, \(aqmo\(aq, \(aqw\(aq, \(aqd\(aq, \(aqh\(aq, or \(aqmi\(aq, then the interval is +measured in years, months, weeks, days, hours, or minutes, +respectively. Without a suffix, the interval is measured in seconds. +.UNINDENT +.SH GENERATED KEY FILES +.sp +When \fBdnssec\-keyfromlabel\fP completes successfully, it prints a string +of the form \fBKnnnn.+aaa+iiiii\fP to the standard output. This is an +identification string for the key files it has generated. +.INDENT 0.0 +.IP \(bu 2 +\fBnnnn\fP is the key name. +.IP \(bu 2 +\fBaaa\fP is the numeric representation of the algorithm. +.IP \(bu 2 +\fBiiiii\fP is the key identifier (or footprint). +.UNINDENT +.sp +\fBdnssec\-keyfromlabel\fP creates two files, with names based on the +printed string. \fBKnnnn.+aaa+iiiii.key\fP contains the public key, and +\fBKnnnn.+aaa+iiiii.private\fP contains the private key. +.sp +The \fB\&.key\fP file contains a DNS KEY record that can be inserted into a +zone file (directly or with a $INCLUDE statement). +.sp +The \fB\&.private\fP file contains algorithm\-specific fields. For obvious +security reasons, this file does not have general read permission. +.SH SEE ALSO +.sp +\fBdnssec\-keygen(8)\fP, \fBdnssec\-signzone(8)\fP, BIND 9 Administrator Reference Manual, +\fI\%RFC 4034\fP, The PKCS#11 URI Scheme (draft\-pechanec\-pkcs11uri\-13). +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-keyfromlabel.rst b/doc/man/dnssec-keyfromlabel.rst new file mode 100644 index 0000000000..4a538114e8 --- /dev/null +++ b/doc/man/dnssec-keyfromlabel.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-keyfromlabel.rst \ No newline at end of file diff --git a/doc/man/dnssec-keygen.8in b/doc/man/dnssec-keygen.8in new file mode 100644 index 0000000000..b6e16efded --- /dev/null +++ b/doc/man/dnssec-keygen.8in @@ -0,0 +1,325 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-KEYGEN" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-keygen \- DNSSEC key generation tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-keygen\fP [\fB\-3\fP] [\fB\-A\fP date/offset] [\fB\-a\fP algorithm] [\fB\-b\fP keysize] [\fB\-C\fP] [\fB\-c\fP class] [\fB\-D\fP date/offset] [\fB\-d\fP bits] [\fB\-D\fP sync date/offset] [\fB\-E\fP engine] [\fB\-f\fP flag] [\fB\-G\fP] [\fB\-g\fP generator] [\fB\-h\fP] [\fB\-I\fP date/offset] [\fB\-i\fP interval] [\fB\-K\fP directory] [\fB\-k\fP policy] [\fB\-L\fP ttl] [\fB\-l\fP file] [\fB\-n\fP nametype] [\fB\-P\fP date/offset] [\fB\-P\fP sync date/offset] [\fB\-p\fP protocol] [\fB\-q\fP] [\fB\-R\fP date/offset] [\fB\-S\fP key] [\fB\-s\fP strength] [\fB\-T\fP rrtype] [\fB\-t\fP type] [\fB\-V\fP] [\fB\-v\fP level] {name} +.SH DESCRIPTION +.sp +\fBdnssec\-keygen\fP generates keys for DNSSEC (Secure DNS), as defined in +\fI\%RFC 2535\fP and \fI\%RFC 4034\fP\&. It can also generate keys for use with TSIG +(Transaction Signatures) as defined in \fI\%RFC 2845\fP, or TKEY (Transaction +Key) as defined in \fI\%RFC 2930\fP\&. +.sp +The \fBname\fP of the key is specified on the command line. For DNSSEC +keys, this must match the name of the zone for which the key is being +generated. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-3\fP +Use an NSEC3\-capable algorithm to generate a DNSSEC key. If this +option is used with an algorithm that has both NSEC and NSEC3 +versions, then the NSEC3 version will be used; for example, +\fBdnssec\-keygen \-3a RSASHA1\fP specifies the NSEC3RSASHA1 algorithm. +.TP +\fB\-a\fP algorithm +Selects the cryptographic algorithm. For DNSSEC keys, the value of +\fBalgorithm\fP must be one of RSASHA1, NSEC3RSASHA1, RSASHA256, +RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519 or ED448. For +TKEY, the value must be DH (Diffie Hellman); specifying his value +will automatically set the \fB\-T KEY\fP option as well. +.sp +These values are case insensitive. In some cases, abbreviations are +supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for +ECDSAP384SHA384. If RSASHA1 is specified along with the \fB\-3\fP +option, then NSEC3RSASHA1 will be used instead. +.sp +This parameter \fImust\fP be specified except when using the \fB\-S\fP +option, which copies the algorithm from the predecessor key. +.sp +In prior releases, HMAC algorithms could be generated for use as TSIG +keys, but that feature has been removed as of BIND 9.13.0. Use +\fBtsig\-keygen\fP to generate TSIG keys. +.TP +\fB\-b\fP keysize +Specifies the number of bits in the key. The choice of key size +depends on the algorithm used. RSA keys must be between 1024 and 4096 +bits. Diffie Hellman keys must be between 128 and 4096 bits. Elliptic +curve algorithms don\(aqt need this parameter. +.sp +If the key size is not specified, some algorithms have pre\-defined +defaults. For example, RSA keys for use as DNSSEC zone signing keys +have a default size of 1024 bits; RSA keys for use as key signing +keys (KSKs, generated with \fB\-f KSK\fP) default to 2048 bits. +.TP +\fB\-C\fP +Compatibility mode: generates an old\-style key, without any timing +metadata. By default, \fBdnssec\-keygen\fP will include the key\(aqs +creation date in the metadata stored with the private key, and other +dates may be set there as well (publication date, activation date, +etc). Keys that include this data may be incompatible with older +versions of BIND; the \fB\-C\fP option suppresses them. +.TP +\fB\-c\fP class +Indicates that the DNS record containing the key should have the +specified class. If not specified, class IN is used. +.TP +\fB\-d\fP bits +Key size in bits. For the algorithms RSASHA1, NSEC3RSASA1, RSASHA256 and +RSASHA512 the key size must be in range 1024\-4096. DH size is between 128 +and 4096. This option is ignored for algorithms ECDSAP256SHA256, +ECDSAP384SHA384, ED25519 and ED448. +.TP +\fB\-E\fP engine +Specifies the cryptographic hardware to use, when applicable. +.sp +When BIND is built with OpenSSL PKCS#11 support, this defaults to the +string "pkcs11", which identifies an OpenSSL engine that can drive a +cryptographic accelerator or hardware service module. When BIND is +built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it +defaults to the path of the PKCS#11 provider library specified via +"\-\-with\-pkcs11". +.TP +\fB\-f\fP flag +Set the specified flag in the flag field of the KEY/DNSKEY record. +The only recognized flags are KSK (Key Signing Key) and REVOKE. +.TP +\fB\-G\fP +Generate a key, but do not publish it or sign with it. This option is +incompatible with \-P and \-A. +.TP +\fB\-g\fP generator +If generating a Diffie Hellman key, use this generator. Allowed +values are 2 and 5. If no generator is specified, a known prime from +\fI\%RFC 2539\fP will be used if possible; otherwise the default is 2. +.TP +\fB\-h\fP +Prints a short summary of the options and arguments to +\fBdnssec\-keygen\fP\&. +.TP +\fB\-K\fP directory +Sets the directory in which the key files are to be written. +.TP +\fB\-k\fP policy +Create keys for a specific dnssec\-policy. If a policy uses multiple keys, +\fBdnssec\-keygen\fP will generate multiple keys. This will also +create a ".state" file to keep track of the key state. +.sp +This option creates keys according to the dnssec\-policy configuration, hence +it cannot be used together with many of the other options that +\fBdnssec\-keygen\fP provides. +.TP +\fB\-L\fP ttl +Sets the default TTL to use for this key when it is converted into a +DNSKEY RR. If the key is imported into a zone, this is the TTL that +will be used for it, unless there was already a DNSKEY RRset in +place, in which case the existing TTL would take precedence. If this +value is not set and there is no existing DNSKEY RRset, the TTL will +default to the SOA TTL. Setting the default TTL to \fB0\fP or \fBnone\fP +is the same as leaving it unset. +.TP +\fB\-l\fP file +Provide a configuration file that contains a dnssec\-policy statement +(matching the policy set with \fB\-k\fP). +.TP +\fB\-n\fP nametype +Specifies the owner type of the key. The value of \fBnametype\fP must +either be ZONE (for a DNSSEC zone key (KEY/DNSKEY)), HOST or ENTITY +(for a key associated with a host (KEY)), USER (for a key associated +with a user(KEY)) or OTHER (DNSKEY). These values are case +insensitive. Defaults to ZONE for DNSKEY generation. +.TP +\fB\-p\fP protocol +Sets the protocol value for the generated key, for use with +\fB\-T KEY\fP\&. The protocol is a number between 0 and 255. The default +is 3 (DNSSEC). Other possible values for this argument are listed in +\fI\%RFC 2535\fP and its successors. +.TP +\fB\-q\fP +Quiet mode: Suppresses unnecessary output, including progress +indication. Without this option, when \fBdnssec\-keygen\fP is run +interactively to generate an RSA or DSA key pair, it will print a +string of symbols to \fBstderr\fP indicating the progress of the key +generation. A \(aq.\(aq indicates that a random number has been found which +passed an initial sieve test; \(aq+\(aq means a number has passed a single +round of the Miller\-Rabin primality test; a space means that the +number has passed all the tests and is a satisfactory key. +.TP +\fB\-S\fP key +Create a new key which is an explicit successor to an existing key. +The name, algorithm, size, and type of the key will be set to match +the existing key. The activation date of the new key will be set to +the inactivation date of the existing one. The publication date will +be set to the activation date minus the prepublication interval, +which defaults to 30 days. +.TP +\fB\-s\fP strength +Specifies the strength value of the key. The strength is a number +between 0 and 15, and currently has no defined purpose in DNSSEC. +.TP +\fB\-T\fP rrtype +Specifies the resource record type to use for the key. \fBrrtype\fP +must be either DNSKEY or KEY. The default is DNSKEY when using a +DNSSEC algorithm, but it can be overridden to KEY for use with +SIG(0). +.TP +\fB\-t\fP type +Indicates the use of the key, for use with \fB\-T KEY\fP\&. \fBtype\fP +must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default +is AUTHCONF. AUTH refers to the ability to authenticate data, and +CONF the ability to encrypt data. +.TP +\fB\-V\fP +Prints version information. +.TP +\fB\-v\fP level +Sets the debugging level. +.UNINDENT +.SH TIMING OPTIONS +.sp +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a \(aq+\(aq or \(aq\-\(aq, it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes \(aqy\(aq, \(aqmo\(aq, \(aqw\(aq, \(aqd\(aq, \(aqh\(aq, or \(aqmi\(aq, then the offset is +computed in years (defined as 365 24\-hour days, ignoring leap years), +months (defined as 30 24\-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +explicitly prevent a date from being set, use \(aqnone\(aq or \(aqnever\(aq. +.INDENT 0.0 +.TP +\fB\-P\fP date/offset +Sets the date on which a key is to be published to the zone. After +that date, the key will be included in the zone but will not be used +to sign it. If not set, and if the \-G option has not been used, the +default is "now". +.TP +\fB\-P\fP sync date/offset +Sets the date on which CDS and CDNSKEY records that match this key +are to be published to the zone. +.TP +\fB\-A\fP date/offset +Sets the date on which the key is to be activated. After that date, +the key will be included in the zone and used to sign it. If not set, +and if the \-G option has not been used, the default is "now". If set, +if and \-P is not set, then the publication date will be set to the +activation date minus the prepublication interval. +.TP +\fB\-R\fP date/offset +Sets the date on which the key is to be revoked. After that date, the +key will be flagged as revoked. It will be included in the zone and +will be used to sign it. +.TP +\fB\-I\fP date/offset +Sets the date on which the key is to be retired. After that date, the +key will still be included in the zone, but it will not be used to +sign it. +.TP +\fB\-D\fP date/offset +Sets the date on which the key is to be deleted. After that date, the +key will no longer be included in the zone. (It may remain in the key +repository, however.) +.TP +\fB\-D\fP sync date/offset +Sets the date on which the CDS and CDNSKEY records that match this +key are to be deleted. +.TP +\fB\-i\fP interval +Sets the prepublication interval for a key. If set, then the +publication and activation dates must be separated by at least this +much time. If the activation date is specified but the publication +date isn\(aqt, then the publication date will default to this much time +before the activation date; conversely, if the publication date is +specified but activation date isn\(aqt, then activation will be set to +this much time after publication. +.sp +If the key is being created as an explicit successor to another key, +then the default prepublication interval is 30 days; otherwise it is +zero. +.sp +As with date offsets, if the argument is followed by one of the +suffixes \(aqy\(aq, \(aqmo\(aq, \(aqw\(aq, \(aqd\(aq, \(aqh\(aq, or \(aqmi\(aq, then the interval is +measured in years, months, weeks, days, hours, or minutes, +respectively. Without a suffix, the interval is measured in seconds. +.UNINDENT +.SH GENERATED KEYS +.sp +When \fBdnssec\-keygen\fP completes successfully, it prints a string of the +form \fBKnnnn.+aaa+iiiii\fP to the standard output. This is an +identification string for the key it has generated. +.INDENT 0.0 +.IP \(bu 2 +\fBnnnn\fP is the key name. +.IP \(bu 2 +\fBaaa\fP is the numeric representation of the algorithm. +.IP \(bu 2 +\fBiiiii\fP is the key identifier (or footprint). +.UNINDENT +.sp +\fBdnssec\-keygen\fP creates two files, with names based on the printed +string. \fBKnnnn.+aaa+iiiii.key\fP contains the public key, and +\fBKnnnn.+aaa+iiiii.private\fP contains the private key. +.sp +The \fB\&.key\fP file contains a DNSKEY or KEY record. When a zone is being +signed by \fBnamed\fP or \fBdnssec\-signzone\fP \fB\-S\fP, DNSKEY records are +included automatically. In other cases, the \fB\&.key\fP file can be +inserted into a zone file manually or with a \fB$INCLUDE\fP statement. +.sp +The \fB\&.private\fP file contains algorithm\-specific fields. For obvious +security reasons, this file does not have general read permission. +.SH EXAMPLE +.sp +To generate an ECDSAP256SHA256 zone\-signing key for the zone +\fBexample.com\fP, issue the command: +.sp +\fBdnssec\-keygen \-a ECDSAP256SHA256 example.com\fP +.sp +The command would print a string of the form: +.sp +\fBKexample.com.+013+26160\fP +.sp +In this example, \fBdnssec\-keygen\fP creates the files +\fBKexample.com.+013+26160.key\fP and \fBKexample.com.+013+26160.private\fP\&. +.sp +To generate a matching key\-signing key, issue the command: +.sp +\fBdnssec\-keygen \-a ECDSAP256SHA256 \-f KSK example.com\fP +.SH SEE ALSO +.sp +\fBdnssec\-signzone(8)\fP, BIND 9 Administrator Reference Manual, \fI\%RFC 2539\fP, +\fI\%RFC 2845\fP, \fI\%RFC 4034\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-keygen.rst b/doc/man/dnssec-keygen.rst new file mode 100644 index 0000000000..69fa337ed1 --- /dev/null +++ b/doc/man/dnssec-keygen.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-keygen.rst \ No newline at end of file diff --git a/doc/man/dnssec-revoke.8in b/doc/man/dnssec-revoke.8in new file mode 100644 index 0000000000..15c30c5202 --- /dev/null +++ b/doc/man/dnssec-revoke.8in @@ -0,0 +1,86 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-REVOKE" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-revoke \- set the REVOKED bit on a DNSSEC key +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-revoke\fP [\fB\-hr\fP] [\fB\-v\fP level] [\fB\-V\fP] [\fB\-K\fP directory] [\fB\-E\fP engine] [\fB\-f\fP] [\fB\-R\fP] {keyfile} +.SH DESCRIPTION +.sp +\fBdnssec\-revoke\fP reads a DNSSEC key file, sets the REVOKED bit on the +key as defined in \fI\%RFC 5011\fP, and creates a new pair of key files +containing the now\-revoked key. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-h\fP +Emit usage message and exit. +.TP +\fB\-K\fP directory +Sets the directory in which the key files are to reside. +.TP +\fB\-r\fP +After writing the new keyset files remove the original keyset files. +.TP +\fB\-v\fP level +Sets the debugging level. +.TP +\fB\-V\fP +Prints version information. +.TP +\fB\-E\fP engine +Specifies the cryptographic hardware to use, when applicable. +.sp +When BIND is built with OpenSSL PKCS#11 support, this defaults to the +string "pkcs11", which identifies an OpenSSL engine that can drive a +cryptographic accelerator or hardware service module. When BIND is +built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it +defaults to the path of the PKCS#11 provider library specified via +"\-\-with\-pkcs11". +.TP +\fB\-f\fP +Force overwrite: Causes \fBdnssec\-revoke\fP to write the new key pair +even if a file already exists matching the algorithm and key ID of +the revoked key. +.TP +\fB\-R\fP +Print the key tag of the key with the REVOKE bit set but do not +revoke the key. +.UNINDENT +.SH SEE ALSO +.sp +\fBdnssec\-keygen(8)\fP, BIND 9 Administrator Reference Manual, \fI\%RFC 5011\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-revoke.rst b/doc/man/dnssec-revoke.rst new file mode 100644 index 0000000000..4102e4ce86 --- /dev/null +++ b/doc/man/dnssec-revoke.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-revoke.rst \ No newline at end of file diff --git a/doc/man/dnssec-settime.8in b/doc/man/dnssec-settime.8in new file mode 100644 index 0000000000..b1d84ed9a0 --- /dev/null +++ b/doc/man/dnssec-settime.8in @@ -0,0 +1,238 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-SETTIME" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-settime \- set the key timing metadata for a DNSSEC key +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-settime\fP [\fB\-f\fP] [\fB\-K\fP directory] [\fB\-L\fP ttl] [\fB\-P\fP date/offset] [\fB\-P\fP sync date/offset] [\fB\-A\fP date/offset] [\fB\-R\fP date/offset] [\fB\-I\fP date/offset] [\fB\-D\fP date/offset] [\fB\-D\fP sync date/offset] [\fB\-S\fP key] [\fB\-i\fP interval] [\fB\-h\fP] [\fB\-V\fP] [\fB\-v\fP level] [\fB\-E\fP engine] {keyfile} [\fB\-s\fP] [\fB\-g\fP state] [\fB\-d\fP state date/offset] [\fB\-k\fP state date/offset] [\fB\-r\fP state date/offset] [\fB\-z\fP state date/offset] +.SH DESCRIPTION +.sp +\fBdnssec\-settime\fP reads a DNSSEC private key file and sets the key +timing metadata as specified by the \fB\-P\fP, \fB\-A\fP, \fB\-R\fP, \fB\-I\fP, and +\fB\-D\fP options. The metadata can then be used by \fBdnssec\-signzone\fP or +other signing software to determine when a key is to be published, +whether it should be used for signing a zone, etc. +.sp +If none of these options is set on the command line, then +\fBdnssec\-settime\fP simply prints the key timing metadata already stored +in the key. +.sp +When key metadata fields are changed, both files of a key pair +(\fBKnnnn.+aaa+iiiii.key\fP and \fBKnnnn.+aaa+iiiii.private\fP) are +regenerated. +.sp +Metadata fields are stored in the private file. A +human\-readable description of the metadata is also placed in comments in +the key file. The private file\(aqs permissions are always set to be +inaccessible to anyone other than the owner (mode 0600). +.sp +When working with state files, it is possible to update the timing metadata in +those files as well with \fB\-s\fP\&. If this option is used you can also update key +states with \fB\-d\fP (DS), \fB\-k\fP (DNSKEY), \fB\-r\fP (RRSIG of KSK), or \fB\-z\fP +(RRSIG of ZSK). Allowed states are HIDDEN, RUMOURED, OMNIPRESENT, and +UNRETENTIVE. +.sp +You can also set the goal state of the key with \fB\-g\fP\&. This should be either +HIDDEN or OMNIPRESENT (representing whether the key should be removed from the +zone, or published). +.sp +It is NOT RECOMMENDED to manipulate state files manually except for testing +purposes. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-f\fP +Force an update of an old\-format key with no metadata fields. Without +this option, \fBdnssec\-settime\fP will fail when attempting to update a +legacy key. With this option, the key will be recreated in the new +format, but with the original key data retained. The key\(aqs creation +date will be set to the present time. If no other values are +specified, then the key\(aqs publication and activation dates will also +be set to the present time. +.TP +\fB\-K\fP directory +Sets the directory in which the key files are to reside. +.TP +\fB\-L\fP ttl +Sets the default TTL to use for this key when it is converted into a +DNSKEY RR. If the key is imported into a zone, this is the TTL that +will be used for it, unless there was already a DNSKEY RRset in +place, in which case the existing TTL would take precedence. If this +value is not set and there is no existing DNSKEY RRset, the TTL will +default to the SOA TTL. Setting the default TTL to \fB0\fP or \fBnone\fP +removes it from the key. +.TP +\fB\-h\fP +Emit usage message and exit. +.TP +\fB\-V\fP +Prints version information. +.TP +\fB\-v\fP level +Sets the debugging level. +.TP +\fB\-E\fP engine +Specifies the cryptographic hardware to use, when applicable. +.sp +When BIND is built with OpenSSL PKCS#11 support, this defaults to the +string "pkcs11", which identifies an OpenSSL engine that can drive a +cryptographic accelerator or hardware service module. When BIND is +built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it +defaults to the path of the PKCS#11 provider library specified via +"\-\-with\-pkcs11". +.UNINDENT +.SH TIMING OPTIONS +.sp +Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the +argument begins with a \(aq+\(aq or \(aq\-\(aq, it is interpreted as an offset from +the present time. For convenience, if such an offset is followed by one +of the suffixes \(aqy\(aq, \(aqmo\(aq, \(aqw\(aq, \(aqd\(aq, \(aqh\(aq, or \(aqmi\(aq, then the offset is +computed in years (defined as 365 24\-hour days, ignoring leap years), +months (defined as 30 24\-hour days), weeks, days, hours, or minutes, +respectively. Without a suffix, the offset is computed in seconds. To +unset a date, use \(aqnone\(aq or \(aqnever\(aq. +.INDENT 0.0 +.TP +\fB\-P\fP date/offset +Sets the date on which a key is to be published to the zone. After +that date, the key will be included in the zone but will not be used +to sign it. +.TP +\fB\-P\fP sync date/offset +Sets the date on which CDS and CDNSKEY records that match this key +are to be published to the zone. +.TP +\fB\-A\fP date/offset +Sets the date on which the key is to be activated. After that date, +the key will be included in the zone and used to sign it. +.TP +\fB\-R\fP date/offset +Sets the date on which the key is to be revoked. After that date, the +key will be flagged as revoked. It will be included in the zone and +will be used to sign it. +.TP +\fB\-I\fP date/offset +Sets the date on which the key is to be retired. After that date, the +key will still be included in the zone, but it will not be used to +sign it. +.TP +\fB\-D\fP date/offset +Sets the date on which the key is to be deleted. After that date, the +key will no longer be included in the zone. (It may remain in the key +repository, however.) +.TP +\fB\-D\fP sync date/offset +Sets the date on which the CDS and CDNSKEY records that match this +key are to be deleted. +.TP +\fB\-S\fP predecessor key +Select a key for which the key being modified will be an explicit +successor. The name, algorithm, size, and type of the predecessor key +must exactly match those of the key being modified. The activation +date of the successor key will be set to the inactivation date of the +predecessor. The publication date will be set to the activation date +minus the prepublication interval, which defaults to 30 days. +.TP +\fB\-i\fP interval +Sets the prepublication interval for a key. If set, then the +publication and activation dates must be separated by at least this +much time. If the activation date is specified but the publication +date isn\(aqt, then the publication date will default to this much time +before the activation date; conversely, if the publication date is +specified but activation date isn\(aqt, then activation will be set to +this much time after publication. +.sp +If the key is being set to be an explicit successor to another key, +then the default prepublication interval is 30 days; otherwise it is +zero. +.sp +As with date offsets, if the argument is followed by one of the +suffixes \(aqy\(aq, \(aqmo\(aq, \(aqw\(aq, \(aqd\(aq, \(aqh\(aq, or \(aqmi\(aq, then the interval is +measured in years, months, weeks, days, hours, or minutes, +respectively. Without a suffix, the interval is measured in seconds. +.UNINDENT +.SH KEY STATE OPTIONS +.sp +Known key states are HIDDEN, RUMOURED, OMNIPRESENT and UNRETENTIVE. These should +not be set manually except for testing purposes. +.INDENT 0.0 +.TP +.B \fB\-s\fP +When setting key timing data, also update the state file. +.TP +.B \fB\-g\fP +Set the goal state for this key. Must be HIDDEN or OMNIPRESENT. +.TP +.B \fB\-d\fP +Set the DS state for this key, and when it was last changed. +.TP +.B \fB\-k\fP +Set the DNSKEY state for this key, and when it was last changed. +.TP +.B \fB\-r\fP +Set the RRSIG (KSK) state for this key, and when it was last changed. +.UNINDENT +.sp +\fB\-z\fP +.INDENT 0.0 +.INDENT 3.5 +Set the RRSIG (ZSK) state for this key, and when it was last changed. +.UNINDENT +.UNINDENT +.SH PRINTING OPTIONS +.sp +\fBdnssec\-settime\fP can also be used to print the timing metadata +associated with a key. +.INDENT 0.0 +.TP +\fB\-u\fP +Print times in UNIX epoch format. +.TP +\fB\-p\fP C/P/Psync/A/R/I/D/Dsync/all +Print a specific metadata value or set of metadata values. The \fB\-p\fP +option may be followed by one or more of the following letters or +strings to indicate which value or values to print: \fBC\fP for the +creation date, \fBP\fP for the publication date, \fBPsync\fP for the CDS +and CDNSKEY publication date, \fBA\fP for the activation date, \fBR\fP +for the revocation date, \fBI\fP for the inactivation date, \fBD\fP for +the deletion date, and \fBDsync\fP for the CDS and CDNSKEY deletion +date To print all of the metadata, use \fB\-p all\fP\&. +.UNINDENT +.SH SEE ALSO +.sp +\fBdnssec\-keygen(8)\fP, \fBdnssec\-signzone(8)\fP, BIND 9 Administrator Reference Manual, +\fI\%RFC 5011\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-settime.rst b/doc/man/dnssec-settime.rst new file mode 100644 index 0000000000..594ff52386 --- /dev/null +++ b/doc/man/dnssec-settime.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-settime.rst \ No newline at end of file diff --git a/doc/man/dnssec-signzone.8in b/doc/man/dnssec-signzone.8in new file mode 100644 index 0000000000..9b6cfdb2ee --- /dev/null +++ b/doc/man/dnssec-signzone.8in @@ -0,0 +1,412 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-SIGNZONE" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-signzone \- DNSSEC zone signing tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-signzone\fP [\fB\-a\fP] [\fB\-c\fP class] [\fB\-d\fP directory] [\fB\-D\fP] [\fB\-E\fP engine] [\fB\-e\fP end\-time] [\fB\-f\fP output\-file] [\fB\-g\fP] [\fB\-h\fP] [\fB\-i\fP interval] [\fB\-I\fP input\-format] [\fB\-j\fP jitter] [\fB\-K\fP directory] [\fB\-k\fP key] [\fB\-L\fP serial] [\fB\-M\fP maxttl] [\fB\-N\fP soa\-serial\-format] [\fB\-o\fP origin] [\fB\-O\fP output\-format] [\fB\-P\fP] [\fB\-Q\fP] [\fB\-q\fP] [\fB\-R\fP] [\fB\-S\fP] [\fB\-s\fP start\-time] [\fB\-T\fP ttl] [\fB\-t\fP] [\fB\-u\fP] [\fB\-v\fP level] [\fB\-V\fP] [\fB\-X\fP extended end\-time] [\fB\-x\fP] [\fB\-z\fP] [\fB\-3\fP salt] [\fB\-H\fP iterations] [\fB\-A\fP] {zonefile} [key...] +.SH DESCRIPTION +.sp +\fBdnssec\-signzone\fP signs a zone. It generates NSEC and RRSIG records +and produces a signed version of the zone. The security status of +delegations from the signed zone (that is, whether the child zones are +secure or not) is determined by the presence or absence of a \fBkeyset\fP +file for each child zone. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-a\fP +Verify all generated signatures. +.TP +\fB\-c\fP class +Specifies the DNS class of the zone. +.TP +\fB\-C\fP +Compatibility mode: Generate a \fBkeyset\-zonename\fP file in addition +to \fBdsset\-zonename\fP when signing a zone, for use by older versions +of \fBdnssec\-signzone\fP\&. +.TP +\fB\-d\fP directory +Look for \fBdsset\-\fP or \fBkeyset\-\fP files in \fBdirectory\fP\&. +.TP +\fB\-D\fP +Output only those record types automatically managed by +\fBdnssec\-signzone\fP, i.e. RRSIG, NSEC, NSEC3 and NSEC3PARAM records. +If smart signing (\fB\-S\fP) is used, DNSKEY records are also included. +The resulting file can be included in the original zone file with +\fB$INCLUDE\fP\&. This option cannot be combined with \fB\-O raw\fP, +\fB\-O map\fP, or serial number updating. +.TP +\fB\-E\fP engine +When applicable, specifies the hardware to use for cryptographic +operations, such as a secure key store used for signing. +.sp +When BIND is built with OpenSSL PKCS#11 support, this defaults to the +string "pkcs11", which identifies an OpenSSL engine that can drive a +cryptographic accelerator or hardware service module. When BIND is +built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it +defaults to the path of the PKCS#11 provider library specified via +"\-\-with\-pkcs11". +.TP +\fB\-g\fP +Generate DS records for child zones from \fBdsset\-\fP or \fBkeyset\-\fP +file. Existing DS records will be removed. +.TP +\fB\-K\fP directory +Key repository: Specify a directory to search for DNSSEC keys. If not +specified, defaults to the current directory. +.TP +\fB\-k\fP key +Treat specified key as a key signing key ignoring any key flags. This +option may be specified multiple times. +.TP +\fB\-M\fP maxttl +Sets the maximum TTL for the signed zone. Any TTL higher than maxttl +in the input zone will be reduced to maxttl in the output. This +provides certainty as to the largest possible TTL in the signed zone, +which is useful to know when rolling keys because it is the longest +possible time before signatures that have been retrieved by resolvers +will expire from resolver caches. Zones that are signed with this +option should be configured to use a matching \fBmax\-zone\-ttl\fP in +\fBnamed.conf\fP\&. (Note: This option is incompatible with \fB\-D\fP, +because it modifies non\-DNSSEC data in the output zone.) +.TP +\fB\-s\fP start\-time +Specify the date and time when the generated RRSIG records become +valid. This can be either an absolute or relative time. An absolute +start time is indicated by a number in YYYYMMDDHHMMSS notation; +20000530144500 denotes 14:45:00 UTC on May 30th, 2000. A relative +start time is indicated by +N, which is N seconds from the current +time. If no \fBstart\-time\fP is specified, the current time minus 1 +hour (to allow for clock skew) is used. +.TP +\fB\-e\fP end\-time +Specify the date and time when the generated RRSIG records expire. As +with \fBstart\-time\fP, an absolute time is indicated in YYYYMMDDHHMMSS +notation. A time relative to the start time is indicated with +N, +which is N seconds from the start time. A time relative to the +current time is indicated with now+N. If no \fBend\-time\fP is +specified, 30 days from the start time is used as a default. +\fBend\-time\fP must be later than \fBstart\-time\fP\&. +.TP +\fB\-X\fP extended end\-time +Specify the date and time when the generated RRSIG records for the +DNSKEY RRset will expire. This is to be used in cases when the DNSKEY +signatures need to persist longer than signatures on other records; +e.g., when the private component of the KSK is kept offline and the +KSK signature is to be refreshed manually. +.sp +As with \fBstart\-time\fP, an absolute time is indicated in +YYYYMMDDHHMMSS notation. A time relative to the start time is +indicated with +N, which is N seconds from the start time. A time +relative to the current time is indicated with now+N. If no +\fBextended end\-time\fP is specified, the value of \fBend\-time\fP is used +as the default. (\fBend\-time\fP, in turn, defaults to 30 days from the +start time.) \fBextended end\-time\fP must be later than \fBstart\-time\fP\&. +.TP +\fB\-f\fP output\-file +The name of the output file containing the signed zone. The default +is to append \fB\&.signed\fP to the input filename. If \fBoutput\-file\fP is +set to \fB"\-"\fP, then the signed zone is written to the standard +output, with a default output format of "full". +.TP +\fB\-h\fP +Prints a short summary of the options and arguments to +\fBdnssec\-signzone\fP\&. +.TP +\fB\-V\fP +Prints version information. +.TP +\fB\-i\fP interval +When a previously\-signed zone is passed as input, records may be +resigned. The \fBinterval\fP option specifies the cycle interval as an +offset from the current time (in seconds). If a RRSIG record expires +after the cycle interval, it is retained. Otherwise, it is considered +to be expiring soon, and it will be replaced. +.sp +The default cycle interval is one quarter of the difference between +the signature end and start times. So if neither \fBend\-time\fP or +\fBstart\-time\fP are specified, \fBdnssec\-signzone\fP generates +signatures that are valid for 30 days, with a cycle interval of 7.5 +days. Therefore, if any existing RRSIG records are due to expire in +less than 7.5 days, they would be replaced. +.TP +\fB\-I\fP input\-format +The format of the input zone file. Possible formats are \fB"text"\fP +(default), \fB"raw"\fP, and \fB"map"\fP\&. This option is primarily +intended to be used for dynamic signed zones so that the dumped zone +file in a non\-text format containing updates can be signed directly. +The use of this option does not make much sense for non\-dynamic +zones. +.TP +\fB\-j\fP jitter +When signing a zone with a fixed signature lifetime, all RRSIG +records issued at the time of signing expires simultaneously. If the +zone is incrementally signed, i.e. a previously\-signed zone is passed +as input to the signer, all expired signatures have to be regenerated +at about the same time. The \fBjitter\fP option specifies a jitter +window that will be used to randomize the signature expire time, thus +spreading incremental signature regeneration over time. +.sp +Signature lifetime jitter also to some extent benefits validators and +servers by spreading out cache expiration, i.e. if large numbers of +RRSIGs don\(aqt expire at the same time from all caches there will be +less congestion than if all validators need to refetch at mostly the +same time. +.TP +\fB\-L\fP serial +When writing a signed zone to "raw" or "map" format, set the "source +serial" value in the header to the specified serial number. (This is +expected to be used primarily for testing purposes.) +.TP +\fB\-n\fP ncpus +Specifies the number of threads to use. By default, one thread is +started for each detected CPU. +.TP +\fB\-N\fP soa\-serial\-format +The SOA serial number format of the signed zone. Possible formats are +\fB"keep"\fP (default), \fB"increment"\fP, \fB"unixtime"\fP, and +\fB"date"\fP\&. +.INDENT 7.0 +.TP +.B \fB"keep"\fP +Do not modify the SOA serial number. +.TP +.B \fB"increment"\fP +Increment the SOA serial number using \fI\%RFC 1982\fP arithmetic. +.TP +.B \fB"unixtime"\fP +Set the SOA serial number to the number of seconds since epoch. +.TP +.B \fB"date"\fP +Set the SOA serial number to today\(aqs date in YYYYMMDDNN format. +.UNINDENT +.TP +\fB\-o\fP origin +The zone origin. If not specified, the name of the zone file is +assumed to be the origin. +.TP +\fB\-O\fP output\-format +The format of the output file containing the signed zone. Possible +formats are \fB"text"\fP (default), which is the standard textual +representation of the zone; \fB"full"\fP, which is text output in a +format suitable for processing by external scripts; and \fB"map"\fP, +\fB"raw"\fP, and \fB"raw=N"\fP, which store the zone in binary formats +for rapid loading by \fBnamed\fP\&. \fB"raw=N"\fP specifies the format +version of the raw zone file: if N is 0, the raw file can be read by +any version of \fBnamed\fP; if N is 1, the file can be read by release +9.9.0 or higher; the default is 1. +.TP +\fB\-P\fP +Disable post sign verification tests. +.sp +The post sign verification test ensures that for each algorithm in +use there is at least one non revoked self signed KSK key, that all +revoked KSK keys are self signed, and that all records in the zone +are signed by the algorithm. This option skips these tests. +.TP +\fB\-Q\fP +Remove signatures from keys that are no longer active. +.sp +Normally, when a previously\-signed zone is passed as input to the +signer, and a DNSKEY record has been removed and replaced with a new +one, signatures from the old key that are still within their validity +period are retained. This allows the zone to continue to validate +with cached copies of the old DNSKEY RRset. The \fB\-Q\fP forces +\fBdnssec\-signzone\fP to remove signatures from keys that are no longer +active. This enables ZSK rollover using the procedure described in +\fI\%RFC 4641#4.2.1.1\fP ("Pre\-Publish Key Rollover"). +.TP +.B \fB\-q\fP +Quiet mode: Suppresses unnecessary output. Without this option, when +\fBdnssec\-signzone\fP is run it will print to standard output the number of +keys in use, the algorithms used to verify the zone was signed correctly and +other status information, and finally the filename containing the signed +zone. With it, that output is suppressed, leaving only the filename. +.TP +\fB\-R\fP +Remove signatures from keys that are no longer published. +.sp +This option is similar to \fB\-Q\fP, except it forces +\fBdnssec\-signzone\fP to signatures from keys that are no longer +published. This enables ZSK rollover using the procedure described in +\fI\%RFC 4641#4.2.1.2\fP ("Double Signature Zone Signing Key +Rollover"). +.TP +\fB\-S\fP +Smart signing: Instructs \fBdnssec\-signzone\fP to search the key +repository for keys that match the zone being signed, and to include +them in the zone if appropriate. +.sp +When a key is found, its timing metadata is examined to determine how +it should be used, according to the following rules. Each successive +rule takes priority over the prior ones: +.INDENT 7.0 +.INDENT 3.5 +If no timing metadata has been set for the key, the key is +published in the zone and used to sign the zone. +.sp +If the key\(aqs publication date is set and is in the past, the key +is published in the zone. +.sp +If the key\(aqs activation date is set and in the past, the key is +published (regardless of publication date) and used to sign the +zone. +.sp +If the key\(aqs revocation date is set and in the past, and the key +is published, then the key is revoked, and the revoked key is used +to sign the zone. +.sp +If either of the key\(aqs unpublication or deletion dates are set and +in the past, the key is NOT published or used to sign the zone, +regardless of any other metadata. +.sp +If key\(aqs sync publication date is set and in the past, +synchronization records (type CDS and/or CDNSKEY) are created. +.sp +If key\(aqs sync deletion date is set and in the past, +synchronization records (type CDS and/or CDNSKEY) are removed. +.UNINDENT +.UNINDENT +.TP +\fB\-T\fP ttl +Specifies a TTL to be used for new DNSKEY records imported into the +zone from the key repository. If not specified, the default is the +TTL value from the zone\(aqs SOA record. This option is ignored when +signing without \fB\-S\fP, since DNSKEY records are not imported from +the key repository in that case. It is also ignored if there are any +pre\-existing DNSKEY records at the zone apex, in which case new +records\(aq TTL values will be set to match them, or if any of the +imported DNSKEY records had a default TTL value. In the event of a a +conflict between TTL values in imported keys, the shortest one is +used. +.TP +\fB\-t\fP +Print statistics at completion. +.TP +\fB\-u\fP +Update NSEC/NSEC3 chain when re\-signing a previously signed zone. +With this option, a zone signed with NSEC can be switched to NSEC3, +or a zone signed with NSEC3 can be switch to NSEC or to NSEC3 with +different parameters. Without this option, \fBdnssec\-signzone\fP will +retain the existing chain when re\-signing. +.TP +\fB\-v\fP level +Sets the debugging level. +.TP +\fB\-x\fP +Only sign the DNSKEY, CDNSKEY, and CDS RRsets with key\-signing keys, +and omit signatures from zone\-signing keys. (This is similar to the +\fBdnssec\-dnskey\-kskonly yes;\fP zone option in \fBnamed\fP\&.) +.TP +\fB\-z\fP +Ignore KSK flag on key when determining what to sign. This causes +KSK\-flagged keys to sign all records, not just the DNSKEY RRset. +(This is similar to the \fBupdate\-check\-ksk no;\fP zone option in +\fBnamed\fP\&.) +.TP +\fB\-3\fP salt +Generate an NSEC3 chain with the given hex encoded salt. A dash +(salt) can be used to indicate that no salt is to be used when +generating the NSEC3 chain. +.TP +\fB\-H\fP iterations +When generating an NSEC3 chain, use this many iterations. The default +is 10. +.TP +\fB\-A\fP +When generating an NSEC3 chain set the OPTOUT flag on all NSEC3 +records and do not generate NSEC3 records for insecure delegations. +.sp +Using this option twice (i.e., \fB\-AA\fP) turns the OPTOUT flag off for +all records. This is useful when using the \fB\-u\fP option to modify an +NSEC3 chain which previously had OPTOUT set. +.TP +\fBzonefile\fP +The file containing the zone to be signed. +.TP +\fBkey\fP +Specify which keys should be used to sign the zone. If no keys are +specified, then the zone will be examined for DNSKEY records at the +zone apex. If these are found and there are matching private keys, in +the current directory, then these will be used for signing. +.UNINDENT +.SH EXAMPLE +.sp +The following command signs the \fBexample.com\fP zone with the +ECDSAP256SHA256 key generated by key generated by \fBdnssec\-keygen\fP +(Kexample.com.+013+17247). Because the \fB\-S\fP option is not being used, +the zone\(aqs keys must be in the master file (\fBdb.example.com\fP). This +invocation looks for \fBdsset\fP files, in the current directory, so that +DS records can be imported from them (\fB\-g\fP). +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +% dnssec\-signzone \-g \-o example.com db.example.com \e +Kexample.com.+013+17247 +db.example.com.signed +% +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +In the above example, \fBdnssec\-signzone\fP creates the file +\fBdb.example.com.signed\fP\&. This file should be referenced in a zone +statement in a \fBnamed.conf\fP file. +.sp +This example re\-signs a previously signed zone with default parameters. +The private keys are assumed to be in the current directory. +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +% cp db.example.com.signed db.example.com +% dnssec\-signzone \-o example.com db.example.com +db.example.com.signed +% +.ft P +.fi +.UNINDENT +.UNINDENT +.SH SEE ALSO +.sp +\fBdnssec\-keygen(8)\fP, BIND 9 Administrator Reference Manual, \fI\%RFC 4033\fP, +\fI\%RFC 4641\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-signzone.rst b/doc/man/dnssec-signzone.rst new file mode 100644 index 0000000000..1815a715dc --- /dev/null +++ b/doc/man/dnssec-signzone.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-signzone.rst \ No newline at end of file diff --git a/doc/man/dnssec-verify.8in b/doc/man/dnssec-verify.8in new file mode 100644 index 0000000000..3d07560edb --- /dev/null +++ b/doc/man/dnssec-verify.8in @@ -0,0 +1,113 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSSEC-VERIFY" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnssec-verify \- DNSSEC zone verification tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnssec\-verify\fP [\fB\-c\fP class] [\fB\-E\fP engine] [\fB\-I\fP input\-format] [\fB\-o\fP origin] [\fB\-q\fP] [\fB\-v\fP level] [\fB\-V\fP] [\fB\-x\fP] [\fB\-z\fP] {zonefile} +.SH DESCRIPTION +.sp +\fBdnssec\-verify\fP verifies that a zone is fully signed for each +algorithm found in the DNSKEY RRset for the zone, and that the NSEC / +NSEC3 chains are complete. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-c\fP class +Specifies the DNS class of the zone. +.TP +\fB\-E\fP engine +Specifies the cryptographic hardware to use, when applicable. +.sp +When BIND is built with OpenSSL PKCS#11 support, this defaults to the +string "pkcs11", which identifies an OpenSSL engine that can drive a +cryptographic accelerator or hardware service module. When BIND is +built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it +defaults to the path of the PKCS#11 provider library specified via +"\-\-with\-pkcs11". +.TP +\fB\-I\fP input\-format +The format of the input zone file. Possible formats are \fB"text"\fP +(default) and \fB"raw"\fP\&. This option is primarily intended to be used +for dynamic signed zones so that the dumped zone file in a non\-text +format containing updates can be verified independently. The use of +this option does not make much sense for non\-dynamic zones. +.TP +\fB\-o\fP origin +The zone origin. If not specified, the name of the zone file is +assumed to be the origin. +.TP +\fB\-v\fP level +Sets the debugging level. +.TP +\fB\-V\fP +Prints version information. +.TP +.B \fB\-q\fP +Quiet mode: Suppresses output. Without this option, when \fBdnssec\-verify\fP +is run it will print to standard output the number of keys in use, the +algorithms used to verify the zone was signed correctly and other status +information. With it, all non\-error output is suppressed, and only the exit +code will indicate success. +.TP +\fB\-x\fP +Only verify that the DNSKEY RRset is signed with key\-signing keys. +Without this flag, it is assumed that the DNSKEY RRset will be signed +by all active keys. When this flag is set, it will not be an error if +the DNSKEY RRset is not signed by zone\-signing keys. This corresponds +to the \fB\-x\fP option in \fBdnssec\-signzone\fP\&. +.TP +\fB\-z\fP +Ignore the KSK flag on the keys when determining whether the zone if +correctly signed. Without this flag it is assumed that there will be +a non\-revoked, self\-signed DNSKEY with the KSK flag set for each +algorithm and that RRsets other than DNSKEY RRset will be signed with +a different DNSKEY without the KSK flag set. +.sp +With this flag set, we only require that for each algorithm, there +will be at least one non\-revoked, self\-signed DNSKEY, regardless of +the KSK flag state, and that other RRsets will be signed by a +non\-revoked key for the same algorithm that includes the self\-signed +key; the same key may be used for both purposes. This corresponds to +the \fB\-z\fP option in \fBdnssec\-signzone\fP\&. +.TP +\fBzonefile\fP +The file containing the zone to be signed. +.UNINDENT +.SH SEE ALSO +.sp +\fBdnssec\-signzone(8)\fP, BIND 9 Administrator Reference Manual, \fI\%RFC 4033\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnssec-verify.rst b/doc/man/dnssec-verify.rst new file mode 100644 index 0000000000..7fcd92e9e4 --- /dev/null +++ b/doc/man/dnssec-verify.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dnssec/dnssec-verify.rst \ No newline at end of file diff --git a/doc/man/dnstap-read.1in b/doc/man/dnstap-read.1in new file mode 100644 index 0000000000..2ea914cc1e --- /dev/null +++ b/doc/man/dnstap-read.1in @@ -0,0 +1,67 @@ +.\" Man page generated from reStructuredText. +. +.TH "DNSTAP-READ" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +dnstap-read \- print dnstap data in human-readable form +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBdnstap\-read\fP [\fB\-m\fP] [\fB\-p\fP] [\fB\-x\fP] [\fB\-y\fP] {file} +.SH DESCRIPTION +.sp +\fBdnstap\-read\fP reads \fBdnstap\fP data from a specified file and prints +it in a human\-readable format. By default, \fBdnstap\fP data is printed in +a short summary format, but if the \fB\-y\fP option is specified, then a +longer and more detailed YAML format is used instead. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-m\fP +Trace memory allocations; used for debugging memory leaks. +.TP +\fB\-p\fP +After printing the \fBdnstap\fP data, print the text form of the DNS +message that was encapsulated in the \fBdnstap\fP frame. +.TP +\fB\-x\fP +After printing the \fBdnstap\fP data, print a hex dump of the wire form +of the DNS message that was encapsulated in the \fBdnstap\fP frame. +.TP +\fB\-y\fP +Print \fBdnstap\fP data in a detailed YAML format. +.UNINDENT +.SH SEE ALSO +.sp +\fBnamed(8)\fP, \fBrndc(8)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/dnstap-read.rst b/doc/man/dnstap-read.rst new file mode 100644 index 0000000000..e08c861052 --- /dev/null +++ b/doc/man/dnstap-read.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/tools/dnstap-read.rst \ No newline at end of file diff --git a/doc/man/filter-aaaa.8in b/doc/man/filter-aaaa.8in new file mode 100644 index 0000000000..799fb5249d --- /dev/null +++ b/doc/man/filter-aaaa.8in @@ -0,0 +1,110 @@ +.\" Man page generated from reStructuredText. +. +.TH "FILTER-AAAA" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +filter-aaaa \- filter AAAA in DNS responses when A is present +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBplugin query\fP "filter\-aaaa.so" [{ parameters }]; +.SH DESCRIPTION +.sp +\fBfilter\-aaaa.so\fP is a query plugin module for \fBnamed\fP, enabling +\fBnamed\fP to omit some IPv6 addresses when responding to clients. +.sp +Until BIND 9.12, this feature was implemented natively in \fBnamed\fP and +enabled with the \fBfilter\-aaaa\fP ACL and the \fBfilter\-aaaa\-on\-v4\fP and +\fBfilter\-aaaa\-on\-v6\fP options. These options are now deprecated in +\fBnamed.conf\fP, but can be passed as parameters to the +\fBfilter\-aaaa.so\fP plugin, for example: +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +plugin query "/usr/local/lib/filter\-aaaa.so" { + filter\-aaaa\-on\-v4 yes; + filter\-aaaa\-on\-v6 yes; + filter\-aaaa { 192.0.2.1; 2001:db8:2::1; }; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +This module is intended to aid transition from IPv4 to IPv6 by +withholding IPv6 addresses from DNS clients which are not connected to +the IPv6 Internet, when the name being looked up has an IPv4 address +available. Use of this module is not recommended unless absolutely +necessary. +.sp +Note: This mechanism can erroneously cause other servers not to give +AAAA records to their clients. If a recursing server with both IPv6 and +IPv4 network connections queries an authoritative server using this +mechanism via IPv4, it will be denied AAAA records even if its client is +using IPv6. +.SH OPTIONS +.INDENT 0.0 +.TP +.B \fBfilter\-aaaa\fP +Specifies a list of client addresses for which AAAA filtering is to +be applied. The default is \fBany\fP\&. +.TP +.B \fBfilter\-aaaa\-on\-v4\fP +If set to \fByes\fP, the DNS client is at an IPv4 address, in +\fBfilter\-aaaa\fP, and if the response does not include DNSSEC +signatures, then all AAAA records are deleted from the response. This +filtering applies to all responses and not only authoritative +responses. +.sp +If set to \fBbreak\-dnssec\fP, then AAAA records are deleted even when +DNSSEC is enabled. As suggested by the name, this causes the response +to fail to verify, because the DNSSEC protocol is designed to detect +deletions. +.sp +This mechanism can erroneously cause other servers not to give AAAA +records to their clients. A recursing server with both IPv6 and IPv4 +network connections that queries an authoritative server using this +mechanism via IPv4 will be denied AAAA records even if its client is +using IPv6. +.TP +.B \fBfilter\-aaaa\-on\-v6\fP +Identical to \fBfilter\-aaaa\-on\-v4\fP, except it filters AAAA responses +to queries from IPv6 clients instead of IPv4 clients. To filter all +responses, set both options to \fByes\fP\&. +.UNINDENT +.SH SEE ALSO +.sp +BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/filter-aaaa.rst b/doc/man/filter-aaaa.rst new file mode 100644 index 0000000000..17b6e1423b --- /dev/null +++ b/doc/man/filter-aaaa.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/plugins/filter-aaaa.rst \ No newline at end of file diff --git a/doc/man/host.1in b/doc/man/host.1in new file mode 100644 index 0000000000..00bc543e9b --- /dev/null +++ b/doc/man/host.1in @@ -0,0 +1,182 @@ +.\" Man page generated from reStructuredText. +. +.TH "HOST" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +host \- DNS lookup utility +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBhost\fP [\fB\-aACdlnrsTUwv\fP] [\fB\-c\fP class] [\fB\-N\fP ndots] [\fB\-p\fP port] [\fB\-R\fP number] [\fB\-t\fP type] [\fB\-W\fP wait] [\fB\-m\fP flag] [ [\fB\-4\fP] | [\fB\-6\fP] ] [\fB\-v\fP] [\fB\-V\fP] {name} [server] +.SH DESCRIPTION +.sp +\fBhost\fP is a simple utility for performing DNS lookups. It is normally +used to convert names to IP addresses and vice versa. When no arguments +or options are given, \fBhost\fP prints a short summary of its command +line arguments and options. +.sp +\fBname\fP is the domain name that is to be looked up. It can also be a +dotted\-decimal IPv4 address or a colon\-delimited IPv6 address, in which +case \fBhost\fP will by default perform a reverse lookup for that address. +\fBserver\fP is an optional argument which is either the name or IP +address of the name server that \fBhost\fP should query instead of the +server or servers listed in \fB/etc/resolv.conf\fP\&. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-4\fP +Use IPv4 only for query transport. See also the \fB\-6\fP option. +.TP +\fB\-6\fP +Use IPv6 only for query transport. See also the \fB\-4\fP option. +.TP +\fB\-a\fP +"All". The \fB\-a\fP option is normally equivalent to \fB\-v \-t ANY\fP\&. It +also affects the behaviour of the \fB\-l\fP list zone option. +.TP +\fB\-A\fP +"Almost all". The \fB\-A\fP option is equivalent to \fB\-a\fP except RRSIG, +NSEC, and NSEC3 records are omitted from the output. +.TP +\fB\-c\fP class +Query class: This can be used to lookup HS (Hesiod) or CH (Chaosnet) +class resource records. The default class is IN (Internet). +.TP +\fB\-C\fP +Check consistency: \fBhost\fP will query the SOA records for zone +\fBname\fP from all the listed authoritative name servers for that +zone. The list of name servers is defined by the NS records that are +found for the zone. +.TP +\fB\-d\fP +Print debugging traces. Equivalent to the \fB\-v\fP verbose option. +.TP +\fB\-l\fP +List zone: The \fBhost\fP command performs a zone transfer of zone +\fBname\fP and prints out the NS, PTR and address records (A/AAAA). +.sp +Together, the \fB\-l \-a\fP options print all records in the zone. +.TP +\fB\-N\fP ndots +The number of dots that have to be in \fBname\fP for it to be +considered absolute. The default value is that defined using the +ndots statement in \fB/etc/resolv.conf\fP, or 1 if no ndots statement +is present. Names with fewer dots are interpreted as relative names +and will be searched for in the domains listed in the \fBsearch\fP or +\fBdomain\fP directive in \fB/etc/resolv.conf\fP\&. +.TP +\fB\-p\fP port +Specify the port on the server to query. The default is 53. +.TP +\fB\-r\fP +Non\-recursive query: Setting this option clears the RD (recursion +desired) bit in the query. This should mean that the name server +receiving the query will not attempt to resolve \fBname\fP\&. The \fB\-r\fP +option enables \fBhost\fP to mimic the behavior of a name server by +making non\-recursive queries and expecting to receive answers to +those queries that can be referrals to other name servers. +.TP +\fB\-R\fP number +Number of retries for UDP queries: If \fBnumber\fP is negative or zero, +the number of retries will default to 1. The default value is 1, or +the value of the \fBattempts\fP option in \fB/etc/resolv.conf\fP, if set. +.TP +\fB\-s\fP +Do \fInot\fP send the query to the next nameserver if any server responds +with a SERVFAIL response, which is the reverse of normal stub +resolver behavior. +.TP +\fB\-t\fP type +Query type: The \fBtype\fP argument can be any recognized query type: +CNAME, NS, SOA, TXT, DNSKEY, AXFR, etc. +.sp +When no query type is specified, \fBhost\fP automatically selects an +appropriate query type. By default, it looks for A, AAAA, and MX +records. If the \fB\-C\fP option is given, queries will be made for SOA +records. If \fBname\fP is a dotted\-decimal IPv4 address or +colon\-delimited IPv6 address, \fBhost\fP will query for PTR records. +.sp +If a query type of IXFR is chosen the starting serial number can be +specified by appending an equal followed by the starting serial +number (like \fB\-t IXFR=12345678\fP). +.TP +\fB\-T\fP; \fB\-U\fP +TCP/UDP: By default, \fBhost\fP uses UDP when making queries. The +\fB\-T\fP option makes it use a TCP connection when querying the name +server. TCP will be automatically selected for queries that require +it, such as zone transfer (AXFR) requests. Type ANY queries default +to TCP but can be forced to UDP initially using \fB\-U\fP\&. +.TP +\fB\-m\fP flag +Memory usage debugging: the flag can be \fBrecord\fP, \fBusage\fP, or +\fBtrace\fP\&. You can specify the \fB\-m\fP option more than once to set +multiple flags. +.TP +\fB\-v\fP +Verbose output. Equivalent to the \fB\-d\fP debug option. Verbose output +can also be enabled by setting the \fBdebug\fP option in +\fB/etc/resolv.conf\fP\&. +.TP +\fB\-V\fP +Print the version number and exit. +.TP +\fB\-w\fP +Wait forever: The query timeout is set to the maximum possible. See +also the \fB\-W\fP option. +.TP +\fB\-W\fP wait +Timeout: Wait for up to \fBwait\fP seconds for a reply. If \fBwait\fP is +less than one, the wait interval is set to one second. +.sp +By default, \fBhost\fP will wait for 5 seconds for UDP responses and 10 +seconds for TCP connections. These defaults can be overridden by the +\fBtimeout\fP option in \fB/etc/resolv.conf\fP\&. +.sp +See also the \fB\-w\fP option. +.UNINDENT +.SH IDN SUPPORT +.sp +If \fBhost\fP has been built with IDN (internationalized domain name) +support, it can accept and display non\-ASCII domain names. \fBhost\fP +appropriately converts character encoding of domain name before sending +a request to DNS server or displaying a reply from the server. If you\(aqd +like to turn off the IDN support for some reason, define the IDN_DISABLE +environment variable. The IDN support is disabled if the variable is set +when \fBhost\fP runs. +.SH FILES +.sp +\fB/etc/resolv.conf\fP +.SH SEE ALSO +.sp +\fBdig(1)\fP, \fBnamed(8)\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/host.rst b/doc/man/host.rst new file mode 100644 index 0000000000..67e863aa97 --- /dev/null +++ b/doc/man/host.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dig/host.rst \ No newline at end of file diff --git a/doc/man/index.rst b/doc/man/index.rst new file mode 100644 index 0000000000..30e0221746 --- /dev/null +++ b/doc/man/index.rst @@ -0,0 +1,9 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. diff --git a/doc/man/mdig.1in b/doc/man/mdig.1in new file mode 100644 index 0000000000..2129cdd311 --- /dev/null +++ b/doc/man/mdig.1in @@ -0,0 +1,321 @@ +.\" Man page generated from reStructuredText. +. +.TH "MDIG" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +mdig \- DNS pipelined lookup utility +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBmdig\fP \fI\%{@server\fP} [\fB\-f\fP filename] [\fB\-h\fP] [\fB\-v\fP] [ [\fB\-4\fP] | [\fB\-6\fP] ] [\fB\-m\fP] [\fB\-b\fP address] [\fB\-p\fP port#] [\fB\-c\fP class] [\fB\-t\fP type] [\fB\-i\fP] [\fB\-x\fP addr] [plusopt...] +.sp +\fBmdig\fP {\fB\-h\fP} +.sp +\fBmdig\fP [@server] {global\-opt...} { {local\-opt...} {query} ...} +.SH DESCRIPTION +.sp +\fBmdig\fP is a multiple/pipelined query version of \fBdig\fP: instead of +waiting for a response after sending each query, it begins by sending +all queries. Responses are displayed in the order in which they are +received, not in the order the corresponding queries were sent. +.sp +\fBmdig\fP options are a subset of the \fBdig\fP options, and are divided +into "anywhere options" which can occur anywhere, "global options" which +must occur before the query name (or they are ignored with a warning), +and "local options" which apply to the next query on the command line. +.sp +The @server option is a mandatory global option. It is the name or IP +address of the name server to query. (Unlike \fBdig\fP, this value is not +retrieved from \fB/etc/resolv.conf\fP\&.) It can be an IPv4 address in +dotted\-decimal notation, an IPv6 address in colon\-delimited notation, or +a hostname. When the supplied \fBserver\fP argument is a hostname, +\fBmdig\fP resolves that name before querying the name server. +.sp +\fBmdig\fP provides a number of query options which affect the way in +which lookups are made and the results displayed. Some of these set or +reset flag bits in the query header, some determine which sections of +the answer get printed, and others determine the timeout and retry +strategies. +.sp +Each query option is identified by a keyword preceded by a plus sign +(\fB+\fP). Some keywords set or reset an option. These may be preceded by +the string \fBno\fP to negate the meaning of that keyword. Other keywords +assign values to options like the timeout interval. They have the form +\fB+keyword=value\fP\&. +.SH ANYWHERE OPTIONS +.sp +The \fB\-f\fP option makes \fBmdig\fP operate in batch mode by reading a list +of lookup requests to process from the file \fBfilename\fP\&. The file +contains a number of queries, one per line. Each entry in the file +should be organized in the same way they would be presented as queries +to \fBmdig\fP using the command\-line interface. +.sp +The \fB\-h\fP causes \fBmdig\fP to print the detailed help with the full list +of options and exit. +.sp +The \fB\-v\fP causes \fBmdig\fP to print the version number and exit. +.SH GLOBAL OPTIONS +.sp +The \fB\-4\fP option forces \fBmdig\fP to only use IPv4 query transport. +.sp +The \fB\-6\fP option forces \fBmdig\fP to only use IPv6 query transport. +.sp +The \fB\-b\fP option sets the source IP address of the query to +\fBaddress\fP\&. This must be a valid address on one of the host\(aqs network +interfaces or "0.0.0.0" or "::". An optional port may be specified by +appending "#" +.sp +The \fB\-m\fP option enables memory usage debugging. +.sp +The \fB\-p\fP option is used when a non\-standard port number is to be +queried. \fBport#\fP is the port number that \fBmdig\fP will send its +queries instead of the standard DNS port number 53. This option would be +used to test a name server that has been configured to listen for +queries on a non\-standard port number. +.sp +The global query options are: +.INDENT 0.0 +.TP +.B \fB+[no]additional\fP +Display [do not display] the additional section of a reply. The +default is to display it. +.TP +.B \fB+[no]all\fP +Set or clear all display flags. +.TP +.B \fB+[no]answer\fP +Display [do not display] the answer section of a reply. The default +is to display it. +.TP +.B \fB+[no]authority\fP +Display [do not display] the authority section of a reply. The +default is to display it. +.TP +.B \fB+[no]besteffort\fP +Attempt to display the contents of messages which are malformed. The +default is to not display malformed answers. +.TP +.B \fB+[no]cl\fP +Display [do not display] the CLASS when printing the record. +.TP +.B \fB+[no]comments\fP +Toggle the display of comment lines in the output. The default is to +print comments. +.TP +.B \fB+[no]continue\fP +Continue on errors (e.g. timeouts). +.TP +.B \fB+[no]crypto\fP +Toggle the display of cryptographic fields in DNSSEC records. The +contents of these field are unnecessary to debug most DNSSEC +validation failures and removing them makes it easier to see the +common failures. The default is to display the fields. When omitted +they are replaced by the string "[omitted]" or in the DNSKEY case the +key id is displayed as the replacement, e.g. "[ key id = value ]". +.TP +.B \fB+dscp[=value]\fP +Set the DSCP code point to be used when sending the query. Valid DSCP +code points are in the range [0..63]. By default no code point is +explicitly set. +.TP +.B \fB+[no]multiline\fP +Print records like the SOA records in a verbose multi\-line format +with human\-readable comments. The default is to print each record on +a single line, to facilitate machine parsing of the \fBmdig\fP output. +.TP +.B \fB+[no]question\fP +Print [do not print] the question section of a query when an answer +is returned. The default is to print the question section as a +comment. +.TP +.B \fB+[no]rrcomments\fP +Toggle the display of per\-record comments in the output (for example, +human\-readable key information about DNSKEY records). The default is +not to print record comments unless multiline mode is active. +.TP +.B \fB+[no]short\fP +Provide a terse answer. The default is to print the answer in a +verbose form. +.TP +.B \fB+split=W\fP +Split long hex\- or base64\-formatted fields in resource records into +chunks of \fBW\fP characters (where \fBW\fP is rounded up to the nearest +multiple of 4). \fB+nosplit\fP or \fB+split=0\fP causes fields not to be +split at all. The default is 56 characters, or 44 characters when +multiline mode is active. +.TP +.B \fB+[no]tcp\fP +Use [do not use] TCP when querying name servers. The default behavior +is to use UDP. +.TP +.B \fB+[no]ttlid\fP +Display [do not display] the TTL when printing the record. +.TP +.B \fB+[no]ttlunits\fP +Display [do not display] the TTL in friendly human\-readable time +units of "s", "m", "h", "d", and "w", representing seconds, minutes, +hours, days and weeks. Implies +ttlid. +.TP +.B \fB+[no]vc\fP +Use [do not use] TCP when querying name servers. This alternate +syntax to \fB+[no]tcp\fP is provided for backwards compatibility. The +"vc" stands for "virtual circuit". +.UNINDENT +.SH LOCAL OPTIONS +.sp +The \fB\-c\fP option sets the query class to \fBclass\fP\&. It can be any valid +query class which is supported in BIND 9. The default query class is +"IN". +.sp +The \fB\-t\fP option sets the query type to \fBtype\fP\&. It can be any valid +query type which is supported in BIND 9. The default query type is "A", +unless the \fB\-x\fP option is supplied to indicate a reverse lookup with +the "PTR" query type. +.sp +Reverse lookups MDASH mapping addresses to names MDASH are simplified by +the \fB\-x\fP option. \fBaddr\fP is an IPv4 address in dotted\-decimal +notation, or a colon\-delimited IPv6 address. \fBmdig\fP automatically +performs a lookup for a query name like \fB11.12.13.10.in\-addr.arpa\fP and +sets the query type and class to PTR and IN respectively. By default, +IPv6 addresses are looked up using nibble format under the IP6.ARPA +domain. +.sp +The local query options are: +.INDENT 0.0 +.TP +.B \fB+[no]aaflag\fP +A synonym for \fB+[no]aaonly\fP\&. +.TP +.B \fB+[no]aaonly\fP +Sets the "aa" flag in the query. +.TP +.B \fB+[no]adflag\fP +Set [do not set] the AD (authentic data) bit in the query. This +requests the server to return whether all of the answer and authority +sections have all been validated as secure according to the security +policy of the server. AD=1 indicates that all records have been +validated as secure and the answer is not from a OPT\-OUT range. AD=0 +indicate that some part of the answer was insecure or not validated. +This bit is set by default. +.TP +.B \fB+bufsize=B\fP +Set the UDP message buffer size advertised using EDNS0 to \fBB\fP +bytes. The maximum and minimum sizes of this buffer are 65535 and 0 +respectively. Values outside this range are rounded up or down +appropriately. Values other than zero will cause a EDNS query to be +sent. +.TP +.B \fB+[no]cdflag\fP +Set [do not set] the CD (checking disabled) bit in the query. This +requests the server to not perform DNSSEC validation of responses. +.TP +.B \fB+[no]cookie=####\fP +Send a COOKIE EDNS option, with optional value. Replaying a COOKIE +from a previous response will allow the server to identify a previous +client. The default is \fB+nocookie\fP\&. +.TP +.B \fB+[no]dnssec\fP +Requests DNSSEC records be sent by setting the DNSSEC OK bit (DO) in +the OPT record in the additional section of the query. +.TP +.B \fB+[no]edns[=#]\fP +Specify the EDNS version to query with. Valid values are 0 to 255. +Setting the EDNS version will cause a EDNS query to be sent. +\fB+noedns\fP clears the remembered EDNS version. EDNS is set to 0 by +default. +.TP +.B \fB+[no]ednsflags[=#]\fP +Set the must\-be\-zero EDNS flags bits (Z bits) to the specified value. +Decimal, hex and octal encodings are accepted. Setting a named flag +(e.g. DO) will silently be ignored. By default, no Z bits are set. +.TP +.B \fB+[no]ednsopt[=code[:value]]\fP +Specify EDNS option with code point \fBcode\fP and optionally payload +of \fBvalue\fP as a hexadecimal string. \fB+noednsopt\fP clears the EDNS +options to be sent. +.TP +.B \fB+[no]expire\fP +Send an EDNS Expire option. +.TP +.B \fB+[no]nsid\fP +Include an EDNS name server ID request when sending a query. +.TP +.B \fB+[no]recurse\fP +Toggle the setting of the RD (recursion desired) bit in the query. +This bit is set by default, which means \fBmdig\fP normally sends +recursive queries. +.TP +.B \fB+retry=T\fP +Sets the number of times to retry UDP queries to server to \fBT\fP +instead of the default, 2. Unlike \fB+tries\fP, this does not include +the initial query. +.TP +.B \fB+[no]subnet=addr[/prefix\-length]\fP +Send (don\(aqt send) an EDNS Client Subnet option with the specified IP +address or network prefix. +.sp +\fBmdig +subnet=0.0.0.0/0\fP, or simply \fBmdig +subnet=0\fP for short, +sends an EDNS client\-subnet option with an empty address and a source +prefix\-length of zero, which signals a resolver that the client\(aqs +address information must \fInot\fP be used when resolving this query. +.TP +.B \fB+timeout=T\fP +Sets the timeout for a query to \fBT\fP seconds. The default timeout is +5 seconds for UDP transport and 10 for TCP. An attempt to set \fBT\fP +to less than 1 will result in a query timeout of 1 second being +applied. +.TP +.B \fB+tries=T\fP +Sets the number of times to try UDP queries to server to \fBT\fP +instead of the default, 3. If \fBT\fP is less than or equal to zero, +the number of tries is silently rounded up to 1. +.TP +.B \fB+udptimeout=T\fP +Sets the timeout between UDP query retries. +.TP +.B \fB+[no]unknownformat\fP +Print all RDATA in unknown RR type presentation format (\fI\%RFC 3597\fP). +The default is to print RDATA for known types in the type\(aqs +presentation format. +.TP +.B \fB+[no]yaml\fP +Print the responses in a detailed YAML format. +.TP +.B \fB+[no]zflag\fP +Set [do not set] the last unassigned DNS header flag in a DNS query. +This flag is off by default. +.UNINDENT +.SH SEE ALSO +.sp +\fBdig(1)\fP, \fI\%RFC 1035\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/mdig.rst b/doc/man/mdig.rst new file mode 100644 index 0000000000..692ce4a149 --- /dev/null +++ b/doc/man/mdig.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/tools/mdig.rst \ No newline at end of file diff --git a/doc/man/named-checkconf.8in b/doc/man/named-checkconf.8in new file mode 100644 index 0000000000..40a947dd53 --- /dev/null +++ b/doc/man/named-checkconf.8in @@ -0,0 +1,108 @@ +.\" Man page generated from reStructuredText. +. +.TH "NAMED-CHECKCONF" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +named-checkconf \- named configuration file syntax checking tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnamed\-checkconf\fP [\fB\-chjlvz\fP] [\fB\-p\fP [\fB\-x\fP ]] [\fB\-t\fP directory] {filename} +.SH DESCRIPTION +.sp +\fBnamed\-checkconf\fP checks the syntax, but not the semantics, of a +\fBnamed\fP configuration file. The file is parsed and checked for syntax +errors, along with all files included by it. If no file is specified, +\fB/etc/named.conf\fP is read by default. +.sp +Note: files that \fBnamed\fP reads in separate parser contexts, such as +\fBrndc.key\fP and \fBbind.keys\fP, are not automatically read by +\fBnamed\-checkconf\fP\&. Configuration errors in these files may cause +\fBnamed\fP to fail to run, even if \fBnamed\-checkconf\fP was successful. +\fBnamed\-checkconf\fP can be run on these files explicitly, however. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-h\fP +Print the usage summary and exit. +.TP +\fB\-j\fP +When loading a zonefile read the journal if it exists. +.TP +\fB\-l\fP +List all the configured zones. Each line of output contains the zone +name, class (e.g. IN), view, and type (e.g. master or slave). +.TP +\fB\-c\fP +Check "core" configuration only. This suppresses the loading of +plugin modules, and causes all parameters to \fBplugin\fP statements to +be ignored. +.TP +\fB\-i\fP +Ignore warnings on deprecated options. +.TP +\fB\-p\fP +Print out the \fBnamed.conf\fP and included files in canonical form if +no errors were detected. See also the \fB\-x\fP option. +.TP +\fB\-t\fP directory +Chroot to \fBdirectory\fP so that include directives in the +configuration file are processed as if run by a similarly chrooted +\fBnamed\fP\&. +.TP +\fB\-v\fP +Print the version of the \fBnamed\-checkconf\fP program and exit. +.TP +\fB\-x\fP +When printing the configuration files in canonical form, obscure +shared secrets by replacing them with strings of question marks +(\(aq?\(aq). This allows the contents of \fBnamed.conf\fP and related files +to be shared MDASH for example, when submitting bug reports MDASH +without compromising private data. This option cannot be used without +\fB\-p\fP\&. +.TP +\fB\-z\fP +Perform a test load of all master zones found in \fBnamed.conf\fP\&. +.TP +.B filename +The name of the configuration file to be checked. If not specified, +it defaults to \fB/etc/named.conf\fP\&. +.UNINDENT +.SH RETURN VALUES +.sp +\fBnamed\-checkconf\fP returns an exit status of 1 if errors were detected +and 0 otherwise. +.SH SEE ALSO +.sp +\fBnamed(8)\fP, \fBnamed\-checkzone(8)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/named-checkconf.rst b/doc/man/named-checkconf.rst new file mode 100644 index 0000000000..6dc3f28ae8 --- /dev/null +++ b/doc/man/named-checkconf.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/check/named-checkconf.rst \ No newline at end of file diff --git a/doc/man/named-checkzone.8in b/doc/man/named-checkzone.8in new file mode 100644 index 0000000000..9ac647b4ce --- /dev/null +++ b/doc/man/named-checkzone.8in @@ -0,0 +1,217 @@ +.\" Man page generated from reStructuredText. +. +.TH "NAMED-CHECKZONE" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +named-checkzone \- zone file validity checking or converting tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnamed\-checkzone\fP [\fB\-d\fP] [\fB\-h\fP] [\fB\-j\fP] [\fB\-q\fP] [\fB\-v\fP] [\fB\-c\fP class] [\fB\-f\fP format] [\fB\-F\fP format] [\fB\-J\fP filename] [\fB\-i\fP mode] [\fB\-k\fP mode] [\fB\-m\fP mode] [\fB\-M\fP mode] [\fB\-n\fP mode] [\fB\-l\fP ttl] [\fB\-L\fP serial] [\fB\-o\fP filename] [\fB\-r\fP mode] [\fB\-s\fP style] [\fB\-S\fP mode] [\fB\-t\fP directory] [\fB\-T\fP mode] [\fB\-w\fP directory] [\fB\-D\fP] [\fB\-W\fP mode] {zonename} {filename} +.sp +\fBnamed\-compilezone\fP [\fB\-d\fP] [\fB\-j\fP] [\fB\-q\fP] [\fB\-v\fP] [\fB\-c\fP class] [\fB\-C\fP mode] [\fB\-f\fP format] [\fB\-F\fP format] [\fB\-J\fP filename] [\fB\-i\fP mode] [\fB\-k\fP mode] [\fB\-m\fP mode] [\fB\-n\fP mode] [\fB\-l\fP ttl] [\fB\-L\fP serial] [\fB\-r\fP mode] [\fB\-s\fP style] [\fB\-t\fP directory] [\fB\-T\fP mode] [\fB\-w\fP directory] [\fB\-D\fP] [\fB\-W\fP mode] {\fB\-o\fP filename} {zonename} {filename} +.SH DESCRIPTION +.sp +\fBnamed\-checkzone\fP checks the syntax and integrity of a zone file. It +performs the same checks as \fBnamed\fP does when loading a zone. This +makes \fBnamed\-checkzone\fP useful for checking zone files before +configuring them into a name server. +.sp +\fBnamed\-compilezone\fP is similar to \fBnamed\-checkzone\fP, but it always +dumps the zone contents to a specified file in a specified format. +Additionally, it applies stricter check levels by default, since the +dump output will be used as an actual zone file loaded by \fBnamed\fP\&. +When manually specified otherwise, the check levels must at least be as +strict as those specified in the \fBnamed\fP configuration file. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-d\fP +Enable debugging. +.TP +\fB\-h\fP +Print the usage summary and exit. +.TP +\fB\-q\fP +Quiet mode \- exit code only. +.TP +\fB\-v\fP +Print the version of the \fBnamed\-checkzone\fP program and exit. +.TP +\fB\-j\fP +When loading a zone file, read the journal if it exists. The journal +file name is assumed to be the zone file name appended with the +string \fB\&.jnl\fP\&. +.TP +\fB\-J\fP filename +When loading the zone file read the journal from the given file, if +it exists. (Implies \-j.) +.TP +\fB\-c\fP class +Specify the class of the zone. If not specified, "IN" is assumed. +.TP +\fB\-i\fP mode +Perform post\-load zone integrity checks. Possible modes are +\fB"full"\fP (default), \fB"full\-sibling"\fP, \fB"local"\fP, +\fB"local\-sibling"\fP and \fB"none"\fP\&. +.sp +Mode \fB"full"\fP checks that MX records refer to A or AAAA record +(both in\-zone and out\-of\-zone hostnames). Mode \fB"local"\fP only +checks MX records which refer to in\-zone hostnames. +.sp +Mode \fB"full"\fP checks that SRV records refer to A or AAAA record +(both in\-zone and out\-of\-zone hostnames). Mode \fB"local"\fP only +checks SRV records which refer to in\-zone hostnames. +.sp +Mode \fB"full"\fP checks that delegation NS records refer to A or AAAA +record (both in\-zone and out\-of\-zone hostnames). It also checks that +glue address records in the zone match those advertised by the child. +Mode \fB"local"\fP only checks NS records which refer to in\-zone +hostnames or that some required glue exists, that is when the +nameserver is in a child zone. +.sp +Mode \fB"full\-sibling"\fP and \fB"local\-sibling"\fP disable sibling glue +checks but are otherwise the same as \fB"full"\fP and \fB"local"\fP +respectively. +.sp +Mode \fB"none"\fP disables the checks. +.TP +\fB\-f\fP format +Specify the format of the zone file. Possible formats are \fB"text"\fP +(default), \fB"raw"\fP, and \fB"map"\fP\&. +.TP +\fB\-F\fP format +Specify the format of the output file specified. For +\fBnamed\-checkzone\fP, this does not cause any effects unless it dumps +the zone contents. +.sp +Possible formats are \fB"text"\fP (default), which is the standard +textual representation of the zone, and \fB"map"\fP, \fB"raw"\fP, and +\fB"raw=N"\fP, which store the zone in a binary format for rapid +loading by \fBnamed\fP\&. \fB"raw=N"\fP specifies the format version of the +raw zone file: if N is 0, the raw file can be read by any version of +\fBnamed\fP; if N is 1, the file can be read by release 9.9.0 or +higher; the default is 1. +.TP +\fB\-k\fP mode +Perform \fB"check\-names"\fP checks with the specified failure mode. +Possible modes are \fB"fail"\fP (default for \fBnamed\-compilezone\fP), +\fB"warn"\fP (default for \fBnamed\-checkzone\fP) and \fB"ignore"\fP\&. +.TP +\fB\-l\fP ttl +Sets a maximum permissible TTL for the input file. Any record with a +TTL higher than this value will cause the zone to be rejected. This +is similar to using the \fBmax\-zone\-ttl\fP option in \fBnamed.conf\fP\&. +.TP +\fB\-L\fP serial +When compiling a zone to "raw" or "map" format, set the "source +serial" value in the header to the specified serial number. (This is +expected to be used primarily for testing purposes.) +.TP +\fB\-m\fP mode +Specify whether MX records should be checked to see if they are +addresses. Possible modes are \fB"fail"\fP, \fB"warn"\fP (default) and +\fB"ignore"\fP\&. +.TP +\fB\-M\fP mode +Check if a MX record refers to a CNAME. Possible modes are +\fB"fail"\fP, \fB"warn"\fP (default) and \fB"ignore"\fP\&. +.TP +\fB\-n\fP mode +Specify whether NS records should be checked to see if they are +addresses. Possible modes are \fB"fail"\fP (default for +\fBnamed\-compilezone\fP), \fB"warn"\fP (default for \fBnamed\-checkzone\fP) +and \fB"ignore"\fP\&. +.TP +\fB\-o\fP filename +Write zone output to \fBfilename\fP\&. If \fBfilename\fP is \fB\-\fP then +write to standard out. This is mandatory for \fBnamed\-compilezone\fP\&. +.TP +\fB\-r\fP mode +Check for records that are treated as different by DNSSEC but are +semantically equal in plain DNS. Possible modes are \fB"fail"\fP, +\fB"warn"\fP (default) and \fB"ignore"\fP\&. +.TP +\fB\-s\fP style +Specify the style of the dumped zone file. Possible styles are +\fB"full"\fP (default) and \fB"relative"\fP\&. The full format is most +suitable for processing automatically by a separate script. On the +other hand, the relative format is more human\-readable and is thus +suitable for editing by hand. For \fBnamed\-checkzone\fP this does not +cause any effects unless it dumps the zone contents. It also does not +have any meaning if the output format is not text. +.TP +\fB\-S\fP mode +Check if a SRV record refers to a CNAME. Possible modes are +\fB"fail"\fP, \fB"warn"\fP (default) and \fB"ignore"\fP\&. +.TP +\fB\-t\fP directory +Chroot to \fBdirectory\fP so that include directives in the +configuration file are processed as if run by a similarly chrooted +\fBnamed\fP\&. +.TP +\fB\-T\fP mode +Check if Sender Policy Framework (SPF) records exist and issues a +warning if an SPF\-formatted TXT record is not also present. Possible +modes are \fB"warn"\fP (default), \fB"ignore"\fP\&. +.TP +\fB\-w\fP directory +chdir to \fBdirectory\fP so that relative filenames in master file +$INCLUDE directives work. This is similar to the directory clause in +\fBnamed.conf\fP\&. +.TP +\fB\-D\fP +Dump zone file in canonical format. This is always enabled for +\fBnamed\-compilezone\fP\&. +.TP +\fB\-W\fP mode +Specify whether to check for non\-terminal wildcards. Non\-terminal +wildcards are almost always the result of a failure to understand the +wildcard matching algorithm (\fI\%RFC 1034\fP). Possible modes are \fB"warn"\fP +(default) and \fB"ignore"\fP\&. +.TP +.B zonename +The domain name of the zone being checked. +.TP +.B filename +The name of the zone file. +.UNINDENT +.SH RETURN VALUES +.sp +\fBnamed\-checkzone\fP returns an exit status of 1 if errors were detected +and 0 otherwise. +.SH SEE ALSO +.sp +\fBnamed(8)\fP, \fBnamed\-checkconf(8)\fP, \fI\%RFC 1035\fP, BIND 9 Administrator Reference +Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/named-checkzone.rst b/doc/man/named-checkzone.rst new file mode 100644 index 0000000000..7c5f089a7f --- /dev/null +++ b/doc/man/named-checkzone.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/check/named-checkzone.rst \ No newline at end of file diff --git a/doc/man/named-journalprint.8in b/doc/man/named-journalprint.8in new file mode 100644 index 0000000000..5feea4aa07 --- /dev/null +++ b/doc/man/named-journalprint.8in @@ -0,0 +1,61 @@ +.\" Man page generated from reStructuredText. +. +.TH "NAMED-JOURNALPRINT" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +named-journalprint \- print zone journal in human-readable form +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnamed\-journalprint\fP {journal} +.SH DESCRIPTION +.sp +\fBnamed\-journalprint\fP prints the contents of a zone journal file in a +human\-readable form. +.sp +Journal files are automatically created by \fBnamed\fP when changes are +made to dynamic zones (e.g., by \fBnsupdate\fP). They record each addition +or deletion of a resource record, in binary format, allowing the changes +to be re\-applied to the zone when the server is restarted after a +shutdown or crash. By default, the name of the journal file is formed by +appending the extension \fB\&.jnl\fP to the name of the corresponding zone +file. +.sp +\fBnamed\-journalprint\fP converts the contents of a given journal file +into a human\-readable text format. Each line begins with "add" or "del", +to indicate whether the record was added or deleted, and continues with +the resource record in master\-file format. +.SH SEE ALSO +.sp +\fBnamed(8)\fP, \fBnsupdate(1)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/named-journalprint.rst b/doc/man/named-journalprint.rst new file mode 100644 index 0000000000..862b226fa9 --- /dev/null +++ b/doc/man/named-journalprint.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/tools/named-journalprint.rst \ No newline at end of file diff --git a/doc/man/named-nzd2nzf.8in b/doc/man/named-nzd2nzf.8in new file mode 100644 index 0000000000..56757e8a47 --- /dev/null +++ b/doc/man/named-nzd2nzf.8in @@ -0,0 +1,57 @@ +.\" Man page generated from reStructuredText. +. +.TH "NAMED-NZD2NZF" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +named-nzd2nzf \- convert an NZD database to NZF text format +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnamed\-nzd2nzf\fP {filename} +.SH DESCRIPTION +.sp +\fBnamed\-nzd2nzf\fP converts an NZD database to NZF format and prints it +to standard output. This can be used to review the configuration of +zones that were added to \fBnamed\fP via \fBrndc addzone\fP\&. It can also be +used to restore the old file format when rolling back from a newer +version of BIND to an older version. +.SH ARGUMENTS +.INDENT 0.0 +.TP +.B filename +The name of the \fB\&.nzd\fP file whose contents should be printed. +.UNINDENT +.SH SEE ALSO +.sp +BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/named-nzd2nzf.rst b/doc/man/named-nzd2nzf.rst new file mode 100644 index 0000000000..50d8acee15 --- /dev/null +++ b/doc/man/named-nzd2nzf.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/tools/named-nzd2nzf.rst \ No newline at end of file diff --git a/doc/man/named-rrchecker.1in b/doc/man/named-rrchecker.1in new file mode 100644 index 0000000000..b25a605964 --- /dev/null +++ b/doc/man/named-rrchecker.1in @@ -0,0 +1,62 @@ +.\" Man page generated from reStructuredText. +. +.TH "NAMED-RRCHECKER" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +named-rrchecker \- syntax checker for individual DNS resource records +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnamed\-rrchecker\fP [\fB\-h\fP] [\fB\-o\fP origin] [\fB\-p\fP] [\fB\-u\fP] [\fB\-C\fP] [\fB\-T\fP] [\fB\-P\fP] +.SH DESCRIPTION +.sp +\fBnamed\-rrchecker\fP read a individual DNS resource record from standard +input and checks if it is syntactically correct. +.sp +The \fB\-h\fP prints out the help menu. +.sp +The \fB\-o origin\fP option specifies a origin to be used when interpreting +the record. +.sp +The \fB\-p\fP prints out the resulting record in canonical form. If there +is no canonical form defined then the record will be printed in unknown +record format. +.sp +The \fB\-u\fP prints out the resulting record in unknown record form. +.sp +The \fB\-C\fP, \fB\-T\fP and \fB\-P\fP print out the known class, standard type +and private type mnemonics respectively. +.SH SEE ALSO +.sp +\fI\%RFC 1034\fP, \fI\%RFC 1035\fP, \fBnamed(8)\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/named-rrchecker.rst b/doc/man/named-rrchecker.rst new file mode 100644 index 0000000000..289de23752 --- /dev/null +++ b/doc/man/named-rrchecker.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/tools/named-rrchecker.rst \ No newline at end of file diff --git a/doc/man/named.8in b/doc/man/named.8in new file mode 100644 index 0000000000..a52d14f0e2 --- /dev/null +++ b/doc/man/named.8in @@ -0,0 +1,260 @@ +.\" Man page generated from reStructuredText. +. +.TH "NAMED" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +named \- Internet domain name server +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnamed\fP [ [\fB\-4\fP] | [\fB\-6\fP] ] [\fB\-c\fP config\-file] [\fB\-d\fP debug\-level] [\fB\-D\fP string] [\fB\-E\fP engine\-name] [\fB\-f\fP] [\fB\-g\fP] [\fB\-L\fP logfile] [\fB\-M\fP option] [\fB\-m\fP flag] [\fB\-n\fP #cpus] [\fB\-p\fP port] [\fB\-s\fP] [\fB\-S\fP #max\-socks] [\fB\-t\fP directory] [\fB\-U\fP #listeners] [\fB\-u\fP user] [\fB\-v\fP] [\fB\-V\fP] [\fB\-X\fP lock\-file] [\fB\-x\fP cache\-file] +.SH DESCRIPTION +.sp +\fBnamed\fP is a Domain Name System (DNS) server, part of the BIND 9 +distribution from ISC. For more information on the DNS, see \fI\%RFC 1033\fP, +\fI\%RFC 1034\fP, and \fI\%RFC 1035\fP\&. +.sp +When invoked without arguments, \fBnamed\fP will read the default +configuration file \fB/etc/named.conf\fP, read any initial data, and +listen for queries. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-4\fP +Use IPv4 only even if the host machine is capable of IPv6. \fB\-4\fP and +\fB\-6\fP are mutually exclusive. +.TP +\fB\-6\fP +Use IPv6 only even if the host machine is capable of IPv4. \fB\-4\fP and +\fB\-6\fP are mutually exclusive. +.TP +\fB\-c\fP config\-file +Use config\-file as the configuration file instead of the default, +\fB/etc/named.conf\fP\&. To ensure that reloading the configuration file +continues to work after the server has changed its working directory +due to to a possible \fBdirectory\fP option in the configuration file, +config\-file should be an absolute pathname. +.TP +\fB\-d\fP debug\-level +Set the daemon\(aqs debug level to debug\-level. Debugging traces from +\fBnamed\fP become more verbose as the debug level increases. +.TP +\fB\-D\fP string +Specifies a string that is used to identify a instance of \fBnamed\fP +in a process listing. The contents of string are not examined. +.TP +\fB\-E\fP engine\-name +When applicable, specifies the hardware to use for cryptographic +operations, such as a secure key store used for signing. +.sp +When BIND is built with OpenSSL PKCS#11 support, this defaults to the +string "pkcs11", which identifies an OpenSSL engine that can drive a +cryptographic accelerator or hardware service module. When BIND is +built with native PKCS#11 cryptography (\-\-enable\-native\-pkcs11), it +defaults to the path of the PKCS#11 provider library specified via +"\-\-with\-pkcs11". +.TP +\fB\-f\fP +Run the server in the foreground (i.e. do not daemonize). +.TP +\fB\-g\fP +Run the server in the foreground and force all logging to \fBstderr\fP\&. +.TP +\fB\-L\fP logfile +Log to the file \fBlogfile\fP by default instead of the system log. +.TP +\fB\-M\fP option +Sets the default memory context options. If set to external, this +causes the internal memory manager to be bypassed in favor of +system\-provided memory allocation functions. If set to fill, blocks +of memory will be filled with tag values when allocated or freed, to +assist debugging of memory problems. (nofill disables this behavior, +and is the default unless \fBnamed\fP has been compiled with developer +options.) +.TP +\fB\-m\fP flag +Turn on memory usage debugging flags. Possible flags are usage, +trace, record, size, and mctx. These correspond to the +ISC_MEM_DEBUGXXXX flags described in \fB\fP\&. +.TP +\fB\-n\fP #cpus +Create #cpus worker threads to take advantage of multiple CPUs. If +not specified, \fBnamed\fP will try to determine the number of CPUs +present and create one thread per CPU. If it is unable to determine +the number of CPUs, a single worker thread will be created. +.TP +\fB\-p\fP port +Listen for queries on port port. If not specified, the default is +port 53. +.TP +\fB\-s\fP +Write memory usage statistics to \fBstdout\fP on exit. +.UNINDENT +.sp +\fBNOTE:\fP +.INDENT 0.0 +.INDENT 3.5 +This option is mainly of interest to BIND 9 developers and may be +removed or changed in a future release. +.UNINDENT +.UNINDENT +.INDENT 0.0 +.TP +\fB\-S\fP #max\-socks +Allow \fBnamed\fP to use up to #max\-socks sockets. The default value is +21000 on systems built with default configuration options, and 4096 +on systems built with "configure \-\-with\-tuning=small". +.UNINDENT +.sp +\fBWARNING:\fP +.INDENT 0.0 +.INDENT 3.5 +This option should be unnecessary for the vast majority of users. +The use of this option could even be harmful because the specified +value may exceed the limitation of the underlying system API. It +is therefore set only when the default configuration causes +exhaustion of file descriptors and the operational environment is +known to support the specified number of sockets. Note also that +the actual maximum number is normally a little fewer than the +specified value because \fBnamed\fP reserves some file descriptors +for its internal use. +.UNINDENT +.UNINDENT +.INDENT 0.0 +.TP +\fB\-t\fP directory +Chroot to directory after processing the command line arguments, but +before reading the configuration file. +.UNINDENT +.sp +\fBWARNING:\fP +.INDENT 0.0 +.INDENT 3.5 +This option should be used in conjunction with the \fB\-u\fP option, +as chrooting a process running as root doesn\(aqt enhance security on +most systems; the way \fBchroot(2)\fP is defined allows a process +with root privileges to escape a chroot jail. +.UNINDENT +.UNINDENT +.INDENT 0.0 +.TP +\fB\-U\fP #listeners +Use #listeners worker threads to listen for incoming UDP packets on +each address. If not specified, \fBnamed\fP will calculate a default +value based on the number of detected CPUs: 1 for 1 CPU, and the +number of detected CPUs minus one for machines with more than 1 CPU. +This cannot be increased to a value higher than the number of CPUs. +If \fB\-n\fP has been set to a higher value than the number of detected +CPUs, then \fB\-U\fP may be increased as high as that value, but no +higher. On Windows, the number of UDP listeners is hardwired to 1 and +this option has no effect. +.TP +\fB\-u\fP user +Setuid to user after completing privileged operations, such as +creating sockets that listen on privileged ports. +.UNINDENT +.sp +\fBNOTE:\fP +.INDENT 0.0 +.INDENT 3.5 +On Linux, \fBnamed\fP uses the kernel\(aqs capability mechanism to drop +all root privileges except the ability to \fBbind(2)\fP to a +privileged port and set process resource limits. Unfortunately, +this means that the \fB\-u\fP option only works when \fBnamed\fP is run +on kernel 2.2.18 or later, or kernel 2.3.99\-pre3 or later, since +previous kernels did not allow privileges to be retained after +\fBsetuid(2)\fP\&. +.UNINDENT +.UNINDENT +.INDENT 0.0 +.TP +\fB\-v\fP +Report the version number and exit. +.TP +\fB\-V\fP +Report the version number and build options, and exit. +.TP +\fB\-X\fP lock\-file +Acquire a lock on the specified file at runtime; this helps to +prevent duplicate \fBnamed\fP instances from running simultaneously. +Use of this option overrides the \fBlock\-file\fP option in +\fBnamed.conf\fP\&. If set to \fBnone\fP, the lock file check is disabled. +.TP +\fB\-x\fP cache\-file +Load data from cache\-file into the cache of the default view. +.UNINDENT +.sp +\fBWARNING:\fP +.INDENT 0.0 +.INDENT 3.5 +This option must not be used. It is only of interest to BIND 9 +developers and may be removed or changed in a future release. +.UNINDENT +.UNINDENT +.SH SIGNALS +.sp +In routine operation, signals should not be used to control the +nameserver; \fBrndc\fP should be used instead. +.INDENT 0.0 +.TP +.B SIGHUP +Force a reload of the server. +.TP +.B SIGINT, SIGTERM +Shut down the server. +.UNINDENT +.sp +The result of sending any other signals to the server is undefined. +.SH CONFIGURATION +.sp +The \fBnamed\fP configuration file is too complex to describe in detail +here. A complete description is provided in the BIND 9 Administrator +Reference Manual. +.sp +\fBnamed\fP inherits the \fBumask\fP (file creation mode mask) from the +parent process. If files created by \fBnamed\fP, such as journal files, +need to have custom permissions, the \fBumask\fP should be set explicitly +in the script used to start the \fBnamed\fP process. +.SH FILES +.INDENT 0.0 +.TP +.B \fB/etc/named.conf\fP +The default configuration file. +.TP +.B \fB/var/run/named/named.pid\fP +The default process\-id file. +.UNINDENT +.SH SEE ALSO +.sp +\fI\%RFC 1033\fP, \fI\%RFC 1034\fP, \fI\%RFC 1035\fP, \fBnamed\-checkconf(8)\fP, \fBnamed\-checkzone(8)\fP, \fBrndc(8), :manpage:\(ganamed.conf(5)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/named.conf.5in b/doc/man/named.conf.5in new file mode 100644 index 0000000000..512d2fc59a --- /dev/null +++ b/doc/man/named.conf.5in @@ -0,0 +1,1111 @@ +.\" Man page generated from reStructuredText. +. +.TH "NAMED.CONF" "5" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +named.conf \- configuration file for **named** +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnamed.conf\fP +.SH DESCRIPTION +.sp +\fBnamed.conf\fP is the configuration file for \fBnamed\fP\&. Statements are +enclosed in braces and terminated with a semi\-colon. Clauses in the +statements are also semi\-colon terminated. The usual comment styles are +supported: +.sp +C style: /* */ +.INDENT 0.0 +.INDENT 3.5 +C++ style: // to end of line +.UNINDENT +.UNINDENT +.sp +Unix style: # to end of line +.SS ACL +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +acl string { address_match_element; ... }; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS CONTROLS +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +controls { + inet ( ipv4_address | ipv6_address | + * ) [ port ( integer | * ) ] allow + { address_match_element; ... } [ + keys { string; ... } ] [ read\-only + boolean ]; + unix quoted_string perm integer + owner integer group integer [ + keys { string; ... } ] [ read\-only + boolean ]; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS DLZ +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +dlz string { + database string; + search boolean; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS DNSSEC\-POLICY +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +dnssec\-policy string { + dnskey\-ttl duration; + keys { ( csk | ksk | zsk ) [ ( key\-directory ) ] lifetime + duration_or_unlimited algorithm string [ integer ]; ... }; + max\-zone\-ttl duration; + parent\-ds\-ttl duration; + parent\-propagation\-delay duration; + parent\-registration\-delay duration; + publish\-safety duration; + retire\-safety duration; + signatures\-refresh duration; + signatures\-validity duration; + signatures\-validity\-dnskey duration; + zone\-propagation\-delay duration; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS DYNDB +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +dyndb string quoted_string { + unspecified\-text }; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS KEY +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +key string { + algorithm string; + secret string; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS LOGGING +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +logging { + category string { string; ... }; + channel string { + buffered boolean; + file quoted_string [ versions ( unlimited | integer ) ] + [ size size ] [ suffix ( increment | timestamp ) ]; + null; + print\-category boolean; + print\-severity boolean; + print\-time ( iso8601 | iso8601\-utc | local | boolean ); + severity log_severity; + stderr; + syslog [ syslog_facility ]; + }; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS MANAGED\-KEYS +.sp +See DNSSEC\-KEYS. +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +managed\-keys { string ( static\-key + | initial\-key | static\-ds | + initial\-ds ) integer integer + integer quoted_string; ... };, deprecated +.ft P +.fi +.UNINDENT +.UNINDENT +.SS MASTERS +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +masters string [ port integer ] [ dscp + integer ] { ( masters | ipv4_address [ + port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS OPTIONS +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +options { + allow\-new\-zones boolean; + allow\-notify { address_match_element; ... }; + allow\-query { address_match_element; ... }; + allow\-query\-cache { address_match_element; ... }; + allow\-query\-cache\-on { address_match_element; ... }; + allow\-query\-on { address_match_element; ... }; + allow\-recursion { address_match_element; ... }; + allow\-recursion\-on { address_match_element; ... }; + allow\-transfer { address_match_element; ... }; + allow\-update { address_match_element; ... }; + allow\-update\-forwarding { address_match_element; ... }; + also\-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt\-transfer\-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt\-transfer\-source\-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + answer\-cookie boolean; + attach\-cache string; + auth\-nxdomain boolean; // default changed + auto\-dnssec ( allow | maintain | off ); + automatic\-interface\-scan boolean; + avoid\-v4\-udp\-ports { portrange; ... }; + avoid\-v6\-udp\-ports { portrange; ... }; + bindkeys\-file quoted_string; + blackhole { address_match_element; ... }; + cache\-file quoted_string; + catalog\-zones { zone string [ default\-masters [ port integer ] + [ dscp integer ] { ( masters | ipv4_address [ port + integer ] | ipv6_address [ port integer ] ) [ key + string ]; ... } ] [ zone\-directory quoted_string ] [ + in\-memory boolean ] [ min\-update\-interval duration ]; ... }; + check\-dup\-records ( fail | warn | ignore ); + check\-integrity boolean; + check\-mx ( fail | warn | ignore ); + check\-mx\-cname ( fail | warn | ignore ); + check\-names ( primary | master | + secondary | slave | response ) ( + fail | warn | ignore ); + check\-sibling boolean; + check\-spf ( warn | ignore ); + check\-srv\-cname ( fail | warn | ignore ); + check\-wildcard boolean; + clients\-per\-query integer; + cookie\-algorithm ( aes | siphash24 ); + cookie\-secret string; + coresize ( default | unlimited | sizeval ); + datasize ( default | unlimited | sizeval ); + deny\-answer\-addresses { address_match_element; ... } [ + except\-from { string; ... } ]; + deny\-answer\-aliases { string; ... } [ except\-from { string; ... + } ]; + dialup ( notify | notify\-passive | passive | refresh | boolean ); + directory quoted_string; + disable\-algorithms string { string; + ... }; + disable\-ds\-digests string { string; + ... }; + disable\-empty\-zone string; + dns64 netprefix { + break\-dnssec boolean; + clients { address_match_element; ... }; + exclude { address_match_element; ... }; + mapped { address_match_element; ... }; + recursive\-only boolean; + suffix ipv6_address; + }; + dns64\-contact string; + dns64\-server string; + dnskey\-sig\-validity integer; + dnsrps\-enable boolean; + dnsrps\-options { unspecified\-text }; + dnssec\-accept\-expired boolean; + dnssec\-dnskey\-kskonly boolean; + dnssec\-loadkeys\-interval integer; + dnssec\-must\-be\-secure string boolean; + dnssec\-policy string; + dnssec\-secure\-to\-insecure boolean; + dnssec\-update\-mode ( maintain | no\-resign ); + dnssec\-validation ( yes | no | auto ); + dnstap { ( all | auth | client | forwarder | + resolver | update ) [ ( query | response ) ]; + ... }; + dnstap\-identity ( quoted_string | none | + hostname ); + dnstap\-output ( file | unix ) quoted_string [ + size ( unlimited | size ) ] [ versions ( + unlimited | integer ) ] [ suffix ( increment + | timestamp ) ]; + dnstap\-version ( quoted_string | none ); + dscp integer; + dual\-stack\-servers [ port integer ] { ( quoted_string [ port + integer ] [ dscp integer ] | ipv4_address [ port + integer ] [ dscp integer ] | ipv6_address [ port + integer ] [ dscp integer ] ); ... }; + dump\-file quoted_string; + edns\-udp\-size integer; + empty\-contact string; + empty\-server string; + empty\-zones\-enable boolean; + fetch\-quota\-params integer fixedpoint fixedpoint fixedpoint; + fetches\-per\-server integer [ ( drop | fail ) ]; + fetches\-per\-zone integer [ ( drop | fail ) ]; + files ( default | unlimited | sizeval ); + flush\-zones\-on\-shutdown boolean; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + fstrm\-set\-buffer\-hint integer; + fstrm\-set\-flush\-timeout integer; + fstrm\-set\-input\-queue\-size integer; + fstrm\-set\-output\-notify\-threshold integer; + fstrm\-set\-output\-queue\-model ( mpsc | spsc ); + fstrm\-set\-output\-queue\-size integer; + fstrm\-set\-reopen\-interval duration; + geoip\-directory ( quoted_string | none ); + glue\-cache boolean; + heartbeat\-interval integer; + hostname ( quoted_string | none ); + inline\-signing boolean; + interface\-interval duration; + ixfr\-from\-differences ( primary | master | secondary | slave | + boolean ); + keep\-response\-order { address_match_element; ... }; + key\-directory quoted_string; + lame\-ttl duration; + listen\-on [ port integer ] [ dscp + integer ] { + address_match_element; ... }; + listen\-on\-v6 [ port integer ] [ dscp + integer ] { + address_match_element; ... }; + lmdb\-mapsize sizeval; + lock\-file ( quoted_string | none ); + managed\-keys\-directory quoted_string; + masterfile\-format ( map | raw | text ); + masterfile\-style ( full | relative ); + match\-mapped\-addresses boolean; + max\-cache\-size ( default | unlimited | sizeval | percentage ); + max\-cache\-ttl duration; + max\-clients\-per\-query integer; + max\-ixfr\-ratio ( unlimited | percentage ); + max\-journal\-size ( default | unlimited | sizeval ); + max\-ncache\-ttl duration; + max\-records integer; + max\-recursion\-depth integer; + max\-recursion\-queries integer; + max\-refresh\-time integer; + max\-retry\-time integer; + max\-rsa\-exponent\-size integer; + max\-stale\-ttl duration; + max\-transfer\-idle\-in integer; + max\-transfer\-idle\-out integer; + max\-transfer\-time\-in integer; + max\-transfer\-time\-out integer; + max\-udp\-size integer; + max\-zone\-ttl ( unlimited | duration ); + memstatistics boolean; + memstatistics\-file quoted_string; + message\-compression boolean; + min\-cache\-ttl duration; + min\-ncache\-ttl duration; + min\-refresh\-time integer; + min\-retry\-time integer; + minimal\-any boolean; + minimal\-responses ( no\-auth | no\-auth\-recursive | boolean ); + multi\-master boolean; + new\-zones\-directory quoted_string; + no\-case\-compress { address_match_element; ... }; + nocookie\-udp\-size integer; + notify ( explicit | master\-only | boolean ); + notify\-delay integer; + notify\-rate integer; + notify\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify\-to\-soa boolean; + nta\-lifetime duration; + nta\-recheck duration; + nxdomain\-redirect string; + pid\-file ( quoted_string | none ); + port integer; + preferred\-glue string; + prefetch integer [ integer ]; + provide\-ixfr boolean; + qname\-minimization ( strict | relaxed | disabled | off ); + query\-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query\-source\-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + querylog boolean; + random\-device ( quoted_string | none ); + rate\-limit { + all\-per\-second integer; + errors\-per\-second integer; + exempt\-clients { address_match_element; ... }; + ipv4\-prefix\-length integer; + ipv6\-prefix\-length integer; + log\-only boolean; + max\-table\-size integer; + min\-table\-size integer; + nodata\-per\-second integer; + nxdomains\-per\-second integer; + qps\-scale integer; + referrals\-per\-second integer; + responses\-per\-second integer; + slip integer; + window integer; + }; + recursing\-file quoted_string; + recursion boolean; + recursive\-clients integer; + request\-expire boolean; + request\-ixfr boolean; + request\-nsid boolean; + require\-server\-cookie boolean; + reserved\-sockets integer; + resolver\-nonbackoff\-tries integer; + resolver\-query\-timeout integer; + resolver\-retry\-interval integer; + response\-padding { address_match_element; ... } block\-size + integer; + response\-policy { zone string [ add\-soa boolean ] [ log + boolean ] [ max\-policy\-ttl duration ] [ min\-update\-interval + duration ] [ policy ( cname | disabled | drop | given | no\-op + | nodata | nxdomain | passthru | tcp\-only quoted_string ) ] [ + recursive\-only boolean ] [ nsip\-enable boolean ] [ + nsdname\-enable boolean ]; ... } [ add\-soa boolean ] [ + break\-dnssec boolean ] [ max\-policy\-ttl duration ] [ + min\-update\-interval duration ] [ min\-ns\-dots integer ] [ + nsip\-wait\-recurse boolean ] [ nsdname\-wait\-recurse boolean + ] [ qname\-wait\-recurse boolean ] [ recursive\-only boolean ] + [ nsip\-enable boolean ] [ nsdname\-enable boolean ] [ + dnsrps\-enable boolean ] [ dnsrps\-options { unspecified\-text + } ]; + root\-delegation\-only [ exclude { string; ... } ]; + root\-key\-sentinel boolean; + rrset\-order { [ class string ] [ type string ] [ name + quoted_string ] string string; ... }; + secroots\-file quoted_string; + send\-cookie boolean; + serial\-query\-rate integer; + serial\-update\-method ( date | increment | unixtime ); + server\-id ( quoted_string | none | hostname ); + servfail\-ttl duration; + session\-keyalg string; + session\-keyfile ( quoted_string | none ); + session\-keyname string; + sig\-signing\-nodes integer; + sig\-signing\-signatures integer; + sig\-signing\-type integer; + sig\-validity\-interval integer [ integer ]; + sortlist { address_match_element; ... }; + stacksize ( default | unlimited | sizeval ); + stale\-answer\-enable boolean; + stale\-answer\-ttl duration; + startup\-notify\-rate integer; + statistics\-file quoted_string; + synth\-from\-dnssec boolean; + tcp\-advertised\-timeout integer; + tcp\-clients integer; + tcp\-idle\-timeout integer; + tcp\-initial\-timeout integer; + tcp\-keepalive\-timeout integer; + tcp\-listen\-queue integer; + tkey\-dhkey quoted_string integer; + tkey\-domain quoted_string; + tkey\-gssapi\-credential quoted_string; + tkey\-gssapi\-keytab quoted_string; + transfer\-format ( many\-answers | one\-answer ); + transfer\-message\-size integer; + transfer\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + transfers\-in integer; + transfers\-out integer; + transfers\-per\-ns integer; + trust\-anchor\-telemetry boolean; // experimental + try\-tcp\-refresh boolean; + update\-check\-ksk boolean; + use\-alt\-transfer\-source boolean; + use\-v4\-udp\-ports { portrange; ... }; + use\-v6\-udp\-ports { portrange; ... }; + v6\-bias integer; + validate\-except { string; ... }; + version ( quoted_string | none ); + zero\-no\-soa\-ttl boolean; + zero\-no\-soa\-ttl\-cache boolean; + zone\-statistics ( full | terse | none | boolean ); +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS PLUGIN +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +plugin ( query ) string [ { unspecified\-text + } ]; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS SERVER +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +server netprefix { + bogus boolean; + edns boolean; + edns\-udp\-size integer; + edns\-version integer; + keys server_key; + max\-udp\-size integer; + notify\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + padding integer; + provide\-ixfr boolean; + query\-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query\-source\-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + request\-expire boolean; + request\-ixfr boolean; + request\-nsid boolean; + send\-cookie boolean; + tcp\-keepalive boolean; + tcp\-only boolean; + transfer\-format ( many\-answers | one\-answer ); + transfer\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + transfers integer; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS STATISTICS\-CHANNELS +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +statistics\-channels { + inet ( ipv4_address | ipv6_address | + * ) [ port ( integer | * ) ] [ + allow { address_match_element; ... + } ]; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS TRUST\-ANCHORS +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +trust\-anchors { string ( static\-key | + initial\-key | static\-ds | initial\-ds ) + integer integer integer + quoted_string; ... }; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS TRUSTED\-KEYS +.sp +Deprecated \- see DNSSEC\-KEYS. +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +trusted\-keys { string integer + integer integer + quoted_string; ... };, deprecated +.ft P +.fi +.UNINDENT +.UNINDENT +.SS VIEW +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +view string [ class ] { + allow\-new\-zones boolean; + allow\-notify { address_match_element; ... }; + allow\-query { address_match_element; ... }; + allow\-query\-cache { address_match_element; ... }; + allow\-query\-cache\-on { address_match_element; ... }; + allow\-query\-on { address_match_element; ... }; + allow\-recursion { address_match_element; ... }; + allow\-recursion\-on { address_match_element; ... }; + allow\-transfer { address_match_element; ... }; + allow\-update { address_match_element; ... }; + allow\-update\-forwarding { address_match_element; ... }; + also\-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt\-transfer\-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt\-transfer\-source\-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + attach\-cache string; + auth\-nxdomain boolean; // default changed + auto\-dnssec ( allow | maintain | off ); + cache\-file quoted_string; + catalog\-zones { zone string [ default\-masters [ port integer ] + [ dscp integer ] { ( masters | ipv4_address [ port + integer ] | ipv6_address [ port integer ] ) [ key + string ]; ... } ] [ zone\-directory quoted_string ] [ + in\-memory boolean ] [ min\-update\-interval duration ]; ... }; + check\-dup\-records ( fail | warn | ignore ); + check\-integrity boolean; + check\-mx ( fail | warn | ignore ); + check\-mx\-cname ( fail | warn | ignore ); + check\-names ( primary | master | + secondary | slave | response ) ( + fail | warn | ignore ); + check\-sibling boolean; + check\-spf ( warn | ignore ); + check\-srv\-cname ( fail | warn | ignore ); + check\-wildcard boolean; + clients\-per\-query integer; + deny\-answer\-addresses { address_match_element; ... } [ + except\-from { string; ... } ]; + deny\-answer\-aliases { string; ... } [ except\-from { string; ... + } ]; + dialup ( notify | notify\-passive | passive | refresh | boolean ); + disable\-algorithms string { string; + ... }; + disable\-ds\-digests string { string; + ... }; + disable\-empty\-zone string; + dlz string { + database string; + search boolean; + }; + dns64 netprefix { + break\-dnssec boolean; + clients { address_match_element; ... }; + exclude { address_match_element; ... }; + mapped { address_match_element; ... }; + recursive\-only boolean; + suffix ipv6_address; + }; + dns64\-contact string; + dns64\-server string; + dnskey\-sig\-validity integer; + dnsrps\-enable boolean; + dnsrps\-options { unspecified\-text }; + dnssec\-accept\-expired boolean; + dnssec\-dnskey\-kskonly boolean; + dnssec\-loadkeys\-interval integer; + dnssec\-must\-be\-secure string boolean; + dnssec\-policy string; + dnssec\-secure\-to\-insecure boolean; + dnssec\-update\-mode ( maintain | no\-resign ); + dnssec\-validation ( yes | no | auto ); + dnstap { ( all | auth | client | forwarder | + resolver | update ) [ ( query | response ) ]; + ... }; + dual\-stack\-servers [ port integer ] { ( quoted_string [ port + integer ] [ dscp integer ] | ipv4_address [ port + integer ] [ dscp integer ] | ipv6_address [ port + integer ] [ dscp integer ] ); ... }; + dyndb string quoted_string { + unspecified\-text }; + edns\-udp\-size integer; + empty\-contact string; + empty\-server string; + empty\-zones\-enable boolean; + fetch\-quota\-params integer fixedpoint fixedpoint fixedpoint; + fetches\-per\-server integer [ ( drop | fail ) ]; + fetches\-per\-zone integer [ ( drop | fail ) ]; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + glue\-cache boolean; + inline\-signing boolean; + ixfr\-from\-differences ( primary | master | secondary | slave | + boolean ); + key string { + algorithm string; + secret string; + }; + key\-directory quoted_string; + lame\-ttl duration; + lmdb\-mapsize sizeval; + managed\-keys { string ( + static\-key | initial\-key + | static\-ds | initial\-ds + ) integer integer + integer + quoted_string; ... };, deprecated + masterfile\-format ( map | raw | text ); + masterfile\-style ( full | relative ); + match\-clients { address_match_element; ... }; + match\-destinations { address_match_element; ... }; + match\-recursive\-only boolean; + max\-cache\-size ( default | unlimited | sizeval | percentage ); + max\-cache\-ttl duration; + max\-clients\-per\-query integer; + max\-ixfr\-ratio ( unlimited | percentage ); + max\-journal\-size ( default | unlimited | sizeval ); + max\-ncache\-ttl duration; + max\-records integer; + max\-recursion\-depth integer; + max\-recursion\-queries integer; + max\-refresh\-time integer; + max\-retry\-time integer; + max\-stale\-ttl duration; + max\-transfer\-idle\-in integer; + max\-transfer\-idle\-out integer; + max\-transfer\-time\-in integer; + max\-transfer\-time\-out integer; + max\-udp\-size integer; + max\-zone\-ttl ( unlimited | duration ); + message\-compression boolean; + min\-cache\-ttl duration; + min\-ncache\-ttl duration; + min\-refresh\-time integer; + min\-retry\-time integer; + minimal\-any boolean; + minimal\-responses ( no\-auth | no\-auth\-recursive | boolean ); + multi\-master boolean; + new\-zones\-directory quoted_string; + no\-case\-compress { address_match_element; ... }; + nocookie\-udp\-size integer; + notify ( explicit | master\-only | boolean ); + notify\-delay integer; + notify\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify\-to\-soa boolean; + nta\-lifetime duration; + nta\-recheck duration; + nxdomain\-redirect string; + plugin ( query ) string [ { + unspecified\-text } ]; + preferred\-glue string; + prefetch integer [ integer ]; + provide\-ixfr boolean; + qname\-minimization ( strict | relaxed | disabled | off ); + query\-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query\-source\-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + rate\-limit { + all\-per\-second integer; + errors\-per\-second integer; + exempt\-clients { address_match_element; ... }; + ipv4\-prefix\-length integer; + ipv6\-prefix\-length integer; + log\-only boolean; + max\-table\-size integer; + min\-table\-size integer; + nodata\-per\-second integer; + nxdomains\-per\-second integer; + qps\-scale integer; + referrals\-per\-second integer; + responses\-per\-second integer; + slip integer; + window integer; + }; + recursion boolean; + request\-expire boolean; + request\-ixfr boolean; + request\-nsid boolean; + require\-server\-cookie boolean; + resolver\-nonbackoff\-tries integer; + resolver\-query\-timeout integer; + resolver\-retry\-interval integer; + response\-padding { address_match_element; ... } block\-size + integer; + response\-policy { zone string [ add\-soa boolean ] [ log + boolean ] [ max\-policy\-ttl duration ] [ min\-update\-interval + duration ] [ policy ( cname | disabled | drop | given | no\-op + | nodata | nxdomain | passthru | tcp\-only quoted_string ) ] [ + recursive\-only boolean ] [ nsip\-enable boolean ] [ + nsdname\-enable boolean ]; ... } [ add\-soa boolean ] [ + break\-dnssec boolean ] [ max\-policy\-ttl duration ] [ + min\-update\-interval duration ] [ min\-ns\-dots integer ] [ + nsip\-wait\-recurse boolean ] [ nsdname\-wait\-recurse boolean + ] [ qname\-wait\-recurse boolean ] [ recursive\-only boolean ] + [ nsip\-enable boolean ] [ nsdname\-enable boolean ] [ + dnsrps\-enable boolean ] [ dnsrps\-options { unspecified\-text + } ]; + root\-delegation\-only [ exclude { string; ... } ]; + root\-key\-sentinel boolean; + rrset\-order { [ class string ] [ type string ] [ name + quoted_string ] string string; ... }; + send\-cookie boolean; + serial\-update\-method ( date | increment | unixtime ); + server netprefix { + bogus boolean; + edns boolean; + edns\-udp\-size integer; + edns\-version integer; + keys server_key; + max\-udp\-size integer; + notify\-source ( ipv4_address | * ) [ port ( integer | * + ) ] [ dscp integer ]; + notify\-source\-v6 ( ipv6_address | * ) [ port ( integer + | * ) ] [ dscp integer ]; + padding integer; + provide\-ixfr boolean; + query\-source ( ( [ address ] ( ipv4_address | * ) [ port + ( integer | * ) ] ) | ( [ [ address ] ( + ipv4_address | * ) ] port ( integer | * ) ) ) [ + dscp integer ]; + query\-source\-v6 ( ( [ address ] ( ipv6_address | * ) [ + port ( integer | * ) ] ) | ( [ [ address ] ( + ipv6_address | * ) ] port ( integer | * ) ) ) [ + dscp integer ]; + request\-expire boolean; + request\-ixfr boolean; + request\-nsid boolean; + send\-cookie boolean; + tcp\-keepalive boolean; + tcp\-only boolean; + transfer\-format ( many\-answers | one\-answer ); + transfer\-source ( ipv4_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + transfer\-source\-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + transfers integer; + }; + servfail\-ttl duration; + sig\-signing\-nodes integer; + sig\-signing\-signatures integer; + sig\-signing\-type integer; + sig\-validity\-interval integer [ integer ]; + sortlist { address_match_element; ... }; + stale\-answer\-enable boolean; + stale\-answer\-ttl duration; + synth\-from\-dnssec boolean; + transfer\-format ( many\-answers | one\-answer ); + transfer\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + trust\-anchor\-telemetry boolean; // experimental + trust\-anchors { string ( static\-key | + initial\-key | static\-ds | initial\-ds + ) integer integer integer + quoted_string; ... }; + trusted\-keys { string + integer integer + integer + quoted_string; ... };, deprecated + try\-tcp\-refresh boolean; + update\-check\-ksk boolean; + use\-alt\-transfer\-source boolean; + v6\-bias integer; + validate\-except { string; ... }; + zero\-no\-soa\-ttl boolean; + zero\-no\-soa\-ttl\-cache boolean; + zone string [ class ] { + allow\-notify { address_match_element; ... }; + allow\-query { address_match_element; ... }; + allow\-query\-on { address_match_element; ... }; + allow\-transfer { address_match_element; ... }; + allow\-update { address_match_element; ... }; + allow\-update\-forwarding { address_match_element; ... }; + also\-notify [ port integer ] [ dscp integer ] { ( + masters | ipv4_address [ port integer ] | + ipv6_address [ port integer ] ) [ key string ]; + ... }; + alt\-transfer\-source ( ipv4_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + alt\-transfer\-source\-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + auto\-dnssec ( allow | maintain | off ); + check\-dup\-records ( fail | warn | ignore ); + check\-integrity boolean; + check\-mx ( fail | warn | ignore ); + check\-mx\-cname ( fail | warn | ignore ); + check\-names ( fail | warn | ignore ); + check\-sibling boolean; + check\-spf ( warn | ignore ); + check\-srv\-cname ( fail | warn | ignore ); + check\-wildcard boolean; + database string; + delegation\-only boolean; + dialup ( notify | notify\-passive | passive | refresh | + boolean ); + dlz string; + dnskey\-sig\-validity integer; + dnssec\-dnskey\-kskonly boolean; + dnssec\-loadkeys\-interval integer; + dnssec\-policy string; + dnssec\-secure\-to\-insecure boolean; + dnssec\-update\-mode ( maintain | no\-resign ); + file quoted_string; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( + ipv4_address | ipv6_address ) [ port integer ] [ + dscp integer ]; ... }; + in\-view string; + inline\-signing boolean; + ixfr\-from\-differences boolean; + journal quoted_string; + key\-directory quoted_string; + masterfile\-format ( map | raw | text ); + masterfile\-style ( full | relative ); + masters [ port integer ] [ dscp integer ] { ( masters + | ipv4_address [ port integer ] | ipv6_address [ + port integer ] ) [ key string ]; ... }; + max\-ixfr\-ratio ( unlimited | percentage ); + max\-journal\-size ( default | unlimited | sizeval ); + max\-records integer; + max\-refresh\-time integer; + max\-retry\-time integer; + max\-transfer\-idle\-in integer; + max\-transfer\-idle\-out integer; + max\-transfer\-time\-in integer; + max\-transfer\-time\-out integer; + max\-zone\-ttl ( unlimited | duration ); + min\-refresh\-time integer; + min\-retry\-time integer; + multi\-master boolean; + notify ( explicit | master\-only | boolean ); + notify\-delay integer; + notify\-source ( ipv4_address | * ) [ port ( integer | * + ) ] [ dscp integer ]; + notify\-source\-v6 ( ipv6_address | * ) [ port ( integer + | * ) ] [ dscp integer ]; + notify\-to\-soa boolean; + request\-expire boolean; + request\-ixfr boolean; + serial\-update\-method ( date | increment | unixtime ); + server\-addresses { ( ipv4_address | ipv6_address ); ... }; + server\-names { string; ... }; + sig\-signing\-nodes integer; + sig\-signing\-signatures integer; + sig\-signing\-type integer; + sig\-validity\-interval integer [ integer ]; + transfer\-source ( ipv4_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + transfer\-source\-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + try\-tcp\-refresh boolean; + type ( primary | master | secondary | slave | mirror | + delegation\-only | forward | hint | redirect | + static\-stub | stub ); + update\-check\-ksk boolean; + update\-policy ( local | { ( deny | grant ) string ( + 6to4\-self | external | krb5\-self | krb5\-selfsub | + krb5\-subdomain | ms\-self | ms\-selfsub | ms\-subdomain | + name | self | selfsub | selfwild | subdomain | tcp\-self + | wildcard | zonesub ) [ string ] rrtypelist; ... }; + use\-alt\-transfer\-source boolean; + zero\-no\-soa\-ttl boolean; + zone\-statistics ( full | terse | none | boolean ); + }; + zone\-statistics ( full | terse | none | boolean ); +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SS ZONE +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +zone string [ class ] { + allow\-notify { address_match_element; ... }; + allow\-query { address_match_element; ... }; + allow\-query\-on { address_match_element; ... }; + allow\-transfer { address_match_element; ... }; + allow\-update { address_match_element; ... }; + allow\-update\-forwarding { address_match_element; ... }; + also\-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt\-transfer\-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt\-transfer\-source\-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + auto\-dnssec ( allow | maintain | off ); + check\-dup\-records ( fail | warn | ignore ); + check\-integrity boolean; + check\-mx ( fail | warn | ignore ); + check\-mx\-cname ( fail | warn | ignore ); + check\-names ( fail | warn | ignore ); + check\-sibling boolean; + check\-spf ( warn | ignore ); + check\-srv\-cname ( fail | warn | ignore ); + check\-wildcard boolean; + database string; + delegation\-only boolean; + dialup ( notify | notify\-passive | passive | refresh | boolean ); + dlz string; + dnskey\-sig\-validity integer; + dnssec\-dnskey\-kskonly boolean; + dnssec\-loadkeys\-interval integer; + dnssec\-policy string; + dnssec\-secure\-to\-insecure boolean; + dnssec\-update\-mode ( maintain | no\-resign ); + file quoted_string; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + in\-view string; + inline\-signing boolean; + ixfr\-from\-differences boolean; + journal quoted_string; + key\-directory quoted_string; + masterfile\-format ( map | raw | text ); + masterfile\-style ( full | relative ); + masters [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + max\-ixfr\-ratio ( unlimited | percentage ); + max\-journal\-size ( default | unlimited | sizeval ); + max\-records integer; + max\-refresh\-time integer; + max\-retry\-time integer; + max\-transfer\-idle\-in integer; + max\-transfer\-idle\-out integer; + max\-transfer\-time\-in integer; + max\-transfer\-time\-out integer; + max\-zone\-ttl ( unlimited | duration ); + min\-refresh\-time integer; + min\-retry\-time integer; + multi\-master boolean; + notify ( explicit | master\-only | boolean ); + notify\-delay integer; + notify\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify\-to\-soa boolean; + request\-expire boolean; + request\-ixfr boolean; + serial\-update\-method ( date | increment | unixtime ); + server\-addresses { ( ipv4_address | ipv6_address ); ... }; + server\-names { string; ... }; + sig\-signing\-nodes integer; + sig\-signing\-signatures integer; + sig\-signing\-type integer; + sig\-validity\-interval integer [ integer ]; + transfer\-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer\-source\-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + try\-tcp\-refresh boolean; + type ( primary | master | secondary | slave | mirror | + delegation\-only | forward | hint | redirect | static\-stub | + stub ); + update\-check\-ksk boolean; + update\-policy ( local | { ( deny | grant ) string ( 6to4\-self | + external | krb5\-self | krb5\-selfsub | krb5\-subdomain | ms\-self + | ms\-selfsub | ms\-subdomain | name | self | selfsub | selfwild + | subdomain | tcp\-self | wildcard | zonesub ) [ string ] + rrtypelist; ... }; + use\-alt\-transfer\-source boolean; + zero\-no\-soa\-ttl boolean; + zone\-statistics ( full | terse | none | boolean ); +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.SH FILES +.sp +\fB/etc/named.conf\fP +.SH SEE ALSO +.sp +\fBddns\-confgen(8)\fP, \fBnamed(8)\fP, \fBnamed\-checkconf(8)\fP, \fBrndc(8)\fP, \fBrndc\-confgen(8)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/named.conf.rst b/doc/man/named.conf.rst new file mode 100644 index 0000000000..d9352e272c --- /dev/null +++ b/doc/man/named.conf.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/named/named.conf.rst diff --git a/doc/man/named.rst b/doc/man/named.rst new file mode 100644 index 0000000000..cca0c33f40 --- /dev/null +++ b/doc/man/named.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/named/named.rst diff --git a/doc/man/nsec3hash.8in b/doc/man/nsec3hash.8in new file mode 100644 index 0000000000..860f8bcf3a --- /dev/null +++ b/doc/man/nsec3hash.8in @@ -0,0 +1,78 @@ +.\" Man page generated from reStructuredText. +. +.TH "NSEC3HASH" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +nsec3hash \- generate NSEC3 hash +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnsec3hash\fP {salt} {algorithm} {iterations} {domain} +.sp +\fBnsec3hash\fP \fB\-r\fP {algorithm} {flags} {iterations} {salt} {domain} +.SH DESCRIPTION +.sp +\fBnsec3hash\fP generates an NSEC3 hash based on a set of NSEC3 +parameters. This can be used to check the validity of NSEC3 records in a +signed zone. +.sp +If this command is invoked as \fBnsec3hash \-r\fP, it takes arguments in an +order matching the first four fields of an NSEC3 record, followed by the +domain name: algorithm, flags, iterations, salt, domain. This makes it +convenient to copy and paste a portion of an NSEC3 or NSEC3PARAM record +into a command line to confirm the correctness of an NSEC3 hash. +.SH ARGUMENTS +.INDENT 0.0 +.TP +.B \fBsalt\fP +The salt provided to the hash algorithm. +.TP +.B \fBalgorithm\fP +A number indicating the hash algorithm. Currently the only supported +hash algorithm for NSEC3 is SHA\-1, which is indicated by the number +1; consequently "1" is the only useful value for this argument. +.TP +.B \fBflags\fP +Provided for compatibility with NSEC3 record presentation format, but +ignored since the flags do not affect the hash. +.TP +.B \fBiterations\fP +The number of additional times the hash should be performed. +.TP +.B \fBdomain\fP +The domain name to be hashed. +.UNINDENT +.SH SEE ALSO +.sp +BIND 9 Administrator Reference Manual, \fI\%RFC 5155\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/nsec3hash.rst b/doc/man/nsec3hash.rst new file mode 100644 index 0000000000..8a3c8abb6f --- /dev/null +++ b/doc/man/nsec3hash.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/tools/nsec3hash.rst \ No newline at end of file diff --git a/doc/man/nslookup.1in b/doc/man/nslookup.1in new file mode 100644 index 0000000000..a6d02b10ee --- /dev/null +++ b/doc/man/nslookup.1in @@ -0,0 +1,237 @@ +.\" Man page generated from reStructuredText. +. +.TH "NSLOOKUP" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +nslookup \- query Internet name servers interactively +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnslookup\fP [\-option] [name | \-] [server] +.SH DESCRIPTION +.sp +\fBNslookup\fP is a program to query Internet domain name servers. +\fBNslookup\fP has two modes: interactive and non\-interactive. Interactive +mode allows the user to query name servers for information about various +hosts and domains or to print a list of hosts in a domain. +Non\-interactive mode is used to print just the name and requested +information for a host or domain. +.SH ARGUMENTS +.sp +Interactive mode is entered in the following cases: +.INDENT 0.0 +.IP a. 3 +when no arguments are given (the default name server will be used) +.IP b. 3 +when the first argument is a hyphen (\-) and the second argument is +the host name or Internet address of a name server. +.UNINDENT +.sp +Non\-interactive mode is used when the name or Internet address of the +host to be looked up is given as the first argument. The optional second +argument specifies the host name or address of a name server. +.sp +Options can also be specified on the command line if they precede the +arguments and are prefixed with a hyphen. For example, to change the +default query type to host information, and the initial timeout to 10 +seconds, type: +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +nslookup \-query=hinfo \-timeout=10 +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +The \fB\-version\fP option causes \fBnslookup\fP to print the version number +and immediately exits. +.SH INTERACTIVE COMMANDS +.INDENT 0.0 +.TP +.B \fBhost\fP [server] +Look up information for host using the current default server or +using server, if specified. If host is an Internet address and the +query type is A or PTR, the name of the host is returned. If host is +a name and does not have a trailing period, the search list is used +to qualify the name. +.sp +To look up a host not in the current domain, append a period to the +name. +.TP +.B \fBserver\fP domain | \fBlserver\fP domain +Change the default server to domain; \fBlserver\fP uses the initial +server to look up information about domain, while \fBserver\fP uses the +current default server. If an authoritative answer can\(aqt be found, +the names of servers that might have the answer are returned. +.TP +.B \fBroot\fP +not implemented +.TP +.B \fBfinger\fP +not implemented +.TP +.B \fBls\fP +not implemented +.TP +.B \fBview\fP +not implemented +.TP +.B \fBhelp\fP +not implemented +.TP +.B \fB?\fP +not implemented +.TP +.B \fBexit\fP +Exits the program. +.TP +.B \fBset\fP keyword[=value] +This command is used to change state information that affects the +lookups. Valid keywords are: +.INDENT 7.0 +.TP +.B \fBall\fP +Prints the current values of the frequently used options to +\fBset\fP\&. Information about the current default server and host is +also printed. +.TP +.B \fBclass=\fPvalue +Change the query class to one of: +.INDENT 7.0 +.TP +.B \fBIN\fP +the Internet class +.TP +.B \fBCH\fP +the Chaos class +.TP +.B \fBHS\fP +the Hesiod class +.TP +.B \fBANY\fP +wildcard +.UNINDENT +.sp +The class specifies the protocol group of the information. +.sp +(Default = IN; abbreviation = cl) +.TP +.B \fBnodebug\fP +Turn on or off the display of the full response packet and any +intermediate response packets when searching. +.sp +(Default = nodebug; abbreviation = [no]deb) +.TP +.B \fBnod2\fP +Turn debugging mode on or off. This displays more about what +nslookup is doing. +.sp +(Default = nod2) +.TP +.B \fBdomain=\fPname +Sets the search list to name. +.TP +.B \fBnosearch\fP +If the lookup request contains at least one period but doesn\(aqt end +with a trailing period, append the domain names in the domain +search list to the request until an answer is received. +.sp +(Default = search) +.TP +.B \fBport=\fPvalue +Change the default TCP/UDP name server port to value. +.sp +(Default = 53; abbreviation = po) +.TP +.B \fBquerytype=\fPvalue | \fBtype=\fPvalue +Change the type of the information query. +.sp +(Default = A and then AAAA; abbreviations = q, ty) +.INDENT 7.0 +.TP +\fBNote:\fP It is only possible to specify one query type, only the default +behavior looks up both when an alternative is not specified. +.UNINDENT +.TP +.B \fBnorecurse\fP +Tell the name server to query other servers if it does not have +the information. +.sp +(Default = recurse; abbreviation = [no]rec) +.TP +.B \fBndots=\fPnumber +Set the number of dots (label separators) in a domain that will +disable searching. Absolute names always stop searching. +.TP +.B \fBretry=\fPnumber +Set the number of retries to number. +.TP +.B \fBtimeout=\fPnumber +Change the initial timeout interval for waiting for a reply to +number seconds. +.TP +.B \fBnovc\fP +Always use a virtual circuit when sending requests to the server. +.sp +(Default = novc) +.TP +.B \fBnofail\fP +Try the next nameserver if a nameserver responds with SERVFAIL or +a referral (nofail) or terminate query (fail) on such a response. +.sp +(Default = nofail) +.UNINDENT +.UNINDENT +.SH RETURN VALUES +.sp +\fBnslookup\fP returns with an exit status of 1 if any query failed, and 0 +otherwise. +.SH IDN SUPPORT +.sp +If \fBnslookup\fP has been built with IDN (internationalized domain name) +support, it can accept and display non\-ASCII domain names. \fBnslookup\fP +appropriately converts character encoding of domain name before sending +a request to DNS server or displaying a reply from the server. If you\(aqd +like to turn off the IDN support for some reason, define the IDN_DISABLE +environment variable. The IDN support is disabled if the variable is set +when \fBnslookup\fP runs or when the standard output is not a tty. +.SH FILES +.sp +\fB/etc/resolv.conf\fP +.SH SEE ALSO +.sp +\fBdig(1)\fP, \fBhost(1)\fP, \fBnamed(8)\fP\&. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/nslookup.rst b/doc/man/nslookup.rst new file mode 100644 index 0000000000..4a250f5764 --- /dev/null +++ b/doc/man/nslookup.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/dig/nslookup.rst \ No newline at end of file diff --git a/doc/man/nsupdate.1in b/doc/man/nsupdate.1in new file mode 100644 index 0000000000..494280ec35 --- /dev/null +++ b/doc/man/nsupdate.1in @@ -0,0 +1,378 @@ +.\" Man page generated from reStructuredText. +. +.TH "NSUPDATE" "1" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +nsupdate \- dynamic DNS update utility +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBnsupdate\fP [\fB\-d\fP] [\fB\-D\fP] [\fB\-i\fP] [\fB\-L\fP level] [ [\fB\-g\fP] | [\fB\-o\fP] | [\fB\-l\fP] | [\fB\-y\fP [hmac:]keyname:secret] | [\fB\-k\fP keyfile] ] [\fB\-t\fP timeout] [\fB\-u\fP udptimeout] [\fB\-r\fP udpretries] [\fB\-v\fP] [\fB\-T\fP] [\fB\-P\fP] [\fB\-V\fP] [ [\fB\-4\fP] | [\fB\-6\fP] ] [filename] +.SH DESCRIPTION +.sp +\fBnsupdate\fP is used to submit Dynamic DNS Update requests as defined in +\fI\%RFC 2136\fP to a name server. This allows resource records to be added or +removed from a zone without manually editing the zone file. A single +update request can contain requests to add or remove more than one +resource record. +.sp +Zones that are under dynamic control via \fBnsupdate\fP or a DHCP server +should not be edited by hand. Manual edits could conflict with dynamic +updates and cause data to be lost. +.sp +The resource records that are dynamically added or removed with +\fBnsupdate\fP have to be in the same zone. Requests are sent to the +zone\(aqs master server. This is identified by the MNAME field of the +zone\(aqs SOA record. +.sp +Transaction signatures can be used to authenticate the Dynamic DNS +updates. These use the TSIG resource record type described in \fI\%RFC 2845\fP +or the SIG(0) record described in \fI\%RFC 2535\fP and \fI\%RFC 2931\fP or GSS\-TSIG as +described in \fI\%RFC 3645\fP\&. +.sp +TSIG relies on a shared secret that should only be known to \fBnsupdate\fP +and the name server. For instance, suitable \fBkey\fP and \fBserver\fP +statements would be added to \fB/etc/named.conf\fP so that the name server +can associate the appropriate secret key and algorithm with the IP +address of the client application that will be using TSIG +authentication. You can use \fBddns\-confgen\fP to generate suitable +configuration fragments. \fBnsupdate\fP uses the \fB\-y\fP or \fB\-k\fP options +to provide the TSIG shared secret. These options are mutually exclusive. +.sp +SIG(0) uses public key cryptography. To use a SIG(0) key, the public key +must be stored in a KEY record in a zone served by the name server. +.sp +GSS\-TSIG uses Kerberos credentials. Standard GSS\-TSIG mode is switched +on with the \fB\-g\fP flag. A non\-standards\-compliant variant of GSS\-TSIG +used by Windows 2000 can be switched on with the \fB\-o\fP flag. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-4\fP +Use IPv4 only. +.TP +\fB\-6\fP +Use IPv6 only. +.TP +\fB\-d\fP +Debug mode. This provides tracing information about the update +requests that are made and the replies received from the name server. +.TP +\fB\-D\fP +Extra debug mode. +.TP +\fB\-i\fP +Force interactive mode, even when standard input is not a terminal. +.TP +\fB\-k\fP keyfile +The file containing the TSIG authentication key. Keyfiles may be in +two formats: a single file containing a \fBnamed.conf\fP\-format \fBkey\fP +statement, which may be generated automatically by \fBddns\-confgen\fP, +or a pair of files whose names are of the format +\fBK{name}.+157.+{random}.key\fP and +\fBK{name}.+157.+{random}.private\fP, which can be generated by +\fBdnssec\-keygen\fP\&. The \fB\-k\fP may also be used to specify a SIG(0) +key used to authenticate Dynamic DNS update requests. In this case, +the key specified is not an HMAC\-MD5 key. +.TP +\fB\-l\fP +Local\-host only mode. This sets the server address to localhost +(disabling the \fBserver\fP so that the server address cannot be +overridden). Connections to the local server will use a TSIG key +found in \fB/var/run/named/session.key\fP, which is automatically +generated by \fBnamed\fP if any local master zone has set +\fBupdate\-policy\fP to \fBlocal\fP\&. The location of this key file can be +overridden with the \fB\-k\fP option. +.TP +\fB\-L\fP level +Set the logging debug level. If zero, logging is disabled. +.TP +\fB\-p\fP port +Set the port to use for connections to a name server. The default is +53. +.TP +\fB\-P\fP +Print the list of private BIND\-specific resource record types whose +format is understood by \fBnsupdate\fP\&. See also the \fB\-T\fP option. +.TP +\fB\-r\fP udpretries +The number of UDP retries. The default is 3. If zero, only one update +request will be made. +.TP +\fB\-t\fP timeout +The maximum time an update request can take before it is aborted. The +default is 300 seconds. Zero can be used to disable the timeout. +.TP +\fB\-T\fP +Print the list of IANA standard resource record types whose format is +understood by \fBnsupdate\fP\&. \fBnsupdate\fP will exit after the lists +are printed. The \fB\-T\fP option can be combined with the \fB\-P\fP +option. +.sp +Other types can be entered using "TYPEXXXXX" where "XXXXX" is the +decimal value of the type with no leading zeros. The rdata, if +present, will be parsed using the UNKNOWN rdata format, ( + ). +.TP +\fB\-u\fP udptimeout +The UDP retry interval. The default is 3 seconds. If zero, the +interval will be computed from the timeout interval and number of UDP +retries. +.TP +\fB\-v\fP +Use TCP even for small update requests. By default, \fBnsupdate\fP uses +UDP to send update requests to the name server unless they are too +large to fit in a UDP request in which case TCP will be used. TCP may +be preferable when a batch of update requests is made. +.TP +\fB\-V\fP +Print the version number and exit. +.TP +\fB\-y\fP [hmac:]keyname:secret +Literal TSIG authentication key. \fBkeyname\fP is the name of the key, +and \fBsecret\fP is the base64 encoded shared secret. \fBhmac\fP is the +name of the key algorithm; valid choices are \fBhmac\-md5\fP, +\fBhmac\-sha1\fP, \fBhmac\-sha224\fP, \fBhmac\-sha256\fP, \fBhmac\-sha384\fP, or +\fBhmac\-sha512\fP\&. If \fBhmac\fP is not specified, the default is +\fBhmac\-md5\fP or if MD5 was disabled \fBhmac\-sha256\fP\&. +.sp +NOTE: Use of the \fB\-y\fP option is discouraged because the shared +secret is supplied as a command line argument in clear text. This may +be visible in the output from ps1 or in a history file maintained by +the user\(aqs shell. +.UNINDENT +.SH INPUT FORMAT +.sp +\fBnsupdate\fP reads input from \fBfilename\fP or standard input. Each +command is supplied on exactly one line of input. Some commands are for +administrative purposes. The others are either update instructions or +prerequisite checks on the contents of the zone. These checks set +conditions that some name or set of resource records (RRset) either +exists or is absent from the zone. These conditions must be met if the +entire update request is to succeed. Updates will be rejected if the +tests for the prerequisite conditions fail. +.sp +Every update request consists of zero or more prerequisites and zero or +more updates. This allows a suitably authenticated update request to +proceed if some specified resource records are present or missing from +the zone. A blank input line (or the \fBsend\fP command) causes the +accumulated commands to be sent as one Dynamic DNS update request to the +name server. +.sp +The command formats and their meaning are as follows: +.INDENT 0.0 +.TP +.B \fBserver\fP servername port +Sends all dynamic update requests to the name server \fBservername\fP\&. +When no server statement is provided, \fBnsupdate\fP will send updates +to the master server of the correct zone. The MNAME field of that +zone\(aqs SOA record will identify the master server for that zone. +\fBport\fP is the port number on \fBservername\fP where the dynamic +update requests get sent. If no port number is specified, the default +DNS port number of 53 is used. +.TP +.B \fBlocal\fP address port +Sends all dynamic update requests using the local \fBaddress\fP\&. When +no local statement is provided, \fBnsupdate\fP will send updates using +an address and port chosen by the system. \fBport\fP can additionally +be used to make requests come from a specific port. If no port number +is specified, the system will assign one. +.TP +.B \fBzone\fP zonename +Specifies that all updates are to be made to the zone \fBzonename\fP\&. +If no \fBzone\fP statement is provided, \fBnsupdate\fP will attempt +determine the correct zone to update based on the rest of the input. +.TP +.B \fBclass\fP classname +Specify the default class. If no \fBclass\fP is specified, the default +class is \fBIN\fP\&. +.TP +.B \fBttl\fP seconds +Specify the default time to live for records to be added. The value +\fBnone\fP will clear the default ttl. +.TP +.B \fBkey\fP hmac:keyname secret +Specifies that all updates are to be TSIG\-signed using the +\fBkeyname\fP \fBsecret\fP pair. If \fBhmac\fP is specified, then it sets +the signing algorithm in use; the default is \fBhmac\-md5\fP or if MD5 +was disabled \fBhmac\-sha256\fP\&. The \fBkey\fP command overrides any key +specified on the command line via \fB\-y\fP or \fB\-k\fP\&. +.TP +.B \fBgsstsig\fP +Use GSS\-TSIG to sign the updated. This is equivalent to specifying +\fB\-g\fP on the command line. +.TP +.B \fBoldgsstsig\fP +Use the Windows 2000 version of GSS\-TSIG to sign the updated. This is +equivalent to specifying \fB\-o\fP on the command line. +.TP +.B \fBrealm\fP [realm_name] +When using GSS\-TSIG use \fBrealm_name\fP rather than the default realm +in \fBkrb5.conf\fP\&. If no realm is specified the saved realm is +cleared. +.TP +.B \fBcheck\-names\fP [yes_or_no] +Turn on or off check\-names processing on records to be added. +Check\-names has no effect on prerequisites or records to be deleted. +By default check\-names processing is on. If check\-names processing +fails the record will not be added to the UPDATE message. +.TP +.B \fBprereq nxdomain\fP domain\-name +Requires that no resource record of any type exists with name +\fBdomain\-name\fP\&. +.TP +.B \fBprereq yxdomain\fP domain\-name +Requires that \fBdomain\-name\fP exists (has as at least one resource +record, of any type). +.TP +.B \fBprereq nxrrset\fP domain\-name class type +Requires that no resource record exists of the specified \fBtype\fP, +\fBclass\fP and \fBdomain\-name\fP\&. If \fBclass\fP is omitted, IN (internet) +is assumed. +.TP +.B \fBprereq yxrrset\fP domain\-name class type +This requires that a resource record of the specified \fBtype\fP, +\fBclass\fP and \fBdomain\-name\fP must exist. If \fBclass\fP is omitted, IN +(internet) is assumed. +.TP +.B \fBprereq yxrrset\fP domain\-name class type data +The \fBdata\fP from each set of prerequisites of this form sharing a +common \fBtype\fP, \fBclass\fP, and \fBdomain\-name\fP are combined to form +a set of RRs. This set of RRs must exactly match the set of RRs +existing in the zone at the given \fBtype\fP, \fBclass\fP, and +\fBdomain\-name\fP\&. The \fBdata\fP are written in the standard text +representation of the resource record\(aqs RDATA. +.TP +.B \fBupdate delete\fP domain\-name ttl class type data +Deletes any resource records named \fBdomain\-name\fP\&. If \fBtype\fP and +\fBdata\fP is provided, only matching resource records will be removed. +The internet class is assumed if \fBclass\fP is not supplied. The +\fBttl\fP is ignored, and is only allowed for compatibility. +.TP +.B \fBupdate add\fP domain\-name ttl class type data +Adds a new resource record with the specified \fBttl\fP, \fBclass\fP and +\fBdata\fP\&. +.TP +.B \fBshow\fP +Displays the current message, containing all of the prerequisites and +updates specified since the last send. +.TP +.B \fBsend\fP +Sends the current message. This is equivalent to entering a blank +line. +.TP +.B \fBanswer\fP +Displays the answer. +.TP +.B \fBdebug\fP +Turn on debugging. +.TP +.B \fBversion\fP +Print version number. +.TP +.B \fBhelp\fP +Print a list of commands. +.UNINDENT +.sp +Lines beginning with a semicolon are comments and are ignored. +.SH EXAMPLES +.sp +The examples below show how \fBnsupdate\fP could be used to insert and +delete resource records from the \fBexample.com\fP zone. Notice that the +input in each example contains a trailing blank line so that a group of +commands are sent as one dynamic update request to the master name +server for \fBexample.com\fP\&. +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +# nsupdate +> update delete oldhost.example.com A +> update add newhost.example.com 86400 A 172.16.1.1 +> send +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +Any A records for \fBoldhost.example.com\fP are deleted. And an A record +for \fBnewhost.example.com\fP with IP address 172.16.1.1 is added. The +newly\-added record has a 1 day TTL (86400 seconds). +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +# nsupdate +> prereq nxdomain nickname.example.com +> update add nickname.example.com 86400 CNAME somehost.example.com +> send +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +The prerequisite condition gets the name server to check that there are +no resource records of any type for \fBnickname.example.com\fP\&. If there +are, the update request fails. If this name does not exist, a CNAME for +it is added. This ensures that when the CNAME is added, it cannot +conflict with the long\-standing rule in \fI\%RFC 1034\fP that a name must not +exist as any other record type if it exists as a CNAME. (The rule has +been updated for DNSSEC in \fI\%RFC 2535\fP to allow CNAMEs to have RRSIG, +DNSKEY and NSEC records.) +.SH FILES +.INDENT 0.0 +.TP +.B \fB/etc/resolv.conf\fP +used to identify default name server +.TP +.B \fB/var/run/named/session.key\fP +sets the default TSIG key for use in local\-only mode +.TP +.B \fBK{name}.+157.+{random}.key\fP +base\-64 encoding of HMAC\-MD5 key created by dnssec\-keygen8. +.TP +.B \fBK{name}.+157.+{random}.private\fP +base\-64 encoding of HMAC\-MD5 key created by dnssec\-keygen8. +.UNINDENT +.SH SEE ALSO +.sp +\fI\%RFC 2136\fP, \fI\%RFC 3007\fP, \fI\%RFC 2104\fP, \fI\%RFC 2845\fP, \fI\%RFC 1034\fP, \fI\%RFC 2535\fP, \fI\%RFC 2931\fP, +\fBnamed(8)\fP, \fBddns\-confgen(8)\fP, \fBdnssec\-keygen(8)\fP\&. +.SH BUGS +.sp +The TSIG key is redundantly stored in two separate files. This is a +consequence of nsupdate using the DST library for its cryptographic +operations, and may change in future releases. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/nsupdate.rst b/doc/man/nsupdate.rst new file mode 100644 index 0000000000..acd4704dd9 --- /dev/null +++ b/doc/man/nsupdate.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/nsupdate/nsupdate.rst \ No newline at end of file diff --git a/doc/man/pkcs11-destroy.8in b/doc/man/pkcs11-destroy.8in new file mode 100644 index 0000000000..063c0ff8d5 --- /dev/null +++ b/doc/man/pkcs11-destroy.8in @@ -0,0 +1,74 @@ +.\" Man page generated from reStructuredText. +. +.TH "PKCS11-DESTROY" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +pkcs11-destroy \- destroy PKCS#11 objects +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +pkcs11\-destroy \- destroy PKCS#11 objects +.sp +\fBpkcs11\-destroy\fP [\fB\-m\fP module] [\fB\-s\fP slot] [\fB\-i\fP ID] [\fB\-l\fP label] [\fB\-p\fP PIN] [\fB\-w\fP seconds] +.sp +\fBpkcs11\-destroy\fP destroys keys stored in a PKCS#11 device, identified +by their \fBID\fP or \fBlabel\fP\&. +.sp +Matching keys are displayed before being destroyed. By default, there is +a five second delay to allow the user to interrupt the process before +the destruction takes place. +.INDENT 0.0 +.TP +\fB\-m\fP module +Specify the PKCS#11 provider module. This must be the full path to a +shared library object implementing the PKCS#11 API for the device. +.TP +\fB\-s\fP slot +Open the session with the given PKCS#11 slot. The default is slot 0. +.TP +\fB\-i\fP ID +Destroy keys with the given object ID. +.TP +\fB\-l\fP label +Destroy keys with the given label. +.TP +\fB\-p\fP PIN +Specify the PIN for the device. If no PIN is provided on the command +line, \fBpkcs11\-destroy\fP will prompt for it. +.TP +\fB\-w\fP seconds +Specify how long to pause before carrying out key destruction. The +default is five seconds. If set to \fB0\fP, destruction will be +immediate. +.UNINDENT +.sp +\fBpkcs11\-keygen(8)\fP, \fBpkcs11\-list(8)\fP, \fBpkcs11\-tokens(8)\fP +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/pkcs11-destroy.rst b/doc/man/pkcs11-destroy.rst new file mode 100644 index 0000000000..ac5ae3a9eb --- /dev/null +++ b/doc/man/pkcs11-destroy.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/pkcs11/pkcs11-destroy.rst \ No newline at end of file diff --git a/doc/man/pkcs11-keygen.8in b/doc/man/pkcs11-keygen.8in new file mode 100644 index 0000000000..2f3e7c5a54 --- /dev/null +++ b/doc/man/pkcs11-keygen.8in @@ -0,0 +1,95 @@ +.\" Man page generated from reStructuredText. +. +.TH "PKCS11-KEYGEN" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +pkcs11-keygen \- generate keys on a PKCS#11 device +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBpkcs11\-keygen\fP [\fB\-a\fP algorithm] [\fB\-b\fP keysize] [\fB\-e\fP] [\fB\-i\fP id] [\fB\-m\fP module] [\fB\-P\fP] [\fB\-p\fP PIN] [\fB\-q\fP] [\fB\-S\fP] [\fB\-s\fP slot] label +.SH DESCRIPTION +.sp +\fBpkcs11\-keygen\fP causes a PKCS#11 device to generate a new key pair +with the given \fBlabel\fP (which must be unique) and with \fBkeysize\fP +bits of prime. +.SH ARGUMENTS +.INDENT 0.0 +.TP +\fB\-a\fP algorithm +Specify the key algorithm class: Supported classes are RSA, DSA, DH, +ECC and ECX. In addition to these strings, the \fBalgorithm\fP can be +specified as a DNSSEC signing algorithm that will be used with this +key; for example, NSEC3RSASHA1 maps to RSA, ECDSAP256SHA256 maps to +ECC, and ED25519 to ECX. The default class is "RSA". +.TP +\fB\-b\fP keysize +Create the key pair with \fBkeysize\fP bits of prime. For ECC keys, the +only valid values are 256 and 384, and the default is 256. For ECX +keys, the only valid values are 256 and 456, and the default is 256. +.TP +\fB\-e\fP +For RSA keys only, use a large exponent. +.TP +\fB\-i\fP id +Create key objects with id. The id is either an unsigned short 2 byte +or an unsigned long 4 byte number. +.TP +\fB\-m\fP module +Specify the PKCS#11 provider module. This must be the full path to a +shared library object implementing the PKCS#11 API for the device. +.TP +\fB\-P\fP +Set the new private key to be non\-sensitive and extractable. The +allows the private key data to be read from the PKCS#11 device. The +default is for private keys to be sensitive and non\-extractable. +.TP +\fB\-p\fP PIN +Specify the PIN for the device. If no PIN is provided on the command +line, \fBpkcs11\-keygen\fP will prompt for it. +.TP +\fB\-q\fP +Quiet mode: suppress unnecessary output. +.TP +\fB\-S\fP +For Diffie\-Hellman (DH) keys only, use a special prime of 768, 1024 +or 1536 bit size and base (aka generator) 2. If not specified, bit +size will default to 1024. +.TP +\fB\-s\fP slot +Open the session with the given PKCS#11 slot. The default is slot 0. +.UNINDENT +.SH SEE ALSO +.sp +\fBpkcs11\-destroy(8)\fP, \fBpkcs11\-list(8)\fP, \fBpkcs11\-tokens(8)\fP, \fBdnssec\-keyfromlabel(8)\fP +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/pkcs11-keygen.rst b/doc/man/pkcs11-keygen.rst new file mode 100644 index 0000000000..276d1f4d4f --- /dev/null +++ b/doc/man/pkcs11-keygen.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/pkcs11/pkcs11-keygen.rst \ No newline at end of file diff --git a/doc/man/pkcs11-list.8in b/doc/man/pkcs11-list.8in new file mode 100644 index 0000000000..6a0a3d3368 --- /dev/null +++ b/doc/man/pkcs11-list.8in @@ -0,0 +1,73 @@ +.\" Man page generated from reStructuredText. +. +.TH "PKCS11-LIST" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +pkcs11-list \- list PKCS#11 objects +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.sp +\fBpkcs11\-list\fP [\fB\-P\fP] [\fB\-m\fP module] [\fB\-s\fP slot] [\fB\-i\fP ID \fB] [\-l\fP label] [\fB\-p\fP PIN] +.SH DESCRIPTION +.sp +\fBpkcs11\-list\fP lists the PKCS#11 objects with \fBID\fP or \fBlabel\fP or by +default all objects. The object class, label, and ID are displayed for +all keys. For private or secret keys, the extractability attribute is +also displayed, as either \fBtrue\fP, \fBfalse\fP, or \fBnever\fP\&. +.SH ARGUMENTS +.INDENT 0.0 +.TP +\fB\-P\fP +List only the public objects. (Note that on some PKCS#11 devices, all +objects are private.) +.TP +\fB\-m\fP module +Specify the PKCS#11 provider module. This must be the full path to a +shared library object implementing the PKCS#11 API for the device. +.TP +\fB\-s\fP slot +Open the session with the given PKCS#11 slot. The default is slot 0. +.TP +\fB\-i\fP ID +List only key objects with the given object ID. +.TP +\fB\-l\fP label +List only key objects with the given label. +.TP +\fB\-p\fP PIN +Specify the PIN for the device. If no PIN is provided on the command +line, \fBpkcs11\-list\fP will prompt for it. +.UNINDENT +.SH SEE ALSO +.sp +\fBpkcs11\-destroy(8)\fP, \fBpkcs11\-keygen(8)\fP, \fBpkcs11\-tokens(8)\fP +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/pkcs11-list.rst b/doc/man/pkcs11-list.rst new file mode 100644 index 0000000000..0e69bee7d2 --- /dev/null +++ b/doc/man/pkcs11-list.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/pkcs11/pkcs11-list.rst \ No newline at end of file diff --git a/doc/man/pkcs11-tokens.8in b/doc/man/pkcs11-tokens.8in new file mode 100644 index 0000000000..805a0120ec --- /dev/null +++ b/doc/man/pkcs11-tokens.8in @@ -0,0 +1,58 @@ +.\" Man page generated from reStructuredText. +. +.TH "PKCS11-TOKENS" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +pkcs11-tokens \- list PKCS#11 available tokens +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBpkcs11\-tokens\fP [\fB\-m\fP module] [\fB\-v\fP] +.SH DESCRIPTION +.sp +\fBpkcs11\-tokens\fP lists the PKCS#11 available tokens with defaults from +the slot/token scan performed at application initialization. +.SH ARGUMENTS +.INDENT 0.0 +.TP +\fB\-m\fP module +Specify the PKCS#11 provider module. This must be the full path to a +shared library object implementing the PKCS#11 API for the device. +.TP +\fB\-v\fP +Make the PKCS#11 libisc initialization verbose. +.UNINDENT +.SH SEE ALSO +.sp +\fBpkcs11\-destroy(8)\fP, \fBpkcs11\-keygen(8)\fP, \fBpkcs11\-list(8)\fP +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/pkcs11-tokens.rst b/doc/man/pkcs11-tokens.rst new file mode 100644 index 0000000000..62300bc3a6 --- /dev/null +++ b/doc/man/pkcs11-tokens.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/pkcs11/pkcs11-tokens.rst \ No newline at end of file diff --git a/doc/man/rndc-confgen.8in b/doc/man/rndc-confgen.8in new file mode 100644 index 0000000000..92cc16f0c2 --- /dev/null +++ b/doc/man/rndc-confgen.8in @@ -0,0 +1,123 @@ +.\" Man page generated from reStructuredText. +. +.TH "RNDC-CONFGEN" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +rndc-confgen \- rndc key generation tool +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBrndc\-confgen\fP [\fB\-a\fP] [\fB\-A\fP algorithm] [\fB\-b\fP keysize] [\fB\-c\fP keyfile] [\fB\-h\fP] [\fB\-k\fP keyname] [\fB\-p\fP port] [\fB\-s\fP address] [\fB\-t\fP chrootdir] [\fB\-u\fP user] +.SH DESCRIPTION +.sp +\fBrndc\-confgen\fP generates configuration files for \fBrndc\fP\&. It can be +used as a convenient alternative to writing the \fBrndc.conf\fP file and +the corresponding \fBcontrols\fP and \fBkey\fP statements in \fBnamed.conf\fP +by hand. Alternatively, it can be run with the \fB\-a\fP option to set up a +\fBrndc.key\fP file and avoid the need for a \fBrndc.conf\fP file and a +\fBcontrols\fP statement altogether. +.SH ARGUMENTS +.INDENT 0.0 +.TP +\fB\-a\fP +Do automatic \fBrndc\fP configuration. This creates a file \fBrndc.key\fP +in \fB/etc\fP (or whatever \fBsysconfdir\fP was specified as when BIND +was built) that is read by both \fBrndc\fP and \fBnamed\fP on startup. +The \fBrndc.key\fP file defines a default command channel and +authentication key allowing \fBrndc\fP to communicate with \fBnamed\fP on +the local host with no further configuration. +.sp +Running \fBrndc\-confgen \-a\fP allows BIND 9 and \fBrndc\fP to be used as +drop\-in replacements for BIND 8 and \fBndc\fP, with no changes to the +existing BIND 8 \fBnamed.conf\fP file. +.sp +If a more elaborate configuration than that generated by +\fBrndc\-confgen \-a\fP is required, for example if rndc is to be used +remotely, you should run \fBrndc\-confgen\fP without the \fB\-a\fP option +and set up a \fBrndc.conf\fP and \fBnamed.conf\fP as directed. +.TP +\fB\-A\fP algorithm +Specifies the algorithm to use for the TSIG key. Available choices +are: hmac\-md5, hmac\-sha1, hmac\-sha224, hmac\-sha256, hmac\-sha384 and +hmac\-sha512. The default is hmac\-sha256. +.TP +\fB\-b\fP keysize +Specifies the size of the authentication key in bits. Must be between +1 and 512 bits; the default is the hash size. +.TP +\fB\-c\fP keyfile +Used with the \fB\-a\fP option to specify an alternate location for +\fBrndc.key\fP\&. +.TP +\fB\-h\fP +Prints a short summary of the options and arguments to +\fBrndc\-confgen\fP\&. +.TP +\fB\-k\fP keyname +Specifies the key name of the rndc authentication key. This must be a +valid domain name. The default is \fBrndc\-key\fP\&. +.TP +\fB\-p\fP port +Specifies the command channel port where \fBnamed\fP listens for +connections from \fBrndc\fP\&. The default is 953. +.TP +\fB\-s\fP address +Specifies the IP address where \fBnamed\fP listens for command channel +connections from \fBrndc\fP\&. The default is the loopback address +127.0.0.1. +.TP +\fB\-t\fP chrootdir +Used with the \fB\-a\fP option to specify a directory where \fBnamed\fP +will run chrooted. An additional copy of the \fBrndc.key\fP will be +written relative to this directory so that it will be found by the +chrooted \fBnamed\fP\&. +.TP +\fB\-u\fP user +Used with the \fB\-a\fP option to set the owner of the \fBrndc.key\fP file +generated. If \fB\-t\fP is also specified only the file in the chroot +area has its owner changed. +.UNINDENT +.SH EXAMPLES +.sp +To allow \fBrndc\fP to be used with no manual configuration, run +.sp +\fBrndc\-confgen \-a\fP +.sp +To print a sample \fBrndc.conf\fP file and corresponding \fBcontrols\fP and +\fBkey\fP statements to be manually inserted into \fBnamed.conf\fP, run +.sp +\fBrndc\-confgen\fP +.SH SEE ALSO +.sp +\fBrndc(8)\fP, \fBrndc.conf(5)\fP, \fBnamed(8)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/rndc-confgen.rst b/doc/man/rndc-confgen.rst new file mode 100644 index 0000000000..9df8447787 --- /dev/null +++ b/doc/man/rndc-confgen.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/confgen/rndc-confgen.rst \ No newline at end of file diff --git a/doc/man/rndc.8in b/doc/man/rndc.8in new file mode 100644 index 0000000000..43079e8435 --- /dev/null +++ b/doc/man/rndc.8in @@ -0,0 +1,584 @@ +.\" Man page generated from reStructuredText. +. +.TH "RNDC" "8" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +rndc \- name server control utility +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +.SH SYNOPSIS +.sp +\fBrndc\fP [\fB\-b\fP source\-address] [\fB\-c\fP config\-file] [\fB\-k\fP key\-file] [\fB\-s\fP server] [\fB\-p\fP port] [\fB\-q\fP] [\fB\-r\fP] [\fB\-V\fP] [\fB\-y\fP key_id] [[\fB\-4\fP] | [\fB\-6\fP]] {command} +.SH DESCRIPTION +.sp +\fBrndc\fP controls the operation of a name server. It supersedes the +\fBndc\fP utility that was provided in old BIND releases. If \fBrndc\fP is +invoked with no command line options or arguments, it prints a short +summary of the supported commands and the available options and their +arguments. +.sp +\fBrndc\fP communicates with the name server over a TCP connection, +sending commands authenticated with digital signatures. In the current +versions of \fBrndc\fP and \fBnamed\fP, the only supported authentication +algorithms are HMAC\-MD5 (for compatibility), HMAC\-SHA1, HMAC\-SHA224, +HMAC\-SHA256 (default), HMAC\-SHA384 and HMAC\-SHA512. They use a shared +secret on each end of the connection. This provides TSIG\-style +authentication for the command request and the name server\(aqs response. +All commands sent over the channel must be signed by a key_id known to +the server. +.sp +\fBrndc\fP reads a configuration file to determine how to contact the name +server and decide what algorithm and key it should use. +.SH OPTIONS +.INDENT 0.0 +.TP +\fB\-4\fP +Use IPv4 only. +.TP +\fB\-6\fP +Use IPv6 only. +.TP +\fB\-b\fP source\-address +Use source\-address as the source address for the connection to the +server. Multiple instances are permitted to allow setting of both the +IPv4 and IPv6 source addresses. +.TP +\fB\-c\fP config\-file +Use config\-file as the configuration file instead of the default, +\fB/etc/rndc.conf\fP\&. +.TP +\fB\-k\fP key\-file +Use key\-file as the key file instead of the default, +\fB/etc/rndc.key\fP\&. The key in \fB/etc/rndc.key\fP will be used to +authenticate commands sent to the server if the config\-file does not +exist. +.TP +\fB\-s\fP server +server is the name or address of the server which matches a server +statement in the configuration file for \fBrndc\fP\&. If no server is +supplied on the command line, the host named by the default\-server +clause in the options statement of the \fBrndc\fP configuration file +will be used. +.TP +\fB\-p\fP port +Send commands to TCP port port instead of BIND 9\(aqs default control +channel port, 953. +.TP +\fB\-q\fP +Quiet mode: Message text returned by the server will not be printed +except when there is an error. +.TP +\fB\-r\fP +Instructs \fBrndc\fP to print the result code returned by \fBnamed\fP +after executing the requested command (e.g., ISC_R_SUCCESS, +ISC_R_FAILURE, etc). +.TP +\fB\-V\fP +Enable verbose logging. +.TP +\fB\-y\fP key_id +Use the key key_id from the configuration file. key_id must be known +by \fBnamed\fP with the same algorithm and secret string in order for +control message validation to succeed. If no key_id is specified, +\fBrndc\fP will first look for a key clause in the server statement of +the server being used, or if no server statement is present for that +host, then the default\-key clause of the options statement. Note that +the configuration file contains shared secrets which are used to send +authenticated control commands to name servers. It should therefore +not have general read or write access. +.UNINDENT +.SH COMMANDS +.sp +A list of commands supported by \fBrndc\fP can be seen by running \fBrndc\fP +without arguments. +.sp +Currently supported commands are: +.INDENT 0.0 +.TP +.B \fBaddzone\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] \fIconfiguration\fP +Add a zone while the server is running. This command requires the +\fBallow\-new\-zones\fP option to be set to \fByes\fP\&. The configuration +string specified on the command line is the zone configuration text +that would ordinarily be placed in \fBnamed.conf(5)\fP\&. +.sp +The configuration is saved in a file called \fBviewname.nzf\fP (or, if +\fBnamed(8)\fP is compiled with liblmdb, an LMDB database file called +\fBviewname.nzd\fP). viewname is the name of the view, unless the view +name contains characters that are incompatible with use as a file +name, in which case a cryptographic hash of the view name is used +instead. When \fBnamed(8)\fP is restarted, the file will be loaded into +the view configuration, so that zones that were added can persist +after a restart. +.sp +This sample \fBaddzone\fP command would add the zone \fBexample.com\fP to +the default view: +.sp +\fB$\fP\fBrndc addzone example.com \(aq{ type master; file "example.com.db"; };\(aq\fP +.sp +(Note the brackets and semi\-colon around the zone configuration +text.) +.sp +See also \fBrndc delzone\fP and \fBrndc modzone\fP\&. +.TP +\fBdelzone\fP [\fB\-clean\fP] \fIzone\fP [\fIclass\fP [\fIview\fP]] +Delete a zone while the server is running. +.sp +If the \fB\-clean\fP argument is specified, the zone\(aqs master file (and +journal file, if any) will be deleted along with the zone. Without +the \fB\-clean\fP option, zone files must be cleaned up by hand. (If the +zone is of type "slave" or "stub", the files needing to be cleaned up +will be reported in the output of the \fBrndc delzone\fP command.) +.sp +If the zone was originally added via \fBrndc addzone\fP, then it will +be removed permanently. However, if it was originally configured in +\fBnamed.conf\fP, then that original configuration is still in place; +when the server is restarted or reconfigured, the zone will come +back. To remove it permanently, it must also be removed from +\fBnamed.conf\fP +.sp +See also \fBrndc addzone\fP and \fBrndc modzone\fP\&. +.TP +\fBdnstap\fP ( \fB\-reopen\fP | \fB\-roll\fP [\fInumber\fP] ) +Close and re\-open DNSTAP output files. \fBrndc dnstap \-reopen\fP allows +the output file to be renamed externally, so that \fBnamed(8)\fP can +truncate and re\-open it. \fBrndc dnstap \-roll\fP causes the output file +to be rolled automatically, similar to log files; the most recent +output file has ".0" appended to its name; the previous most recent +output file is moved to ".1", and so on. If number is specified, then +the number of backup log files is limited to that number. +.TP +\fBdumpdb\fP [\fB\-all\fP | \fB\-cache\fP | \fB\-zones\fP | \fB\-adb\fP | \fB\-bad\fP | \fB\-fail\fP] [\fIview ...\fP] +Dump the server\(aqs caches (default) and/or zones to the dump file for +the specified views. If no view is specified, all views are dumped. +(See the \fBdump\-file\fP option in the BIND 9 Administrator Reference +Manual.) +.TP +.B \fBflush\fP +Flushes the server\(aqs cache. +.TP +.B \fBflushname\fP \fIname\fP [\fIview\fP] +Flushes the given name from the view\(aqs DNS cache and, if applicable, +from the view\(aqs nameserver address database, bad server cache and +SERVFAIL cache. +.TP +.B \fBflushtree\fP \fIname\fP [\fIview\fP] +Flushes the given name, and all of its subdomains, from the view\(aqs +DNS cache, address database, bad server cache, and SERVFAIL cache. +.TP +.B \fBfreeze\fP [\fIzone\fP [\fIclass\fP [\fIview\fP]]] +Suspend updates to a dynamic zone. If no zone is specified, then all +zones are suspended. This allows manual edits to be made to a zone +normally updated by dynamic update. It also causes changes in the +journal file to be synced into the master file. All dynamic update +attempts will be refused while the zone is frozen. +.sp +See also \fBrndc thaw\fP\&. +.TP +\fBhalt\fP [\fB\-p\fP] +Stop the server immediately. Recent changes made through dynamic +update or IXFR are not saved to the master files, but will be rolled +forward from the journal files when the server is restarted. If +\fB\-p\fP is specified \fBnamed(8)\fP\(aqs process id is returned. This allows +an external process to determine when \fBnamed(8)\fP had completed +halting. +.sp +See also \fBrndc stop\fP\&. +.TP +.B \fBloadkeys\fP [\fIzone\fP [\fIclass\fP [\fIview\fP]]] +Fetch all DNSSEC keys for the given zone from the key directory. If +they are within their publication period, merge them into the +zone\(aqs DNSKEY RRset. Unlike \fBrndc sign\fP, however, the zone is not +immediately re\-signed by the new keys, but is allowed to +incrementally re\-sign over time. +.sp +This command requires that zone is configured with a \fBdnssec\-policy\fP, or +the \fBauto\-dnssec\fP zone option be set to \fBmaintain\fP, and also requires the +zone to be configured to allow dynamic DNS. (See "Dynamic Update Policies" in +the Administrator Reference Manual for more details.) +.TP +.B \fBmanaged\-keys\fP (\fIstatus\fP | \fIrefresh\fP | \fIsync\fP | \fIdestroy\fP) [\fIclass\fP [\fIview\fP]] +Inspect and control the "managed\-keys" database which handles +\fI\%RFC 5011\fP DNSSEC trust anchor maintenance. If a view is specified, these +commands are applied to that view; otherwise they are applied to all +views. +.INDENT 7.0 +.IP \(bu 2 +When run with the \fBstatus\fP keyword, prints the current status of +the managed\-keys database. +.IP \(bu 2 +When run with the \fBrefresh\fP keyword, forces an immediate refresh +query to be sent for all the managed keys, updating the +managed\-keys database if any new keys are found, without waiting +the normal refresh interval. +.IP \(bu 2 +When run with the \fBsync\fP keyword, forces an immediate dump of +the managed\-keys database to disk (in the file +\fBmanaged\-keys.bind\fP or (\fBviewname.mkeys\fP). This synchronizes +the database with its journal file, so that the database\(aqs current +contents can be inspected visually. +.IP \(bu 2 +When run with the \fBdestroy\fP keyword, the managed\-keys database +is shut down and deleted, and all key maintenance is terminated. +This command should be used only with extreme caution. +.sp +Existing keys that are already trusted are not deleted from +memory; DNSSEC validation can continue after this command is used. +However, key maintenance operations will cease until \fBnamed(8)\fP is +restarted or reconfigured, and all existing key maintenance state +will be deleted. +.sp +Running \fBrndc reconfig\fP or restarting \fBnamed(8)\fP immediately +after this command will cause key maintenance to be reinitialized +from scratch, just as if the server were being started for the +first time. This is primarily intended for testing, but it may +also be used, for example, to jumpstart the acquisition of new +keys in the event of a trust anchor rollover, or as a brute\-force +repair for key maintenance problems. +.UNINDENT +.TP +.B \fBmodzone\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] \fIconfiguration\fP +Modify the configuration of a zone while the server is running. This +command requires the \fBallow\-new\-zones\fP option to be set to \fByes\fP\&. +As with \fBaddzone\fP, the configuration string specified on the +command line is the zone configuration text that would ordinarily be +placed in \fBnamed.conf\fP\&. +.sp +If the zone was originally added via \fBrndc addzone\fP, the +configuration changes will be recorded permanently and will still be +in effect after the server is restarted or reconfigured. However, if +it was originally configured in \fBnamed.conf\fP, then that original +configuration is still in place; when the server is restarted or +reconfigured, the zone will revert to its original configuration. To +make the changes permanent, it must also be modified in +\fBnamed.conf\fP +.sp +See also \fBrndc addzone\fP and \fBrndc delzone\fP\&. +.TP +.B \fBnotify\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] +Resend NOTIFY messages for the zone. +.TP +.B \fBnotrace\fP +Sets the server\(aqs debugging level to 0. +.sp +See also \fBrndc trace\fP\&. +.TP +\fBnta\fP [( \fB\-class\fP \fIclass\fP | \fB\-dump\fP | \fB\-force\fP | \fB\-remove\fP | \fB\-lifetime\fP \fIduration\fP)] \fIdomain\fP [\fIview\fP] +Sets a DNSSEC negative trust anchor (NTA) for \fBdomain\fP, with a +lifetime of \fBduration\fP\&. The default lifetime is configured in +\fBnamed.conf\fP via the \fBnta\-lifetime\fP option, and defaults to one +hour. The lifetime cannot exceed one week. +.sp +A negative trust anchor selectively disables DNSSEC validation for +zones that are known to be failing because of misconfiguration rather +than an attack. When data to be validated is at or below an active +NTA (and above any other configured trust anchors), \fBnamed(8)\fP will +abort the DNSSEC validation process and treat the data as insecure +rather than bogus. This continues until the NTA\(aqs lifetime is +elapsed. +.sp +NTAs persist across restarts of the \fBnamed(8)\fP server. The NTAs for a +view are saved in a file called \fBname.nta\fP, where name is the name +of the view, or if it contains characters that are incompatible with +use as a file name, a cryptographic hash generated from the name of +the view. +.sp +An existing NTA can be removed by using the \fB\-remove\fP option. +.sp +An NTA\(aqs lifetime can be specified with the \fB\-lifetime\fP option. +TTL\-style suffixes can be used to specify the lifetime in seconds, +minutes, or hours. If the specified NTA already exists, its lifetime +will be updated to the new value. Setting \fBlifetime\fP to zero is +equivalent to \fB\-remove\fP\&. +.sp +If the \fB\-dump\fP is used, any other arguments are ignored, and a list +of existing NTAs is printed (note that this may include NTAs that are +expired but have not yet been cleaned up). +.sp +Normally, \fBnamed(8)\fP will periodically test to see whether data below +an NTA can now be validated (see the \fBnta\-recheck\fP option in the +Administrator Reference Manual for details). If data can be +validated, then the NTA is regarded as no longer necessary, and will +be allowed to expire early. The \fB\-force\fP overrides this behavior +and forces an NTA to persist for its entire lifetime, regardless of +whether data could be validated if the NTA were not present. +.sp +The view class can be specified with \fB\-class\fP\&. The default is class +\fBIN\fP, which is the only class for which DNSSEC is currently +supported. +.sp +All of these options can be shortened, i.e., to \fB\-l\fP, \fB\-r\fP, +\fB\-d\fP, \fB\-f\fP, and \fB\-c\fP\&. +.sp +Unrecognized options are treated as errors. To reference a domain or +view name that begins with a hyphen, use a double\-hyphen on the +command line to indicate the end of options. +.TP +.B \fBquerylog\fP [(\fIon\fP | \fIoff\fP)] +Enable or disable query logging. (For backward compatibility, this +command can also be used without an argument to toggle query logging +on and off.) +.sp +Query logging can also be enabled by explicitly directing the +\fBqueries\fP \fBcategory\fP to a \fBchannel\fP in the \fBlogging\fP section +of \fBnamed.conf\fP or by specifying \fBquerylog yes;\fP in the +\fBoptions\fP section of \fBnamed.conf\fP\&. +.TP +.B \fBreconfig\fP +Reload the configuration file and load new zones, but do not reload +existing zone files even if they have changed. This is faster than a +full \fBreload\fP when there is a large number of zones because it +avoids the need to examine the modification times of the zones files. +.TP +.B \fBrecursing\fP +Dump the list of queries \fBnamed(8)\fP is currently recursing on, and the +list of domains to which iterative queries are currently being sent. +(The second list includes the number of fetches currently active for +the given domain, and how many have been passed or dropped because of +the \fBfetches\-per\-zone\fP option.) +.TP +.B \fBrefresh\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] +Schedule zone maintenance for the given zone. +.TP +.B \fBreload\fP +Reload configuration file and zones. +.TP +.B \fBreload\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] +Reload the given zone. +.TP +.B \fBretransfer\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] +Retransfer the given slave zone from the master server. +.sp +If the zone is configured to use \fBinline\-signing\fP, the signed +version of the zone is discarded; after the retransfer of the +unsigned version is complete, the signed version will be regenerated +with all new signatures. +.TP +.B \fBscan\fP +Scan the list of available network interfaces for changes, without +performing a full \fBreconfig\fP or waiting for the +\fBinterface\-interval\fP timer. +.TP +\fBsecroots\fP [\fB\-\fP] [\fIview\fP ...] +Dump the security roots (i.e., trust anchors configured via +\fBtrust\-anchors\fP, or the \fBmanaged\-keys\fP or \fBtrusted\-keys\fP statements +(both deprecated), or \fBdnssec\-validation auto\fP) and negative trust anchors +for the specified views. If no view is specified, all views are +dumped. Security roots will indicate whether they are configured as trusted +keys, managed keys, or initializing managed keys (managed keys that have not +yet been updated by a successful key refresh query). +.sp +If the first argument is "\-", then the output is returned via the +\fBrndc\fP response channel and printed to the standard output. +Otherwise, it is written to the secroots dump file, which defaults to +\fBnamed.secroots\fP, but can be overridden via the \fBsecroots\-file\fP +option in \fBnamed.conf\fP\&. +.sp +See also \fBrndc managed\-keys\fP\&. +.TP +\fBserve\-stale\fP (\fBon\fP | \fBoff\fP | \fBreset\fP | \fBstatus\fP) [\fIclass\fP [\fIview\fP]] +Enable, disable, reset, or report the current status of the serving +of stale answers as configured in \fBnamed.conf\fP\&. +.sp +If serving of stale answers is disabled by \fBrndc\-serve\-stale off\fP, +then it will remain disabled even if \fBnamed(8)\fP is reloaded or +reconfigured. \fBrndc serve\-stale reset\fP restores the setting as +configured in \fBnamed.conf\fP\&. +.sp +\fBrndc serve\-stale status\fP will report whether serving of stale +answers is currently enabled, disabled by the configuration, or +disabled by \fBrndc\fP\&. It will also report the values of +\fBstale\-answer\-ttl\fP and \fBmax\-stale\-ttl\fP\&. +.TP +.B \fBshowzone\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] +Print the configuration of a running zone. +.sp +See also \fBrndc zonestatus\fP\&. +.TP +.B \fBsign\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] +Fetch all DNSSEC keys for the given zone from the key directory (see +the \fBkey\-directory\fP option in the BIND 9 Administrator Reference +Manual). If they are within their publication period, merge them into +the zone\(aqs DNSKEY RRset. If the DNSKEY RRset is changed, then the +zone is automatically re\-signed with the new key set. +.sp +This command requires that the zone is configure with a \fBdnssec\-policy\fP, or +that the \fBauto\-dnssec\fP zone option be set to \fBallow\fP or \fBmaintain\fP, +and also requires the zone to be configured to allow dynamic DNS. (See +"Dynamic Update Policies" in the Administrator Reference Manual for more +details.) +.sp +See also \fBrndc loadkeys\fP\&. +.TP +\fBsigning\fP [(\fB\-list\fP | \fB\-clear\fP \fIkeyid/algorithm\fP | \fB\-clear\fP \fIall\fP | \fB\-nsec3param\fP ( \fIparameters\fP | none ) | \fB\-serial\fP \fIvalue\fP ) \fIzone\fP [\fIclass\fP [\fIview\fP]] +List, edit, or remove the DNSSEC signing state records for the +specified zone. The status of ongoing DNSSEC operations (such as +signing or generating NSEC3 chains) is stored in the zone in the form +of DNS resource records of type \fBsig\-signing\-type\fP\&. +\fBrndc signing \-list\fP converts these records into a human\-readable +form, indicating which keys are currently signing or have finished +signing the zone, and which NSEC3 chains are being created or +removed. +.sp +\fBrndc signing \-clear\fP can remove a single key (specified in the +same format that \fBrndc signing \-list\fP uses to display it), or all +keys. In either case, only completed keys are removed; any record +indicating that a key has not yet finished signing the zone will be +retained. +.sp +\fBrndc signing \-nsec3param\fP sets the NSEC3 parameters for a zone. +This is the only supported mechanism for using NSEC3 with +\fBinline\-signing\fP zones. Parameters are specified in the same format +as an NSEC3PARAM resource record: hash algorithm, flags, iterations, +and salt, in that order. +.sp +Currently, the only defined value for hash algorithm is \fB1\fP, +representing SHA\-1. The \fBflags\fP may be set to \fB0\fP or \fB1\fP, +depending on whether you wish to set the opt\-out bit in the NSEC3 +chain. \fBiterations\fP defines the number of additional times to apply +the algorithm when generating an NSEC3 hash. The \fBsalt\fP is a string +of data expressed in hexadecimal, a hyphen (\fI\-\(aq) if no salt is to be +used, or the keyword \(ga\(gaauto\(ga\fP, which causes \fBnamed(8)\fP to generate a +random 64\-bit salt. +.sp +So, for example, to create an NSEC3 chain using the SHA\-1 hash +algorithm, no opt\-out flag, 10 iterations, and a salt value of +"FFFF", use: \fBrndc signing \-nsec3param 1 0 10 FFFF zone\fP\&. To set +the opt\-out flag, 15 iterations, and no salt, use: +\fBrndc signing \-nsec3param 1 1 15 \- zone\fP\&. +.sp +\fBrndc signing \-nsec3param none\fP removes an existing NSEC3 chain and +replaces it with NSEC. +.sp +\fBrndc signing \-serial value\fP sets the serial number of the zone to +value. If the value would cause the serial number to go backwards it +will be rejected. The primary use is to set the serial on inline +signed zones. +.TP +.B \fBstats\fP +Write server statistics to the statistics file. (See the +\fBstatistics\-file\fP option in the BIND 9 Administrator Reference +Manual.) +.TP +.B \fBstatus\fP +Display status of the server. Note that the number of zones includes +the internal \fBbind/CH\fP zone and the default \fB\&./IN\fP hint zone if +there is not an explicit root zone configured. +.TP +\fBstop\fP \fB\-p\fP +Stop the server, making sure any recent changes made through dynamic +update or IXFR are first saved to the master files of the updated +zones. If \fB\-p\fP is specified \fBnamed(8)\fP\(aqs process id is returned. +This allows an external process to determine when \fBnamed(8)\fP had +completed stopping. +.sp +See also \fBrndc halt\fP\&. +.TP +\fBsync\fP \fB\-clean\fP [\fIzone\fP [\fIclass\fP [\fIview\fP]]] +Sync changes in the journal file for a dynamic zone to the master +file. If the "\-clean" option is specified, the journal file is also +removed. If no zone is specified, then all zones are synced. +.TP +.B \fBtcp\-timeouts\fP [\fIinitial\fP \fIidle\fP \fIkeepalive\fP \fIadvertised\fP] +When called without arguments, display the current values of the +\fBtcp\-initial\-timeout\fP, \fBtcp\-idle\-timeout\fP, +\fBtcp\-keepalive\-timeout\fP and \fBtcp\-advertised\-timeout\fP options. +When called with arguments, update these values. This allows an +administrator to make rapid adjustments when under a denial of +service attack. See the descriptions of these options in the BIND 9 +Administrator Reference Manual for details of their use. +.TP +.B \fBthaw\fP [\fIzone\fP [\fIclass\fP [\fIview\fP]]] +Enable updates to a frozen dynamic zone. If no zone is specified, +then all frozen zones are enabled. This causes the server to reload +the zone from disk, and re\-enables dynamic updates after the load has +completed. After a zone is thawed, dynamic updates will no longer be +refused. If the zone has changed and the \fBixfr\-from\-differences\fP +option is in use, then the journal file will be updated to reflect +changes in the zone. Otherwise, if the zone has changed, any existing +journal file will be removed. +.sp +See also \fBrndc freeze\fP\&. +.TP +.B \fBtrace\fP +Increment the servers debugging level by one. +.TP +.B \fBtrace\fP \fIlevel\fP +Sets the server\(aqs debugging level to an explicit value. +.sp +See also \fBrndc notrace\fP\&. +.TP +.B \fBtsig\-delete\fP \fIkeyname\fP [\fIview\fP] +Delete a given TKEY\-negotiated key from the server. (This does not +apply to statically configured TSIG keys.) +.TP +.B \fBtsig\-list\fP +List the names of all TSIG keys currently configured for use by +\fBnamed(8)\fP in each view. The list both statically configured keys and +dynamic TKEY\-negotiated keys. +.TP +\fBvalidation\fP (\fBon\fP | \fBoff\fP | \fBstatus\fP) [\fIview\fP ...]\(ga\(ga +Enable, disable, or check the current status of DNSSEC validation. By +default, validation is enabled. +.sp +The cache is flushed when validation is turned on or off to avoid using data +that might differ between states. +.TP +.B \fBzonestatus\fP \fIzone\fP [\fIclass\fP [\fIview\fP]] +Displays the current status of the given zone, including the master +file name and any include files from which it was loaded, when it was +most recently loaded, the current serial number, the number of nodes, +whether the zone supports dynamic updates, whether the zone is DNSSEC +signed, whether it uses automatic DNSSEC key management or inline +signing, and the scheduled refresh or expiry times for the zone. +.sp +See also \fBrndc showzone\fP\&. +.UNINDENT +.sp +\fBrndc\fP commands that specify zone names, such as \fBreload\fP, +\fBretransfer\fP or \fBzonestatus\fP, can be ambiguous when applied to zones +of type \fBredirect\fP\&. Redirect zones are always called ".", and can be +confused with zones of type \fBhint\fP or with slaved copies of the root +zone. To specify a redirect zone, use the special zone name +\fB\-redirect\fP, without a trailing period. (With a trailing period, this +would specify a zone called "\-redirect".) +.SH LIMITATIONS +.sp +There is currently no way to provide the shared secret for a \fBkey_id\fP +without using the configuration file. +.sp +Several error messages could be clearer. +.SH SEE ALSO +.sp +\fBrndc.conf(5)\fP, \fBrndc\-confgen(8)\fP, +\fBnamed(8)\fP, \fBnamed.conf(5)\fP, \fBndc(8)\fP, BIND 9 Administrator +Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/rndc.conf.5in b/doc/man/rndc.conf.5in new file mode 100644 index 0000000000..4dd2191fa0 --- /dev/null +++ b/doc/man/rndc.conf.5in @@ -0,0 +1,192 @@ +.\" Man page generated from reStructuredText. +. +.TH "RNDC.CONF" "5" "@RELEASE_DATE@" "@PACKAGE_VERSION@" "BIND 9" +.SH NAME +rndc.conf \- rndc configuration file +. +.nr rst2man-indent-level 0 +. +.de1 rstReportMargin +\\$1 \\n[an-margin] +level \\n[rst2man-indent-level] +level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] +- +\\n[rst2man-indent0] +\\n[rst2man-indent1] +\\n[rst2man-indent2] +.. +.de1 INDENT +.\" .rstReportMargin pre: +. RS \\$1 +. nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] +. nr rst2man-indent-level +1 +.\" .rstReportMargin post: +.. +.de UNINDENT +. RE +.\" indent \\n[an-margin] +.\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] +.nr rst2man-indent-level -1 +.\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] +.in \\n[rst2man-indent\\n[rst2man-indent-level]]u +.. +rndc.conf \- rndc configuration file +.sp +\fBrndc.conf\fP +.sp +\fBrndc.conf\fP is the configuration file for \fBrndc\fP, the BIND 9 name +server control utility. This file has a similar structure and syntax to +\fBnamed.conf\fP\&. Statements are enclosed in braces and terminated with a +semi\-colon. Clauses in the statements are also semi\-colon terminated. +The usual comment styles are supported: +.sp +C style: /* */ +.sp +C++ style: // to end of line +.sp +Unix style: # to end of line +.sp +\fBrndc.conf\fP is much simpler than \fBnamed.conf\fP\&. The file uses three +statements: an options statement, a server statement and a key +statement. +.sp +The \fBoptions\fP statement contains five clauses. The \fBdefault\-server\fP +clause is followed by the name or address of a name server. This host +will be used when no name server is given as an argument to \fBrndc\fP\&. +The \fBdefault\-key\fP clause is followed by the name of a key which is +identified by a \fBkey\fP statement. If no \fBkeyid\fP is provided on the +rndc command line, and no \fBkey\fP clause is found in a matching +\fBserver\fP statement, this default key will be used to authenticate the +server\(aqs commands and responses. The \fBdefault\-port\fP clause is followed +by the port to connect to on the remote name server. If no \fBport\fP +option is provided on the rndc command line, and no \fBport\fP clause is +found in a matching \fBserver\fP statement, this default port will be used +to connect. The \fBdefault\-source\-address\fP and +\fBdefault\-source\-address\-v6\fP clauses which can be used to set the IPv4 +and IPv6 source addresses respectively. +.sp +After the \fBserver\fP keyword, the server statement includes a string +which is the hostname or address for a name server. The statement has +three possible clauses: \fBkey\fP, \fBport\fP and \fBaddresses\fP\&. The key +name must match the name of a key statement in the file. The port number +specifies the port to connect to. If an \fBaddresses\fP clause is supplied +these addresses will be used instead of the server name. Each address +can take an optional port. If an \fBsource\-address\fP or +\fBsource\-address\-v6\fP of supplied then these will be used to specify the +IPv4 and IPv6 source addresses respectively. +.sp +The \fBkey\fP statement begins with an identifying string, the name of the +key. The statement has two clauses. \fBalgorithm\fP identifies the +authentication algorithm for \fBrndc\fP to use; currently only HMAC\-MD5 +(for compatibility), HMAC\-SHA1, HMAC\-SHA224, HMAC\-SHA256 (default), +HMAC\-SHA384 and HMAC\-SHA512 are supported. This is followed by a secret +clause which contains the base\-64 encoding of the algorithm\(aqs +authentication key. The base\-64 string is enclosed in double quotes. +.sp +There are two common ways to generate the base\-64 string for the secret. +The BIND 9 program \fBrndc\-confgen\fP can be used to generate a random +key, or the \fBmmencode\fP program, also known as \fBmimencode\fP, can be +used to generate a base\-64 string from known input. \fBmmencode\fP does +not ship with BIND 9 but is available on many systems. See the EXAMPLE +section for sample command lines for each. +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +options { + default\-server localhost; + default\-key samplekey; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +server localhost { + key samplekey; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +server testserver { + key testkey; + addresses { localhost port 5353; }; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +key samplekey { + algorithm hmac\-sha256; + secret "6FMfj43Osz4lyb24OIe2iGEz9lf1llJO+lz"; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.INDENT 0.0 +.INDENT 3.5 +.sp +.nf +.ft C +key testkey { + algorithm hmac\-sha256; + secret "R3HI8P6BKw9ZwXwN3VZKuQ=="; +}; +.ft P +.fi +.UNINDENT +.UNINDENT +.sp +In the above example, \fBrndc\fP will by default use the server at +localhost (127.0.0.1) and the key called samplekey. Commands to the +localhost server will use the samplekey key, which must also be defined +in the server\(aqs configuration file with the same name and secret. The +key statement indicates that samplekey uses the HMAC\-SHA256 algorithm +and its secret clause contains the base\-64 encoding of the HMAC\-SHA256 +secret enclosed in double quotes. +.sp +If \fBrndc \-s testserver\fP is used then \fBrndc\fP will connect to server +on localhost port 5353 using the key testkey. +.sp +To generate a random secret with \fBrndc\-confgen\fP: +.sp +\fBrndc\-confgen\fP +.sp +A complete \fBrndc.conf\fP file, including the randomly generated key, +will be written to the standard output. Commented\-out \fBkey\fP and +\fBcontrols\fP statements for \fBnamed.conf\fP are also printed. +.sp +To generate a base\-64 secret with \fBmmencode\fP: +.sp +\fBecho "known plaintext for a secret" | mmencode\fP +.sp +The name server must be configured to accept rndc connections and to +recognize the key specified in the \fBrndc.conf\fP file, using the +controls statement in \fBnamed.conf\fP\&. See the sections on the +\fBcontrols\fP statement in the BIND 9 Administrator Reference Manual for +details. +.sp +\fBrndc(8)\fP, \fBrndc\-confgen(8)\fP, \fBmmencode(1)\fP, BIND 9 Administrator Reference Manual. +.SH AUTHOR +Internet Systems Consortium +.SH COPYRIGHT +2020, Internet Systems Consortium +.\" Generated by docutils manpage writer. +. diff --git a/doc/man/rndc.conf.rst b/doc/man/rndc.conf.rst new file mode 100644 index 0000000000..97894ac9a5 --- /dev/null +++ b/doc/man/rndc.conf.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/rndc/rndc.conf.rst diff --git a/doc/man/rndc.rst b/doc/man/rndc.rst new file mode 100644 index 0000000000..373eca857e --- /dev/null +++ b/doc/man/rndc.rst @@ -0,0 +1,13 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +:orphan: + +.. include:: ../../bin/rndc/rndc.rst \ No newline at end of file diff --git a/doc/misc/Makefile.am b/doc/misc/Makefile.am new file mode 100644 index 0000000000..1296038cd1 --- /dev/null +++ b/doc/misc/Makefile.am @@ -0,0 +1,160 @@ +include $(top_srcdir)/Makefile.top +include $(top_srcdir)/Makefile.docs + +noinst_PROGRAMS = cfg_test + +cfg_test_CFLAGS = \ + $(AM_CFLAGS) \ + $(LIBISC_CFLAGS) \ + $(LIBDNS_CFLAGS) \ + $(LIBISCCFG_CFLAGS) + +cfg_test_LDADD = \ + $(LIBISC_LIBS) \ + $(LIBDNS_LIBS) \ + $(LIBISCCFG_LIBS) + +BUILT_SOURCES = \ + options \ + options.active \ + master.zoneopt \ + slave.zoneopt \ + mirror.zoneopt \ + forward.zoneopt \ + hint.zoneopt \ + stub.zoneopt \ + static-stub.zoneopt \ + redirect.zoneopt \ + delegation-only.zoneopt \ + in-view.zoneopt \ + ../../bin/named/named.conf.rst \ + master.zoneopt.rst \ + slave.zoneopt.rst \ + mirror.zoneopt.rst \ + forward.zoneopt.rst \ + hint.zoneopt.rst \ + stub.zoneopt.rst \ + static-stub.zoneopt.rst \ + redirect.zoneopt.rst \ + delegation-only.zoneopt.rst \ + in-view.zoneopt.rst \ + acl.grammar.rst \ + controls.grammar.rst \ + dnssec-policy.grammar.rst \ + key.grammar.rst \ + logging.grammar.rst \ + masters.grammar.rst \ + options.grammar.rst \ + server.grammar.rst \ + statistics-channels.grammar.rst \ + trust-anchors.grammar.rst \ + managed-keys.grammar.rst \ + trusted-keys.grammar.rst + +EXTRA_DIST = $(BUILT_SOURCES) +MAINTAINERCLEANFILES = $(BUILT_SOURCES) + +options: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --named --grammar | $(PERL) $(srcdir)/sort-options.pl | $(PERL) $(srcdir)/format-options.pl > $@ + +options.active: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --named --grammar --active | $(PERL) $(srcdir)/sort-options.pl | $(PERL) $(srcdir)/format-options.pl > $@ + +master.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar master --active > $@ + +slave.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar slave --active > $@ + +mirror.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar mirror --active > $@ + +forward.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar forward --active > $@ + +hint.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar hint --active > $@ + +stub.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar stub --active > $@ + +static-stub.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar static-stub --active > $@ + +redirect.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar redirect --active > $@ + +delegation-only.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar delegation-only --active > $@ + +in-view.zoneopt: cfg_test + $(AM_V_CFG_TEST)$(builddir)/cfg_test --zonegrammar in-view --active > $@ + +../../bin/named/named.conf.rst: options.active + $(AM_V_RST_OPTIONS)$(PERL) $(srcdir)/rst-options.pl options.active > $@ + +master.zoneopt.rst: master.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl master.zoneopt > $@ + +slave.zoneopt.rst: slave.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl slave.zoneopt > $@ + +mirror.zoneopt.rst: mirror.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl mirror.zoneopt > $@ + +forward.zoneopt.rst: forward.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl forward.zoneopt > $@ + +hint.zoneopt.rst: hint.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl hint.zoneopt > $@ + +stub.zoneopt.rst: stub.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl stub.zoneopt > $@ + +static-stub.zoneopt.rst: static-stub.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl static-stub.zoneopt > $@ + +redirect.zoneopt.rst: redirect.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl redirect.zoneopt > $@ + +delegation-only.zoneopt.rst: delegation-only.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl delegation-only.zoneopt > $@ + +in-view.zoneopt.rst: in-view.zoneopt + $(AM_V_RST_ZONEOPT)$(PERL) $(srcdir)/rst-zoneopt.pl in-view.zoneopt > $@ + +acl.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active acl > $@ + +controls.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active controls > $@ + +dnssec-policy.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active dnssec-policy > $@ + +key.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active key > $@ + +logging.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active logging > $@ + +masters.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active masters > $@ + +options.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active options > $@ + +server.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active server > $@ + +statistics-channels.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active statistics-channels > $@ + +trust-anchors.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active trust-anchors > $@ + +managed-keys.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active managed-keys > $@ + +trusted-keys.grammar.rst: options.active + $(AM_V_RST_GRAMMARS)$(PERL) $(srcdir)/rst-grammars.pl options.active trusted-keys > $@ diff --git a/doc/misc/acl.grammar.rst b/doc/misc/acl.grammar.rst new file mode 100644 index 0000000000..189cc301b6 --- /dev/null +++ b/doc/misc/acl.grammar.rst @@ -0,0 +1,3 @@ +:: + + acl { ; ... }; diff --git a/bin/tests/cfg_test.c b/doc/misc/cfg_test.c similarity index 100% rename from bin/tests/cfg_test.c rename to doc/misc/cfg_test.c diff --git a/doc/misc/controls.grammar.rst b/doc/misc/controls.grammar.rst new file mode 100644 index 0000000000..225dba3c6a --- /dev/null +++ b/doc/misc/controls.grammar.rst @@ -0,0 +1,13 @@ +:: + + controls { + inet ( | | + * ) [ port ( | * ) ] allow + { ; ... } [ + keys { ; ... } ] [ read-only + ]; + unix perm + owner group [ + keys { ; ... } ] [ read-only + ]; + }; diff --git a/doc/misc/delegation-only.zoneopt.rst b/doc/misc/delegation-only.zoneopt.rst new file mode 100644 index 0000000000..71651c3f13 --- /dev/null +++ b/doc/misc/delegation-only.zoneopt.rst @@ -0,0 +1,5 @@ +:: + + zone [ ] { + type delegation-only; + }; diff --git a/doc/misc/dnssec b/doc/misc/dnssec deleted file mode 100644 index b01122cb0c..0000000000 --- a/doc/misc/dnssec +++ /dev/null @@ -1,81 +0,0 @@ -Copyright (C) Internet Systems Consortium, Inc. ("ISC") - -See COPYRIGHT in the source root or http://isc.org/copyright.html for terms. - -DNSSEC Release Notes - -This document summarizes the state of the DNSSEC implementation in -this release of BIND9. - - -OpenSSL Library Required - -To support DNSSEC, BIND 9 must be linked with version 0.9.6e or newer of -the OpenSSL library. As of BIND 9.2, the library is no longer -included in the distribution - it must be provided by the operating -system or installed separately. - -To build BIND 9 with OpenSSL, use "configure --with-openssl". If -the OpenSSL library is installed in a nonstandard location, you can -specify a path as in "configure --with-openssl=/var". - - -Key Generation and Signing - -The tools for generating DNSSEC keys and signatures are now in the -bin/dnssec directory. Documentation for these programs can be found -in doc/arm/Bv9ARM.4.html and the man pages. - -The random data used in generating DNSSEC keys and signatures comes -from either /dev/random (if the OS supports it) or keyboard input. -Alternatively, a device or file containing entropy/random data can be -specified. - - -Serving Secure Zones - -When acting as an authoritative name server, BIND9 includes KEY, SIG -and NXT records in responses as specified in RFC2535 when the request -has the DO flag set in the query. - - -Secure Resolution - -Basic support for validation of DNSSEC signatures in responses has -been implemented but should still be considered experimental. - -When acting as a caching name server, BIND9 is capable of performing -basic DNSSEC validation of positive as well as nonexistence responses. -This functionality is enabled by including a "trust-anchors" clause -in the configuration file, containing the top-level zone key of the -the DNSSEC tree. - -Validation of wildcard responses is not currently supported. In -particular, a "name does not exist" response will validate -successfully even if it does not contain the NXT records to prove the -nonexistence of a matching wildcard. - -Proof of insecure status for insecure zones delegated from secure -zones works when the zones are completely insecure. Privately -secured zones delegated from secure zones will not work in all cases, -such as when the privately secured zone is served by the same server -as an ancestor (but not parent) zone. - -Handling of the CD bit in queries is now fully implemented. Validation -is not attempted for recursive queries if CD is set. - - -Secure Dynamic Update - -Dynamic update of secure zones has been implemented, but may not be -complete. Affected NXT and SIG records are updated by the server when -an update occurs. Advanced access control is possible using the -"update-policy" statement in the zone definition. - - -Secure Zone Transfers - -BIND 9 does not implement the zone transfer security mechanisms of -RFC2535 section 5.6, and we have no plans to implement them in the -future as we consider them inferior to the use of TSIG or SIG(0) to -ensure the integrity of zone transfers. diff --git a/doc/misc/dnssec-policy.grammar.rst b/doc/misc/dnssec-policy.grammar.rst new file mode 100644 index 0000000000..76b653294e --- /dev/null +++ b/doc/misc/dnssec-policy.grammar.rst @@ -0,0 +1,17 @@ +:: + + dnssec-policy { + dnskey-ttl ; + keys { ( csk | ksk | zsk ) [ ( key-directory ) ] lifetime + algorithm [ ]; ... }; + max-zone-ttl ; + parent-ds-ttl ; + parent-propagation-delay ; + parent-registration-delay ; + publish-safety ; + retire-safety ; + signatures-refresh ; + signatures-validity ; + signatures-validity-dnskey ; + zone-propagation-delay ; + }; diff --git a/doc/misc/docbook-options.pl b/doc/misc/docbook-options.pl deleted file mode 100644 index 087bf57915..0000000000 --- a/doc/misc/docbook-options.pl +++ /dev/null @@ -1,195 +0,0 @@ -#!/usr/bin/perl -# -# Copyright (C) Internet Systems Consortium, Inc. ("ISC") -# -# This Source Code Form is subject to the terms of the Mozilla Public -# License, v. 2.0. If a copy of the MPL was not distributed with this -# file, You can obtain one at http://mozilla.org/MPL/2.0/. -# -# See the COPYRIGHT file distributed with this work for additional -# information regarding copyright ownership. - -use warnings; -use strict; -use Time::Piece; - -if (@ARGV < 1) { - print STDERR <<'END'; -usage: - perl docbook-options.pl options_file [YYYY/MM/DD] >named.conf.docbook -END - exit 1; -} - -my $FILE = shift; - -my $DATE; -if (@ARGV >= 2) { - $DATE = shift -} else { - $DATE = `git log --max-count=1 --date=short --format='%cd' $FILE` or die "unable to determine last modification date of '$FILE'; specify on command line\nexiting"; -} -chomp $DATE; - -open (FH, "<", $FILE) or die "Can't open $FILE"; - -my $t = Time::Piece->new(); -my $year = $t->year; - -print < - - - - - - $DATE - - - ISC - Internet Systems Consortium, Inc. - - - - named.conf - 5 - BIND9 - - - - named.conf - configuration file for named - - - - -END - -for (my $y = 2004; $y <= $year; $y++) { - print " $y\n"; -} - -print <Internet Systems Consortium, Inc. ("ISC") - - - - - - named.conf - - - - DESCRIPTION - - named.conf is the configuration file - for - named. Statements are enclosed - in braces and terminated with a semi-colon. Clauses in - the statements are also semi-colon terminated. The usual - comment styles are supported: - - - C style: /* */ - - - C++ style: // to end of line - - - Unix style: # to end of line - - - -END - -# skip preamble -my $preamble = 0; -while () { - if (m{^\s*$}) { - last if $preamble > 0; - } else { - $preamble++; - } -} - -my $blank = 0; -while () { - s{ // not configured}{}; - s{ // non-operational}{}; - s{ (// )*may occur multiple times,*}{}; - s{<([a-z0-9_-]+)>}{$1}g; - s{ // deprecated,*}{// deprecated}; - s{[[]}{[}g; - s{[]]}{]}g; - s{ }{\t}g; - if (m{^([a-z0-9-]+) }) { - my $HEADING = uc $1; - print <$HEADING -END - - if ($1 eq "trusted-keys") { - print <Deprecated - see TRUST-ANCHORS. -END - } - - if ($1 eq "managed-keys") { - print <Deprecated - see TRUST-ANCHORS. -END - } - - print < -END - } - - if (m{^\s*$} && !$blank) { - $blank = 1; - print < - -END - } else { - $blank = 0; - } - print; -} - -print <FILES - - /etc/named.conf - - - - SEE ALSO - - - ddns-confgen8 - , - - named8 - , - - named-checkconf8 - , - - rndc8 - , - - rndc-confgen8 - , - BIND 9 Administrator Reference Manual. - - - - -END diff --git a/doc/misc/docbook-zoneopt.pl b/doc/misc/docbook-zoneopt.pl deleted file mode 100644 index 14d156be1a..0000000000 --- a/doc/misc/docbook-zoneopt.pl +++ /dev/null @@ -1,60 +0,0 @@ -#!/usr/bin/perl -# -# Copyright (C) Internet Systems Consortium, Inc. ("ISC") -# -# This Source Code Form is subject to the terms of the Mozilla Public -# License, v. 2.0. If a copy of the MPL was not distributed with this -# file, You can obtain one at http://mozilla.org/MPL/2.0/. -# -# See the COPYRIGHT file distributed with this work for additional -# information regarding copyright ownership. - -use warnings; -use strict; -use Time::Piece; - -if (@ARGV < 1) { - print STDERR <<'END'; -usage: - perl docbook-zoneopt.pl zoneopt_file [YYYY] -END - exit 1; -} - -my $FILE = shift; - -my $t = Time::Piece->new(); -my $year; -$year = `git log --max-count=1 --date=format:%Y --format='%cd' -- $FILE` or $year = $t->year; -chomp $year; - -open (FH, "<", $FILE) or die "Can't open $FILE"; - -print < - - - -END - -while () { - s{ // not configured}{}; - s{ // may occur multiple times,*}{}; - s{<([a-z0-9_-]+)>}{$1}g; - s{^(\s*)([a-z0-9_-]+)\b}{$1$2}; - s{[[]}{[}g; - s{[]]}{]}g; - s{ }{\t}g; - - print; -} - -print < -END diff --git a/doc/misc/forward.zoneopt.rst b/doc/misc/forward.zoneopt.rst new file mode 100644 index 0000000000..1921ff3b57 --- /dev/null +++ b/doc/misc/forward.zoneopt.rst @@ -0,0 +1,8 @@ +:: + + zone [ ] { + type forward; + delegation-only ; + forward ( first | only ); + forwarders [ port ] [ dscp ] { ( | ) [ port ] [ dscp ]; ... }; + }; diff --git a/doc/misc/hint.zoneopt.rst b/doc/misc/hint.zoneopt.rst new file mode 100644 index 0000000000..514b81ddb3 --- /dev/null +++ b/doc/misc/hint.zoneopt.rst @@ -0,0 +1,8 @@ +:: + + zone [ ] { + type hint; + check-names ( fail | warn | ignore ); + delegation-only ; + file ; + }; diff --git a/doc/misc/in-view.zoneopt.rst b/doc/misc/in-view.zoneopt.rst new file mode 100644 index 0000000000..807167ff9e --- /dev/null +++ b/doc/misc/in-view.zoneopt.rst @@ -0,0 +1,5 @@ +:: + + zone [ ] { + in-view ; + }; diff --git a/doc/misc/ipv6 b/doc/misc/ipv6 deleted file mode 100644 index 7a25b23c70..0000000000 --- a/doc/misc/ipv6 +++ /dev/null @@ -1,105 +0,0 @@ -Copyright (C) Internet Systems Consortium, Inc. ("ISC") - -See COPYRIGHT in the source root or http://isc.org/copyright.html for terms. - -Currently, there are multiple interesting problems with ipv6 -implementations on various platforms. These problems range from not -being able to use ipv6 with bind9 (or in particular the ISC socket -library, contained in libisc) to listen-on lists not being respected, -to strange warnings but seemingly correct behavior of named. - -COMPILE-TIME ISSUES -------------------- - -The socket library requires a certain level of support from the -operating system. In particular, it must follow the advanced ipv6 -socket API to be usable. The systems which do not follow this will -currently not get any warnings or errors, but ipv6 will simply not -function on them. - -RUN-TIME ISSUES ---------------- - -In the original drafts of the ipv6 RFC documents, binding an ipv6 -socket to the ipv6 wildcard address would also cause the socket to -accept ipv4 connections and datagrams. When an ipv4 packet is -received on these systems, it is mapped into an ipv6 address. For -example, 1.2.3.4 would be mapped into ::ffff:1.2.3.4. The intent of -this mapping was to make transition from an ipv4-only application into -ipv6 easier, by only requiring one socket to be open on a given port. - -Later, it was discovered that this was generally a bad idea. For one, -many firewalls will block connection to 1.2.3.4, but will let through -::ffff:1.2.3.4. This, of course, is bad. Also, access control lists -written to accept only ipv4 addresses were suddenly ignored unless -they were rewritten to handle the ipv6 mapped addresses as well. - -Partly because of these problems, the latest IPv6 API introduces an -explicit knob (the "IPV6_V6ONLY" socket option ) to turn off the ipv6 -mapped address usage. - -In bind9, we first check if both the advanced API and the IPV6_V6ONLY -socket option are available. If both of them are available, bind9 -named will bind to the ipv6 wildcard port for both TCP and UDP. -Otherwise named will make a warning and try to bind to all available -ipv6 addresses separately. - -In any case, bind9 named binds to specific addresses for ipv4 sockets. - -The following are historical notes when we always bound to the ipv6 -wildcard port regardless of the availability of the API support. -These problems should not happen with the closer checks above. - - -IPV6 Sockets Accept IPV4, Specific IPV4 Addresses Bindings Fail ---------------------------------------------------------------- - -The only OS which seems to do this is (some kernel versions of) linux. -If an ipv6 socket is bound to the ipv6 wildcard socket, and a specific -ipv4 socket is later bound (say, to 1.2.3.4 port 53) the ipv4 binding -will fail. - -What this means to bind9 is that the application will log warnings -about being unable to bind to a socket because the address is already -in use. Since the ipv6 socket will accept ipv4 packets and map them, -however, the ipv4 addresses continue to function. - -The effect is that the config file listen-on directive will not be -respected on these systems. - - -IPV6 Sockets Accept IPV4, Specific IPV4 Address Bindings Succeed ----------------------------------------------------------------- - -In this case, the system allows opening an ipv6 wildcard address -socket and then binding to a more specific ipv4 address later. An -example of this type of system is Digital Unix with ipv6 patches -applied. - -What this means to bind9 is that the application will respect -listen-on in regards to ipv4 sockets, but it will use mapped ipv6 -addresses for any that do not match the listen-on list. This, in -effect, makes listen-on useless for these machines as well. - - -IPV6 Sockets Do Not Accept IPV4 -------------------------------- - -On these systems, opening an IPV6 socket does not implicitly open any -ipv4 sockets. An example of these systems are NetBSD-current with the -latest KAME patch, and other systems which use the latest KAME patches -as their ipv6 implementation. - -On these systems, listen-on is fully functional, as the ipv6 socket -only accepts ipv6 packets, and the ipv4 sockets will handle the ipv4 -packets. - - -RELEVANT RFCs -------------- - -3513: Internet Protocol Version 6 (IPv6) Addressing Architecture - -3493: Basic Socket Interface Extensions for IPv6 - -3542: Advanced Sockets Application Program Interface (API) for IPv6 diff --git a/doc/misc/key.grammar.rst b/doc/misc/key.grammar.rst new file mode 100644 index 0000000000..142fa8257a --- /dev/null +++ b/doc/misc/key.grammar.rst @@ -0,0 +1,6 @@ +:: + + key { + algorithm ; + secret ; + }; diff --git a/doc/misc/logging.grammar.rst b/doc/misc/logging.grammar.rst new file mode 100644 index 0000000000..c5e24db034 --- /dev/null +++ b/doc/misc/logging.grammar.rst @@ -0,0 +1,17 @@ +:: + + logging { + category { ; ... }; + channel { + buffered ; + file [ versions ( unlimited | ) ] + [ size ] [ suffix ( increment | timestamp ) ]; + null; + print-category ; + print-severity ; + print-time ( iso8601 | iso8601-utc | local | ); + severity ; + stderr; + syslog [ ]; + }; + }; diff --git a/doc/misc/managed-keys.grammar.rst b/doc/misc/managed-keys.grammar.rst new file mode 100644 index 0000000000..3b3ba88ba1 --- /dev/null +++ b/doc/misc/managed-keys.grammar.rst @@ -0,0 +1,6 @@ +:: + + managed-keys { ( static-key + | initial-key | static-ds | + initial-ds ) + ; ... };, deprecated diff --git a/doc/misc/master.zoneopt.rst b/doc/misc/master.zoneopt.rst new file mode 100644 index 0000000000..bc26c5f5dc --- /dev/null +++ b/doc/misc/master.zoneopt.rst @@ -0,0 +1,60 @@ +:: + + zone [ ] { + type ( master | primary ); + allow-query { ; ... }; + allow-query-on { ; ... }; + allow-transfer { ; ... }; + allow-update { ; ... }; + also-notify [ port ] [ dscp ] { ( | [ port ] | [ port ] ) [ key ]; ... }; + alt-transfer-source ( | * ) [ port ( | * ) ] [ dscp ]; + alt-transfer-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + auto-dnssec ( allow | maintain | off ); + check-dup-records ( fail | warn | ignore ); + check-integrity ; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( fail | warn | ignore ); + check-sibling ; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard ; + database ; + dialup ( notify | notify-passive | passive | refresh | ); + dlz ; + dnskey-sig-validity ; + dnssec-dnskey-kskonly ; + dnssec-loadkeys-interval ; + dnssec-policy ; + dnssec-secure-to-insecure ; + dnssec-update-mode ( maintain | no-resign ); + file ; + forward ( first | only ); + forwarders [ port ] [ dscp ] { ( | ) [ port ] [ dscp ]; ... }; + inline-signing ; + ixfr-from-differences ; + journal ; + key-directory ; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + max-ixfr-ratio ( unlimited | ); + max-journal-size ( default | unlimited | ); + max-records ; + max-transfer-idle-out ; + max-transfer-time-out ; + max-zone-ttl ( unlimited | ); + notify ( explicit | master-only | ); + notify-delay ; + notify-source ( | * ) [ port ( | * ) ] [ dscp ]; + notify-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + notify-to-soa ; + serial-update-method ( date | increment | unixtime ); + sig-signing-nodes ; + sig-signing-signatures ; + sig-signing-type ; + sig-validity-interval [ ]; + update-check-ksk ; + update-policy ( local | { ( deny | grant ) ( 6to4-self | external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild | subdomain | tcp-self | wildcard | zonesub ) [ ] ; ... }; + zero-no-soa-ttl ; + zone-statistics ( full | terse | none | ); + }; diff --git a/doc/misc/masters.grammar.rst b/doc/misc/masters.grammar.rst new file mode 100644 index 0000000000..45b83450f6 --- /dev/null +++ b/doc/misc/masters.grammar.rst @@ -0,0 +1,6 @@ +:: + + masters [ port ] [ dscp + ] { ( | [ + port ] | [ port + ] ) [ key ]; ... }; diff --git a/doc/misc/migration b/doc/misc/migration deleted file mode 100644 index aa78a74a92..0000000000 --- a/doc/misc/migration +++ /dev/null @@ -1,264 +0,0 @@ -Copyright (C) Internet Systems Consortium, Inc. ("ISC") - -See COPYRIGHT in the source root or http://isc.org/copyright.html for terms. - - BIND 8 to BIND 9 Migration Notes - -BIND 9 is designed to be mostly upwards compatible with BIND 8, but -there is still a number of caveats you should be aware of when -upgrading an existing BIND 8 installation to use BIND 9. - - -1. Configuration File Compatibility - -1.1. Unimplemented Options and Changed Defaults - -BIND 9 supports most, but not all of the named.conf options of BIND 8. -For a complete list of implemented options, see doc/misc/options. - -If your named.conf file uses an unimplemented option, named will log a -warning message. A message is also logged about each option whose -default has changed unless the option is set explicitly in named.conf. - -The default of the "transfer-format" option has changed from -"one-answer" to "many-answers". If you have slave servers that do not -understand the many-answers zone transfer format (e.g., BIND 4.9.5 or -older) you need to explicitly specify "transfer-format one-answer;" in -either the options block or a server statement. - -BIND 9.4 onwards implements "allow-query-cache". The "allow-query" -option is no longer used to specify access to the cache. The -"allow-query" option continues to specify which hosts are allowed -to ask ordinary DNS questions. The new "allow-query-cache" option -is used to specify which hosts are allowed to get answers from the -cache. Since BIND 9.4.1, if "allow-query-cache" is not set then -"allow-recursion" is used if it is set, otherwise "allow-query" is -used if it is set, otherwise the default localnets and localhost -is used. - -1.2. Handling of Configuration File Errors - -In BIND 9, named refuses to start if it detects an error in -named.conf. Earlier versions would start despite errors, causing the -server to run with a partial configuration. Errors detected during -subsequent reloads do not cause the server to exit. - -Errors in master files do not cause the server to exit, but they -do cause the zone not to load. - -1.3. Logging - -The set of logging categories in BIND 9 is different from that -in BIND 8. If you have customised your logging on a per-category -basis, you need to modify your logging statement to use the -new categories. - -Another difference is that the "logging" statement only takes effect -after the entire named.conf file has been read. This means that when -the server starts up, any messages about errors in the configuration -file are always logged to the default destination (syslog) when the -server first starts up, regardless of the contents of the "logging" -statement. In BIND 8, the new logging configuration took effect -immediately after the "logging" statement was read. - -1.4. Notify messages and Refresh queries - -The source address and port for these is now controlled by -"notify-source" and "transfer-source", respectively, rather that -query-source as in BIND 8. - -1.5. Multiple Classes. - -Multiple classes have to be put into explicit views for each class. - - -2. Zone File Compatibility - -2.1. Strict RFC1035 Interpretation of TTLs in Zone Files - -BIND 9 strictly complies with the RFC1035 and RFC2308 rules regarding -omitted TTLs in zone files. Omitted TTLs are replaced by the value -specified with the $TTL directive, or by the previous explicit TTL if -there is no $TTL directive. - -If there is no $TTL directive and the first RR in the file does not -have an explicit TTL field, the zone file is illegal according to -RFC1035 since the TTL of the first RR is undefined. Unfortunately, -BIND 4 and many versions of BIND 8 accept such files without warning -and use the value of the SOA MINTTL field as a default for missing TTL -values. - -BIND 9.0 and 9.1 completely refused to load such files. BIND 9.2 -emulates the nonstandard BIND 4/8 SOA MINTTL behaviour and loads the -files anyway (provided the SOA is the first record in the file), but -will issue the warning message "no TTL specified; using SOA MINTTL -instead". - -To avoid problems, we recommend that you use a $TTL directive in each -zone file. - -2.2. Periods in SOA Serial Numbers Deprecated - -Some versions of BIND allow SOA serial numbers with an embedded -period, like "3.002", and convert them into integers in a rather -unintuitive way. This feature is not supported by BIND 9; serial -numbers must be integers. - -2.3. Handling of Unbalanced Quotes - -TXT records with unbalanced quotes, like 'host TXT "foo', were not -treated as errors in some versions of BIND. If your zone files -contain such records, you will get potentially confusing error -messages like "unexpected end of file" because BIND 9 will interpret -everything up to the next quote character as a literal string. - -2.4. Handling of Line Breaks - -Some versions of BIND accept RRs containing line breaks that are not -properly quoted with parentheses, like the following SOA: - - @ IN SOA ns.example. hostmaster.example. - ( 1 3600 1800 1814400 3600 ) - -This is not legal master file syntax and will be treated as an error -by BIND 9. The fix is to move the opening parenthesis to the first -line. - -2.5. Unimplemented BIND 8 Extensions - -$GENERATE: The "$$" construct for getting a literal $ into a domain -name is deprecated. Use \$ instead. - -2.6. TXT records are no longer automatically split. - -Some versions of BIND accepted strings in TXT RDATA consisting of more -than 255 characters and silently split them to be able to encode the -strings in a protocol conformant way. You may now see errors like this - dns_rdata_fromtext: local.db:119: ran out of space -if you have TXT RRs with too longs strings. Make sure to split the -string in the zone data file at or before a single one reaches 255 -characters. - -3. Interoperability Impact of New Protocol Features - -3.1. EDNS0 - -BIND 9 uses EDNS0 (RFC2671) to advertise its receive buffer size. It -also sets DO EDNS flag bit in queries to indicate that it wishes to -receive DNSSEC responses. - -Most older servers that do not support EDNS0, including prior versions -of BIND, will send a FORMERR or NOTIMP response to these queries. -When this happens, BIND 9 will automatically retry the query without -EDNS0. - -Unfortunately, there exists at least one non-BIND name server -implementation that silently ignores these queries instead of sending -an error response. Resolving names in zones where all or most -authoritative servers use this server will be very slow or fail -completely. We have contacted the manufacturer of the name server in -case, and they are working on a solution. - -When BIND 9 communicates with a server that does support EDNS0, such as -another BIND 9 server, responses of up to 4096 bytes may be -transmitted as a single UDP datagram which is subject to fragmentation -at the IP level. If a firewall incorrectly drops IP fragments, it can -cause resolution to slow down dramatically or fail. - -3.2. Zone Transfers - -Outgoing zone transfers now use the "many-answers" format by default. -This format is not understood by certain old versions of BIND 4. -You can work around this problem using the option "transfer-format -one-answer;", but since these old versions all have known security -problems, the correct fix is to upgrade the slave servers. - -Zone transfers to Windows 2000 DNS servers sometimes fail due to a -bug in the Windows 2000 DNS server where DNS messages larger than -16K are not handled properly. Obtain the latest service pack for -Windows 2000 from Microsoft to address this issue. In the meantime, -the problem can be worked around by setting "transfer-format one-answer;". -http://support.microsoft.com/default.aspx?scid=kb;en-us;297936 - -4. Unrestricted Character Set - - BIND 9.2 only - -BIND 9 does not restrict the character set of domain names - it is -fully 8-bit clean in accordance with RFC2181 section 11. - -It is strongly recommended that hostnames published in the DNS follow -the RFC952 rules, but BIND 9 will not enforce this restriction. - -Historically, some applications have suffered from security flaws -where data originating from the network, such as names returned by -gethostbyaddr(), are used with insufficient checking and may cause a -breach of security when containing unexpected characters; see - -for details. Some earlier versions of BIND attempt to protect these -flawed applications from attack by discarding data containing -characters deemed inappropriate in host names or mail addresses, under -the control of the "check-names" option in named.conf and/or "options -no-check-names" in resolv.conf. BIND 9 provides no such protection; -if applications with these flaws are still being used, they should -be upgraded. - - BIND 9.3 onwards implements check-names. - -5. Server Administration Tools - -5.1 Ndc Replaced by Rndc - -The "ndc" program has been replaced by "rndc", which is capable of -remote operation. Unlike ndc, rndc requires a configuration file. -The easiest way to generate a configuration file is to run -"rndc-confgen -a"; see the man pages for rndc(8), rndc-confgen(8), -and rndc.conf(5) for details. - -5.2. Nsupdate Differences - -The BIND 8 implementation of nsupdate had an undocumented feature -where an update request would be broken down into multiple requests -based upon the discovered zones that contained the records. This -behaviour has not been implemented in BIND 9. Each update request -must pertain to a single zone, but it is still possible to do multiple -updates in a single invocation of nsupdate by terminating each update -with an empty line or a "send" command. - - -6. No Information Leakage between Zones - -BIND 9 stores the authoritative data for each zone in a separate data -structure, as recommended in RFC1035 and as required by DNSSEC and -IXFR. When a BIND 9 server is authoritative for both a child zone and -its parent, it will have two distinct sets of NS records at the -delegation point: the authoritative NS records at the child's apex, -and a set of glue NS records in the parent. - -BIND 8 was unable to properly distinguish between these two sets of NS -records and would "leak" the child's NS records into the parent, -effectively causing the parent zone to be silently modified: responses -and zone transfers from the parent contained the child's NS records -rather than the glue configured into the parent (if any). In the case -of children of type "stub", this behaviour was documented as a feature, -allowing the glue NS records to be omitted from the parent -configuration. - -Sites that were relying on this BIND 8 behaviour need to add any -omitted glue NS records, and any necessary glue A records, to the -parent zone. - -Although stub zones can no longer be used as a mechanism for injecting -NS records into their parent zones, they are still useful as a way of -directing queries for a given domain to a particular set of name -servers. - - -7. Umask not Modified - -The BIND 8 named unconditionally sets the umask to 022. BIND 9 does -not; the umask inherited from the parent process remains in effect. -This may cause files created by named, such as journal files, to be -created with different file permissions than they did in BIND 8. If -necessary, the umask should be set explicitly in the script used to -start the named process. diff --git a/doc/misc/migration-4to9 b/doc/misc/migration-4to9 deleted file mode 100644 index 4d038a5110..0000000000 --- a/doc/misc/migration-4to9 +++ /dev/null @@ -1,55 +0,0 @@ -Copyright (C) Internet Systems Consortium, Inc. ("ISC") - -See COPYRIGHT in the source root or http://isc.org/copyright.html for terms. - - BIND 4 to BIND 9 Migration Notes - -To transition from BIND 4 to BIND 9 you first need to convert your -configuration file to the new format. There is a conversion tool in -contrib/named-bootconf that allows you to do this. - - named-bootconf.sh < /etc/named.boot > /etc/named.conf - -BIND 9 uses a system assigned port for the UDP queries it makes rather -than port 53 that BIND 4 uses. This may conflict with some firewalls. -The following directives in /etc/named.conf allows you to specify -a port to use. - - query-source address * port 53; - transfer-source * port 53; - notify-source * port 53; - -BIND 9 no longer uses the minimum field to specify the TTL of records -without a explicit TTL. Use the $TTL directive to specify a default TTL -before the first record without a explicit TTL. - - $TTL 3600 - @ IN SOA ns1.example.com. hostmaster.example.com. ( - 2001021100 - 7200 - 1200 - 3600000 - 7200 ) - -BIND 9 does not support multiple CNAMEs with the same owner name. - - Illegal: - www.example.com. CNAME host1.example.com. - www.example.com. CNAME host2.example.com. - -BIND 9 does not support "CNAMEs with other data" with the same owner name, -ignoring the DNSSEC records (SIG, NXT, KEY) that BIND 4 did not support. - - Illegal: - www.example.com. CNAME host1.example.com. - www.example.com. MX 10 host2.example.com. - -BIND 9 is less tolerant of errors in master files, so check your logs and -fix any errors reported. The named-checkzone program can also be to check -master files. - -Outgoing zone transfers now use the "many-answers" format by default. -This format is not understood by certain old versions of BIND 4. -You can work around this problem using the option "transfer-format -one-answer;", but since these old versions all have known security -problems, the correct fix is to upgrade the slave servers. diff --git a/doc/misc/mirror.zoneopt.rst b/doc/misc/mirror.zoneopt.rst new file mode 100644 index 0000000000..01e86349cc --- /dev/null +++ b/doc/misc/mirror.zoneopt.rst @@ -0,0 +1,45 @@ +:: + + zone [ ] { + type mirror; + allow-notify { ; ... }; + allow-query { ; ... }; + allow-query-on { ; ... }; + allow-transfer { ; ... }; + allow-update-forwarding { ; ... }; + also-notify [ port ] [ dscp ] { ( | [ port ] | [ port ] ) [ key ]; ... }; + alt-transfer-source ( | * ) [ port ( | * ) ] [ dscp ]; + alt-transfer-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + check-names ( fail | warn | ignore ); + database ; + file ; + ixfr-from-differences ; + journal ; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port ] [ dscp ] { ( | [ port ] | [ port ] ) [ key ]; ... }; + max-ixfr-ratio ( unlimited | ); + max-journal-size ( default | unlimited | ); + max-records ; + max-refresh-time ; + max-retry-time ; + max-transfer-idle-in ; + max-transfer-idle-out ; + max-transfer-time-in ; + max-transfer-time-out ; + min-refresh-time ; + min-retry-time ; + multi-master ; + notify ( explicit | master-only | ); + notify-delay ; + notify-source ( | * ) [ port ( | * ) ] [ dscp ]; + notify-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + request-expire ; + request-ixfr ; + transfer-source ( | * ) [ port ( | * ) ] [ dscp ]; + transfer-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + try-tcp-refresh ; + use-alt-transfer-source ; + zero-no-soa-ttl ; + zone-statistics ( full | terse | none | ); + }; diff --git a/doc/misc/named.conf.rst b/doc/misc/named.conf.rst new file mode 100644 index 0000000000..8af0972839 --- /dev/null +++ b/doc/misc/named.conf.rst @@ -0,0 +1,1025 @@ +.. + Copyright (C) Internet Systems Consortium, Inc. ("ISC") + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + + See the COPYRIGHT file distributed with this work for additional + information regarding copyright ownership. + +.. higlight: console + +named.conf - configuration file for **named** +--------------------------------------------- + +Synopsis +~~~~~~~~ + +:program:`named.conf` + +Description +~~~~~~~~~~~ + +``named.conf`` is the configuration file for ``named``. Statements are +enclosed in braces and terminated with a semi-colon. Clauses in the +statements are also semi-colon terminated. The usual comment styles are +supported: + +C style: /\* \*/ + + C++ style: // to end of line + +Unix style: # to end of line + +ACL +^^^ + +:: + + acl string { address_match_element; ... }; + +CONTROLS +^^^^^^^^ + +:: + + controls { + inet ( ipv4_address | ipv6_address | + * ) [ port ( integer | * ) ] allow + { address_match_element; ... } [ + keys { string; ... } ] [ read-only + boolean ]; + unix quoted_string perm integer + owner integer group integer [ + keys { string; ... } ] [ read-only + boolean ]; + }; + +DLZ +^^^ + +:: + + dlz string { + database string; + search boolean; + }; + +DNSSEC-POLICY +^^^^^^^^^^^^^ + +:: + + dnssec-policy string { + dnskey-ttl duration; + keys { ( csk | ksk | zsk ) [ ( key-directory ) ] lifetime + duration_or_unlimited algorithm string [ integer ]; ... }; + max-zone-ttl duration; + parent-ds-ttl duration; + parent-propagation-delay duration; + parent-registration-delay duration; + publish-safety duration; + retire-safety duration; + signatures-refresh duration; + signatures-validity duration; + signatures-validity-dnskey duration; + zone-propagation-delay duration; + }; + +DYNDB +^^^^^ + +:: + + dyndb string quoted_string { + unspecified-text }; + +KEY +^^^ + +:: + + key string { + algorithm string; + secret string; + }; + +LOGGING +^^^^^^^ + +:: + + logging { + category string { string; ... }; + channel string { + buffered boolean; + file quoted_string [ versions ( unlimited | integer ) ] + [ size size ] [ suffix ( increment | timestamp ) ]; + null; + print-category boolean; + print-severity boolean; + print-time ( iso8601 | iso8601-utc | local | boolean ); + severity log_severity; + stderr; + syslog [ syslog_facility ]; + }; + }; + +MANAGED-KEYS +^^^^^^^^^^^^ + +See DNSSEC-KEYS. + +:: + + managed-keys { string ( static-key + | initial-key | static-ds | + initial-ds ) integer integer + integer quoted_string; ... };, deprecated + +MASTERS +^^^^^^^ + +:: + + masters string [ port integer ] [ dscp + integer ] { ( masters | ipv4_address [ + port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + +OPTIONS +^^^^^^^ + +:: + + options { + allow-new-zones boolean; + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-cache { address_match_element; ... }; + allow-query-cache-on { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-recursion { address_match_element; ... }; + allow-recursion-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + answer-cookie boolean; + attach-cache string; + auth-nxdomain boolean; // default changed + auto-dnssec ( allow | maintain | off ); + automatic-interface-scan boolean; + avoid-v4-udp-ports { portrange; ... }; + avoid-v6-udp-ports { portrange; ... }; + bindkeys-file quoted_string; + blackhole { address_match_element; ... }; + cache-file quoted_string; + catalog-zones { zone string [ default-masters [ port integer ] + [ dscp integer ] { ( masters | ipv4_address [ port + integer ] | ipv6_address [ port integer ] ) [ key + string ]; ... } ] [ zone-directory quoted_string ] [ + in-memory boolean ] [ min-update-interval duration ]; ... }; + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( primary | master | + secondary | slave | response ) ( + fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + clients-per-query integer; + cookie-algorithm ( aes | siphash24 ); + cookie-secret string; + coresize ( default | unlimited | sizeval ); + datasize ( default | unlimited | sizeval ); + deny-answer-addresses { address_match_element; ... } [ + except-from { string; ... } ]; + deny-answer-aliases { string; ... } [ except-from { string; ... + } ]; + dialup ( notify | notify-passive | passive | refresh | boolean ); + directory quoted_string; + disable-algorithms string { string; + ... }; + disable-ds-digests string { string; + ... }; + disable-empty-zone string; + dns64 netprefix { + break-dnssec boolean; + clients { address_match_element; ... }; + exclude { address_match_element; ... }; + mapped { address_match_element; ... }; + recursive-only boolean; + suffix ipv6_address; + }; + dns64-contact string; + dns64-server string; + dnskey-sig-validity integer; + dnsrps-enable boolean; + dnsrps-options { unspecified-text }; + dnssec-accept-expired boolean; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-must-be-secure string boolean; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + dnssec-validation ( yes | no | auto ); + dnstap { ( all | auth | client | forwarder | + resolver | update ) [ ( query | response ) ]; + ... }; + dnstap-identity ( quoted_string | none | + hostname ); + dnstap-output ( file | unix ) quoted_string [ + size ( unlimited | size ) ] [ versions ( + unlimited | integer ) ] [ suffix ( increment + | timestamp ) ]; + dnstap-version ( quoted_string | none ); + dscp integer; + dual-stack-servers [ port integer ] { ( quoted_string [ port + integer ] [ dscp integer ] | ipv4_address [ port + integer ] [ dscp integer ] | ipv6_address [ port + integer ] [ dscp integer ] ); ... }; + dump-file quoted_string; + edns-udp-size integer; + empty-contact string; + empty-server string; + empty-zones-enable boolean; + fetch-quota-params integer fixedpoint fixedpoint fixedpoint; + fetches-per-server integer [ ( drop | fail ) ]; + fetches-per-zone integer [ ( drop | fail ) ]; + files ( default | unlimited | sizeval ); + flush-zones-on-shutdown boolean; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + fstrm-set-buffer-hint integer; + fstrm-set-flush-timeout integer; + fstrm-set-input-queue-size integer; + fstrm-set-output-notify-threshold integer; + fstrm-set-output-queue-model ( mpsc | spsc ); + fstrm-set-output-queue-size integer; + fstrm-set-reopen-interval duration; + geoip-directory ( quoted_string | none ); + glue-cache boolean; + heartbeat-interval integer; + hostname ( quoted_string | none ); + inline-signing boolean; + interface-interval duration; + ixfr-from-differences ( primary | master | secondary | slave | + boolean ); + keep-response-order { address_match_element; ... }; + key-directory quoted_string; + lame-ttl duration; + listen-on [ port integer ] [ dscp + integer ] { + address_match_element; ... }; + listen-on-v6 [ port integer ] [ dscp + integer ] { + address_match_element; ... }; + lmdb-mapsize sizeval; + lock-file ( quoted_string | none ); + managed-keys-directory quoted_string; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + match-mapped-addresses boolean; + max-cache-size ( default | unlimited | sizeval | percentage ); + max-cache-ttl duration; + max-clients-per-query integer; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-ncache-ttl duration; + max-records integer; + max-recursion-depth integer; + max-recursion-queries integer; + max-refresh-time integer; + max-retry-time integer; + max-rsa-exponent-size integer; + max-stale-ttl duration; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-udp-size integer; + max-zone-ttl ( unlimited | duration ); + memstatistics boolean; + memstatistics-file quoted_string; + message-compression boolean; + min-cache-ttl duration; + min-ncache-ttl duration; + min-refresh-time integer; + min-retry-time integer; + minimal-any boolean; + minimal-responses ( no-auth | no-auth-recursive | boolean ); + multi-master boolean; + new-zones-directory quoted_string; + no-case-compress { address_match_element; ... }; + nocookie-udp-size integer; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-rate integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify-to-soa boolean; + nta-lifetime duration; + nta-recheck duration; + nxdomain-redirect string; + pid-file ( quoted_string | none ); + port integer; + preferred-glue string; + prefetch integer [ integer ]; + provide-ixfr boolean; + qname-minimization ( strict | relaxed | disabled | off ); + query-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + querylog boolean; + random-device ( quoted_string | none ); + rate-limit { + all-per-second integer; + errors-per-second integer; + exempt-clients { address_match_element; ... }; + ipv4-prefix-length integer; + ipv6-prefix-length integer; + log-only boolean; + max-table-size integer; + min-table-size integer; + nodata-per-second integer; + nxdomains-per-second integer; + qps-scale integer; + referrals-per-second integer; + responses-per-second integer; + slip integer; + window integer; + }; + recursing-file quoted_string; + recursion boolean; + recursive-clients integer; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + require-server-cookie boolean; + reserved-sockets integer; + resolver-nonbackoff-tries integer; + resolver-query-timeout integer; + resolver-retry-interval integer; + response-padding { address_match_element; ... } block-size + integer; + response-policy { zone string [ add-soa boolean ] [ log + boolean ] [ max-policy-ttl duration ] [ min-update-interval + duration ] [ policy ( cname | disabled | drop | given | no-op + | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [ + recursive-only boolean ] [ nsip-enable boolean ] [ + nsdname-enable boolean ]; ... } [ add-soa boolean ] [ + break-dnssec boolean ] [ max-policy-ttl duration ] [ + min-update-interval duration ] [ min-ns-dots integer ] [ + nsip-wait-recurse boolean ] [ nsdname-wait-recurse boolean + ] [ qname-wait-recurse boolean ] [ recursive-only boolean ] + [ nsip-enable boolean ] [ nsdname-enable boolean ] [ + dnsrps-enable boolean ] [ dnsrps-options { unspecified-text + } ]; + root-delegation-only [ exclude { string; ... } ]; + root-key-sentinel boolean; + rrset-order { [ class string ] [ type string ] [ name + quoted_string ] string string; ... }; + secroots-file quoted_string; + send-cookie boolean; + serial-query-rate integer; + serial-update-method ( date | increment | unixtime ); + server-id ( quoted_string | none | hostname ); + servfail-ttl duration; + session-keyalg string; + session-keyfile ( quoted_string | none ); + session-keyname string; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + sortlist { address_match_element; ... }; + stacksize ( default | unlimited | sizeval ); + stale-answer-enable boolean; + stale-answer-ttl duration; + startup-notify-rate integer; + statistics-file quoted_string; + synth-from-dnssec boolean; + tcp-advertised-timeout integer; + tcp-clients integer; + tcp-idle-timeout integer; + tcp-initial-timeout integer; + tcp-keepalive-timeout integer; + tcp-listen-queue integer; + tkey-dhkey quoted_string integer; + tkey-domain quoted_string; + tkey-gssapi-credential quoted_string; + tkey-gssapi-keytab quoted_string; + transfer-format ( many-answers | one-answer ); + transfer-message-size integer; + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + transfers-in integer; + transfers-out integer; + transfers-per-ns integer; + trust-anchor-telemetry boolean; // experimental + try-tcp-refresh boolean; + update-check-ksk boolean; + use-alt-transfer-source boolean; + use-v4-udp-ports { portrange; ... }; + use-v6-udp-ports { portrange; ... }; + v6-bias integer; + validate-except { string; ... }; + version ( quoted_string | none ); + zero-no-soa-ttl boolean; + zero-no-soa-ttl-cache boolean; + zone-statistics ( full | terse | none | boolean ); + }; + +PLUGIN +^^^^^^ + +:: + + plugin ( query ) string [ { unspecified-text + } ]; + +SERVER +^^^^^^ + +:: + + server netprefix { + bogus boolean; + edns boolean; + edns-udp-size integer; + edns-version integer; + keys server_key; + max-udp-size integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + padding integer; + provide-ixfr boolean; + query-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + send-cookie boolean; + tcp-keepalive boolean; + tcp-only boolean; + transfer-format ( many-answers | one-answer ); + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + transfers integer; + }; + +STATISTICS-CHANNELS +^^^^^^^^^^^^^^^^^^^ + +:: + + statistics-channels { + inet ( ipv4_address | ipv6_address | + * ) [ port ( integer | * ) ] [ + allow { address_match_element; ... + } ]; + }; + +TRUST-ANCHORS +^^^^^^^^^^^^^ + +:: + + trust-anchors { string ( static-key | + initial-key | static-ds | initial-ds ) + integer integer integer + quoted_string; ... }; + +TRUSTED-KEYS +^^^^^^^^^^^^ + +Deprecated - see DNSSEC-KEYS. + +:: + + trusted-keys { string integer + integer integer + quoted_string; ... };, deprecated + +VIEW +^^^^ + +:: + + view string [ class ] { + allow-new-zones boolean; + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-cache { address_match_element; ... }; + allow-query-cache-on { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-recursion { address_match_element; ... }; + allow-recursion-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + attach-cache string; + auth-nxdomain boolean; // default changed + auto-dnssec ( allow | maintain | off ); + cache-file quoted_string; + catalog-zones { zone string [ default-masters [ port integer ] + [ dscp integer ] { ( masters | ipv4_address [ port + integer ] | ipv6_address [ port integer ] ) [ key + string ]; ... } ] [ zone-directory quoted_string ] [ + in-memory boolean ] [ min-update-interval duration ]; ... }; + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( primary | master | + secondary | slave | response ) ( + fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + clients-per-query integer; + deny-answer-addresses { address_match_element; ... } [ + except-from { string; ... } ]; + deny-answer-aliases { string; ... } [ except-from { string; ... + } ]; + dialup ( notify | notify-passive | passive | refresh | boolean ); + disable-algorithms string { string; + ... }; + disable-ds-digests string { string; + ... }; + disable-empty-zone string; + dlz string { + database string; + search boolean; + }; + dns64 netprefix { + break-dnssec boolean; + clients { address_match_element; ... }; + exclude { address_match_element; ... }; + mapped { address_match_element; ... }; + recursive-only boolean; + suffix ipv6_address; + }; + dns64-contact string; + dns64-server string; + dnskey-sig-validity integer; + dnsrps-enable boolean; + dnsrps-options { unspecified-text }; + dnssec-accept-expired boolean; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-must-be-secure string boolean; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + dnssec-validation ( yes | no | auto ); + dnstap { ( all | auth | client | forwarder | + resolver | update ) [ ( query | response ) ]; + ... }; + dual-stack-servers [ port integer ] { ( quoted_string [ port + integer ] [ dscp integer ] | ipv4_address [ port + integer ] [ dscp integer ] | ipv6_address [ port + integer ] [ dscp integer ] ); ... }; + dyndb string quoted_string { + unspecified-text }; + edns-udp-size integer; + empty-contact string; + empty-server string; + empty-zones-enable boolean; + fetch-quota-params integer fixedpoint fixedpoint fixedpoint; + fetches-per-server integer [ ( drop | fail ) ]; + fetches-per-zone integer [ ( drop | fail ) ]; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + glue-cache boolean; + inline-signing boolean; + ixfr-from-differences ( primary | master | secondary | slave | + boolean ); + key string { + algorithm string; + secret string; + }; + key-directory quoted_string; + lame-ttl duration; + lmdb-mapsize sizeval; + managed-keys { string ( + static-key | initial-key + | static-ds | initial-ds + ) integer integer + integer + quoted_string; ... };, deprecated + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + match-clients { address_match_element; ... }; + match-destinations { address_match_element; ... }; + match-recursive-only boolean; + max-cache-size ( default | unlimited | sizeval | percentage ); + max-cache-ttl duration; + max-clients-per-query integer; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-ncache-ttl duration; + max-records integer; + max-recursion-depth integer; + max-recursion-queries integer; + max-refresh-time integer; + max-retry-time integer; + max-stale-ttl duration; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-udp-size integer; + max-zone-ttl ( unlimited | duration ); + message-compression boolean; + min-cache-ttl duration; + min-ncache-ttl duration; + min-refresh-time integer; + min-retry-time integer; + minimal-any boolean; + minimal-responses ( no-auth | no-auth-recursive | boolean ); + multi-master boolean; + new-zones-directory quoted_string; + no-case-compress { address_match_element; ... }; + nocookie-udp-size integer; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify-to-soa boolean; + nta-lifetime duration; + nta-recheck duration; + nxdomain-redirect string; + plugin ( query ) string [ { + unspecified-text } ]; + preferred-glue string; + prefetch integer [ integer ]; + provide-ixfr boolean; + qname-minimization ( strict | relaxed | disabled | off ); + query-source ( ( [ address ] ( ipv4_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv4_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ port ( + integer | * ) ] ) | ( [ [ address ] ( ipv6_address | * ) ] + port ( integer | * ) ) ) [ dscp integer ]; + rate-limit { + all-per-second integer; + errors-per-second integer; + exempt-clients { address_match_element; ... }; + ipv4-prefix-length integer; + ipv6-prefix-length integer; + log-only boolean; + max-table-size integer; + min-table-size integer; + nodata-per-second integer; + nxdomains-per-second integer; + qps-scale integer; + referrals-per-second integer; + responses-per-second integer; + slip integer; + window integer; + }; + recursion boolean; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + require-server-cookie boolean; + resolver-nonbackoff-tries integer; + resolver-query-timeout integer; + resolver-retry-interval integer; + response-padding { address_match_element; ... } block-size + integer; + response-policy { zone string [ add-soa boolean ] [ log + boolean ] [ max-policy-ttl duration ] [ min-update-interval + duration ] [ policy ( cname | disabled | drop | given | no-op + | nodata | nxdomain | passthru | tcp-only quoted_string ) ] [ + recursive-only boolean ] [ nsip-enable boolean ] [ + nsdname-enable boolean ]; ... } [ add-soa boolean ] [ + break-dnssec boolean ] [ max-policy-ttl duration ] [ + min-update-interval duration ] [ min-ns-dots integer ] [ + nsip-wait-recurse boolean ] [ nsdname-wait-recurse boolean + ] [ qname-wait-recurse boolean ] [ recursive-only boolean ] + [ nsip-enable boolean ] [ nsdname-enable boolean ] [ + dnsrps-enable boolean ] [ dnsrps-options { unspecified-text + } ]; + root-delegation-only [ exclude { string; ... } ]; + root-key-sentinel boolean; + rrset-order { [ class string ] [ type string ] [ name + quoted_string ] string string; ... }; + send-cookie boolean; + serial-update-method ( date | increment | unixtime ); + server netprefix { + bogus boolean; + edns boolean; + edns-udp-size integer; + edns-version integer; + keys server_key; + max-udp-size integer; + notify-source ( ipv4_address | * ) [ port ( integer | * + ) ] [ dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer + | * ) ] [ dscp integer ]; + padding integer; + provide-ixfr boolean; + query-source ( ( [ address ] ( ipv4_address | * ) [ port + ( integer | * ) ] ) | ( [ [ address ] ( + ipv4_address | * ) ] port ( integer | * ) ) ) [ + dscp integer ]; + query-source-v6 ( ( [ address ] ( ipv6_address | * ) [ + port ( integer | * ) ] ) | ( [ [ address ] ( + ipv6_address | * ) ] port ( integer | * ) ) ) [ + dscp integer ]; + request-expire boolean; + request-ixfr boolean; + request-nsid boolean; + send-cookie boolean; + tcp-keepalive boolean; + tcp-only boolean; + transfer-format ( many-answers | one-answer ); + transfer-source ( ipv4_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + transfers integer; + }; + servfail-ttl duration; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + sortlist { address_match_element; ... }; + stale-answer-enable boolean; + stale-answer-ttl duration; + synth-from-dnssec boolean; + transfer-format ( many-answers | one-answer ); + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + trust-anchor-telemetry boolean; // experimental + trust-anchors { string ( static-key | + initial-key | static-ds | initial-ds + ) integer integer integer + quoted_string; ... }; + trusted-keys { string + integer integer + integer + quoted_string; ... };, deprecated + try-tcp-refresh boolean; + update-check-ksk boolean; + use-alt-transfer-source boolean; + v6-bias integer; + validate-except { string; ... }; + zero-no-soa-ttl boolean; + zero-no-soa-ttl-cache boolean; + zone string [ class ] { + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( + masters | ipv4_address [ port integer ] | + ipv6_address [ port integer ] ) [ key string ]; + ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + auto-dnssec ( allow | maintain | off ); + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + database string; + delegation-only boolean; + dialup ( notify | notify-passive | passive | refresh | + boolean ); + dlz string; + dnskey-sig-validity integer; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + file quoted_string; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( + ipv4_address | ipv6_address ) [ port integer ] [ + dscp integer ]; ... }; + in-view string; + inline-signing boolean; + ixfr-from-differences boolean; + journal quoted_string; + key-directory quoted_string; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port integer ] [ dscp integer ] { ( masters + | ipv4_address [ port integer ] | ipv6_address [ + port integer ] ) [ key string ]; ... }; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-records integer; + max-refresh-time integer; + max-retry-time integer; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-zone-ttl ( unlimited | duration ); + min-refresh-time integer; + min-retry-time integer; + multi-master boolean; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-source ( ipv4_address | * ) [ port ( integer | * + ) ] [ dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer + | * ) ] [ dscp integer ]; + notify-to-soa boolean; + request-expire boolean; + request-ixfr boolean; + serial-update-method ( date | increment | unixtime ); + server-addresses { ( ipv4_address | ipv6_address ); ... }; + server-names { string; ... }; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + transfer-source ( ipv4_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( + integer | * ) ] [ dscp integer ]; + try-tcp-refresh boolean; + type ( primary | master | secondary | slave | mirror | + delegation-only | forward | hint | redirect | + static-stub | stub ); + update-check-ksk boolean; + update-policy ( local | { ( deny | grant ) string ( + 6to4-self | external | krb5-self | krb5-selfsub | + krb5-subdomain | ms-self | ms-selfsub | ms-subdomain | + name | self | selfsub | selfwild | subdomain | tcp-self + | wildcard | zonesub ) [ string ] rrtypelist; ... }; + use-alt-transfer-source boolean; + zero-no-soa-ttl boolean; + zone-statistics ( full | terse | none | boolean ); + }; + zone-statistics ( full | terse | none | boolean ); + }; + +ZONE +^^^^ + +:: + + zone string [ class ] { + allow-notify { address_match_element; ... }; + allow-query { address_match_element; ... }; + allow-query-on { address_match_element; ... }; + allow-transfer { address_match_element; ... }; + allow-update { address_match_element; ... }; + allow-update-forwarding { address_match_element; ... }; + also-notify [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + alt-transfer-source ( ipv4_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + alt-transfer-source-v6 ( ipv6_address | * ) [ port ( integer | + * ) ] [ dscp integer ]; + auto-dnssec ( allow | maintain | off ); + check-dup-records ( fail | warn | ignore ); + check-integrity boolean; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( fail | warn | ignore ); + check-sibling boolean; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard boolean; + database string; + delegation-only boolean; + dialup ( notify | notify-passive | passive | refresh | boolean ); + dlz string; + dnskey-sig-validity integer; + dnssec-dnskey-kskonly boolean; + dnssec-loadkeys-interval integer; + dnssec-policy string; + dnssec-secure-to-insecure boolean; + dnssec-update-mode ( maintain | no-resign ); + file quoted_string; + forward ( first | only ); + forwarders [ port integer ] [ dscp integer ] { ( ipv4_address + | ipv6_address ) [ port integer ] [ dscp integer ]; ... }; + in-view string; + inline-signing boolean; + ixfr-from-differences boolean; + journal quoted_string; + key-directory quoted_string; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port integer ] [ dscp integer ] { ( masters | + ipv4_address [ port integer ] | ipv6_address [ port + integer ] ) [ key string ]; ... }; + max-ixfr-ratio ( unlimited | percentage ); + max-journal-size ( default | unlimited | sizeval ); + max-records integer; + max-refresh-time integer; + max-retry-time integer; + max-transfer-idle-in integer; + max-transfer-idle-out integer; + max-transfer-time-in integer; + max-transfer-time-out integer; + max-zone-ttl ( unlimited | duration ); + min-refresh-time integer; + min-retry-time integer; + multi-master boolean; + notify ( explicit | master-only | boolean ); + notify-delay integer; + notify-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + notify-source-v6 ( ipv6_address | * ) [ port ( integer | * ) ] + [ dscp integer ]; + notify-to-soa boolean; + request-expire boolean; + request-ixfr boolean; + serial-update-method ( date | increment | unixtime ); + server-addresses { ( ipv4_address | ipv6_address ); ... }; + server-names { string; ... }; + sig-signing-nodes integer; + sig-signing-signatures integer; + sig-signing-type integer; + sig-validity-interval integer [ integer ]; + transfer-source ( ipv4_address | * ) [ port ( integer | * ) ] [ + dscp integer ]; + transfer-source-v6 ( ipv6_address | * ) [ port ( integer | * ) + ] [ dscp integer ]; + try-tcp-refresh boolean; + type ( primary | master | secondary | slave | mirror | + delegation-only | forward | hint | redirect | static-stub | + stub ); + update-check-ksk boolean; + update-policy ( local | { ( deny | grant ) string ( 6to4-self | + external | krb5-self | krb5-selfsub | krb5-subdomain | ms-self + | ms-selfsub | ms-subdomain | name | self | selfsub | selfwild + | subdomain | tcp-self | wildcard | zonesub ) [ string ] + rrtypelist; ... }; + use-alt-transfer-source boolean; + zero-no-soa-ttl boolean; + zone-statistics ( full | terse | none | boolean ); + }; + +Files +~~~~~ + +``/etc/named.conf`` + +See Also +~~~~~~~~ + +:manpage:`ddns-confgen(8)`, :manpage:`named(8)`, :manpage:`named-checkconf(8)`, :manpage:`rndc(8)`, :manpage:`rndc-confgen(8)`, BIND 9 Administrator Reference Manual. + diff --git a/doc/misc/options b/doc/misc/options index 2962f839ad..5161474545 100644 --- a/doc/misc/options +++ b/doc/misc/options @@ -206,7 +206,7 @@ options { fstrm-set-output-queue-model ( mpsc | spsc ); // not configured fstrm-set-output-queue-size ; // not configured fstrm-set-reopen-interval ; // not configured - geoip-directory ( | none ); // not configured + geoip-directory ( | none ); geoip-use-ecs ; // obsolete glue-cache ; has-old-clients ; // ancient @@ -227,7 +227,7 @@ options { listen-on-v6 [ port ] [ dscp ] { ; ... }; // may occur multiple times - lmdb-mapsize ; // non-operational + lmdb-mapsize ; lock-file ( | none ); maintain-ixfr-base ; // ancient managed-keys-directory ; @@ -583,7 +583,7 @@ view [ ] { }; // may occur multiple times key-directory ; lame-ttl ; - lmdb-mapsize ; // non-operational + lmdb-mapsize ; maintain-ixfr-base ; // ancient managed-keys { ( static-key | initial-key diff --git a/doc/misc/options.active b/doc/misc/options.active index c44b0d4fb7..3ce6b6cb61 100644 --- a/doc/misc/options.active +++ b/doc/misc/options.active @@ -188,7 +188,7 @@ options { fstrm-set-output-queue-model ( mpsc | spsc ); // not configured fstrm-set-output-queue-size ; // not configured fstrm-set-reopen-interval ; // not configured - geoip-directory ( | none ); // not configured + geoip-directory ( | none ); glue-cache ; heartbeat-interval ; hostname ( | none ); @@ -205,7 +205,7 @@ options { listen-on-v6 [ port ] [ dscp ] { ; ... }; // may occur multiple times - lmdb-mapsize ; // non-operational + lmdb-mapsize ; lock-file ( | none ); managed-keys-directory ; masterfile-format ( map | raw | text ); @@ -524,7 +524,7 @@ view [ ] { }; // may occur multiple times key-directory ; lame-ttl ; - lmdb-mapsize ; // non-operational + lmdb-mapsize ; managed-keys { ( static-key | initial-key | static-ds | initial-ds diff --git a/doc/misc/options.grammar.rst b/doc/misc/options.grammar.rst new file mode 100644 index 0000000000..d99a89fbcc --- /dev/null +++ b/doc/misc/options.grammar.rst @@ -0,0 +1,298 @@ +:: + + options { + allow-new-zones ; + allow-notify { ; ... }; + allow-query { ; ... }; + allow-query-cache { ; ... }; + allow-query-cache-on { ; ... }; + allow-query-on { ; ... }; + allow-recursion { ; ... }; + allow-recursion-on { ; ... }; + allow-transfer { ; ... }; + allow-update { ; ... }; + allow-update-forwarding { ; ... }; + also-notify [ port ] [ dscp ] { ( | + [ port ] | [ port + ] ) [ key ]; ... }; + alt-transfer-source ( | * ) [ port ( | * ) + ] [ dscp ]; + alt-transfer-source-v6 ( | * ) [ port ( | + * ) ] [ dscp ]; + answer-cookie ; + attach-cache ; + auth-nxdomain ; // default changed + auto-dnssec ( allow | maintain | off ); + automatic-interface-scan ; + avoid-v4-udp-ports { ; ... }; + avoid-v6-udp-ports { ; ... }; + bindkeys-file ; + blackhole { ; ... }; + cache-file ; + catalog-zones { zone [ default-masters [ port ] + [ dscp ] { ( | [ port + ] | [ port ] ) [ key + ]; ... } ] [ zone-directory ] [ + in-memory ] [ min-update-interval ]; ... }; + check-dup-records ( fail | warn | ignore ); + check-integrity ; + check-mx ( fail | warn | ignore ); + check-mx-cname ( fail | warn | ignore ); + check-names ( primary | master | + secondary | slave | response ) ( + fail | warn | ignore ); + check-sibling ; + check-spf ( warn | ignore ); + check-srv-cname ( fail | warn | ignore ); + check-wildcard ; + clients-per-query ; + cookie-algorithm ( aes | siphash24 ); + cookie-secret ; + coresize ( default | unlimited | ); + datasize ( default | unlimited | ); + deny-answer-addresses { ; ... } [ + except-from { ; ... } ]; + deny-answer-aliases { ; ... } [ except-from { ; ... + } ]; + dialup ( notify | notify-passive | passive | refresh | ); + directory ; + disable-algorithms { ; + ... }; + disable-ds-digests { ; + ... }; + disable-empty-zone ; + dns64 { + break-dnssec ; + clients { ; ... }; + exclude { ; ... }; + mapped { ; ... }; + recursive-only ; + suffix ; + }; + dns64-contact ; + dns64-server ; + dnskey-sig-validity ; + dnsrps-enable ; + dnsrps-options { }; + dnssec-accept-expired ; + dnssec-dnskey-kskonly ; + dnssec-loadkeys-interval ; + dnssec-must-be-secure ; + dnssec-policy ; + dnssec-secure-to-insecure ; + dnssec-update-mode ( maintain | no-resign ); + dnssec-validation ( yes | no | auto ); + dnstap { ( all | auth | client | forwarder | + resolver | update ) [ ( query | response ) ]; + ... }; + dnstap-identity ( | none | + hostname ); + dnstap-output ( file | unix ) [ + size ( unlimited | ) ] [ versions ( + unlimited | ) ] [ suffix ( increment + | timestamp ) ]; + dnstap-version ( | none ); + dscp ; + dual-stack-servers [ port ] { ( [ port + ] [ dscp ] | [ port + ] [ dscp ] | [ port + ] [ dscp ] ); ... }; + dump-file ; + edns-udp-size ; + empty-contact ; + empty-server ; + empty-zones-enable ; + fetch-quota-params ; + fetches-per-server [ ( drop | fail ) ]; + fetches-per-zone [ ( drop | fail ) ]; + files ( default | unlimited | ); + flush-zones-on-shutdown ; + forward ( first | only ); + forwarders [ port ] [ dscp ] { ( + | ) [ port ] [ dscp ]; ... }; + fstrm-set-buffer-hint ; + fstrm-set-flush-timeout ; + fstrm-set-input-queue-size ; + fstrm-set-output-notify-threshold ; + fstrm-set-output-queue-model ( mpsc | spsc ); + fstrm-set-output-queue-size ; + fstrm-set-reopen-interval ; + geoip-directory ( | none ); + glue-cache ; + heartbeat-interval ; + hostname ( | none ); + inline-signing ; + interface-interval ; + ixfr-from-differences ( primary | master | secondary | slave | + ); + keep-response-order { ; ... }; + key-directory ; + lame-ttl ; + listen-on [ port ] [ dscp + ] { + ; ... }; + listen-on-v6 [ port ] [ dscp + ] { + ; ... }; + lmdb-mapsize ; + lock-file ( | none ); + managed-keys-directory ; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + match-mapped-addresses ; + max-cache-size ( default | unlimited | | ); + max-cache-ttl ; + max-clients-per-query ; + max-ixfr-ratio ( unlimited | ); + max-journal-size ( default | unlimited | ); + max-ncache-ttl ; + max-records ; + max-recursion-depth ; + max-recursion-queries ; + max-refresh-time ; + max-retry-time ; + max-rsa-exponent-size ; + max-stale-ttl ; + max-transfer-idle-in ; + max-transfer-idle-out ; + max-transfer-time-in ; + max-transfer-time-out ; + max-udp-size ; + max-zone-ttl ( unlimited | ); + memstatistics ; + memstatistics-file ; + message-compression ; + min-cache-ttl ; + min-ncache-ttl ; + min-refresh-time ; + min-retry-time ; + minimal-any ; + minimal-responses ( no-auth | no-auth-recursive | ); + multi-master ; + new-zones-directory ; + no-case-compress { ; ... }; + nocookie-udp-size ; + notify ( explicit | master-only | ); + notify-delay ; + notify-rate ; + notify-source ( | * ) [ port ( | * ) ] [ + dscp ]; + notify-source-v6 ( | * ) [ port ( | * ) ] + [ dscp ]; + notify-to-soa ; + nta-lifetime ; + nta-recheck ; + nxdomain-redirect ; + pid-file ( | none ); + port ; + preferred-glue ; + prefetch [ ]; + provide-ixfr ; + qname-minimization ( strict | relaxed | disabled | off ); + query-source ( ( [ address ] ( | * ) [ port ( + | * ) ] ) | ( [ [ address ] ( | * ) ] + port ( | * ) ) ) [ dscp ]; + query-source-v6 ( ( [ address ] ( | * ) [ port ( + | * ) ] ) | ( [ [ address ] ( | * ) ] + port ( | * ) ) ) [ dscp ]; + querylog ; + random-device ( | none ); + rate-limit { + all-per-second ; + errors-per-second ; + exempt-clients { ; ... }; + ipv4-prefix-length ; + ipv6-prefix-length ; + log-only ; + max-table-size ; + min-table-size ; + nodata-per-second ; + nxdomains-per-second ; + qps-scale ; + referrals-per-second ; + responses-per-second ; + slip ; + window ; + }; + recursing-file ; + recursion ; + recursive-clients ; + request-expire ; + request-ixfr ; + request-nsid ; + require-server-cookie ; + reserved-sockets ; + resolver-nonbackoff-tries ; + resolver-query-timeout ; + resolver-retry-interval ; + response-padding { ; ... } block-size + ; + response-policy { zone [ add-soa ] [ log + ] [ max-policy-ttl ] [ min-update-interval + ] [ policy ( cname | disabled | drop | given | no-op + | nodata | nxdomain | passthru | tcp-only ) ] [ + recursive-only ] [ nsip-enable ] [ + nsdname-enable ]; ... } [ add-soa ] [ + break-dnssec ] [ max-policy-ttl ] [ + min-update-interval ] [ min-ns-dots ] [ + nsip-wait-recurse ] [ nsdname-wait-recurse + ] [ qname-wait-recurse ] [ recursive-only ] + [ nsip-enable ] [ nsdname-enable ] [ + dnsrps-enable ] [ dnsrps-options { + } ]; + root-delegation-only [ exclude { ; ... } ]; + root-key-sentinel ; + rrset-order { [ class ] [ type ] [ name + ] ; ... }; + secroots-file ; + send-cookie ; + serial-query-rate ; + serial-update-method ( date | increment | unixtime ); + server-id ( | none | hostname ); + servfail-ttl ; + session-keyalg ; + session-keyfile ( | none ); + session-keyname ; + sig-signing-nodes ; + sig-signing-signatures ; + sig-signing-type ; + sig-validity-interval [ ]; + sortlist { ; ... }; + stacksize ( default | unlimited | ); + stale-answer-enable ; + stale-answer-ttl ; + startup-notify-rate ; + statistics-file ; + synth-from-dnssec ; + tcp-advertised-timeout ; + tcp-clients ; + tcp-idle-timeout ; + tcp-initial-timeout ; + tcp-keepalive-timeout ; + tcp-listen-queue ; + tkey-dhkey ; + tkey-domain ; + tkey-gssapi-credential ; + tkey-gssapi-keytab ; + transfer-format ( many-answers | one-answer ); + transfer-message-size ; + transfer-source ( | * ) [ port ( | * ) ] [ + dscp ]; + transfer-source-v6 ( | * ) [ port ( | * ) + ] [ dscp ]; + transfers-in ; + transfers-out ; + transfers-per-ns ; + trust-anchor-telemetry ; // experimental + try-tcp-refresh ; + update-check-ksk ; + use-alt-transfer-source ; + use-v4-udp-ports { ; ... }; + use-v6-udp-ports { ; ... }; + v6-bias ; + validate-except { ; ... }; + version ( | none ); + zero-no-soa-ttl ; + zero-no-soa-ttl-cache ; + zone-statistics ( full | terse | none | ); + }; diff --git a/doc/misc/redirect.zoneopt.rst b/doc/misc/redirect.zoneopt.rst new file mode 100644 index 0000000000..2ec9046f0f --- /dev/null +++ b/doc/misc/redirect.zoneopt.rst @@ -0,0 +1,15 @@ +:: + + zone [ ] { + type redirect; + allow-query { ; ... }; + allow-query-on { ; ... }; + dlz ; + file ; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port ] [ dscp ] { ( | [ port ] | [ port ] ) [ key ]; ... }; + max-records ; + max-zone-ttl ( unlimited | ); + zone-statistics ( full | terse | none | ); + }; diff --git a/doc/misc/roadmap b/doc/misc/roadmap deleted file mode 100644 index 6113d3500e..0000000000 --- a/doc/misc/roadmap +++ /dev/null @@ -1,43 +0,0 @@ -Copyright (C) Internet Systems Consortium, Inc. ("ISC") - -See COPYRIGHT in the source root or http://isc.org/copyright.html for terms. - -Road Map to the BIND 9 Source Tree - -bin/named The name server. This relies heavily on the - libraries in lib/isc and lib/dns. - client.c Handling of incoming client requests - query.c Query processing -bin/rndc The remote name daemon control program -bin/dig The "dig" program -bin/dnssec The DNSSEC signer and other DNSSEC tools -bin/nsupdate The "nsupdate" program -bin/tests Test suites and miscellaneous test programs -bin/tests/system System tests; see bin/tests/system/README -lib/dns The DNS library - resolver.c The "full resolver" (performs recursive lookups) - validator.c The DNSSEC validator - db.c The database interface - sdb.c The simple database interface (deprecated) - rbtdb.c The red-black tree database -lib/dns/rdata Routines for handling the various RR types -lib/dns/sec Cryptographic libraries for DNSSEC -lib/isc The ISC library - task.c Task library - unix/socket.c Unix implementation of socket library -lib/isccfg Routines for reading and writing ISC-style - configuration files like named.conf and rndc.conf -lib/isccc The command channel library, used by rndc. -lib/tests Support code for the test suites. -doc/draft Current internet-drafts pertaining to the DNS -doc/rfc RFCs pertaining to the DNS -doc/misc Miscellaneous documentation -doc/arm The BIND 9 Administrator Reference Manual -doc/man Man pages -contrib Contributed and other auxiliary code -contrib/idn/mdnkit The multilingual domain name evaluation kit -make Makefile fragments, used by configure - -The library interfaces are mainly documented in the form of comments -in the header files. For example, the task subsystem is documented in -lib/isc/include/isc/task.h diff --git a/doc/misc/docbook-grammars.pl b/doc/misc/rst-grammars.pl similarity index 61% rename from doc/misc/docbook-grammars.pl rename to doc/misc/rst-grammars.pl index 9eb8c81126..4154f15233 100644 --- a/doc/misc/docbook-grammars.pl +++ b/doc/misc/rst-grammars.pl @@ -11,7 +11,6 @@ use warnings; use strict; -use Time::Piece; if (@ARGV < 2) { print STDERR <<'END'; @@ -26,22 +25,7 @@ my $SECTION = shift; open (FH, "<", $FILE) or die "Can't open $FILE"; -my $t = Time::Piece->new(); -my $year = $t->year; - -print < - - - - -END +print "::\n\n"; # skip preamble my $preamble = 0; @@ -59,11 +43,15 @@ while () { $display = 1 } + if (m{// not.*implemented} || m{// obsolete} || + m{// ancient} || m{// test.*only}) + { + next; + } + s{ // not configured}{}; s{ // non-operational}{}; - s{ // may occur multiple times,*}{}; - s{<([a-z0-9_-]+)>}{$1}g; - s{^(\s*)([a-z0-9_-]+)\b}{$1$2}; + s{ // may occur multiple times}{}; s{[[]}{[}g; s{[]]}{]}g; s{ }{\t}g; @@ -72,10 +60,6 @@ while () { last; } if ($display) { - print; + print " " . $_; } } - -print < -END diff --git a/doc/misc/rst-options.pl b/doc/misc/rst-options.pl new file mode 100644 index 0000000000..963570cb47 --- /dev/null +++ b/doc/misc/rst-options.pl @@ -0,0 +1,119 @@ +#!/usr/bin/perl +# +# Copyright (C) Internet Systems Consortium, Inc. ("ISC") +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# +# See the COPYRIGHT file distributed with this work for additional +# information regarding copyright ownership. + +use warnings; +use strict; + +if (@ARGV < 1) { + print STDERR <<'END'; +usage: + perl rst-options.pl options_file >named.conf.rst +END + exit 1; +} + +my $FILE = shift; + +open (FH, "<", $FILE) or die "Can't open $FILE"; + +print <) { + if (m{^\s*$}) { + last if $preamble > 0; + } else { + $preamble++; + } +} + +my $blank = 0; +while () { + if (m{// not.*implemented} || m{// obsolete} || + m{// ancient} || m{// test.*only}) + { + next; + } + + s{ // not configured}{}; + s{ // non-operational}{}; + s{ (// )*may occur multiple times}{}; + s{<([a-z0-9_-]+)>}{$1}g; + s{ // deprecated,*}{// deprecated}; + s{[[]}{[}g; + s{[]]}{]}g; + s{ }{\t}g; + if (m{^([a-z0-9-]+) }) { + my $HEADING = uc $1; + my $UNDERLINE = $HEADING; + $UNDERLINE =~ s/./^/g; + print $HEADING . "\n"; + print $UNDERLINE . "\n\n"; + if ($HEADING eq "TRUSTED-KEYS") { + print "Deprecated - see DNSSEC-KEYS.\n\n"; + } + if ($HEADING eq "MANAGED-KEYS") { + print "See DNSSEC-KEYS.\n\n" ; + } + print "::\n\n"; + } + + if (m{^\s*$}) { + if (!$blank) { + print "\n"; + $blank = 1; + } + next; + } else { + $blank = 0; + } + print " " . $_; + +} + +print <) { + if (m{// not.*implemented} || m{// obsolete} || + m{// ancient} || m{// test.*only}) + { + next; + } + + s{ // not configured}{}; + s{ // may occur multiple times}{}; + s{[[]}{[}g; + s{[]]}{]}g; + s{ }{\t}g; + + print " " . $_; +} diff --git a/doc/misc/server.grammar.rst b/doc/misc/server.grammar.rst new file mode 100644 index 0000000000..4c461a0c12 --- /dev/null +++ b/doc/misc/server.grammar.rst @@ -0,0 +1,34 @@ +:: + + server { + bogus ; + edns ; + edns-udp-size ; + edns-version ; + keys ; + max-udp-size ; + notify-source ( | * ) [ port ( | * ) ] [ + dscp ]; + notify-source-v6 ( | * ) [ port ( | * ) ] + [ dscp ]; + padding ; + provide-ixfr ; + query-source ( ( [ address ] ( | * ) [ port ( + | * ) ] ) | ( [ [ address ] ( | * ) ] + port ( | * ) ) ) [ dscp ]; + query-source-v6 ( ( [ address ] ( | * ) [ port ( + | * ) ] ) | ( [ [ address ] ( | * ) ] + port ( | * ) ) ) [ dscp ]; + request-expire ; + request-ixfr ; + request-nsid ; + send-cookie ; + tcp-keepalive ; + tcp-only ; + transfer-format ( many-answers | one-answer ); + transfer-source ( | * ) [ port ( | * ) ] [ + dscp ]; + transfer-source-v6 ( | * ) [ port ( | * ) + ] [ dscp ]; + transfers ; + }; diff --git a/doc/misc/slave.zoneopt.rst b/doc/misc/slave.zoneopt.rst new file mode 100644 index 0000000000..08395efe44 --- /dev/null +++ b/doc/misc/slave.zoneopt.rst @@ -0,0 +1,63 @@ +:: + + zone [ ] { + type ( slave | secondary ); + allow-notify { ; ... }; + allow-query { ; ... }; + allow-query-on { ; ... }; + allow-transfer { ; ... }; + allow-update-forwarding { ; ... }; + also-notify [ port ] [ dscp ] { ( | [ port ] | [ port ] ) [ key ]; ... }; + alt-transfer-source ( | * ) [ port ( | * ) ] [ dscp ]; + alt-transfer-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + auto-dnssec ( allow | maintain | off ); + check-names ( fail | warn | ignore ); + database ; + dialup ( notify | notify-passive | passive | refresh | ); + dlz ; + dnskey-sig-validity ; + dnssec-dnskey-kskonly ; + dnssec-loadkeys-interval ; + dnssec-policy ; + dnssec-update-mode ( maintain | no-resign ); + file ; + forward ( first | only ); + forwarders [ port ] [ dscp ] { ( | ) [ port ] [ dscp ]; ... }; + inline-signing ; + ixfr-from-differences ; + journal ; + key-directory ; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port ] [ dscp ] { ( | [ port ] | [ port ] ) [ key ]; ... }; + max-ixfr-ratio ( unlimited | ); + max-journal-size ( default | unlimited | ); + max-records ; + max-refresh-time ; + max-retry-time ; + max-transfer-idle-in ; + max-transfer-idle-out ; + max-transfer-time-in ; + max-transfer-time-out ; + min-refresh-time ; + min-retry-time ; + multi-master ; + notify ( explicit | master-only | ); + notify-delay ; + notify-source ( | * ) [ port ( | * ) ] [ dscp ]; + notify-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + notify-to-soa ; + request-expire ; + request-ixfr ; + sig-signing-nodes ; + sig-signing-signatures ; + sig-signing-type ; + sig-validity-interval [ ]; + transfer-source ( | * ) [ port ( | * ) ] [ dscp ]; + transfer-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + try-tcp-refresh ; + update-check-ksk ; + use-alt-transfer-source ; + zero-no-soa-ttl ; + zone-statistics ( full | terse | none | ); + }; diff --git a/doc/misc/static-stub.zoneopt.rst b/doc/misc/static-stub.zoneopt.rst new file mode 100644 index 0000000000..2116849f28 --- /dev/null +++ b/doc/misc/static-stub.zoneopt.rst @@ -0,0 +1,13 @@ +:: + + zone [ ] { + type static-stub; + allow-query { ; ... }; + allow-query-on { ; ... }; + forward ( first | only ); + forwarders [ port ] [ dscp ] { ( | ) [ port ] [ dscp ]; ... }; + max-records ; + server-addresses { ( | ); ... }; + server-names { ; ... }; + zone-statistics ( full | terse | none | ); + }; diff --git a/doc/misc/statistics-channels.grammar.rst b/doc/misc/statistics-channels.grammar.rst new file mode 100644 index 0000000000..69c19e7361 --- /dev/null +++ b/doc/misc/statistics-channels.grammar.rst @@ -0,0 +1,8 @@ +:: + + statistics-channels { + inet ( | | + * ) [ port ( | * ) ] [ + allow { ; ... + } ]; + }; diff --git a/doc/misc/stub.zoneopt.rst b/doc/misc/stub.zoneopt.rst new file mode 100644 index 0000000000..7357617f25 --- /dev/null +++ b/doc/misc/stub.zoneopt.rst @@ -0,0 +1,29 @@ +:: + + zone [ ] { + type stub; + allow-query { ; ... }; + allow-query-on { ; ... }; + check-names ( fail | warn | ignore ); + database ; + delegation-only ; + dialup ( notify | notify-passive | passive | refresh | ); + file ; + forward ( first | only ); + forwarders [ port ] [ dscp ] { ( | ) [ port ] [ dscp ]; ... }; + masterfile-format ( map | raw | text ); + masterfile-style ( full | relative ); + masters [ port ] [ dscp ] { ( | [ port ] | [ port ] ) [ key ]; ... }; + max-records ; + max-refresh-time ; + max-retry-time ; + max-transfer-idle-in ; + max-transfer-time-in ; + min-refresh-time ; + min-retry-time ; + multi-master ; + transfer-source ( | * ) [ port ( | * ) ] [ dscp ]; + transfer-source-v6 ( | * ) [ port ( | * ) ] [ dscp ]; + use-alt-transfer-source ; + zone-statistics ( full | terse | none | ); + }; diff --git a/doc/misc/tcp-fast-open b/doc/misc/tcp-fast-open deleted file mode 100644 index 020ec053a1..0000000000 --- a/doc/misc/tcp-fast-open +++ /dev/null @@ -1,32 +0,0 @@ -Copyright (C) Internet Systems Consortium, Inc. ("ISC") - -See COPYRIGHT in the source root or http://isc.org/copyright.html for terms. - -Some systems (Linux, FreeBSD, OS X/macOS and Windows 10) support -the TCP Fast Open (RFC 7413) mechanism in their recent versions. - -BIND 9 supports this on the server side. - -When the TCP_FASTOPEN socket option is defined after the listen() -system call the socket code in the libisc set the option with -the half of the listen backlog (so the fast open maximum queue length -is the half of the pending connection queue length). -Any failure is logged and ignored. - -System specific notes: - - FreeBSD doesn't interpret the argument as a queue length but - only as an on/off switch. - - - Using TCP Fast Open on FreeBSD, as of versions 10.3 and 11.0, requires - compiling a custom kernel and setting the "net.inet.tcp.fastopen.enabled" - sysctl to 1. - - - Apple OS X/macOS allows only 0 or 1 so the code puts 1 for this system. - - - Windows 10 uses a 0/1 char flag? Note that TCP_FASTOPEN is defined - only in SDK 10.0.14393.0 or higher (Visual Studio 2015 requires - extra setting of the "Target Platform Version" in all project - properties). - - - the only other system known to support this is Linux. - diff --git a/doc/misc/trust-anchors.grammar.rst b/doc/misc/trust-anchors.grammar.rst new file mode 100644 index 0000000000..c7a800583d --- /dev/null +++ b/doc/misc/trust-anchors.grammar.rst @@ -0,0 +1,6 @@ +:: + + trust-anchors { ( static-key | + initial-key | static-ds | initial-ds ) + + ; ... }; diff --git a/doc/misc/trusted-keys.grammar.rst b/doc/misc/trusted-keys.grammar.rst new file mode 100644 index 0000000000..d920076399 --- /dev/null +++ b/doc/misc/trusted-keys.grammar.rst @@ -0,0 +1,5 @@ +:: + + trusted-keys { + + ; ... };, deprecated diff --git a/doc/tex/.gitignore b/doc/tex/.gitignore deleted file mode 100644 index 764b6ada73..0000000000 --- a/doc/tex/.gitignore +++ /dev/null @@ -1 +0,0 @@ -armstyle.sty diff --git a/doc/tex/armstyle.sty.in b/doc/tex/armstyle.sty.in deleted file mode 100644 index 906a563212..0000000000 --- a/doc/tex/armstyle.sty.in +++ /dev/null @@ -1,107 +0,0 @@ -%% -%% This style is derivated from the docbook one -%% -\NeedsTeXFormat{LaTeX2e} -\ProvidesPackage{armstyle}[] - -%% Just use the original package and pass the options -\RequirePackageWithOptions{db2latex} - -% 2015-09-03 reed -- used with figure -\usepackage{float} - -% For page layout -\usepackage{geometry} - -% don't want date on the cover page -\let\@date\@empty - -% get rid of "Chapter" on start of each chapter -\def\@makechapterhead#1{% - \vspace*{50\p@}% - {\parindent \z@ \raggedright \normalfont - \ifnum \c@secnumdepth >\m@ne - \if@mainmatter - \Huge\bfseries\sffamily \thechapter\space\space\space\space% - \fi - \fi - \interlinepenalty\@M - \Huge \bfseries \sffamily #1\par\nobreak - \vskip 40\p@ - }} - -% for use of \titleformat -\usepackage{titlesec} - -\titleformat*{\section}{\Large\bfseries\scshape\sffamily} -\titleformat*{\subsection}{\large\bfseries\sffamily} - -% Contents font too ; note I don't know what last parts of this are for -\titleformat{\chapter}{\Huge\bfseries\sffamily}{\thechapter}{1em}{} \vspace{6pt} - -% font for the Index headline also -\titleformat{\index}{\Huge\bfseries\sffamily}{Index}{1em}{} \vspace{6pt} - -% following two lines for no indenting paragraphs and spacing between -\setlength\parskip{\medskipamount} -\setlength\parindent{0pt} - -% fancy footers -\pagestyle{fancy} -\fancyfoot[ce,co]{\thepage} -\fancyfoot[le,ro]{@BIND9_VERSIONSHORT@} -\renewcommand{\headrulewidth}{0.4 pt} -\fancypagestyle{plain}{% - \fancyhf{}% - \fancyfoot[ce,co]{\thepage}% - \fancyfoot[le,ro]{@BIND9_VERSIONSHORT@} - \renewcommand{\headrulewidth}{0 pt} -} -\fancypagestyle{empty}{% - \fancyhf{}% - \renewcommand{\headrulewidth}{0 pt} - \renewcommand{\footrulewidth}{0 pt} -} - -% custom title and copyright pages -\def\maketitle{ - \thispagestyle{empty} - \null\vfil - \vskip 60pt - \begin{center}% - { %\LARGE - \Huge - \bfseries - \DBKtitle \\ - \par - } - \vskip 3em% - { %\large - \Large - \lineskip .75em% - @BIND9_VERSIONSTRING@ - \par - } - \vfil\null - % Not sure exactly how much to trim logo, but given that - % this is a centered environment, we need not be too precise - % so long as the image is centered in the input PDF, we - % trim enough for it to fit on the page, and we do not trim - % so much that we clip out part of the graphic itself. - % This seems to work, anyway. - \includegraphics[trim=400 150 400 0,clip,scale=2.5]{isc-logo.pdf} - \end{center}\par - \newpage - \thispagestyle{empty} - \vfill - \DBKcopyright \\ - \vfill\null - \begin{center} - Internet Systems Consortium \\ - 950 Charter Street \\ - Redwood City, California \\ - USA \\ - https://www.isc.org/ - \end{center} - \vfil\null -} diff --git a/doc/tex/notestyle.sty b/doc/tex/notestyle.sty deleted file mode 100644 index 137f01f12f..0000000000 --- a/doc/tex/notestyle.sty +++ /dev/null @@ -1,21 +0,0 @@ -%% -%% This style is derivated from the docbook one -%% -\NeedsTeXFormat{LaTeX2e} -\ProvidesPackage{notestyle}[] - -%% Just use the original package and pass the options -\RequirePackageWithOptions{db2latex} - -%% My Cover Page -\def\maketitle{% -} - -%% Suppress header -\fancyhead{} -\renewcommand{\headrulewidth}{0pt} -\renewcommand{\footrulewidth}{0pt} - -% following two lines for no indenting paragraphs and spacing between -\setlength\parskip{\medskipamount} -\setlength\parindent{0pt} diff --git a/doc/xsl/.gitignore b/doc/xsl/.gitignore deleted file mode 100644 index f83f78a6e1..0000000000 --- a/doc/xsl/.gitignore +++ /dev/null @@ -1,6 +0,0 @@ -/isc-docbook-chunk.xsl -/isc-docbook-html.xsl -/isc-docbook-latex.xsl -/isc-manpage.xsl -/isc-notes-html.xsl -/isc-notes-latex.xsl diff --git a/doc/xsl/arm-param.xsl b/doc/xsl/arm-param.xsl deleted file mode 100644 index a124a758c0..0000000000 --- a/doc/xsl/arm-param.xsl +++ /dev/null @@ -1,122 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - 3 - - - - - - - - - - - - - - - - - - - - - - book - - - - - - - - - 1 - - - 2 - - - 1 - - - - - - \textsf{ - - } - - - - - - default - - - qanda - - - 5 - 0 - - - - - \\ - - - - \def\DBKtitle{ - - } - - \def\DBKcopyright{ - - } - - - diff --git a/doc/xsl/copyright.xsl b/doc/xsl/copyright.xsl deleted file mode 100644 index 100249b08a..0000000000 --- a/doc/xsl/copyright.xsl +++ /dev/null @@ -1,63 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - This Source Code Form is subject to the terms of the Mozilla Public - License, v. 2.0. If a copy of the MPL was not distributed with this - file, You can obtain one at http://mozilla.org/MPL/2.0/. - - - - - - - - Copyright (C) - - - - - - - - - - - - - - - diff --git a/doc/xsl/graphics/caution.eps b/doc/xsl/graphics/caution.eps deleted file mode 100644 index ff3c2c4c4c..0000000000 --- a/doc/xsl/graphics/caution.eps +++ /dev/null @@ -1,1348 +0,0 @@ -%!PS-Adobe-2.0 EPSF-1.2 -%%Title: Untitled-3 -%%Creator: FreeHand 9.0 -%%CreationDate: 2002/12/05 8:20 PM -%%BoundingBox: 0 0 29 29 -%%FHPathName:Untitled:FreeHand 9:English:Untitled-3 -%ALDOriginalFile:Untitled:FreeHand 9:English:Untitled-3 -%ALDBoundingBox: -2 -2 29 29 -%%FHPageNum:1 -%%DocumentSuppliedResources: procset Altsys_header 4 0 -%%ColorUsage: Color -%%DocumentProcessColors: Black -%%EndComments -%%BeginResource: procset Altsys_header 4 0 -userdict begin /AltsysDict 300 dict def end -AltsysDict begin -/bdf{bind def}bind def -/xdf{exch def}bdf -/defed{where{pop true}{false}ifelse}bdf -/ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf -/d{setdash}bdf -/h{closepath}bdf -/H{}bdf -/J{setlinecap}bdf -/j{setlinejoin}bdf -/M{setmiterlimit}bdf -/n{newpath}bdf -/N{newpath}bdf -/q{gsave}bdf -/Q{grestore}bdf -/w{setlinewidth}bdf -/Xic{matrix invertmatrix concat}bdf -/Xq{matrix currentmatrix mark}bdf -/XQ{cleartomark setmatrix}bdf -/sepdef{ -dup where not -{ -AltsysSepDict -} -if -3 1 roll exch put -}bdf -/st{settransfer}bdf -/colorimage defed /_rci xdf -/cntr 0 def -/readbinarystring{ -/cntr 0 def -2 copy readstring -{ -{ -dup -(\034) search -{ -length exch pop exch -dup length 0 ne -{ -dup dup 0 get 32 sub 0 exch put -/cntr cntr 1 add def -} -{ -pop 1 string dup -0 6 index read pop 32 sub put -}ifelse -3 copy -putinterval pop -1 add -1 index length 1 sub -1 index sub -dup 0 le {pop pop exit}if -getinterval -} -{ -pop exit -} ifelse -} loop -}if -cntr 0 gt -{ -pop 2 copy -dup length cntr sub cntr getinterval -readbinarystring -} if -pop exch pop -} bdf -/_NXLevel1 defed { -_NXLevel1 not { -/colorimage where { -userdict eq { -/_rci false def -} if -} if -} if -} if -/md defed{ -md type /dicttype eq { -/colorimage where { -md eq { -/_rci false def -}if -}if -/settransfer where { -md eq { -/st systemdict /settransfer get def -}if -}if -}if -}if -/setstrokeadjust defed -{ -true setstrokeadjust -/C{curveto}bdf -/L{lineto}bdf -/m{moveto}bdf -} -{ -/dr{transform .25 sub round .25 add -exch .25 sub round .25 add exch itransform}bdf -/C{dr curveto}bdf -/L{dr lineto}bdf -/m{dr moveto}bdf -/setstrokeadjust{pop}bdf -}ifelse -/privrectpath { -4 -2 roll m -dtransform round exch round exch idtransform -2 copy 0 lt exch 0 lt xor -{dup 0 exch rlineto exch 0 rlineto neg 0 exch rlineto} -{exch dup 0 rlineto exch 0 exch rlineto neg 0 rlineto} -ifelse -closepath -}bdf -/rectclip{newpath privrectpath clip newpath}def -/rectfill{gsave newpath privrectpath fill grestore}def -/rectstroke{gsave newpath privrectpath stroke grestore}def -/_fonthacksave false def -/currentpacking defed -{ -/_bfh {/_fonthacksave currentpacking def false setpacking} bdf -/_efh {_fonthacksave setpacking} bdf -} -{ -/_bfh {} bdf -/_efh {} bdf -}ifelse -/packedarray{array astore readonly}ndf -/` -{ -false setoverprint -/-save0- save def -5 index concat -pop -storerect left bottom width height rectclip -pop -/MMdict_count countdictstack def -/MMop_count count 1 sub def -userdict begin -/showpage {} def -0 setgray 0 setlinecap 1 setlinewidth -0 setlinejoin 10 setmiterlimit [] 0 setdash newpath -} bdf -/currentpacking defed{true setpacking}if -/min{2 copy gt{exch}if pop}bdf -/max{2 copy lt{exch}if pop}bdf -/xformfont { currentfont exch makefont setfont } bdf -/fhnumcolors 1 -statusdict begin -/processcolors defed -{ -pop processcolors -} -{ -/deviceinfo defed { -deviceinfo /Colors known { -pop deviceinfo /Colors get -} if -} if -} ifelse -end -def -/printerRes -gsave -matrix defaultmatrix setmatrix -72 72 dtransform -abs exch abs -max -grestore -def -/graycalcs -[ -{Angle Frequency} -{GrayAngle GrayFrequency} -{0 Width Height matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -{0 GrayWidth GrayHeight matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -] def -/calcgraysteps { -forcemaxsteps -{ -maxsteps -} -{ -/currenthalftone defed -{currenthalftone /dicttype eq}{false}ifelse -{ -currenthalftone begin -HalftoneType 4 le -{graycalcs HalftoneType 1 sub get exec} -{ -HalftoneType 5 eq -{ -Default begin -{graycalcs HalftoneType 1 sub get exec} -end -} -{0 60} -ifelse -} -ifelse -end -} -{ -currentscreen pop exch -} -ifelse -printerRes 300 max exch div exch -2 copy -sin mul round dup mul -3 1 roll -cos mul round dup mul -add 1 add -dup maxsteps gt {pop maxsteps} if -dup minsteps lt {pop minsteps} if -} -ifelse -} bdf -/nextrelease defed { -/languagelevel defed not { -/framebuffer defed { -0 40 string framebuffer 9 1 roll 8 {pop} repeat -dup 516 eq exch 520 eq or -{ -/fhnumcolors 3 def -/currentscreen {60 0 {pop pop 1}}bdf -/calcgraysteps {maxsteps} bdf -}if -}if -}if -}if -fhnumcolors 1 ne { -/calcgraysteps {maxsteps} bdf -} if -/currentpagedevice defed { -currentpagedevice /PreRenderingEnhance known -{ -currentpagedevice /PreRenderingEnhance get -{ -/calcgraysteps -{ -forcemaxsteps -{maxsteps} -{256 maxsteps min} -ifelse -} def -} if -} if -} if -/gradfrequency 144 def -printerRes 1000 lt { -/gradfrequency 72 def -} if -/adjnumsteps { -dup dtransform abs exch abs max -printerRes div -gradfrequency mul -round -5 max -min -}bdf -/goodsep { -spots exch get 4 get dup sepname eq exch (_vc_Registration) eq or -}bdf -/BeginGradation defed -{/bb{BeginGradation}bdf} -{/bb{}bdf} -ifelse -/EndGradation defed -{/eb{EndGradation}bdf} -{/eb{}bdf} -ifelse -/bottom -0 def -/delta -0 def -/frac -0 def -/height -0 def -/left -0 def -/numsteps1 -0 def -/radius -0 def -/right -0 def -/top -0 def -/width -0 def -/xt -0 def -/yt -0 def -/df currentflat def -/tempstr 1 string def -/clipflatness currentflat def -/inverted? -0 currenttransfer exec .5 ge def -/tc1 [0 0 0 1] def -/tc2 [0 0 0 1] def -/storerect{/top xdf /right xdf /bottom xdf /left xdf -/width right left sub def /height top bottom sub def}bdf -/concatprocs{ -systemdict /packedarray known -{dup type /packedarraytype eq 2 index type /packedarraytype eq or}{false}ifelse -{ -/proc2 exch cvlit def /proc1 exch cvlit def -proc1 aload pop proc2 aload pop -proc1 length proc2 length add packedarray cvx -} -{ -/proc2 exch cvlit def /proc1 exch cvlit def -/newproc proc1 length proc2 length add array def -newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval -newproc cvx -}ifelse -}bdf -/i{dup 0 eq -{pop df dup} -{dup} ifelse -/clipflatness xdf setflat -}bdf -version cvr 38.0 le -{/setrgbcolor{ -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -setrgbcolor}bdf}if -/vms {/vmsv save def} bdf -/vmr {vmsv restore} bdf -/vmrs{vmsv restore /vmsv save def}bdf -/eomode{ -{/filler /eofill load def /clipper /eoclip load def} -{/filler /fill load def /clipper /clip load def} -ifelse -}bdf -/normtaper{}bdf -/logtaper{9 mul 1 add log}bdf -/CD{ -/NF exch def -{ -exch dup -/FID ne 1 index/UniqueID ne and -{exch NF 3 1 roll put} -{pop pop} -ifelse -}forall -NF -}bdf -/MN{ -1 index length -/Len exch def -dup length Len add -string dup -Len -4 -1 roll -putinterval -dup -0 -4 -1 roll -putinterval -}bdf -/RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch -{1 index MN cvn/NewN exch def cvn -findfont dup maxlength dict CD dup/FontName NewN put dup -/Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf -/RF{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RC} -ifelse -}bdf -/FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known -{exch pop findfont 3 -1 roll pop} -{pop dup findfont dup maxlength dict CD dup dup -/Encoding exch /Encoding get 256 array copy 7 -1 roll -{3 -1 roll dup 4 -2 roll put}forall put definefont} -ifelse}bdf -/RCJ{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFJ -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFJ{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCJ} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFJ -{ -dup -hasfont -not -{ -pop -/Ryumin-Light-83pv-RKSJ-H -hasfont -{ -/Ryumin-Light-83pv-RKSJ-H -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFJ{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFJ -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/GS { -dup -hasfont -{ -findfont -exch makesetfont -exch -pop -ts -} -{ -pop pop pop -ts -} ifelse -} bdf -/RCK{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFK -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFK{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCK} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFK -{ -dup -hasfont -not -{ -pop -/JCsm -hasfont -{ -/JCsm -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFK{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFK -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/RCTC{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFTC -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFTC{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCTC} -ifelse -}bdf -/FDFTC -{ -dup -hasfont -not -{ -pop -/DFMing-Lt-HK-BF -hasfont -{ -/DFMing-Lt-HK-BF -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFTC{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFTC -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/fps{ -currentflat -exch -dup 0 le{pop 1}if -{ -dup setflat 3 index stopped -{1.3 mul dup 3 index gt{pop setflat pop pop stop}if} -{exit} -ifelse -}loop -pop setflat pop pop -}bdf -/fp{100 currentflat fps}bdf -/clipper{clip}bdf -/W{/clipper load 100 clipflatness dup setflat fps}bdf - -userdict begin /BDFontDict 29 dict def end -BDFontDict begin -/bu{}def -/bn{}def -/setTxMode{av 70 ge{pop}if pop}def -/gm{m}def -/show{pop}def -/gr{pop}def -/fnt{pop pop pop}def -/fs{pop}def -/fz{pop}def -/lin{pop pop}def -/:M {pop pop} def -/sf {pop} def -/S {pop} def -/@b {pop pop pop pop pop pop pop pop} def -/_bdsave /save load def -/_bdrestore /restore load def -/save { dup /fontsave eq {null} {_bdsave} ifelse } def -/restore { dup null eq { pop } { _bdrestore } ifelse } def -/fontsave null def -end -/MacVec 256 array def -MacVec 0 /Helvetica findfont -/Encoding get 0 128 getinterval putinterval -MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put -/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI -/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US -MacVec 0 32 getinterval astore pop -/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute -/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave -/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute -/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis -/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls -/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash -/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation -/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash -/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotleft -/guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe -/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge -/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl -/daggerdbl/periodcentered/quotesinglbase/quotedblbase -/perthousand/Acircumflex/Ecircumflex/Aacute -/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex -/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde -/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron -MacVec 128 128 getinterval astore pop -/findheaderfont { -/Helvetica findfont -} def -end %. AltsysDict -%%EndResource -%%EndProlog - -%%BeginSetup - -AltsysDict begin -_bfh - -_efh -end %. AltsysDict - -%%EndSetup -AltsysDict begin - -/onlyk4{false}ndf -/ccmyk{dup 5 -1 roll sub 0 max exch}ndf -/cmyk2gray{ -4 -1 roll 0.3 mul 4 -1 roll 0.59 mul 4 -1 roll 0.11 mul -add add add 1 min neg 1 add -}bdf -/setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf -/maxcolor { -max max max -} ndf -/maxspot { -pop -} ndf -/setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf -/findcmykcustomcolor{5 packedarray}ndf -/setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat setcmykcolor pop}ndf -/setseparationgray{setgray}ndf -/setoverprint{pop}ndf -/currentoverprint false ndf -/cmykbufs2gray{ -0 1 2 index length 1 sub -{ -4 index 1 index get 0.3 mul -4 index 2 index get 0.59 mul -4 index 3 index get 0.11 mul -4 index 4 index get -add add add cvi 255 min -255 exch sub -2 index 3 1 roll put -}for -4 1 roll pop pop pop -}bdf -/colorimage{ -pop pop -[ -5 -1 roll/exec cvx -6 -1 roll/exec cvx -7 -1 roll/exec cvx -8 -1 roll/exec cvx -/cmykbufs2gray cvx -]cvx -image -} -%. version 47.1 on Linotronic of Postscript defines colorimage incorrectly (rgb model only) -version cvr 47.1 le -statusdict /product get (Lino) anchorsearch{pop pop true}{pop false}ifelse -and{userdict begin bdf end}{ndf}ifelse -fhnumcolors 1 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -ic im iy ik cmyk2gray /xt xdf -currenttransfer -{dup 1.0 exch sub xt mul add}concatprocs -st -image -} -ifelse -}ndf -fhnumcolors 1 ne {yt restore} if -fhnumcolors 3 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -1.0 dup ic ik add min sub -1.0 dup im ik add min sub -1.0 dup iy ik add min sub -/ic xdf /iy xdf /im xdf -currentcolortransfer -4 1 roll -{dup 1.0 exch sub ic mul add}concatprocs 4 1 roll -{dup 1.0 exch sub iy mul add}concatprocs 4 1 roll -{dup 1.0 exch sub im mul add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}true 3 colorimage -} -ifelse -}ndf -fhnumcolors 3 ne {yt restore} if -fhnumcolors 4 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -currentcolortransfer -{1.0 exch sub ik mul ik sub 1 add}concatprocs 4 1 roll -{1.0 exch sub iy mul iy sub 1 add}concatprocs 4 1 roll -{1.0 exch sub im mul im sub 1 add}concatprocs 4 1 roll -{1.0 exch sub ic mul ic sub 1 add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}{dummy} -true 4 colorimage -} -ifelse -}ndf -fhnumcolors 4 ne {yt restore} if -/separationimage{image}ndf -/spotascmyk false ndf -/newcmykcustomcolor{6 packedarray}ndf -/inkoverprint false ndf -/setinkoverprint{pop}ndf -/setspotcolor { -spots exch get -dup 4 get (_vc_Registration) eq -{pop 1 exch sub setseparationgray} -{0 5 getinterval exch setcustomcolor} -ifelse -}ndf -/currentcolortransfer{currenttransfer dup dup dup}ndf -/setcolortransfer{st pop pop pop}ndf -/fas{}ndf -/sas{}ndf -/fhsetspreadsize{pop}ndf -/filler{fill}bdf -/F{gsave {filler}fp grestore}bdf -/f{closepath F}bdf -/S{gsave {stroke}fp grestore}bdf -/s{closepath S}bdf -userdict /islevel2 -systemdict /languagelevel known dup -{ -pop systemdict /languagelevel get 2 ge -} if -put -islevel2 not -{ -/currentcmykcolor -{ -0 0 0 1 currentgray sub -} ndf -} if -/tc -{ -gsave -setcmykcolor currentcmykcolor -grestore -} bind def -/testCMYKColorThrough -{ -tc add add add 0 ne -} bind def -/fhiscomposite where not { -userdict /fhiscomposite -islevel2 -{ -gsave 1 1 1 1 setcmykcolor currentcmykcolor grestore -add add add 4 eq -} -{ -1 0 0 0 testCMYKColorThrough -0 1 0 0 testCMYKColorThrough -0 0 1 0 testCMYKColorThrough -0 0 0 1 testCMYKColorThrough -and and and -} ifelse -put -} -{ pop } -ifelse -/bc4 [0 0 0 0] def -/_lfp4 { -1 pop -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -height abs adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -taperfcn /frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/bcs [0 0] def -/_lfs4 { -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -height abs adjnumsteps -dup 2 lt {pop 2} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 div taperfcn /frac xdf -bcs 0 -1.0 tint2 tint1 sub frac mul tint1 add sub -put bcs vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfs6 { -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bcs 0 -tint2 tint1 sub frac mul tint1 add -put bcs vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfp6 { -1 pop -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/lfp4{_lfp4}ndf -/lfs4{_lfs4}ndf -/rfs6{_rfs6}ndf -/rfp6{_rfp6}ndf -/cvc [0 0 0 1] def -/vc{ -AltsysDict /cvc 2 index put -aload length dup 4 eq -{pop dup -1 eq{pop setrgbcolor}{setcmykcolor}ifelse} -{6 eq {sethexcolor} {setspotcolor} ifelse } -ifelse -}bdf -0 setseparationgray -/imgr {1692.47 1570.59 1723.65 1601.77 } def -/bleed 0 def -/clpr {1692.47 1570.59 1723.65 1601.77 } def -/xs 1 def -/ys 1 def -/botx 0 def -/overlap 0 def -/wdist 18 def -0 2 mul fhsetspreadsize -0 0 ne {/df 0 def /clipflatness 0 def} if -/maxsteps 256 def -/forcemaxsteps false def -/minsteps 0 def - -userdict begin /AGDOrigMtx matrix currentmatrix def end -vms --1694 -1572 translate - -/currentpacking defed{false setpacking}if -/spots[ - -1 0 0 0 (Process Cyan) false newcmykcustomcolor - -0 1 0 0 (Process Magenta) false newcmykcustomcolor - -0 0 1 0 (Process Yellow) false newcmykcustomcolor - -0 0 0 1 (Process Black) false newcmykcustomcolor -]def -n -[] 0 d -3.863708 M -1 w -0 j -0 J -false setoverprint -0 i -false eomode -[0 0 0 1]vc -vms -q -[1 0 0 1 -249.981674 -586.867554] concat -vms -1946.9506 2177.5114 m -1954.4907 2185.0516 L -1956.7047 2187.2656 1960.2943 2187.2656 1962.5083 2185.0516 C -1970.0485 2177.5114 L -1972.2625 2175.2974 1972.2625 2171.7078 1970.0485 2169.4938 C -1962.5083 2161.9537 L -1960.2943 2159.7396 1956.7047 2159.7396 1954.4907 2161.9537 C -1946.9506 2169.4938 L -1944.7365 2171.7078 1944.7365 2175.2974 1946.9506 2177.5114 C -s -n -true eomode -1958.5469 2181.0039 m -1959.2148 2181.0039 1959.7012 2180.9296 1960.0059 2180.7813 C -1960.3142 2180.6326 1960.4684 2180.363 1960.4688 2179.9727 C -1960.4688 2179.7383 1960.3398 2178.8026 1960.082 2177.166 C -1959.0742 2170.4219 L -1958.9373 2170.3241 1958.7615 2170.2754 1958.5469 2170.2754 C -1958.3319 2170.2754 1958.1561 2170.3241 1958.0195 2170.4219 C -1957.0117 2177.166 L -1956.7539 2178.8026 1956.625 2179.7379 1956.625 2179.9727 C -1956.625 2180.363 1956.7792 2180.6326 1957.0879 2180.7813 C -1957.4003 2180.9296 1957.8866 2181.0035 1958.5469 2181.0039 C -h -1958.5469 2165.166 m -1958.0389 2165.166 1957.5878 2165.3499 1957.1934 2165.7168 C -1956.7986 2166.0837 1956.6016 2166.5485 1956.6016 2167.1113 C -1956.6016 2167.6698 1956.7891 2168.1404 1957.1641 2168.5234 C -1957.5427 2168.9102 1958.0038 2169.1035 1958.5469 2169.1035 C -1959.1094 2169.1035 1959.5741 2168.9043 1959.9414 2168.5059 C -1960.3083 2168.1074 1960.4918 2167.6423 1960.4922 2167.1113 C -1960.4922 2166.748 1960.4102 2166.4177 1960.2461 2166.1211 C -1960.082 2165.8241 1959.8513 2165.5916 1959.5547 2165.4238 C -1959.2577 2165.2521 1958.9219 2165.1664 1958.5469 2165.166 C -true setoverprint -f -false setoverprint -n -vmr -Q -false eomode -vmr -vmr -end -%%Trailer diff --git a/doc/xsl/graphics/caution.pdf b/doc/xsl/graphics/caution.pdf deleted file mode 100644 index ff7c00399b..0000000000 Binary files a/doc/xsl/graphics/caution.pdf and /dev/null differ diff --git a/doc/xsl/graphics/important.eps b/doc/xsl/graphics/important.eps deleted file mode 100644 index ff3c2c4c4c..0000000000 --- a/doc/xsl/graphics/important.eps +++ /dev/null @@ -1,1348 +0,0 @@ -%!PS-Adobe-2.0 EPSF-1.2 -%%Title: Untitled-3 -%%Creator: FreeHand 9.0 -%%CreationDate: 2002/12/05 8:20 PM -%%BoundingBox: 0 0 29 29 -%%FHPathName:Untitled:FreeHand 9:English:Untitled-3 -%ALDOriginalFile:Untitled:FreeHand 9:English:Untitled-3 -%ALDBoundingBox: -2 -2 29 29 -%%FHPageNum:1 -%%DocumentSuppliedResources: procset Altsys_header 4 0 -%%ColorUsage: Color -%%DocumentProcessColors: Black -%%EndComments -%%BeginResource: procset Altsys_header 4 0 -userdict begin /AltsysDict 300 dict def end -AltsysDict begin -/bdf{bind def}bind def -/xdf{exch def}bdf -/defed{where{pop true}{false}ifelse}bdf -/ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf -/d{setdash}bdf -/h{closepath}bdf -/H{}bdf -/J{setlinecap}bdf -/j{setlinejoin}bdf -/M{setmiterlimit}bdf -/n{newpath}bdf -/N{newpath}bdf -/q{gsave}bdf -/Q{grestore}bdf -/w{setlinewidth}bdf -/Xic{matrix invertmatrix concat}bdf -/Xq{matrix currentmatrix mark}bdf -/XQ{cleartomark setmatrix}bdf -/sepdef{ -dup where not -{ -AltsysSepDict -} -if -3 1 roll exch put -}bdf -/st{settransfer}bdf -/colorimage defed /_rci xdf -/cntr 0 def -/readbinarystring{ -/cntr 0 def -2 copy readstring -{ -{ -dup -(\034) search -{ -length exch pop exch -dup length 0 ne -{ -dup dup 0 get 32 sub 0 exch put -/cntr cntr 1 add def -} -{ -pop 1 string dup -0 6 index read pop 32 sub put -}ifelse -3 copy -putinterval pop -1 add -1 index length 1 sub -1 index sub -dup 0 le {pop pop exit}if -getinterval -} -{ -pop exit -} ifelse -} loop -}if -cntr 0 gt -{ -pop 2 copy -dup length cntr sub cntr getinterval -readbinarystring -} if -pop exch pop -} bdf -/_NXLevel1 defed { -_NXLevel1 not { -/colorimage where { -userdict eq { -/_rci false def -} if -} if -} if -} if -/md defed{ -md type /dicttype eq { -/colorimage where { -md eq { -/_rci false def -}if -}if -/settransfer where { -md eq { -/st systemdict /settransfer get def -}if -}if -}if -}if -/setstrokeadjust defed -{ -true setstrokeadjust -/C{curveto}bdf -/L{lineto}bdf -/m{moveto}bdf -} -{ -/dr{transform .25 sub round .25 add -exch .25 sub round .25 add exch itransform}bdf -/C{dr curveto}bdf -/L{dr lineto}bdf -/m{dr moveto}bdf -/setstrokeadjust{pop}bdf -}ifelse -/privrectpath { -4 -2 roll m -dtransform round exch round exch idtransform -2 copy 0 lt exch 0 lt xor -{dup 0 exch rlineto exch 0 rlineto neg 0 exch rlineto} -{exch dup 0 rlineto exch 0 exch rlineto neg 0 rlineto} -ifelse -closepath -}bdf -/rectclip{newpath privrectpath clip newpath}def -/rectfill{gsave newpath privrectpath fill grestore}def -/rectstroke{gsave newpath privrectpath stroke grestore}def -/_fonthacksave false def -/currentpacking defed -{ -/_bfh {/_fonthacksave currentpacking def false setpacking} bdf -/_efh {_fonthacksave setpacking} bdf -} -{ -/_bfh {} bdf -/_efh {} bdf -}ifelse -/packedarray{array astore readonly}ndf -/` -{ -false setoverprint -/-save0- save def -5 index concat -pop -storerect left bottom width height rectclip -pop -/MMdict_count countdictstack def -/MMop_count count 1 sub def -userdict begin -/showpage {} def -0 setgray 0 setlinecap 1 setlinewidth -0 setlinejoin 10 setmiterlimit [] 0 setdash newpath -} bdf -/currentpacking defed{true setpacking}if -/min{2 copy gt{exch}if pop}bdf -/max{2 copy lt{exch}if pop}bdf -/xformfont { currentfont exch makefont setfont } bdf -/fhnumcolors 1 -statusdict begin -/processcolors defed -{ -pop processcolors -} -{ -/deviceinfo defed { -deviceinfo /Colors known { -pop deviceinfo /Colors get -} if -} if -} ifelse -end -def -/printerRes -gsave -matrix defaultmatrix setmatrix -72 72 dtransform -abs exch abs -max -grestore -def -/graycalcs -[ -{Angle Frequency} -{GrayAngle GrayFrequency} -{0 Width Height matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -{0 GrayWidth GrayHeight matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -] def -/calcgraysteps { -forcemaxsteps -{ -maxsteps -} -{ -/currenthalftone defed -{currenthalftone /dicttype eq}{false}ifelse -{ -currenthalftone begin -HalftoneType 4 le -{graycalcs HalftoneType 1 sub get exec} -{ -HalftoneType 5 eq -{ -Default begin -{graycalcs HalftoneType 1 sub get exec} -end -} -{0 60} -ifelse -} -ifelse -end -} -{ -currentscreen pop exch -} -ifelse -printerRes 300 max exch div exch -2 copy -sin mul round dup mul -3 1 roll -cos mul round dup mul -add 1 add -dup maxsteps gt {pop maxsteps} if -dup minsteps lt {pop minsteps} if -} -ifelse -} bdf -/nextrelease defed { -/languagelevel defed not { -/framebuffer defed { -0 40 string framebuffer 9 1 roll 8 {pop} repeat -dup 516 eq exch 520 eq or -{ -/fhnumcolors 3 def -/currentscreen {60 0 {pop pop 1}}bdf -/calcgraysteps {maxsteps} bdf -}if -}if -}if -}if -fhnumcolors 1 ne { -/calcgraysteps {maxsteps} bdf -} if -/currentpagedevice defed { -currentpagedevice /PreRenderingEnhance known -{ -currentpagedevice /PreRenderingEnhance get -{ -/calcgraysteps -{ -forcemaxsteps -{maxsteps} -{256 maxsteps min} -ifelse -} def -} if -} if -} if -/gradfrequency 144 def -printerRes 1000 lt { -/gradfrequency 72 def -} if -/adjnumsteps { -dup dtransform abs exch abs max -printerRes div -gradfrequency mul -round -5 max -min -}bdf -/goodsep { -spots exch get 4 get dup sepname eq exch (_vc_Registration) eq or -}bdf -/BeginGradation defed -{/bb{BeginGradation}bdf} -{/bb{}bdf} -ifelse -/EndGradation defed -{/eb{EndGradation}bdf} -{/eb{}bdf} -ifelse -/bottom -0 def -/delta -0 def -/frac -0 def -/height -0 def -/left -0 def -/numsteps1 -0 def -/radius -0 def -/right -0 def -/top -0 def -/width -0 def -/xt -0 def -/yt -0 def -/df currentflat def -/tempstr 1 string def -/clipflatness currentflat def -/inverted? -0 currenttransfer exec .5 ge def -/tc1 [0 0 0 1] def -/tc2 [0 0 0 1] def -/storerect{/top xdf /right xdf /bottom xdf /left xdf -/width right left sub def /height top bottom sub def}bdf -/concatprocs{ -systemdict /packedarray known -{dup type /packedarraytype eq 2 index type /packedarraytype eq or}{false}ifelse -{ -/proc2 exch cvlit def /proc1 exch cvlit def -proc1 aload pop proc2 aload pop -proc1 length proc2 length add packedarray cvx -} -{ -/proc2 exch cvlit def /proc1 exch cvlit def -/newproc proc1 length proc2 length add array def -newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval -newproc cvx -}ifelse -}bdf -/i{dup 0 eq -{pop df dup} -{dup} ifelse -/clipflatness xdf setflat -}bdf -version cvr 38.0 le -{/setrgbcolor{ -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -setrgbcolor}bdf}if -/vms {/vmsv save def} bdf -/vmr {vmsv restore} bdf -/vmrs{vmsv restore /vmsv save def}bdf -/eomode{ -{/filler /eofill load def /clipper /eoclip load def} -{/filler /fill load def /clipper /clip load def} -ifelse -}bdf -/normtaper{}bdf -/logtaper{9 mul 1 add log}bdf -/CD{ -/NF exch def -{ -exch dup -/FID ne 1 index/UniqueID ne and -{exch NF 3 1 roll put} -{pop pop} -ifelse -}forall -NF -}bdf -/MN{ -1 index length -/Len exch def -dup length Len add -string dup -Len -4 -1 roll -putinterval -dup -0 -4 -1 roll -putinterval -}bdf -/RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch -{1 index MN cvn/NewN exch def cvn -findfont dup maxlength dict CD dup/FontName NewN put dup -/Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf -/RF{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RC} -ifelse -}bdf -/FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known -{exch pop findfont 3 -1 roll pop} -{pop dup findfont dup maxlength dict CD dup dup -/Encoding exch /Encoding get 256 array copy 7 -1 roll -{3 -1 roll dup 4 -2 roll put}forall put definefont} -ifelse}bdf -/RCJ{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFJ -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFJ{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCJ} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFJ -{ -dup -hasfont -not -{ -pop -/Ryumin-Light-83pv-RKSJ-H -hasfont -{ -/Ryumin-Light-83pv-RKSJ-H -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFJ{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFJ -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/GS { -dup -hasfont -{ -findfont -exch makesetfont -exch -pop -ts -} -{ -pop pop pop -ts -} ifelse -} bdf -/RCK{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFK -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFK{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCK} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFK -{ -dup -hasfont -not -{ -pop -/JCsm -hasfont -{ -/JCsm -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFK{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFK -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/RCTC{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFTC -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFTC{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCTC} -ifelse -}bdf -/FDFTC -{ -dup -hasfont -not -{ -pop -/DFMing-Lt-HK-BF -hasfont -{ -/DFMing-Lt-HK-BF -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFTC{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFTC -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/fps{ -currentflat -exch -dup 0 le{pop 1}if -{ -dup setflat 3 index stopped -{1.3 mul dup 3 index gt{pop setflat pop pop stop}if} -{exit} -ifelse -}loop -pop setflat pop pop -}bdf -/fp{100 currentflat fps}bdf -/clipper{clip}bdf -/W{/clipper load 100 clipflatness dup setflat fps}bdf - -userdict begin /BDFontDict 29 dict def end -BDFontDict begin -/bu{}def -/bn{}def -/setTxMode{av 70 ge{pop}if pop}def -/gm{m}def -/show{pop}def -/gr{pop}def -/fnt{pop pop pop}def -/fs{pop}def -/fz{pop}def -/lin{pop pop}def -/:M {pop pop} def -/sf {pop} def -/S {pop} def -/@b {pop pop pop pop pop pop pop pop} def -/_bdsave /save load def -/_bdrestore /restore load def -/save { dup /fontsave eq {null} {_bdsave} ifelse } def -/restore { dup null eq { pop } { _bdrestore } ifelse } def -/fontsave null def -end -/MacVec 256 array def -MacVec 0 /Helvetica findfont -/Encoding get 0 128 getinterval putinterval -MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put -/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI -/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US -MacVec 0 32 getinterval astore pop -/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute -/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave -/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute -/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis -/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls -/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash -/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation -/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash -/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotleft -/guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe -/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge -/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl -/daggerdbl/periodcentered/quotesinglbase/quotedblbase -/perthousand/Acircumflex/Ecircumflex/Aacute -/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex -/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde -/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron -MacVec 128 128 getinterval astore pop -/findheaderfont { -/Helvetica findfont -} def -end %. AltsysDict -%%EndResource -%%EndProlog - -%%BeginSetup - -AltsysDict begin -_bfh - -_efh -end %. AltsysDict - -%%EndSetup -AltsysDict begin - -/onlyk4{false}ndf -/ccmyk{dup 5 -1 roll sub 0 max exch}ndf -/cmyk2gray{ -4 -1 roll 0.3 mul 4 -1 roll 0.59 mul 4 -1 roll 0.11 mul -add add add 1 min neg 1 add -}bdf -/setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf -/maxcolor { -max max max -} ndf -/maxspot { -pop -} ndf -/setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf -/findcmykcustomcolor{5 packedarray}ndf -/setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat setcmykcolor pop}ndf -/setseparationgray{setgray}ndf -/setoverprint{pop}ndf -/currentoverprint false ndf -/cmykbufs2gray{ -0 1 2 index length 1 sub -{ -4 index 1 index get 0.3 mul -4 index 2 index get 0.59 mul -4 index 3 index get 0.11 mul -4 index 4 index get -add add add cvi 255 min -255 exch sub -2 index 3 1 roll put -}for -4 1 roll pop pop pop -}bdf -/colorimage{ -pop pop -[ -5 -1 roll/exec cvx -6 -1 roll/exec cvx -7 -1 roll/exec cvx -8 -1 roll/exec cvx -/cmykbufs2gray cvx -]cvx -image -} -%. version 47.1 on Linotronic of Postscript defines colorimage incorrectly (rgb model only) -version cvr 47.1 le -statusdict /product get (Lino) anchorsearch{pop pop true}{pop false}ifelse -and{userdict begin bdf end}{ndf}ifelse -fhnumcolors 1 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -ic im iy ik cmyk2gray /xt xdf -currenttransfer -{dup 1.0 exch sub xt mul add}concatprocs -st -image -} -ifelse -}ndf -fhnumcolors 1 ne {yt restore} if -fhnumcolors 3 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -1.0 dup ic ik add min sub -1.0 dup im ik add min sub -1.0 dup iy ik add min sub -/ic xdf /iy xdf /im xdf -currentcolortransfer -4 1 roll -{dup 1.0 exch sub ic mul add}concatprocs 4 1 roll -{dup 1.0 exch sub iy mul add}concatprocs 4 1 roll -{dup 1.0 exch sub im mul add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}true 3 colorimage -} -ifelse -}ndf -fhnumcolors 3 ne {yt restore} if -fhnumcolors 4 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -currentcolortransfer -{1.0 exch sub ik mul ik sub 1 add}concatprocs 4 1 roll -{1.0 exch sub iy mul iy sub 1 add}concatprocs 4 1 roll -{1.0 exch sub im mul im sub 1 add}concatprocs 4 1 roll -{1.0 exch sub ic mul ic sub 1 add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}{dummy} -true 4 colorimage -} -ifelse -}ndf -fhnumcolors 4 ne {yt restore} if -/separationimage{image}ndf -/spotascmyk false ndf -/newcmykcustomcolor{6 packedarray}ndf -/inkoverprint false ndf -/setinkoverprint{pop}ndf -/setspotcolor { -spots exch get -dup 4 get (_vc_Registration) eq -{pop 1 exch sub setseparationgray} -{0 5 getinterval exch setcustomcolor} -ifelse -}ndf -/currentcolortransfer{currenttransfer dup dup dup}ndf -/setcolortransfer{st pop pop pop}ndf -/fas{}ndf -/sas{}ndf -/fhsetspreadsize{pop}ndf -/filler{fill}bdf -/F{gsave {filler}fp grestore}bdf -/f{closepath F}bdf -/S{gsave {stroke}fp grestore}bdf -/s{closepath S}bdf -userdict /islevel2 -systemdict /languagelevel known dup -{ -pop systemdict /languagelevel get 2 ge -} if -put -islevel2 not -{ -/currentcmykcolor -{ -0 0 0 1 currentgray sub -} ndf -} if -/tc -{ -gsave -setcmykcolor currentcmykcolor -grestore -} bind def -/testCMYKColorThrough -{ -tc add add add 0 ne -} bind def -/fhiscomposite where not { -userdict /fhiscomposite -islevel2 -{ -gsave 1 1 1 1 setcmykcolor currentcmykcolor grestore -add add add 4 eq -} -{ -1 0 0 0 testCMYKColorThrough -0 1 0 0 testCMYKColorThrough -0 0 1 0 testCMYKColorThrough -0 0 0 1 testCMYKColorThrough -and and and -} ifelse -put -} -{ pop } -ifelse -/bc4 [0 0 0 0] def -/_lfp4 { -1 pop -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -height abs adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -taperfcn /frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/bcs [0 0] def -/_lfs4 { -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -height abs adjnumsteps -dup 2 lt {pop 2} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 div taperfcn /frac xdf -bcs 0 -1.0 tint2 tint1 sub frac mul tint1 add sub -put bcs vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfs6 { -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bcs 0 -tint2 tint1 sub frac mul tint1 add -put bcs vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfp6 { -1 pop -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/lfp4{_lfp4}ndf -/lfs4{_lfs4}ndf -/rfs6{_rfs6}ndf -/rfp6{_rfp6}ndf -/cvc [0 0 0 1] def -/vc{ -AltsysDict /cvc 2 index put -aload length dup 4 eq -{pop dup -1 eq{pop setrgbcolor}{setcmykcolor}ifelse} -{6 eq {sethexcolor} {setspotcolor} ifelse } -ifelse -}bdf -0 setseparationgray -/imgr {1692.47 1570.59 1723.65 1601.77 } def -/bleed 0 def -/clpr {1692.47 1570.59 1723.65 1601.77 } def -/xs 1 def -/ys 1 def -/botx 0 def -/overlap 0 def -/wdist 18 def -0 2 mul fhsetspreadsize -0 0 ne {/df 0 def /clipflatness 0 def} if -/maxsteps 256 def -/forcemaxsteps false def -/minsteps 0 def - -userdict begin /AGDOrigMtx matrix currentmatrix def end -vms --1694 -1572 translate - -/currentpacking defed{false setpacking}if -/spots[ - -1 0 0 0 (Process Cyan) false newcmykcustomcolor - -0 1 0 0 (Process Magenta) false newcmykcustomcolor - -0 0 1 0 (Process Yellow) false newcmykcustomcolor - -0 0 0 1 (Process Black) false newcmykcustomcolor -]def -n -[] 0 d -3.863708 M -1 w -0 j -0 J -false setoverprint -0 i -false eomode -[0 0 0 1]vc -vms -q -[1 0 0 1 -249.981674 -586.867554] concat -vms -1946.9506 2177.5114 m -1954.4907 2185.0516 L -1956.7047 2187.2656 1960.2943 2187.2656 1962.5083 2185.0516 C -1970.0485 2177.5114 L -1972.2625 2175.2974 1972.2625 2171.7078 1970.0485 2169.4938 C -1962.5083 2161.9537 L -1960.2943 2159.7396 1956.7047 2159.7396 1954.4907 2161.9537 C -1946.9506 2169.4938 L -1944.7365 2171.7078 1944.7365 2175.2974 1946.9506 2177.5114 C -s -n -true eomode -1958.5469 2181.0039 m -1959.2148 2181.0039 1959.7012 2180.9296 1960.0059 2180.7813 C -1960.3142 2180.6326 1960.4684 2180.363 1960.4688 2179.9727 C -1960.4688 2179.7383 1960.3398 2178.8026 1960.082 2177.166 C -1959.0742 2170.4219 L -1958.9373 2170.3241 1958.7615 2170.2754 1958.5469 2170.2754 C -1958.3319 2170.2754 1958.1561 2170.3241 1958.0195 2170.4219 C -1957.0117 2177.166 L -1956.7539 2178.8026 1956.625 2179.7379 1956.625 2179.9727 C -1956.625 2180.363 1956.7792 2180.6326 1957.0879 2180.7813 C -1957.4003 2180.9296 1957.8866 2181.0035 1958.5469 2181.0039 C -h -1958.5469 2165.166 m -1958.0389 2165.166 1957.5878 2165.3499 1957.1934 2165.7168 C -1956.7986 2166.0837 1956.6016 2166.5485 1956.6016 2167.1113 C -1956.6016 2167.6698 1956.7891 2168.1404 1957.1641 2168.5234 C -1957.5427 2168.9102 1958.0038 2169.1035 1958.5469 2169.1035 C -1959.1094 2169.1035 1959.5741 2168.9043 1959.9414 2168.5059 C -1960.3083 2168.1074 1960.4918 2167.6423 1960.4922 2167.1113 C -1960.4922 2166.748 1960.4102 2166.4177 1960.2461 2166.1211 C -1960.082 2165.8241 1959.8513 2165.5916 1959.5547 2165.4238 C -1959.2577 2165.2521 1958.9219 2165.1664 1958.5469 2165.166 C -true setoverprint -f -false setoverprint -n -vmr -Q -false eomode -vmr -vmr -end -%%Trailer diff --git a/doc/xsl/graphics/important.pdf b/doc/xsl/graphics/important.pdf deleted file mode 100644 index f6dd589223..0000000000 Binary files a/doc/xsl/graphics/important.pdf and /dev/null differ diff --git a/doc/xsl/graphics/note.eps b/doc/xsl/graphics/note.eps deleted file mode 100644 index f5df521781..0000000000 --- a/doc/xsl/graphics/note.eps +++ /dev/null @@ -1,1387 +0,0 @@ -%!PS-Adobe-2.0 EPSF-1.2 -%%Title: Untitled-1 -%%Creator: FreeHand 9.0 -%%CreationDate: 2002/07/16 10:41 PM -%%BoundingBox: 0 0 27 27 -%%FHPathName:Untitled:FreeHand 9:English:Untitled-1 -%ALDOriginalFile:Untitled:FreeHand 9:English:Untitled-1 -%ALDBoundingBox: -153 -436 442 406 -%%FHPageNum:1 -%%DocumentSuppliedResources: procset Altsys_header 4 0 -%%ColorUsage: Color -%%DocumentProcessColors: Black -%%EndComments -%%BeginResource: procset Altsys_header 4 0 -userdict begin /AltsysDict 300 dict def end -AltsysDict begin -/bdf{bind def}bind def -/xdf{exch def}bdf -/defed{where{pop true}{false}ifelse}bdf -/ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf -/d{setdash}bdf -/h{closepath}bdf -/H{}bdf -/J{setlinecap}bdf -/j{setlinejoin}bdf -/M{setmiterlimit}bdf -/n{newpath}bdf -/N{newpath}bdf -/q{gsave}bdf -/Q{grestore}bdf -/w{setlinewidth}bdf -/Xic{matrix invertmatrix concat}bdf -/Xq{matrix currentmatrix mark}bdf -/XQ{cleartomark setmatrix}bdf -/sepdef{ -dup where not -{ -AltsysSepDict -} -if -3 1 roll exch put -}bdf -/st{settransfer}bdf -/colorimage defed /_rci xdf -/cntr 0 def -/readbinarystring{ -/cntr 0 def -2 copy readstring -{ -{ -dup -(\034) search -{ -length exch pop exch -dup length 0 ne -{ -dup dup 0 get 32 sub 0 exch put -/cntr cntr 1 add def -} -{ -pop 1 string dup -0 6 index read pop 32 sub put -}ifelse -3 copy -putinterval pop -1 add -1 index length 1 sub -1 index sub -dup 0 le {pop pop exit}if -getinterval -} -{ -pop exit -} ifelse -} loop -}if -cntr 0 gt -{ -pop 2 copy -dup length cntr sub cntr getinterval -readbinarystring -} if -pop exch pop -} bdf -/_NXLevel1 defed { -_NXLevel1 not { -/colorimage where { -userdict eq { -/_rci false def -} if -} if -} if -} if -/md defed{ -md type /dicttype eq { -/colorimage where { -md eq { -/_rci false def -}if -}if -/settransfer where { -md eq { -/st systemdict /settransfer get def -}if -}if -}if -}if -/setstrokeadjust defed -{ -true setstrokeadjust -/C{curveto}bdf -/L{lineto}bdf -/m{moveto}bdf -} -{ -/dr{transform .25 sub round .25 add -exch .25 sub round .25 add exch itransform}bdf -/C{dr curveto}bdf -/L{dr lineto}bdf -/m{dr moveto}bdf -/setstrokeadjust{pop}bdf -}ifelse -/privrectpath { -4 -2 roll m -dtransform round exch round exch idtransform -2 copy 0 lt exch 0 lt xor -{dup 0 exch rlineto exch 0 rlineto neg 0 exch rlineto} -{exch dup 0 rlineto exch 0 exch rlineto neg 0 rlineto} -ifelse -closepath -}bdf -/rectclip{newpath privrectpath clip newpath}def -/rectfill{gsave newpath privrectpath fill grestore}def -/rectstroke{gsave newpath privrectpath stroke grestore}def -/_fonthacksave false def -/currentpacking defed -{ -/_bfh {/_fonthacksave currentpacking def false setpacking} bdf -/_efh {_fonthacksave setpacking} bdf -} -{ -/_bfh {} bdf -/_efh {} bdf -}ifelse -/packedarray{array astore readonly}ndf -/` -{ -false setoverprint -/-save0- save def -5 index concat -pop -storerect left bottom width height rectclip -pop -/MMdict_count countdictstack def -/MMop_count count 1 sub def -userdict begin -/showpage {} def -0 setgray 0 setlinecap 1 setlinewidth -0 setlinejoin 10 setmiterlimit [] 0 setdash newpath -} bdf -/currentpacking defed{true setpacking}if -/min{2 copy gt{exch}if pop}bdf -/max{2 copy lt{exch}if pop}bdf -/xformfont { currentfont exch makefont setfont } bdf -/fhnumcolors 1 -statusdict begin -/processcolors defed -{ -pop processcolors -} -{ -/deviceinfo defed { -deviceinfo /Colors known { -pop deviceinfo /Colors get -} if -} if -} ifelse -end -def -/printerRes -gsave -matrix defaultmatrix setmatrix -72 72 dtransform -abs exch abs -max -grestore -def -/graycalcs -[ -{Angle Frequency} -{GrayAngle GrayFrequency} -{0 Width Height matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -{0 GrayWidth GrayHeight matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -] def -/calcgraysteps { -forcemaxsteps -{ -maxsteps -} -{ -/currenthalftone defed -{currenthalftone /dicttype eq}{false}ifelse -{ -currenthalftone begin -HalftoneType 4 le -{graycalcs HalftoneType 1 sub get exec} -{ -HalftoneType 5 eq -{ -Default begin -{graycalcs HalftoneType 1 sub get exec} -end -} -{0 60} -ifelse -} -ifelse -end -} -{ -currentscreen pop exch -} -ifelse -printerRes 300 max exch div exch -2 copy -sin mul round dup mul -3 1 roll -cos mul round dup mul -add 1 add -dup maxsteps gt {pop maxsteps} if -dup minsteps lt {pop minsteps} if -} -ifelse -} bdf -/nextrelease defed { -/languagelevel defed not { -/framebuffer defed { -0 40 string framebuffer 9 1 roll 8 {pop} repeat -dup 516 eq exch 520 eq or -{ -/fhnumcolors 3 def -/currentscreen {60 0 {pop pop 1}}bdf -/calcgraysteps {maxsteps} bdf -}if -}if -}if -}if -fhnumcolors 1 ne { -/calcgraysteps {maxsteps} bdf -} if -/currentpagedevice defed { -currentpagedevice /PreRenderingEnhance known -{ -currentpagedevice /PreRenderingEnhance get -{ -/calcgraysteps -{ -forcemaxsteps -{maxsteps} -{256 maxsteps min} -ifelse -} def -} if -} if -} if -/gradfrequency 144 def -printerRes 1000 lt { -/gradfrequency 72 def -} if -/adjnumsteps { -dup dtransform abs exch abs max -printerRes div -gradfrequency mul -round -5 max -min -}bdf -/goodsep { -spots exch get 4 get dup sepname eq exch (_vc_Registration) eq or -}bdf -/BeginGradation defed -{/bb{BeginGradation}bdf} -{/bb{}bdf} -ifelse -/EndGradation defed -{/eb{EndGradation}bdf} -{/eb{}bdf} -ifelse -/bottom -0 def -/delta -0 def -/frac -0 def -/height -0 def -/left -0 def -/numsteps1 -0 def -/radius -0 def -/right -0 def -/top -0 def -/width -0 def -/xt -0 def -/yt -0 def -/df currentflat def -/tempstr 1 string def -/clipflatness currentflat def -/inverted? -0 currenttransfer exec .5 ge def -/tc1 [0 0 0 1] def -/tc2 [0 0 0 1] def -/storerect{/top xdf /right xdf /bottom xdf /left xdf -/width right left sub def /height top bottom sub def}bdf -/concatprocs{ -systemdict /packedarray known -{dup type /packedarraytype eq 2 index type /packedarraytype eq or}{false}ifelse -{ -/proc2 exch cvlit def /proc1 exch cvlit def -proc1 aload pop proc2 aload pop -proc1 length proc2 length add packedarray cvx -} -{ -/proc2 exch cvlit def /proc1 exch cvlit def -/newproc proc1 length proc2 length add array def -newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval -newproc cvx -}ifelse -}bdf -/i{dup 0 eq -{pop df dup} -{dup} ifelse -/clipflatness xdf setflat -}bdf -version cvr 38.0 le -{/setrgbcolor{ -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -setrgbcolor}bdf}if -/vms {/vmsv save def} bdf -/vmr {vmsv restore} bdf -/vmrs{vmsv restore /vmsv save def}bdf -/eomode{ -{/filler /eofill load def /clipper /eoclip load def} -{/filler /fill load def /clipper /clip load def} -ifelse -}bdf -/normtaper{}bdf -/logtaper{9 mul 1 add log}bdf -/CD{ -/NF exch def -{ -exch dup -/FID ne 1 index/UniqueID ne and -{exch NF 3 1 roll put} -{pop pop} -ifelse -}forall -NF -}bdf -/MN{ -1 index length -/Len exch def -dup length Len add -string dup -Len -4 -1 roll -putinterval -dup -0 -4 -1 roll -putinterval -}bdf -/RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch -{1 index MN cvn/NewN exch def cvn -findfont dup maxlength dict CD dup/FontName NewN put dup -/Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf -/RF{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RC} -ifelse -}bdf -/FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known -{exch pop findfont 3 -1 roll pop} -{pop dup findfont dup maxlength dict CD dup dup -/Encoding exch /Encoding get 256 array copy 7 -1 roll -{3 -1 roll dup 4 -2 roll put}forall put definefont} -ifelse}bdf -/RCJ{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFJ -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFJ{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCJ} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFJ -{ -dup -hasfont -not -{ -pop -/Ryumin-Light-83pv-RKSJ-H -hasfont -{ -/Ryumin-Light-83pv-RKSJ-H -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFJ{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFJ -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/GS { -dup -hasfont -{ -findfont -exch makesetfont -exch -pop -ts -} -{ -pop pop pop -ts -} ifelse -} bdf -/RCK{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFK -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFK{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCK} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFK -{ -dup -hasfont -not -{ -pop -/JCsm -hasfont -{ -/JCsm -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFK{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFK -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/RCTC{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFTC -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFTC{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCTC} -ifelse -}bdf -/FDFTC -{ -dup -hasfont -not -{ -pop -/DFMing-Lt-HK-BF -hasfont -{ -/DFMing-Lt-HK-BF -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFTC{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFTC -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/fps{ -currentflat -exch -dup 0 le{pop 1}if -{ -dup setflat 3 index stopped -{1.3 mul dup 3 index gt{pop setflat pop pop stop}if} -{exit} -ifelse -}loop -pop setflat pop pop -}bdf -/fp{100 currentflat fps}bdf -/clipper{clip}bdf -/W{/clipper load 100 clipflatness dup setflat fps}bdf - -userdict begin /BDFontDict 29 dict def end -BDFontDict begin -/bu{}def -/bn{}def -/setTxMode{av 70 ge{pop}if pop}def -/gm{m}def -/show{pop}def -/gr{pop}def -/fnt{pop pop pop}def -/fs{pop}def -/fz{pop}def -/lin{pop pop}def -/:M {pop pop} def -/sf {pop} def -/S {pop} def -/@b {pop pop pop pop pop pop pop pop} def -/_bdsave /save load def -/_bdrestore /restore load def -/save { dup /fontsave eq {null} {_bdsave} ifelse } def -/restore { dup null eq { pop } { _bdrestore } ifelse } def -/fontsave null def -end -/MacVec 256 array def -MacVec 0 /Helvetica findfont -/Encoding get 0 128 getinterval putinterval -MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put -/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI -/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US -MacVec 0 32 getinterval astore pop -/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute -/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave -/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute -/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis -/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls -/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash -/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation -/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash -/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotleft -/guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe -/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge -/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl -/daggerdbl/periodcentered/quotesinglbase/quotedblbase -/perthousand/Acircumflex/Ecircumflex/Aacute -/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex -/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde -/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron -MacVec 128 128 getinterval astore pop -/findheaderfont { -/Helvetica findfont -} def -end %. AltsysDict -%%EndResource -%%EndProlog - -%%BeginSetup - -AltsysDict begin -_bfh - -_efh -end %. AltsysDict - -%%EndSetup -AltsysDict begin - -/onlyk4{false}ndf -/ccmyk{dup 5 -1 roll sub 0 max exch}ndf -/cmyk2gray{ -4 -1 roll 0.3 mul 4 -1 roll 0.59 mul 4 -1 roll 0.11 mul -add add add 1 min neg 1 add -}bdf -/setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf -/maxcolor { -max max max -} ndf -/maxspot { -pop -} ndf -/setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf -/findcmykcustomcolor{5 packedarray}ndf -/setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat setcmykcolor pop}ndf -/setseparationgray{setgray}ndf -/setoverprint{pop}ndf -/currentoverprint false ndf -/cmykbufs2gray{ -0 1 2 index length 1 sub -{ -4 index 1 index get 0.3 mul -4 index 2 index get 0.59 mul -4 index 3 index get 0.11 mul -4 index 4 index get -add add add cvi 255 min -255 exch sub -2 index 3 1 roll put -}for -4 1 roll pop pop pop -}bdf -/colorimage{ -pop pop -[ -5 -1 roll/exec cvx -6 -1 roll/exec cvx -7 -1 roll/exec cvx -8 -1 roll/exec cvx -/cmykbufs2gray cvx -]cvx -image -} -%. version 47.1 on Linotronic of Postscript defines colorimage incorrectly (rgb model only) -version cvr 47.1 le -statusdict /product get (Lino) anchorsearch{pop pop true}{pop false}ifelse -and{userdict begin bdf end}{ndf}ifelse -fhnumcolors 1 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -ic im iy ik cmyk2gray /xt xdf -currenttransfer -{dup 1.0 exch sub xt mul add}concatprocs -st -image -} -ifelse -}ndf -fhnumcolors 1 ne {yt restore} if -fhnumcolors 3 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -1.0 dup ic ik add min sub -1.0 dup im ik add min sub -1.0 dup iy ik add min sub -/ic xdf /iy xdf /im xdf -currentcolortransfer -4 1 roll -{dup 1.0 exch sub ic mul add}concatprocs 4 1 roll -{dup 1.0 exch sub iy mul add}concatprocs 4 1 roll -{dup 1.0 exch sub im mul add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}true 3 colorimage -} -ifelse -}ndf -fhnumcolors 3 ne {yt restore} if -fhnumcolors 4 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -currentcolortransfer -{1.0 exch sub ik mul ik sub 1 add}concatprocs 4 1 roll -{1.0 exch sub iy mul iy sub 1 add}concatprocs 4 1 roll -{1.0 exch sub im mul im sub 1 add}concatprocs 4 1 roll -{1.0 exch sub ic mul ic sub 1 add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}{dummy} -true 4 colorimage -} -ifelse -}ndf -fhnumcolors 4 ne {yt restore} if -/separationimage{image}ndf -/spotascmyk false ndf -/newcmykcustomcolor{6 packedarray}ndf -/inkoverprint false ndf -/setinkoverprint{pop}ndf -/setspotcolor { -spots exch get -dup 4 get (_vc_Registration) eq -{pop 1 exch sub setseparationgray} -{0 5 getinterval exch setcustomcolor} -ifelse -}ndf -/currentcolortransfer{currenttransfer dup dup dup}ndf -/setcolortransfer{st pop pop pop}ndf -/fas{}ndf -/sas{}ndf -/fhsetspreadsize{pop}ndf -/filler{fill}bdf -/F{gsave {filler}fp grestore}bdf -/f{closepath F}bdf -/S{gsave {stroke}fp grestore}bdf -/s{closepath S}bdf -userdict /islevel2 -systemdict /languagelevel known dup -{ -pop systemdict /languagelevel get 2 ge -} if -put -islevel2 not -{ -/currentcmykcolor -{ -0 0 0 1 currentgray sub -} ndf -} if -/tc -{ -gsave -setcmykcolor currentcmykcolor -grestore -} bind def -/testCMYKColorThrough -{ -tc add add add 0 ne -} bind def -/fhiscomposite where not { -userdict /fhiscomposite -islevel2 -{ -gsave 1 1 1 1 setcmykcolor currentcmykcolor grestore -add add add 4 eq -} -{ -1 0 0 0 testCMYKColorThrough -0 1 0 0 testCMYKColorThrough -0 0 1 0 testCMYKColorThrough -0 0 0 1 testCMYKColorThrough -and and and -} ifelse -put -} -{ pop } -ifelse -/bc4 [0 0 0 0] def -/_lfp4 { -1 pop -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -height abs adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -taperfcn /frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/bcs [0 0] def -/_lfs4 { -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -height abs adjnumsteps -dup 2 lt {pop 2} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 div taperfcn /frac xdf -bcs 0 -1.0 tint2 tint1 sub frac mul tint1 add sub -put bcs vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfs6 { -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bcs 0 -tint2 tint1 sub frac mul tint1 add -put bcs vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfp6 { -1 pop -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/lfp4{_lfp4}ndf -/lfs4{_lfs4}ndf -/rfs6{_rfs6}ndf -/rfp6{_rfp6}ndf -/cvc [0 0 0 1] def -/vc{ -AltsysDict /cvc 2 index put -aload length dup 4 eq -{pop dup -1 eq{pop setrgbcolor}{setcmykcolor}ifelse} -{6 eq {sethexcolor} {setspotcolor} ifelse } -ifelse -}bdf -0 setseparationgray -/imgr {1692.47 1570.59 2287.75 2412.48 } def -/bleed 0 def -/clpr {1692.47 1570.59 2287.75 2412.48 } def -/xs 1 def -/ys 1 def -/botx 0 def -/overlap 0 def -/wdist 18 def -0 2 mul fhsetspreadsize -0 0 ne {/df 0 def /clipflatness 0 def} if -/maxsteps 256 def -/forcemaxsteps false def -/minsteps 0 def - -userdict begin /AGDOrigMtx matrix currentmatrix def end -vms -0.15 0.15 scale %JND --1845 -2006 translate - -/currentpacking defed{false setpacking}if -/spots[ - -1 0 0 0 (Process Cyan) false newcmykcustomcolor - -0 1 0 0 (Process Magenta) false newcmykcustomcolor - -0 0 1 0 (Process Yellow) false newcmykcustomcolor - -0 0 0 1 (Process Black) false newcmykcustomcolor -]def -n -[] 0 d -3.863708 M -1 w -0 j -0 J -false setoverprint -0 i -false eomode -[0 0 0 1]vc -vms -1848.4365 2094.0422 m -1848.4365 2140.987 1886.4917 2179.0422 1933.4365 2179.0422 C -1980.3813 2179.0422 2018.4365 2140.987 2018.4365 2094.0422 C -2018.4365 2047.0974 1980.3813 2009.0422 1933.4365 2009.0422 C -1886.4917 2009.0422 1848.4365 2047.0974 1848.4365 2094.0422 C -5.3858 w -3.863693 M -s -n -true eomode -1880.5612 2118.7403 m -1880.5612 2121.7396 1881.6862 2124.8795 1883.9362 2128.1622 C -1886.1862 2131.4889 1888.4581 2133.1522 1890.7565 2133.1544 C -1892.2089 2133.1544 1893.4042 2132.5677 1894.3424 2131.3966 C -1895.3268 2130.2233 1895.819 2128.7467 1895.819 2126.9669 C -1895.819 2124.0599 1894.6237 2121.0826 1892.233 2118.0372 C -1889.8885 2114.9896 1887.6144 2113.4669 1885.4127 2113.4669 C -1884.0526 2113.4669 1882.9034 2113.9591 1881.9674 2114.9435 C -1881.0292 2115.974 1880.5612 2117.2396 1880.5612 2118.7403 C -h -1948.2018 2061.1544 m -1978.4362 2061.0138 L -1980.451 2062.6068 1981.9034 2064.3163 1982.7955 2066.1466 C -1983.7316 2068.0209 1984.1996 2070.2005 1984.2018 2072.6857 C -1984.2018 2073.2482 L -1969.2252 2099.6153 L -1969.2252 2099.3341 1969.2472 2098.8639 1969.2955 2098.2091 C -1969.3417 2097.5983 1969.3636 2097.1544 1969.3658 2096.8732 C -1969.3658 2089.888 1967.5597 2083.3732 1963.9518 2077.3263 C -1960.3878 2071.2794 1955.1385 2065.8873 1948.2018 2061.1544 C -h -1905.8737 2139.4825 m -1910.0924 2124.2247 L -1964.233 2092.5841 L -1964.6066 2094.3177 1964.8636 2095.724 1965.0065 2096.8028 C -1965.1471 2097.9278 1965.2174 2098.9122 1965.2174 2099.756 C -1965.2174 2100.4108 1965.1691 2101.5599 1965.0768 2103.2013 C -1964.9823 2103.5748 1964.9362 2103.8561 1964.9362 2104.045 C -1905.8737 2139.4825 L -h -1908.4752 2120.3575 m -1898.983 2105.5216 L -1954.3893 2072.8263 L -1956.4987 2074.7005 1958.2565 2076.8561 1959.6627 2079.295 C -1961.1151 2081.7779 1962.2863 2084.6608 1963.1783 2087.9435 C -1908.4752 2120.3575 L -h -1896.2408 2102.3575 m -1880.5612 2099.0528 L -1942.9283 2062.631 L -1944.5675 2063.5209 1946.0682 2064.5272 1947.4283 2065.6544 C -1948.7863 2066.7794 1950.0057 2068.0209 1951.0846 2069.381 C -1896.2408 2102.3575 L -h -1871.2096 2120.7794 m -1876.3424 2102.3575 L -1894.2018 2105.9435 L -1906.1549 2125.2794 L -1900.8815 2142.506 L -1882.7408 2139.2013 L -1871.2096 2120.7794 L -h -1866.7096 2121.4825 m -1880.1393 2142.3653 L -1901.3033 2146.5841 L -1963.6705 2109.3888 L -1968.0299 2106.8092 1971.005 2103.9747 1972.6002 2100.881 C -1972.8815 2100.2701 1973.1144 2099.8021 1973.3033 2099.4747 C -1991.444 2068.256 L -1991.6769 2067.8341 1992.0043 2067.2474 1992.4283 2066.4982 C -1994.0675 2064.013 1994.8871 2062.0904 1994.8893 2060.7325 C -1994.8893 2059.4186 1994.3971 2058.4825 1993.4127 2057.92 C -1992.4745 2057.4037 1990.6705 2057.1466 1987.9987 2057.1466 C -1948.0612 2057.1466 L -1946.4198 2057.1466 1944.7784 2057.4037 1943.1393 2057.92 C -1941.4979 2058.4825 1939.4127 2059.513 1936.8815 2061.0138 C -1873.6705 2098.631 L -1866.7096 2121.4825 L -true setoverprint -f -false setoverprint -n -vmr -vmr -end -%%Trailer diff --git a/doc/xsl/graphics/note.pdf b/doc/xsl/graphics/note.pdf deleted file mode 100644 index ec6c248a2a..0000000000 Binary files a/doc/xsl/graphics/note.pdf and /dev/null differ diff --git a/doc/xsl/graphics/tip.eps b/doc/xsl/graphics/tip.eps deleted file mode 100644 index 0edd2ef792..0000000000 --- a/doc/xsl/graphics/tip.eps +++ /dev/null @@ -1,1503 +0,0 @@ -%!PS-Adobe-2.0 EPSF-1.2 -%%Title: Untitled-1 -%%Creator: FreeHand 9.0 -%%CreationDate: 2002/07/16 10:41 PM -%%BoundingBox: 0 0 27 27 -%%FHPathName:Untitled:FreeHand 9:English:Untitled-1 -%ALDOriginalFile:Untitled:FreeHand 9:English:Untitled-1 -%ALDBoundingBox: -153 -436 442 406 -%%FHPageNum:1 -%%DocumentSuppliedResources: procset Altsys_header 4 0 -%%ColorUsage: Color -%%DocumentProcessColors: Black -%%EndComments -%%BeginResource: procset Altsys_header 4 0 -userdict begin /AltsysDict 300 dict def end -AltsysDict begin -/bdf{bind def}bind def -/xdf{exch def}bdf -/defed{where{pop true}{false}ifelse}bdf -/ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf -/d{setdash}bdf -/h{closepath}bdf -/H{}bdf -/J{setlinecap}bdf -/j{setlinejoin}bdf -/M{setmiterlimit}bdf -/n{newpath}bdf -/N{newpath}bdf -/q{gsave}bdf -/Q{grestore}bdf -/w{setlinewidth}bdf -/Xic{matrix invertmatrix concat}bdf -/Xq{matrix currentmatrix mark}bdf -/XQ{cleartomark setmatrix}bdf -/sepdef{ -dup where not -{ -AltsysSepDict -} -if -3 1 roll exch put -}bdf -/st{settransfer}bdf -/colorimage defed /_rci xdf -/cntr 0 def -/readbinarystring{ -/cntr 0 def -2 copy readstring -{ -{ -dup -(\034) search -{ -length exch pop exch -dup length 0 ne -{ -dup dup 0 get 32 sub 0 exch put -/cntr cntr 1 add def -} -{ -pop 1 string dup -0 6 index read pop 32 sub put -}ifelse -3 copy -putinterval pop -1 add -1 index length 1 sub -1 index sub -dup 0 le {pop pop exit}if -getinterval -} -{ -pop exit -} ifelse -} loop -}if -cntr 0 gt -{ -pop 2 copy -dup length cntr sub cntr getinterval -readbinarystring -} if -pop exch pop -} bdf -/_NXLevel1 defed { -_NXLevel1 not { -/colorimage where { -userdict eq { -/_rci false def -} if -} if -} if -} if -/md defed{ -md type /dicttype eq { -/colorimage where { -md eq { -/_rci false def -}if -}if -/settransfer where { -md eq { -/st systemdict /settransfer get def -}if -}if -}if -}if -/setstrokeadjust defed -{ -true setstrokeadjust -/C{curveto}bdf -/L{lineto}bdf -/m{moveto}bdf -} -{ -/dr{transform .25 sub round .25 add -exch .25 sub round .25 add exch itransform}bdf -/C{dr curveto}bdf -/L{dr lineto}bdf -/m{dr moveto}bdf -/setstrokeadjust{pop}bdf -}ifelse -/privrectpath { -4 -2 roll m -dtransform round exch round exch idtransform -2 copy 0 lt exch 0 lt xor -{dup 0 exch rlineto exch 0 rlineto neg 0 exch rlineto} -{exch dup 0 rlineto exch 0 exch rlineto neg 0 rlineto} -ifelse -closepath -}bdf -/rectclip{newpath privrectpath clip newpath}def -/rectfill{gsave newpath privrectpath fill grestore}def -/rectstroke{gsave newpath privrectpath stroke grestore}def -/_fonthacksave false def -/currentpacking defed -{ -/_bfh {/_fonthacksave currentpacking def false setpacking} bdf -/_efh {_fonthacksave setpacking} bdf -} -{ -/_bfh {} bdf -/_efh {} bdf -}ifelse -/packedarray{array astore readonly}ndf -/` -{ -false setoverprint -/-save0- save def -5 index concat -pop -storerect left bottom width height rectclip -pop -/MMdict_count countdictstack def -/MMop_count count 1 sub def -userdict begin -/showpage {} def -0 setgray 0 setlinecap 1 setlinewidth -0 setlinejoin 10 setmiterlimit [] 0 setdash newpath -} bdf -/currentpacking defed{true setpacking}if -/min{2 copy gt{exch}if pop}bdf -/max{2 copy lt{exch}if pop}bdf -/xformfont { currentfont exch makefont setfont } bdf -/fhnumcolors 1 -statusdict begin -/processcolors defed -{ -pop processcolors -} -{ -/deviceinfo defed { -deviceinfo /Colors known { -pop deviceinfo /Colors get -} if -} if -} ifelse -end -def -/printerRes -gsave -matrix defaultmatrix setmatrix -72 72 dtransform -abs exch abs -max -grestore -def -/graycalcs -[ -{Angle Frequency} -{GrayAngle GrayFrequency} -{0 Width Height matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -{0 GrayWidth GrayHeight matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -] def -/calcgraysteps { -forcemaxsteps -{ -maxsteps -} -{ -/currenthalftone defed -{currenthalftone /dicttype eq}{false}ifelse -{ -currenthalftone begin -HalftoneType 4 le -{graycalcs HalftoneType 1 sub get exec} -{ -HalftoneType 5 eq -{ -Default begin -{graycalcs HalftoneType 1 sub get exec} -end -} -{0 60} -ifelse -} -ifelse -end -} -{ -currentscreen pop exch -} -ifelse -printerRes 300 max exch div exch -2 copy -sin mul round dup mul -3 1 roll -cos mul round dup mul -add 1 add -dup maxsteps gt {pop maxsteps} if -dup minsteps lt {pop minsteps} if -} -ifelse -} bdf -/nextrelease defed { -/languagelevel defed not { -/framebuffer defed { -0 40 string framebuffer 9 1 roll 8 {pop} repeat -dup 516 eq exch 520 eq or -{ -/fhnumcolors 3 def -/currentscreen {60 0 {pop pop 1}}bdf -/calcgraysteps {maxsteps} bdf -}if -}if -}if -}if -fhnumcolors 1 ne { -/calcgraysteps {maxsteps} bdf -} if -/currentpagedevice defed { -currentpagedevice /PreRenderingEnhance known -{ -currentpagedevice /PreRenderingEnhance get -{ -/calcgraysteps -{ -forcemaxsteps -{maxsteps} -{256 maxsteps min} -ifelse -} def -} if -} if -} if -/gradfrequency 144 def -printerRes 1000 lt { -/gradfrequency 72 def -} if -/adjnumsteps { -dup dtransform abs exch abs max -printerRes div -gradfrequency mul -round -5 max -min -}bdf -/goodsep { -spots exch get 4 get dup sepname eq exch (_vc_Registration) eq or -}bdf -/BeginGradation defed -{/bb{BeginGradation}bdf} -{/bb{}bdf} -ifelse -/EndGradation defed -{/eb{EndGradation}bdf} -{/eb{}bdf} -ifelse -/bottom -0 def -/delta -0 def -/frac -0 def -/height -0 def -/left -0 def -/numsteps1 -0 def -/radius -0 def -/right -0 def -/top -0 def -/width -0 def -/xt -0 def -/yt -0 def -/df currentflat def -/tempstr 1 string def -/clipflatness currentflat def -/inverted? -0 currenttransfer exec .5 ge def -/tc1 [0 0 0 1] def -/tc2 [0 0 0 1] def -/storerect{/top xdf /right xdf /bottom xdf /left xdf -/width right left sub def /height top bottom sub def}bdf -/concatprocs{ -systemdict /packedarray known -{dup type /packedarraytype eq 2 index type /packedarraytype eq or}{false}ifelse -{ -/proc2 exch cvlit def /proc1 exch cvlit def -proc1 aload pop proc2 aload pop -proc1 length proc2 length add packedarray cvx -} -{ -/proc2 exch cvlit def /proc1 exch cvlit def -/newproc proc1 length proc2 length add array def -newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval -newproc cvx -}ifelse -}bdf -/i{dup 0 eq -{pop df dup} -{dup} ifelse -/clipflatness xdf setflat -}bdf -version cvr 38.0 le -{/setrgbcolor{ -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -setrgbcolor}bdf}if -/vms {/vmsv save def} bdf -/vmr {vmsv restore} bdf -/vmrs{vmsv restore /vmsv save def}bdf -/eomode{ -{/filler /eofill load def /clipper /eoclip load def} -{/filler /fill load def /clipper /clip load def} -ifelse -}bdf -/normtaper{}bdf -/logtaper{9 mul 1 add log}bdf -/CD{ -/NF exch def -{ -exch dup -/FID ne 1 index/UniqueID ne and -{exch NF 3 1 roll put} -{pop pop} -ifelse -}forall -NF -}bdf -/MN{ -1 index length -/Len exch def -dup length Len add -string dup -Len -4 -1 roll -putinterval -dup -0 -4 -1 roll -putinterval -}bdf -/RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch -{1 index MN cvn/NewN exch def cvn -findfont dup maxlength dict CD dup/FontName NewN put dup -/Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf -/RF{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RC} -ifelse -}bdf -/FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known -{exch pop findfont 3 -1 roll pop} -{pop dup findfont dup maxlength dict CD dup dup -/Encoding exch /Encoding get 256 array copy 7 -1 roll -{3 -1 roll dup 4 -2 roll put}forall put definefont} -ifelse}bdf -/RCJ{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFJ -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFJ{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCJ} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFJ -{ -dup -hasfont -not -{ -pop -/Ryumin-Light-83pv-RKSJ-H -hasfont -{ -/Ryumin-Light-83pv-RKSJ-H -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFJ{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFJ -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/GS { -dup -hasfont -{ -findfont -exch makesetfont -exch -pop -ts -} -{ -pop pop pop -ts -} ifelse -} bdf -/RCK{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFK -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFK{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCK} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFK -{ -dup -hasfont -not -{ -pop -/JCsm -hasfont -{ -/JCsm -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFK{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFK -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/RCTC{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFTC -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFTC{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCTC} -ifelse -}bdf -/FDFTC -{ -dup -hasfont -not -{ -pop -/DFMing-Lt-HK-BF -hasfont -{ -/DFMing-Lt-HK-BF -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFTC{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFTC -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/fps{ -currentflat -exch -dup 0 le{pop 1}if -{ -dup setflat 3 index stopped -{1.3 mul dup 3 index gt{pop setflat pop pop stop}if} -{exit} -ifelse -}loop -pop setflat pop pop -}bdf -/fp{100 currentflat fps}bdf -/clipper{clip}bdf -/W{/clipper load 100 clipflatness dup setflat fps}bdf - -userdict begin /BDFontDict 29 dict def end -BDFontDict begin -/bu{}def -/bn{}def -/setTxMode{av 70 ge{pop}if pop}def -/gm{m}def -/show{pop}def -/gr{pop}def -/fnt{pop pop pop}def -/fs{pop}def -/fz{pop}def -/lin{pop pop}def -/:M {pop pop} def -/sf {pop} def -/S {pop} def -/@b {pop pop pop pop pop pop pop pop} def -/_bdsave /save load def -/_bdrestore /restore load def -/save { dup /fontsave eq {null} {_bdsave} ifelse } def -/restore { dup null eq { pop } { _bdrestore } ifelse } def -/fontsave null def -end -/MacVec 256 array def -MacVec 0 /Helvetica findfont -/Encoding get 0 128 getinterval putinterval -MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put -/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI -/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US -MacVec 0 32 getinterval astore pop -/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute -/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave -/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute -/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis -/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls -/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash -/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation -/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash -/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotleft -/guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe -/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge -/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl -/daggerdbl/periodcentered/quotesinglbase/quotedblbase -/perthousand/Acircumflex/Ecircumflex/Aacute -/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex -/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde -/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron -MacVec 128 128 getinterval astore pop -/findheaderfont { -/Helvetica findfont -} def -end %. AltsysDict -%%EndResource -%%EndProlog - -%%BeginSetup - -AltsysDict begin -_bfh - -_efh -end %. AltsysDict - -%%EndSetup -AltsysDict begin - -/onlyk4{false}ndf -/ccmyk{dup 5 -1 roll sub 0 max exch}ndf -/cmyk2gray{ -4 -1 roll 0.3 mul 4 -1 roll 0.59 mul 4 -1 roll 0.11 mul -add add add 1 min neg 1 add -}bdf -/setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf -/maxcolor { -max max max -} ndf -/maxspot { -pop -} ndf -/setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf -/findcmykcustomcolor{5 packedarray}ndf -/setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat setcmykcolor pop}ndf -/setseparationgray{setgray}ndf -/setoverprint{pop}ndf -/currentoverprint false ndf -/cmykbufs2gray{ -0 1 2 index length 1 sub -{ -4 index 1 index get 0.3 mul -4 index 2 index get 0.59 mul -4 index 3 index get 0.11 mul -4 index 4 index get -add add add cvi 255 min -255 exch sub -2 index 3 1 roll put -}for -4 1 roll pop pop pop -}bdf -/colorimage{ -pop pop -[ -5 -1 roll/exec cvx -6 -1 roll/exec cvx -7 -1 roll/exec cvx -8 -1 roll/exec cvx -/cmykbufs2gray cvx -]cvx -image -} -%. version 47.1 on Linotronic of Postscript defines colorimage incorrectly (rgb model only) -version cvr 47.1 le -statusdict /product get (Lino) anchorsearch{pop pop true}{pop false}ifelse -and{userdict begin bdf end}{ndf}ifelse -fhnumcolors 1 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -ic im iy ik cmyk2gray /xt xdf -currenttransfer -{dup 1.0 exch sub xt mul add}concatprocs -st -image -} -ifelse -}ndf -fhnumcolors 1 ne {yt restore} if -fhnumcolors 3 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -1.0 dup ic ik add min sub -1.0 dup im ik add min sub -1.0 dup iy ik add min sub -/ic xdf /iy xdf /im xdf -currentcolortransfer -4 1 roll -{dup 1.0 exch sub ic mul add}concatprocs 4 1 roll -{dup 1.0 exch sub iy mul add}concatprocs 4 1 roll -{dup 1.0 exch sub im mul add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}true 3 colorimage -} -ifelse -}ndf -fhnumcolors 3 ne {yt restore} if -fhnumcolors 4 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -currentcolortransfer -{1.0 exch sub ik mul ik sub 1 add}concatprocs 4 1 roll -{1.0 exch sub iy mul iy sub 1 add}concatprocs 4 1 roll -{1.0 exch sub im mul im sub 1 add}concatprocs 4 1 roll -{1.0 exch sub ic mul ic sub 1 add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}{dummy} -true 4 colorimage -} -ifelse -}ndf -fhnumcolors 4 ne {yt restore} if -/separationimage{image}ndf -/spotascmyk false ndf -/newcmykcustomcolor{6 packedarray}ndf -/inkoverprint false ndf -/setinkoverprint{pop}ndf -/setspotcolor { -spots exch get -dup 4 get (_vc_Registration) eq -{pop 1 exch sub setseparationgray} -{0 5 getinterval exch setcustomcolor} -ifelse -}ndf -/currentcolortransfer{currenttransfer dup dup dup}ndf -/setcolortransfer{st pop pop pop}ndf -/fas{}ndf -/sas{}ndf -/fhsetspreadsize{pop}ndf -/filler{fill}bdf -/F{gsave {filler}fp grestore}bdf -/f{closepath F}bdf -/S{gsave {stroke}fp grestore}bdf -/s{closepath S}bdf -userdict /islevel2 -systemdict /languagelevel known dup -{ -pop systemdict /languagelevel get 2 ge -} if -put -islevel2 not -{ -/currentcmykcolor -{ -0 0 0 1 currentgray sub -} ndf -} if -/tc -{ -gsave -setcmykcolor currentcmykcolor -grestore -} bind def -/testCMYKColorThrough -{ -tc add add add 0 ne -} bind def -/fhiscomposite where not { -userdict /fhiscomposite -islevel2 -{ -gsave 1 1 1 1 setcmykcolor currentcmykcolor grestore -add add add 4 eq -} -{ -1 0 0 0 testCMYKColorThrough -0 1 0 0 testCMYKColorThrough -0 0 1 0 testCMYKColorThrough -0 0 0 1 testCMYKColorThrough -and and and -} ifelse -put -} -{ pop } -ifelse -/bc4 [0 0 0 0] def -/_lfp4 { -1 pop -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -height abs adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -taperfcn /frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/bcs [0 0] def -/_lfs4 { -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -height abs adjnumsteps -dup 2 lt {pop 2} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 div taperfcn /frac xdf -bcs 0 -1.0 tint2 tint1 sub frac mul tint1 add sub -put bcs vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfs6 { -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bcs 0 -tint2 tint1 sub frac mul tint1 add -put bcs vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfp6 { -1 pop -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/lfp4{_lfp4}ndf -/lfs4{_lfs4}ndf -/rfs6{_rfs6}ndf -/rfp6{_rfp6}ndf -/cvc [0 0 0 1] def -/vc{ -AltsysDict /cvc 2 index put -aload length dup 4 eq -{pop dup -1 eq{pop setrgbcolor}{setcmykcolor}ifelse} -{6 eq {sethexcolor} {setspotcolor} ifelse } -ifelse -}bdf -0 setseparationgray -/imgr {1692.47 1570.59 2287.75 2412.48 } def -/bleed 0 def -/clpr {1692.47 1570.59 2287.75 2412.48 } def -/xs 1 def -/ys 1 def -/botx 0 def -/overlap 0 def -/wdist 18 def -0 2 mul fhsetspreadsize -0 0 ne {/df 0 def /clipflatness 0 def} if -/maxsteps 256 def -/forcemaxsteps false def -/minsteps 0 def - -userdict begin /AGDOrigMtx matrix currentmatrix def end -vms -0.15 0.15 scale %JND --1845 -2006 translate - -/currentpacking defed{false setpacking}if -/spots[ - -1 0 0 0 (Process Cyan) false newcmykcustomcolor - -0 1 0 0 (Process Magenta) false newcmykcustomcolor - -0 0 1 0 (Process Yellow) false newcmykcustomcolor - -0 0 0 1 (Process Black) false newcmykcustomcolor -]def -n -[] 0 d -3.863708 M -1 w -0 j -0 J -false setoverprint -0 i -false eomode -[0 0 0 1]vc -vms -1848.4365 2094.0422 m -1848.4365 2140.987 1886.4917 2179.0422 1933.4365 2179.0422 C -1980.3813 2179.0422 2018.4365 2140.987 2018.4365 2094.0422 C -2018.4365 2047.0974 1980.3813 2009.0422 1933.4365 2009.0422 C -1886.4917 2009.0422 1848.4365 2047.0974 1848.4365 2094.0422 C -5.3858 w -3.863693 M -s -n -true eomode -1897.6516 2067.1709 m -1897.6087 2066.5538 L -1885.3743 2066.1319 L -1883.1946 2062.4053 L -1869.9055 2063.9522 L -1869.9055 2067.1712 L -1897.6516 2067.1709 L -h -1944.0852 2067.1709 m -1944.0852 2067.0077 1944.0852 2066.8741 1944.0852 2066.7647 C -1944.1314 2066.5757 1944.1775 2066.4131 1944.2258 2066.2725 C -1945.0213 2065.0992 1946.0056 2064.2554 1947.179 2063.7413 C -1948.3963 2063.2249 1950.0134 2062.9678 1952.0305 2062.9678 C -1956.0142 2062.9678 1959.7627 2063.9522 1963.2805 2065.9209 C -1964.0204 2066.3353 1964.6824 2066.7527 1965.2665 2067.1732 C -1971.313 2067.1709 L -1970.2122 2065.693 1968.5893 2064.3153 1966.4446 2063.0381 C -1962.0369 2060.4585 1956.8821 2059.1709 1950.9758 2059.1709 C -1948.6775 2059.1709 1946.7791 2059.5445 1945.2805 2060.2959 C -1943.7798 2061.0914 1942.5142 2062.357 1941.4837 2064.0928 C -1941.2486 2064.0928 1940.8728 2064.0928 1940.3587 2064.0928 C -1937.5462 2063.9039 1935.4829 2063.8116 1934.1712 2063.8116 C -1929.2954 2063.8116 1925.1228 2064.2796 1921.6555 2065.2178 C -1919.9787 2065.6936 1918.2362 2066.3443 1916.4282 2067.1704 C -1944.0852 2067.1709 L -true setoverprint -f -false setoverprint -n -1884.4125 2075.1709 m -1884.4602 2073.585 L -1893.1087 2073.0225 L -1893.1087 2075.1712 L -1910.8456 2075.1709 L -1910.98 2075.0913 1911.1146 2075.0069 1911.2493 2074.9209 C -1911.9986 2074.3584 1912.583 2073.9585 1913.0071 2073.7256 C -1916.804 2071.4756 1920.2954 2069.9288 1923.4837 2069.085 C -1926.718 2068.2413 1931.0071 2067.8194 1936.3508 2067.8194 C -1940.3587 2067.8194 L -1940.7805 2070.7022 L -1938.9524 2070.8428 1937.522 2071.4053 1936.4915 2072.3897 C -1935.7726 2073.1422 1935.3163 2074.0693 1935.1223 2075.1726 C -1940.1696 2075.1709 L -1940.3293 2074.9768 1940.5095 2074.8018 1940.7102 2074.6397 C -1941.7407 2073.8421 1943.147 2073.4444 1944.929 2073.4444 C -1948.4128 2073.4444 1951.8259 2074.0193 1955.1674 2075.169 C -1963.5704 2075.1709 L -1962.8877 2074.843 1962.0411 2074.4337 1961.0305 2073.9366 C -1958.1697 2072.5303 1955.2166 2071.4976 1952.1712 2070.8428 C -1951.3274 2070.7022 1950.2244 2070.5132 1948.8665 2070.2803 C -1945.6782 2069.7178 1944.0852 2068.8038 1944.0852 2067.5381 C -1944.0852 2067.4017 1944.0852 2067.2776 1944.0852 2067.1658 C -1916.4282 2067.1709 L -1914.4953 2068.0535 1912.4877 2069.1369 1910.4055 2070.4209 C -1910.0759 2070.6539 1909.6321 2070.9593 1909.0696 2071.335 C -1905.9275 2073.5367 1902.9041 2074.6375 1899.9993 2074.6397 C -1899.9509 2074.6397 1899.6939 2074.6155 1899.2258 2074.5694 C -1898.7556 2074.521 1898.4041 2074.5452 1898.1712 2074.6397 C -1897.6516 2067.1709 L -1869.9055 2067.1709 L -1869.9055 2075.1714 L -1884.4125 2075.1709 L -h -1972.5022 2075.1709 m -1972.8687 2074.2606 1973.0523 2073.2652 1973.054 2072.1788 C -1973.054 2070.3983 1972.4736 2068.7289 1971.313 2067.1709 C -1965.2666 2067.1709 L -1967.4581 2068.751 1968.554 2070.3727 1968.554 2072.0381 C -1968.554 2073.0686 1968.2486 2073.9827 1967.6399 2074.7803 C -1967.5373 2074.922 1967.4334 2075.0518 1967.3283 2075.1698 C -1972.5022 2075.1709 L -true setoverprint -f -false setoverprint -n -1869.9055 2075.1709 m -1869.9055 2119.0772 L -1897.1868 2119.8506 L -1897.8899 2114.2256 L -1899.2962 2114.2256 L -1901.0759 2114.2256 1902.7876 2114.5069 1904.429 2115.0694 C -1906.1165 2115.678 1908.2478 2116.825 1910.8274 2118.5147 C -1911.9524 2119.2178 L -1919.5923 2124.1397 1925.4041 2126.6006 1929.3899 2126.6006 C -1930.8423 2126.6006 1932.3408 2126.3655 1933.8899 2125.8975 C -1935.4368 2125.4756 1937.1463 2124.7945 1939.0227 2123.8584 C -1940.1939 2123.9046 1941.8814 2123.9507 1944.0852 2123.9991 C -1950.0376 2124.0914 1954.0674 2124.1375 1956.179 2124.1397 C -1972.7244 2124.1397 1984.583 2123.1311 1991.7571 2121.1163 C -1998.9751 2119.1475 2002.583 2115.9351 2002.5852 2111.4834 C -2002.5852 2107.8272 2000.2869 2105.2959 1995.6946 2103.8897 C -1991.1463 2102.5296 1981.865 2101.8506 1967.8508 2101.8506 C -1963.5618 2101.8506 L -1964.6384 2100.8179 1965.4361 2099.8116 1965.9524 2098.8272 C -1966.4666 2097.8428 1966.7236 2096.8343 1966.7258 2095.8038 C -1966.7258 2095.3335 1966.6314 2094.7952 1966.4446 2094.1866 C -1966.2556 2093.6241 1965.9041 2092.8506 1965.3899 2091.8663 C -1967.1697 2091.1631 1968.5056 2090.1788 1969.3977 2088.9131 C -1970.2876 2087.6936 1970.7315 2086.1929 1970.7337 2084.4131 C -1970.7337 2083.521 1970.615 2082.6311 1970.3821 2081.7413 C -1970.147 2080.8492 1969.7954 2079.9593 1969.3274 2079.0694 C -1970.5447 2078.2256 1971.4588 2077.2171 1972.0696 2076.0459 C -1972.2346 2075.7625 1972.3788 2075.4685 1972.5022 2075.1642 C -1967.3284 2075.1709 L -1966.8077 2075.7539 1966.2562 2076.0459 1965.6712 2076.0459 C -1965.5191 2076.0459 1964.8189 2075.7521 1963.5704 2075.1643 C -1955.1674 2075.1709 L -1956.5004 2075.6277 1957.8219 2076.1778 1959.1321 2076.8194 C -1963.7727 2079.1155 1966.093 2081.5523 1966.093 2084.1319 C -1966.093 2085.303 1965.7173 2086.2632 1964.968 2087.0147 C -1964.2649 2087.764 1963.3508 2088.1375 1962.2258 2088.1397 C -1961.7556 2088.1397 1959.0838 2086.9905 1954.2102 2084.6944 C -1949.3806 2082.396 1944.4368 2080.6624 1939.3743 2079.4913 C -1939.2798 2079.3023 1939.2337 2079.0914 1939.2337 2078.8584 C -1939.2337 2078.6695 1939.2337 2078.3663 1939.2337 2077.9444 C -1939.2337 2076.8248 1939.5456 2075.8974 1940.1695 2075.1644 C -1935.1224 2075.1709 L -1935.0507 2075.5803 1935.0149 2076.012 1935.0149 2076.4678 C -1935.0149 2076.8414 1935.0369 2077.2391 1935.0852 2077.6631 C -1935.1775 2078.085 1935.294 2078.5992 1935.4368 2079.21 C -1934.7337 2079.21 L -1931.9673 2079.21 1929.7876 2080.0296 1928.1946 2081.6709 C -1926.5994 2083.3101 1925.804 2085.514 1925.804 2088.2803 C -1925.804 2088.9834 L -1924.3032 2088.6077 1922.9673 2088.3265 1921.7962 2088.1397 C -1920.6712 2087.9507 1919.6626 2087.8584 1918.7727 2087.8584 C -1916.8501 2087.8584 1914.9517 2088.232 1913.0774 2088.9834 C -1911.2493 2089.7789 1909.2102 2091.0906 1906.9602 2092.9209 C -1906.8196 2094.6084 L -1909.1619 2093.7647 1911.2713 2093.1077 1913.1477 2092.6397 C -1915.022 2092.2178 1916.7556 2092.0069 1918.3508 2092.0069 C -1920.6931 2092.0069 1922.9431 2092.521 1925.1008 2093.5538 C -1927.3025 2094.5843 1929.5986 2096.2476 1931.9915 2098.5459 C -1925.804 2107.7569 L -1927.0696 2109.4444 L -1928.4275 2108.3655 1930.2556 2106.7945 1932.554 2104.7334 C -1938.2251 2099.6226 1942.9361 2097.0694 1946.6868 2097.0694 C -1948.5149 2097.0694 1950.1782 2097.5132 1951.679 2098.4053 C -1953.2258 2099.2952 1953.9993 2100.1851 1953.9993 2101.0772 C -1953.9993 2101.6397 1952.9446 2103.1866 1950.8352 2105.7178 C -1948.772 2108.2491 1946.1946 2111.0374 1943.1008 2114.085 C -1939.4446 2117.6006 1936.7244 2119.8023 1934.9446 2120.6944 C -1933.2088 2121.6304 1931.3103 2122.0984 1929.2493 2122.1006 C -1925.3579 2122.1006 1920.3657 2120.0374 1914.2727 2115.9131 C -1913.5696 2115.4913 1913.0532 2115.1617 1912.7258 2114.9288 C -1909.6321 2112.8194 1907.1228 2111.4131 1905.2024 2110.71 C -1903.2798 2110.053 1901.2166 2109.7256 1899.0149 2109.7256 C -1898.0305 2109.7256 L -1898.0305 2078.6475 L -1899.8587 2078.6475 L -1903.4329 2078.6475 1907.0952 2077.4884 1910.8456 2075.1742 C -1893.1087 2075.1709 L -1893.1087 2115.7725 L -1883.1946 2115.6319 L -1884.4125 2075.171 L -1869.9055 2075.1709 L -h -1957.9368 2101.0772 m -1957.3259 2098.5459 1956.0603 2096.6695 1954.1399 2095.4522 C -1952.2634 2094.2327 1949.6399 2093.6241 1946.2649 2093.6241 C -1945.1861 2093.6241 1943.615 2093.9273 1941.554 2094.5381 C -1939.5369 2095.1929 1938.0383 2095.5203 1937.054 2095.5225 C -1935.3665 2095.5225 1933.679 2094.8194 1931.9915 2093.4131 C -1930.3501 2092.0069 1929.5305 2090.5765 1929.5305 2089.1241 C -1929.5305 2087.107 1930.0447 2085.5601 1931.0774 2084.4834 C -1932.1079 2083.4507 1933.6065 2082.9366 1935.5774 2082.9366 C -1937.5462 2082.9366 1940.1477 2083.4046 1943.3821 2084.3428 C -1946.6626 2085.3272 1949.9673 2086.5928 1953.2962 2088.1397 C -1956.3416 2089.5459 1958.5674 2090.8819 1959.9758 2092.1475 C -1961.3821 2093.4131 1962.0852 2094.6788 1962.0852 2095.9444 C -1962.0852 2096.8343 1961.7556 2097.678 1961.1008 2098.4756 C -1960.4439 2099.3194 1959.3892 2100.1851 1957.9368 2101.0772 C -h -1943.3821 2119.71 m -1946.054 2117.1788 1948.3501 2114.8584 1950.2727 2112.7491 C -1952.2415 2110.6397 1954.0213 2108.5303 1955.6165 2106.4209 C -1958.5696 2106.1397 1961.2876 2105.9288 1963.7727 2105.7881 C -1966.304 2105.6475 1968.6243 2105.5772 1970.7337 2105.5772 C -1980.7642 2105.5772 1987.7471 2106.021 1991.6868 2106.9131 C -1995.6704 2107.803 1997.6611 2109.3719 1997.6633 2111.6241 C -1997.6633 2114.4366 1994.2883 2116.5459 1987.5383 2117.9522 C -1980.8345 2119.4046 1970.8259 2120.1297 1957.5149 2120.1319 C -1955.4055 2120.1319 1953.1555 2120.0835 1950.7649 2119.9913 C -1948.4204 2119.9429 1945.9595 2119.8506 1943.3821 2119.71 C -true setoverprint -f -false setoverprint -n -vmr -vmr -end -%%Trailer diff --git a/doc/xsl/graphics/tip.pdf b/doc/xsl/graphics/tip.pdf deleted file mode 100644 index 54f5dedb5d..0000000000 Binary files a/doc/xsl/graphics/tip.pdf and /dev/null differ diff --git a/doc/xsl/graphics/warning.eps b/doc/xsl/graphics/warning.eps deleted file mode 100644 index ff3c2c4c4c..0000000000 --- a/doc/xsl/graphics/warning.eps +++ /dev/null @@ -1,1348 +0,0 @@ -%!PS-Adobe-2.0 EPSF-1.2 -%%Title: Untitled-3 -%%Creator: FreeHand 9.0 -%%CreationDate: 2002/12/05 8:20 PM -%%BoundingBox: 0 0 29 29 -%%FHPathName:Untitled:FreeHand 9:English:Untitled-3 -%ALDOriginalFile:Untitled:FreeHand 9:English:Untitled-3 -%ALDBoundingBox: -2 -2 29 29 -%%FHPageNum:1 -%%DocumentSuppliedResources: procset Altsys_header 4 0 -%%ColorUsage: Color -%%DocumentProcessColors: Black -%%EndComments -%%BeginResource: procset Altsys_header 4 0 -userdict begin /AltsysDict 300 dict def end -AltsysDict begin -/bdf{bind def}bind def -/xdf{exch def}bdf -/defed{where{pop true}{false}ifelse}bdf -/ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf -/d{setdash}bdf -/h{closepath}bdf -/H{}bdf -/J{setlinecap}bdf -/j{setlinejoin}bdf -/M{setmiterlimit}bdf -/n{newpath}bdf -/N{newpath}bdf -/q{gsave}bdf -/Q{grestore}bdf -/w{setlinewidth}bdf -/Xic{matrix invertmatrix concat}bdf -/Xq{matrix currentmatrix mark}bdf -/XQ{cleartomark setmatrix}bdf -/sepdef{ -dup where not -{ -AltsysSepDict -} -if -3 1 roll exch put -}bdf -/st{settransfer}bdf -/colorimage defed /_rci xdf -/cntr 0 def -/readbinarystring{ -/cntr 0 def -2 copy readstring -{ -{ -dup -(\034) search -{ -length exch pop exch -dup length 0 ne -{ -dup dup 0 get 32 sub 0 exch put -/cntr cntr 1 add def -} -{ -pop 1 string dup -0 6 index read pop 32 sub put -}ifelse -3 copy -putinterval pop -1 add -1 index length 1 sub -1 index sub -dup 0 le {pop pop exit}if -getinterval -} -{ -pop exit -} ifelse -} loop -}if -cntr 0 gt -{ -pop 2 copy -dup length cntr sub cntr getinterval -readbinarystring -} if -pop exch pop -} bdf -/_NXLevel1 defed { -_NXLevel1 not { -/colorimage where { -userdict eq { -/_rci false def -} if -} if -} if -} if -/md defed{ -md type /dicttype eq { -/colorimage where { -md eq { -/_rci false def -}if -}if -/settransfer where { -md eq { -/st systemdict /settransfer get def -}if -}if -}if -}if -/setstrokeadjust defed -{ -true setstrokeadjust -/C{curveto}bdf -/L{lineto}bdf -/m{moveto}bdf -} -{ -/dr{transform .25 sub round .25 add -exch .25 sub round .25 add exch itransform}bdf -/C{dr curveto}bdf -/L{dr lineto}bdf -/m{dr moveto}bdf -/setstrokeadjust{pop}bdf -}ifelse -/privrectpath { -4 -2 roll m -dtransform round exch round exch idtransform -2 copy 0 lt exch 0 lt xor -{dup 0 exch rlineto exch 0 rlineto neg 0 exch rlineto} -{exch dup 0 rlineto exch 0 exch rlineto neg 0 rlineto} -ifelse -closepath -}bdf -/rectclip{newpath privrectpath clip newpath}def -/rectfill{gsave newpath privrectpath fill grestore}def -/rectstroke{gsave newpath privrectpath stroke grestore}def -/_fonthacksave false def -/currentpacking defed -{ -/_bfh {/_fonthacksave currentpacking def false setpacking} bdf -/_efh {_fonthacksave setpacking} bdf -} -{ -/_bfh {} bdf -/_efh {} bdf -}ifelse -/packedarray{array astore readonly}ndf -/` -{ -false setoverprint -/-save0- save def -5 index concat -pop -storerect left bottom width height rectclip -pop -/MMdict_count countdictstack def -/MMop_count count 1 sub def -userdict begin -/showpage {} def -0 setgray 0 setlinecap 1 setlinewidth -0 setlinejoin 10 setmiterlimit [] 0 setdash newpath -} bdf -/currentpacking defed{true setpacking}if -/min{2 copy gt{exch}if pop}bdf -/max{2 copy lt{exch}if pop}bdf -/xformfont { currentfont exch makefont setfont } bdf -/fhnumcolors 1 -statusdict begin -/processcolors defed -{ -pop processcolors -} -{ -/deviceinfo defed { -deviceinfo /Colors known { -pop deviceinfo /Colors get -} if -} if -} ifelse -end -def -/printerRes -gsave -matrix defaultmatrix setmatrix -72 72 dtransform -abs exch abs -max -grestore -def -/graycalcs -[ -{Angle Frequency} -{GrayAngle GrayFrequency} -{0 Width Height matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -{0 GrayWidth GrayHeight matrix defaultmatrix idtransform -dup mul exch dup mul add sqrt 72 exch div} -] def -/calcgraysteps { -forcemaxsteps -{ -maxsteps -} -{ -/currenthalftone defed -{currenthalftone /dicttype eq}{false}ifelse -{ -currenthalftone begin -HalftoneType 4 le -{graycalcs HalftoneType 1 sub get exec} -{ -HalftoneType 5 eq -{ -Default begin -{graycalcs HalftoneType 1 sub get exec} -end -} -{0 60} -ifelse -} -ifelse -end -} -{ -currentscreen pop exch -} -ifelse -printerRes 300 max exch div exch -2 copy -sin mul round dup mul -3 1 roll -cos mul round dup mul -add 1 add -dup maxsteps gt {pop maxsteps} if -dup minsteps lt {pop minsteps} if -} -ifelse -} bdf -/nextrelease defed { -/languagelevel defed not { -/framebuffer defed { -0 40 string framebuffer 9 1 roll 8 {pop} repeat -dup 516 eq exch 520 eq or -{ -/fhnumcolors 3 def -/currentscreen {60 0 {pop pop 1}}bdf -/calcgraysteps {maxsteps} bdf -}if -}if -}if -}if -fhnumcolors 1 ne { -/calcgraysteps {maxsteps} bdf -} if -/currentpagedevice defed { -currentpagedevice /PreRenderingEnhance known -{ -currentpagedevice /PreRenderingEnhance get -{ -/calcgraysteps -{ -forcemaxsteps -{maxsteps} -{256 maxsteps min} -ifelse -} def -} if -} if -} if -/gradfrequency 144 def -printerRes 1000 lt { -/gradfrequency 72 def -} if -/adjnumsteps { -dup dtransform abs exch abs max -printerRes div -gradfrequency mul -round -5 max -min -}bdf -/goodsep { -spots exch get 4 get dup sepname eq exch (_vc_Registration) eq or -}bdf -/BeginGradation defed -{/bb{BeginGradation}bdf} -{/bb{}bdf} -ifelse -/EndGradation defed -{/eb{EndGradation}bdf} -{/eb{}bdf} -ifelse -/bottom -0 def -/delta -0 def -/frac -0 def -/height -0 def -/left -0 def -/numsteps1 -0 def -/radius -0 def -/right -0 def -/top -0 def -/width -0 def -/xt -0 def -/yt -0 def -/df currentflat def -/tempstr 1 string def -/clipflatness currentflat def -/inverted? -0 currenttransfer exec .5 ge def -/tc1 [0 0 0 1] def -/tc2 [0 0 0 1] def -/storerect{/top xdf /right xdf /bottom xdf /left xdf -/width right left sub def /height top bottom sub def}bdf -/concatprocs{ -systemdict /packedarray known -{dup type /packedarraytype eq 2 index type /packedarraytype eq or}{false}ifelse -{ -/proc2 exch cvlit def /proc1 exch cvlit def -proc1 aload pop proc2 aload pop -proc1 length proc2 length add packedarray cvx -} -{ -/proc2 exch cvlit def /proc1 exch cvlit def -/newproc proc1 length proc2 length add array def -newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval -newproc cvx -}ifelse -}bdf -/i{dup 0 eq -{pop df dup} -{dup} ifelse -/clipflatness xdf setflat -}bdf -version cvr 38.0 le -{/setrgbcolor{ -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -currenttransfer exec 3 1 roll -setrgbcolor}bdf}if -/vms {/vmsv save def} bdf -/vmr {vmsv restore} bdf -/vmrs{vmsv restore /vmsv save def}bdf -/eomode{ -{/filler /eofill load def /clipper /eoclip load def} -{/filler /fill load def /clipper /clip load def} -ifelse -}bdf -/normtaper{}bdf -/logtaper{9 mul 1 add log}bdf -/CD{ -/NF exch def -{ -exch dup -/FID ne 1 index/UniqueID ne and -{exch NF 3 1 roll put} -{pop pop} -ifelse -}forall -NF -}bdf -/MN{ -1 index length -/Len exch def -dup length Len add -string dup -Len -4 -1 roll -putinterval -dup -0 -4 -1 roll -putinterval -}bdf -/RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch -{1 index MN cvn/NewN exch def cvn -findfont dup maxlength dict CD dup/FontName NewN put dup -/Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf -/RF{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RC} -ifelse -}bdf -/FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known -{exch pop findfont 3 -1 roll pop} -{pop dup findfont dup maxlength dict CD dup dup -/Encoding exch /Encoding get 256 array copy 7 -1 roll -{3 -1 roll dup 4 -2 roll put}forall put definefont} -ifelse}bdf -/RCJ{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFJ -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFJ{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCJ} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFJ -{ -dup -hasfont -not -{ -pop -/Ryumin-Light-83pv-RKSJ-H -hasfont -{ -/Ryumin-Light-83pv-RKSJ-H -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFJ{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFJ -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/GS { -dup -hasfont -{ -findfont -exch makesetfont -exch -pop -ts -} -{ -pop pop pop -ts -} ifelse -} bdf -/RCK{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFK -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFK{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCK} -ifelse -}bdf -/hasfont -{ -/resourcestatus where -{ -pop -/Font resourcestatus -{ -pop pop true -} -{ -false -} -ifelse -} -{ -dup FontDirectory exch known -{pop true} -{ -256 string -cvs -(fonts/) exch MN -status -{pop pop pop pop true} -{false} -ifelse -} -ifelse -} -ifelse -}bdf -/FDFK -{ -dup -hasfont -not -{ -pop -/JCsm -hasfont -{ -/JCsm -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFK{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFK -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/RCTC{4 -1 roll -/ourvec xdf -256 string cvs -(|______) anchorsearch -{pop -cvn -dup FDFTC -exch -1 index -eq -{ -_bfh findfont _efh -dup -maxlength dict -CD -dup -/FontName -3 index -put -dup -/Encoding ourvec put -1 index -exch -definefont -pop -} -{exch pop} -ifelse -} -{pop} -ifelse -}bdf -/RFTC{ -dup -FontDirectory exch -known -{pop 3 -1 roll pop} -{RCTC} -ifelse -}bdf -/FDFTC -{ -dup -hasfont -not -{ -pop -/DFMing-Lt-HK-BF -hasfont -{ -/DFMing-Lt-HK-BF -} -{ -/Courier -} -ifelse -} -if -}bdf -/FFTC{ -_bfh -dup -256 string cvs -(|______)exch MN -cvn -dup -FontDirectory -exch known -{ -exch -pop -findfont -3 -1 roll -pop -} -{ -pop -FDFTC -dup findfont -dup maxlength dict -CD -dup dup -/Encoding exch -/Encoding get -256 array copy -7 -1 roll -{ -3 -1 roll -dup -4 -2 roll -put -}forall -put -definefont -} -ifelse -_efh -}bdf -/fps{ -currentflat -exch -dup 0 le{pop 1}if -{ -dup setflat 3 index stopped -{1.3 mul dup 3 index gt{pop setflat pop pop stop}if} -{exit} -ifelse -}loop -pop setflat pop pop -}bdf -/fp{100 currentflat fps}bdf -/clipper{clip}bdf -/W{/clipper load 100 clipflatness dup setflat fps}bdf - -userdict begin /BDFontDict 29 dict def end -BDFontDict begin -/bu{}def -/bn{}def -/setTxMode{av 70 ge{pop}if pop}def -/gm{m}def -/show{pop}def -/gr{pop}def -/fnt{pop pop pop}def -/fs{pop}def -/fz{pop}def -/lin{pop pop}def -/:M {pop pop} def -/sf {pop} def -/S {pop} def -/@b {pop pop pop pop pop pop pop pop} def -/_bdsave /save load def -/_bdrestore /restore load def -/save { dup /fontsave eq {null} {_bdsave} ifelse } def -/restore { dup null eq { pop } { _bdrestore } ifelse } def -/fontsave null def -end -/MacVec 256 array def -MacVec 0 /Helvetica findfont -/Encoding get 0 128 getinterval putinterval -MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put -/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI -/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US -MacVec 0 32 getinterval astore pop -/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute -/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave -/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute -/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis -/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls -/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash -/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation -/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash -/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotleft -/guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe -/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge -/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl -/daggerdbl/periodcentered/quotesinglbase/quotedblbase -/perthousand/Acircumflex/Ecircumflex/Aacute -/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex -/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde -/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron -MacVec 128 128 getinterval astore pop -/findheaderfont { -/Helvetica findfont -} def -end %. AltsysDict -%%EndResource -%%EndProlog - -%%BeginSetup - -AltsysDict begin -_bfh - -_efh -end %. AltsysDict - -%%EndSetup -AltsysDict begin - -/onlyk4{false}ndf -/ccmyk{dup 5 -1 roll sub 0 max exch}ndf -/cmyk2gray{ -4 -1 roll 0.3 mul 4 -1 roll 0.59 mul 4 -1 roll 0.11 mul -add add add 1 min neg 1 add -}bdf -/setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf -/maxcolor { -max max max -} ndf -/maxspot { -pop -} ndf -/setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf -/findcmykcustomcolor{5 packedarray}ndf -/setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat setcmykcolor pop}ndf -/setseparationgray{setgray}ndf -/setoverprint{pop}ndf -/currentoverprint false ndf -/cmykbufs2gray{ -0 1 2 index length 1 sub -{ -4 index 1 index get 0.3 mul -4 index 2 index get 0.59 mul -4 index 3 index get 0.11 mul -4 index 4 index get -add add add cvi 255 min -255 exch sub -2 index 3 1 roll put -}for -4 1 roll pop pop pop -}bdf -/colorimage{ -pop pop -[ -5 -1 roll/exec cvx -6 -1 roll/exec cvx -7 -1 roll/exec cvx -8 -1 roll/exec cvx -/cmykbufs2gray cvx -]cvx -image -} -%. version 47.1 on Linotronic of Postscript defines colorimage incorrectly (rgb model only) -version cvr 47.1 le -statusdict /product get (Lino) anchorsearch{pop pop true}{pop false}ifelse -and{userdict begin bdf end}{ndf}ifelse -fhnumcolors 1 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -ic im iy ik cmyk2gray /xt xdf -currenttransfer -{dup 1.0 exch sub xt mul add}concatprocs -st -image -} -ifelse -}ndf -fhnumcolors 1 ne {yt restore} if -fhnumcolors 3 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -1.0 dup ic ik add min sub -1.0 dup im ik add min sub -1.0 dup iy ik add min sub -/ic xdf /iy xdf /im xdf -currentcolortransfer -4 1 roll -{dup 1.0 exch sub ic mul add}concatprocs 4 1 roll -{dup 1.0 exch sub iy mul add}concatprocs 4 1 roll -{dup 1.0 exch sub im mul add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}true 3 colorimage -} -ifelse -}ndf -fhnumcolors 3 ne {yt restore} if -fhnumcolors 4 ne {/yt save def} if -/customcolorimage{ -aload pop -(_vc_Registration) eq -{ -pop pop pop pop separationimage -} -{ -/ik xdf /iy xdf /im xdf /ic xdf -currentcolortransfer -{1.0 exch sub ik mul ik sub 1 add}concatprocs 4 1 roll -{1.0 exch sub iy mul iy sub 1 add}concatprocs 4 1 roll -{1.0 exch sub im mul im sub 1 add}concatprocs 4 1 roll -{1.0 exch sub ic mul ic sub 1 add}concatprocs 4 1 roll -setcolortransfer -{/dummy xdf dummy}concatprocs{dummy}{dummy}{dummy} -true 4 colorimage -} -ifelse -}ndf -fhnumcolors 4 ne {yt restore} if -/separationimage{image}ndf -/spotascmyk false ndf -/newcmykcustomcolor{6 packedarray}ndf -/inkoverprint false ndf -/setinkoverprint{pop}ndf -/setspotcolor { -spots exch get -dup 4 get (_vc_Registration) eq -{pop 1 exch sub setseparationgray} -{0 5 getinterval exch setcustomcolor} -ifelse -}ndf -/currentcolortransfer{currenttransfer dup dup dup}ndf -/setcolortransfer{st pop pop pop}ndf -/fas{}ndf -/sas{}ndf -/fhsetspreadsize{pop}ndf -/filler{fill}bdf -/F{gsave {filler}fp grestore}bdf -/f{closepath F}bdf -/S{gsave {stroke}fp grestore}bdf -/s{closepath S}bdf -userdict /islevel2 -systemdict /languagelevel known dup -{ -pop systemdict /languagelevel get 2 ge -} if -put -islevel2 not -{ -/currentcmykcolor -{ -0 0 0 1 currentgray sub -} ndf -} if -/tc -{ -gsave -setcmykcolor currentcmykcolor -grestore -} bind def -/testCMYKColorThrough -{ -tc add add add 0 ne -} bind def -/fhiscomposite where not { -userdict /fhiscomposite -islevel2 -{ -gsave 1 1 1 1 setcmykcolor currentcmykcolor grestore -add add add 4 eq -} -{ -1 0 0 0 testCMYKColorThrough -0 1 0 0 testCMYKColorThrough -0 0 1 0 testCMYKColorThrough -0 0 0 1 testCMYKColorThrough -and and and -} ifelse -put -} -{ pop } -ifelse -/bc4 [0 0 0 0] def -/_lfp4 { -1 pop -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -height abs adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -taperfcn /frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/bcs [0 0] def -/_lfs4 { -/yt xdf -/xt xdf -/ang xdf -storerect -/taperfcn xdf -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -height abs adjnumsteps -dup 2 lt {pop 2} if -1 sub /numsteps1 xdf -currentflat mark -currentflat clipflatness -/delta top bottom sub numsteps1 1 add div def -/right right left sub def -/botsv top delta sub def -{ -{ -W -xt yt translate -ang rotate -xt neg yt neg translate -dup setflat -/bottom botsv def -0 1 numsteps1 -{ -numsteps1 div taperfcn /frac xdf -bcs 0 -1.0 tint2 tint1 sub frac mul tint1 add sub -put bcs vc -1 index setflat -{ -mark {newpath left bottom right delta rectfill}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -/bottom bottom delta sub def -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfs6 { -/tint2 xdf -/tint1 xdf -bcs exch 1 exch put -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -tint1 tint2 sub abs -bcs 1 get maxspot -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bcs 0 -tint2 tint1 sub frac mul tint1 add -put bcs vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/_rfp6 { -1 pop -/k2 xdf /y2 xdf /m2 xdf /c2 xdf -/k1 xdf /y1 xdf /m1 xdf /c1 xdf -/inrad xdf -/radius xdf -/yt xdf -/xt xdf -c1 c2 sub abs -m1 m2 sub abs -y1 y2 sub abs -k1 k2 sub abs -maxcolor -calcgraysteps mul abs round -radius inrad sub abs -adjnumsteps -dup 1 lt {pop 1} if -1 sub /numsteps1 xdf -radius inrad sub numsteps1 dup 0 eq {pop} {div} ifelse -2 div /halfstep xdf -currentflat mark -currentflat clipflatness -{ -{ -dup setflat -W -0 1 numsteps1 -{ -dup /radindex xdf -numsteps1 dup 0 eq {pop pop 0.5} {div} ifelse -/frac xdf -bc4 0 c2 c1 sub frac mul c1 add put -bc4 1 m2 m1 sub frac mul m1 add put -bc4 2 y2 y1 sub frac mul y1 add put -bc4 3 k2 k1 sub frac mul k1 add put -bc4 vc -1 index setflat -{ -newpath mark -xt yt radius inrad sub 1 frac sub mul halfstep add inrad add 0 360 -{ arc -radindex numsteps1 ne -inrad 0 gt or -{ -xt yt -numsteps1 0 eq -{ inrad } -{ -radindex 1 add numsteps1 div 1 exch sub -radius inrad sub mul halfstep add inrad add -}ifelse -dup xt add yt moveto -360 0 arcn -} if -fill -}stopped -{cleartomark exch 1.3 mul dup setflat exch 2 copy gt{stop}if} -{cleartomark exit}ifelse -}loop -}for -} -gsave stopped grestore -{exch pop 2 index exch 1.3 mul dup 100 gt{cleartomark setflat stop}if} -{exit}ifelse -}loop -cleartomark setflat -}bdf -/lfp4{_lfp4}ndf -/lfs4{_lfs4}ndf -/rfs6{_rfs6}ndf -/rfp6{_rfp6}ndf -/cvc [0 0 0 1] def -/vc{ -AltsysDict /cvc 2 index put -aload length dup 4 eq -{pop dup -1 eq{pop setrgbcolor}{setcmykcolor}ifelse} -{6 eq {sethexcolor} {setspotcolor} ifelse } -ifelse -}bdf -0 setseparationgray -/imgr {1692.47 1570.59 1723.65 1601.77 } def -/bleed 0 def -/clpr {1692.47 1570.59 1723.65 1601.77 } def -/xs 1 def -/ys 1 def -/botx 0 def -/overlap 0 def -/wdist 18 def -0 2 mul fhsetspreadsize -0 0 ne {/df 0 def /clipflatness 0 def} if -/maxsteps 256 def -/forcemaxsteps false def -/minsteps 0 def - -userdict begin /AGDOrigMtx matrix currentmatrix def end -vms --1694 -1572 translate - -/currentpacking defed{false setpacking}if -/spots[ - -1 0 0 0 (Process Cyan) false newcmykcustomcolor - -0 1 0 0 (Process Magenta) false newcmykcustomcolor - -0 0 1 0 (Process Yellow) false newcmykcustomcolor - -0 0 0 1 (Process Black) false newcmykcustomcolor -]def -n -[] 0 d -3.863708 M -1 w -0 j -0 J -false setoverprint -0 i -false eomode -[0 0 0 1]vc -vms -q -[1 0 0 1 -249.981674 -586.867554] concat -vms -1946.9506 2177.5114 m -1954.4907 2185.0516 L -1956.7047 2187.2656 1960.2943 2187.2656 1962.5083 2185.0516 C -1970.0485 2177.5114 L -1972.2625 2175.2974 1972.2625 2171.7078 1970.0485 2169.4938 C -1962.5083 2161.9537 L -1960.2943 2159.7396 1956.7047 2159.7396 1954.4907 2161.9537 C -1946.9506 2169.4938 L -1944.7365 2171.7078 1944.7365 2175.2974 1946.9506 2177.5114 C -s -n -true eomode -1958.5469 2181.0039 m -1959.2148 2181.0039 1959.7012 2180.9296 1960.0059 2180.7813 C -1960.3142 2180.6326 1960.4684 2180.363 1960.4688 2179.9727 C -1960.4688 2179.7383 1960.3398 2178.8026 1960.082 2177.166 C -1959.0742 2170.4219 L -1958.9373 2170.3241 1958.7615 2170.2754 1958.5469 2170.2754 C -1958.3319 2170.2754 1958.1561 2170.3241 1958.0195 2170.4219 C -1957.0117 2177.166 L -1956.7539 2178.8026 1956.625 2179.7379 1956.625 2179.9727 C -1956.625 2180.363 1956.7792 2180.6326 1957.0879 2180.7813 C -1957.4003 2180.9296 1957.8866 2181.0035 1958.5469 2181.0039 C -h -1958.5469 2165.166 m -1958.0389 2165.166 1957.5878 2165.3499 1957.1934 2165.7168 C -1956.7986 2166.0837 1956.6016 2166.5485 1956.6016 2167.1113 C -1956.6016 2167.6698 1956.7891 2168.1404 1957.1641 2168.5234 C -1957.5427 2168.9102 1958.0038 2169.1035 1958.5469 2169.1035 C -1959.1094 2169.1035 1959.5741 2168.9043 1959.9414 2168.5059 C -1960.3083 2168.1074 1960.4918 2167.6423 1960.4922 2167.1113 C -1960.4922 2166.748 1960.4102 2166.4177 1960.2461 2166.1211 C -1960.082 2165.8241 1959.8513 2165.5916 1959.5547 2165.4238 C -1959.2577 2165.2521 1958.9219 2165.1664 1958.5469 2165.166 C -true setoverprint -f -false setoverprint -n -vmr -Q -false eomode -vmr -vmr -end -%%Trailer diff --git a/doc/xsl/graphics/warning.pdf b/doc/xsl/graphics/warning.pdf deleted file mode 100644 index bc548d52a9..0000000000 Binary files a/doc/xsl/graphics/warning.pdf and /dev/null differ diff --git a/doc/xsl/isc-docbook-chunk.xsl.in b/doc/xsl/isc-docbook-chunk.xsl.in deleted file mode 100644 index 6f9977e11e..0000000000 --- a/doc/xsl/isc-docbook-chunk.xsl.in +++ /dev/null @@ -1,72 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - ansi - - - - - - - - - - - - - - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> - - - - - - - - - - en - - - -

@BIND9_VERSIONSTRING@

-
- -
- - diff --git a/doc/xsl/isc-docbook-html.xsl.in b/doc/xsl/isc-docbook-html.xsl.in deleted file mode 100644 index 6d27de8b82..0000000000 --- a/doc/xsl/isc-docbook-html.xsl.in +++ /dev/null @@ -1,65 +0,0 @@ - - - - - - - - - - - - - - ansi - - - - - - - - - - - - - - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> - - - - - - - - - - en - - - -

@BIND9_VERSIONSTRING@

-
- -
- - diff --git a/doc/xsl/isc-docbook-text.xsl b/doc/xsl/isc-docbook-text.xsl deleted file mode 100644 index 1e45e0d3e8..0000000000 --- a/doc/xsl/isc-docbook-text.xsl +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/doc/xsl/isc-manpage.xsl.in b/doc/xsl/isc-manpage.xsl.in deleted file mode 100644 index 69ff90361b..0000000000 --- a/doc/xsl/isc-manpage.xsl.in +++ /dev/null @@ -1,139 +0,0 @@ - - - - - - - - - - - - - - .\" - - - - - - - ansi - - - - - - - .\" - .hy 0 - .ad l - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - .RS .B " - - - - - : - - - :" - - .RE - - - - - .HP - - - - - - - - - - - - - - .nf - - .fi - - - - - diff --git a/doc/xsl/isc-notes-html.xsl.in b/doc/xsl/isc-notes-html.xsl.in deleted file mode 100644 index 3f6b2a290a..0000000000 --- a/doc/xsl/isc-notes-html.xsl.in +++ /dev/null @@ -1,64 +0,0 @@ - - - - - - - - - - - - - - ansi - - - - - - - - - - - - - - - - - - - - - - - $Id$ - - - - - - - -

@BIND9_VERSIONSTRING@

-
- -
- - diff --git a/doc/xsl/notes-param.xsl b/doc/xsl/notes-param.xsl deleted file mode 100644 index f2b3e8b24f..0000000000 --- a/doc/xsl/notes-param.xsl +++ /dev/null @@ -1,23 +0,0 @@ - - - - - - - - diff --git a/doc/xsl/pre-latex.xsl b/doc/xsl/pre-latex.xsl deleted file mode 100644 index b527daaaaf..0000000000 --- a/doc/xsl/pre-latex.xsl +++ /dev/null @@ -1,50 +0,0 @@ - - - - - - - - - - - - - - --- - - - - - - - - - - - - - - - - - - - - - - diff --git a/util/copyrights b/util/copyrights index 6b48540278..cc82d5f756 100644 --- a/util/copyrights +++ b/util/copyrights @@ -3,19 +3,16 @@ ./COPYING X 2020 ./COPYRIGHT TXT.TOP 1996,1997,1998,1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./LICENSE X 2016,2018,2019,2020 +./Makefile.docs X 2020 ./Makefile.tests X 2020 ./Makefile.top X 2020 ./NEWS X 2020 ./bin/check/check-tool.c C 2000,2001,2002,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/check/check-tool.h C 2000,2001,2002,2004,2005,2007,2010,2011,2013,2014,2016,2018,2019,2020 -./bin/check/named-checkconf.8 MAN DOCBOOK ./bin/check/named-checkconf.c C 1999,2000,2001,2002,2004,2005,2006,2007,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/check/named-checkconf.docbook SGML 2000,2001,2002,2004,2005,2007,2009,2014,2015,2016,2018,2019,2020 -./bin/check/named-checkconf.html HTML DOCBOOK -./bin/check/named-checkzone.8 MAN DOCBOOK +./bin/check/named-checkconf.rst RST 2020 ./bin/check/named-checkzone.c C 1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2018,2019,2020 -./bin/check/named-checkzone.docbook SGML 2000,2001,2002,2004,2005,2006,2007,2009,2010,2011,2012,2013,2014,2015,2016,2018,2019,2020 -./bin/check/named-checkzone.html HTML DOCBOOK +./bin/check/named-checkzone.rst RST 2020 ./bin/check/win32/checkconf.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/check/win32/checkconf.vcxproj.in X 2013,2014,2015,2016,2017,2018,2019,2020 ./bin/check/win32/checkconf.vcxproj.user X 2013,2018,2019,2020 @@ -25,17 +22,13 @@ ./bin/check/win32/checkzone.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/check/win32/checkzone.vcxproj.in X 2013,2014,2015,2016,2017,2018,2019,2020 ./bin/check/win32/checkzone.vcxproj.user X 2013,2018,2019,2020 -./bin/confgen/ddns-confgen.8 MAN DOCBOOK ./bin/confgen/ddns-confgen.c C 2009,2011,2014,2016,2018,2019,2020 -./bin/confgen/ddns-confgen.docbook SGML 2009,2014,2015,2016,2018,2019,2020 -./bin/confgen/ddns-confgen.html HTML DOCBOOK +./bin/confgen/ddns-confgen.rst RST 2020 ./bin/confgen/include/confgen/os.h C 2009,2016,2018,2019,2020 ./bin/confgen/keygen.c C 2009,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/confgen/keygen.h C 2009,2016,2018,2019,2020 -./bin/confgen/rndc-confgen.8 MAN DOCBOOK ./bin/confgen/rndc-confgen.c C 2001,2003,2004,2005,2007,2008,2009,2011,2013,2014,2016,2017,2018,2019,2020 -./bin/confgen/rndc-confgen.docbook SGML 2001,2003,2004,2005,2007,2009,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/confgen/rndc-confgen.html HTML DOCBOOK +./bin/confgen/rndc-confgen.rst RST 2020 ./bin/confgen/unix/os.c C 2009,2016,2018,2019,2020 ./bin/confgen/util.c C 2009,2015,2016,2018,2019,2020 ./bin/confgen/util.h C 2009,2016,2018,2019,2020 @@ -49,27 +42,19 @@ ./bin/confgen/win32/rndcconfgen.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/confgen/win32/rndcconfgen.vcxproj.in X 2013,2015,2016,2017,2018,2019,2020 ./bin/confgen/win32/rndcconfgen.vcxproj.user X 2013,2018,2019,2020 -./bin/delv/delv.1 MAN DOCBOOK ./bin/delv/delv.c C 2014,2015,2016,2017,2018,2019,2020 -./bin/delv/delv.docbook SGML 2014,2015,2016,2017,2018,2019,2020 -./bin/delv/delv.html HTML DOCBOOK +./bin/delv/delv.rst RST 2020 ./bin/delv/win32/delv.vcxproj.filters.in X 2014,2015,2018,2019,2020 ./bin/delv/win32/delv.vcxproj.in X 2014,2015,2016,2017,2018,2019,2020 ./bin/delv/win32/delv.vcxproj.user X 2014,2018,2019,2020 -./bin/dig/dig.1 MAN DOCBOOK ./bin/dig/dig.c C 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dig/dig.docbook SGML 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dig/dig.html HTML DOCBOOK +./bin/dig/dig.rst RST 2020 ./bin/dig/dighost.c C 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/dig/dighost.h C 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dig/host.1 MAN DOCBOOK ./bin/dig/host.c C 2000,2001,2002,2003,2004,2005,2006,2007,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dig/host.docbook SGML 2000,2001,2002,2004,2005,2007,2008,2009,2014,2015,2016,2017,2018,2019,2020 -./bin/dig/host.html HTML DOCBOOK -./bin/dig/nslookup.1 MAN DOCBOOK +./bin/dig/host.rst RST 2020 ./bin/dig/nslookup.c C 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dig/nslookup.docbook SGML 2004,2005,2006,2007,2010,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dig/nslookup.html HTML DOCBOOK +./bin/dig/nslookup.rst RST 2020 ./bin/dig/win32/dig.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/dig/win32/dig.vcxproj.in X 2013,2014,2015,2016,2017,2018,2019,2020 ./bin/dig/win32/dig.vcxproj.user X 2013,2018,2019,2020 @@ -82,42 +67,24 @@ ./bin/dig/win32/nslookup.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/dig/win32/nslookup.vcxproj.in X 2013,2014,2015,2016,2017,2018,2019,2020 ./bin/dig/win32/nslookup.vcxproj.user X 2013,2018,2019,2020 -./bin/dnssec/dnssec-cds.8 MAN DOCBOOK ./bin/dnssec/dnssec-cds.c C 2017,2018,2019,2020 -./bin/dnssec/dnssec-cds.docbook SGML 2017,2018,2019,2020 -./bin/dnssec/dnssec-cds.html HTML DOCBOOK -./bin/dnssec/dnssec-dsfromkey.8 MAN DOCBOOK +./bin/dnssec/dnssec-cds.rst RST 2020 ./bin/dnssec/dnssec-dsfromkey.c C 2008,2009,2010,2011,2012,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-dsfromkey.docbook SGML 2008,2009,2010,2011,2012,2014,2015,2016,2018,2019,2020 -./bin/dnssec/dnssec-dsfromkey.html HTML DOCBOOK -./bin/dnssec/dnssec-importkey.8 MAN DOCBOOK +./bin/dnssec/dnssec-dsfromkey.rst RST 2020 ./bin/dnssec/dnssec-importkey.c C 2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-importkey.docbook SGML 2013,2014,2015,2016,2018,2019,2020 -./bin/dnssec/dnssec-importkey.html HTML DOCBOOK -./bin/dnssec/dnssec-keyfromlabel.8 MAN DOCBOOK +./bin/dnssec/dnssec-importkey.rst RST 2020 ./bin/dnssec/dnssec-keyfromlabel.c C 2007,2008,2009,2010,2011,2012,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-keyfromlabel.docbook SGML 2008,2009,2010,2011,2012,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-keyfromlabel.html HTML DOCBOOK -./bin/dnssec/dnssec-keygen.8 MAN DOCBOOK +./bin/dnssec/dnssec-keyfromlabel.rst RST 2020 ./bin/dnssec/dnssec-keygen.c C.NAI 1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-keygen.docbook SGML 2000,2001,2002,2003,2004,2005,2007,2008,2009,2010,2011,2012,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-keygen.html HTML DOCBOOK -./bin/dnssec/dnssec-revoke.8 MAN DOCBOOK +./bin/dnssec/dnssec-keygen.rst RST 2020 ./bin/dnssec/dnssec-revoke.c C 2009,2010,2011,2012,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-revoke.docbook SGML 2009,2011,2014,2015,2016,2018,2019,2020 -./bin/dnssec/dnssec-revoke.html HTML DOCBOOK -./bin/dnssec/dnssec-settime.8 MAN DOCBOOK +./bin/dnssec/dnssec-revoke.rst RST 2020 ./bin/dnssec/dnssec-settime.c C 2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-settime.docbook SGML 2009,2010,2011,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-settime.html HTML DOCBOOK -./bin/dnssec/dnssec-signzone.8 MAN DOCBOOK +./bin/dnssec/dnssec-settime.rst RST 2020 ./bin/dnssec/dnssec-signzone.c C.NAI 1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-signzone.docbook SGML 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-signzone.html HTML DOCBOOK -./bin/dnssec/dnssec-verify.8 MAN DOCBOOK +./bin/dnssec/dnssec-signzone.rst RST 2020 ./bin/dnssec/dnssec-verify.c C 2012,2014,2015,2016,2017,2018,2019,2020 -./bin/dnssec/dnssec-verify.docbook SGML 2012,2014,2015,2016,2018,2019,2020 -./bin/dnssec/dnssec-verify.html HTML DOCBOOK +./bin/dnssec/dnssec-verify.rst RST 2020 ./bin/dnssec/dnssectool.c C 2000,2001,2003,2004,2005,2007,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/dnssec/dnssectool.h C 2000,2001,2003,2004,2007,2008,2009,2010,2011,2012,2014,2015,2016,2017,2018,2019,2020 ./bin/dnssec/win32/cds.vcxproj.filters.in X 2019,2020 @@ -177,12 +144,8 @@ ./bin/named/log.c C 1999,2000,2001,2002,2004,2005,2006,2007,2009,2013,2014,2016,2017,2018,2019,2020 ./bin/named/logconf.c C 1999,2000,2001,2004,2005,2006,2007,2011,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/named/main.c C 1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/named/named.8 MAN DOCBOOK -./bin/named/named.conf.5 MAN DOCBOOK -./bin/named/named.conf.docbook SGML 2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/named/named.conf.html HTML DOCBOOK -./bin/named/named.docbook SGML 2000,2001,2003,2004,2005,2006,2007,2008,2009,2011,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/named/named.html HTML DOCBOOK +./bin/named/named.conf.rst RST 2020 +./bin/named/named.rst RST 2020 ./bin/named/server.c C 1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/named/statschannel.c C 2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/named/tkeyconf.c C 1999,2000,2001,2004,2005,2006,2007,2009,2010,2012,2014,2016,2017,2018,2019,2020 @@ -200,29 +163,19 @@ ./bin/named/win32/os.c C 1999,2000,2001,2002,2004,2005,2007,2008,2009,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/named/xsl_p.h X 2007,2008,2009,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./bin/named/zoneconf.c C 1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/nsupdate/nsupdate.1 MAN DOCBOOK ./bin/nsupdate/nsupdate.c C 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/nsupdate/nsupdate.docbook SGML 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2014,2015,2016,2017,2018,2019,2020 -./bin/nsupdate/nsupdate.html HTML DOCBOOK +./bin/nsupdate/nsupdate.rst RST 2020 ./bin/nsupdate/win32/nsupdate.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/nsupdate/win32/nsupdate.vcxproj.in X 2013,2014,2015,2016,2017,2018,2019,2020 ./bin/nsupdate/win32/nsupdate.vcxproj.user X 2013,2018,2019,2020 -./bin/pkcs11/pkcs11-destroy.8 MAN DOCBOOK ./bin/pkcs11/pkcs11-destroy.c X 2009,2010,2014,2015,2018,2019,2020 -./bin/pkcs11/pkcs11-destroy.docbook SGML 2009,2014,2015,2016,2018,2019,2020 -./bin/pkcs11/pkcs11-destroy.html HTML DOCBOOK -./bin/pkcs11/pkcs11-keygen.8 MAN DOCBOOK +./bin/pkcs11/pkcs11-destroy.rst RST 2020 ./bin/pkcs11/pkcs11-keygen.c X 2009,2014,2015,2017,2018,2019,2020 -./bin/pkcs11/pkcs11-keygen.docbook SGML 2009,2014,2015,2016,2017,2018,2019,2020 -./bin/pkcs11/pkcs11-keygen.html HTML DOCBOOK -./bin/pkcs11/pkcs11-list.8 MAN DOCBOOK +./bin/pkcs11/pkcs11-keygen.rst RST 2020 ./bin/pkcs11/pkcs11-list.c C 2009,2014,2015,2016,2018,2019,2020 -./bin/pkcs11/pkcs11-list.docbook SGML 2009,2014,2015,2016,2018,2019,2020 -./bin/pkcs11/pkcs11-list.html HTML DOCBOOK -./bin/pkcs11/pkcs11-tokens.8 MAN DOCBOOK +./bin/pkcs11/pkcs11-list.rst RST 2020 ./bin/pkcs11/pkcs11-tokens.c C 2014,2015,2016,2018,2019,2020 -./bin/pkcs11/pkcs11-tokens.docbook SGML 2014,2015,2016,2018,2019,2020 -./bin/pkcs11/pkcs11-tokens.html HTML DOCBOOK +./bin/pkcs11/pkcs11-tokens.rst RST 2020 ./bin/pkcs11/win32/pk11destroy.vcxproj.filters.in X 2013,2014,2015,2018,2019,2020 ./bin/pkcs11/win32/pk11destroy.vcxproj.in X 2013,2014,2015,2016,2017,2018,2019,2020 ./bin/pkcs11/win32/pk11destroy.vcxproj.user X 2013,2018,2019,2020 @@ -235,18 +188,12 @@ ./bin/pkcs11/win32/pk11tokens.vcxproj.filters.in X 2014,2015,2018,2019,2020 ./bin/pkcs11/win32/pk11tokens.vcxproj.in X 2014,2015,2016,2017,2018,2019,2020 ./bin/pkcs11/win32/pk11tokens.vcxproj.user X 2014,2018,2019,2020 -./bin/plugins/filter-aaaa.8 MAN DOCBOOK ./bin/plugins/filter-aaaa.c C 2018,2019,2020 -./bin/plugins/filter-aaaa.docbook SGML 2018,2019,2020 -./bin/plugins/filter-aaaa.html HTML DOCBOOK +./bin/plugins/filter-aaaa.rst RST 2020 ./bin/rndc/include/rndc/os.h C 2001,2004,2005,2007,2009,2016,2018,2019,2020 -./bin/rndc/rndc.8 MAN DOCBOOK ./bin/rndc/rndc.c C 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/rndc/rndc.conf.5 MAN DOCBOOK -./bin/rndc/rndc.conf.docbook SGML 2000,2001,2004,2005,2007,2013,2014,2015,2016,2018,2019,2020 -./bin/rndc/rndc.conf.html HTML DOCBOOK -./bin/rndc/rndc.docbook SGML 2000,2001,2004,2005,2007,2013,2014,2015,2016,2017,2018,2019,2020 -./bin/rndc/rndc.html HTML DOCBOOK +./bin/rndc/rndc.conf.rst RST 2020 +./bin/rndc/rndc.rst RST 2020 ./bin/rndc/util.c C 2000,2001,2004,2005,2007,2015,2016,2018,2019,2020 ./bin/rndc/util.h C 2000,2001,2004,2005,2007,2009,2016,2018,2019,2020 ./bin/rndc/win32/rndc.vcxproj.filters.in X 2013,2015,2018,2019,2020 @@ -255,7 +202,6 @@ ./bin/rndc/win32/rndcutil.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/rndc/win32/rndcutil.vcxproj.in X 2013,2015,2016,2017,2018,2019,2020 ./bin/rndc/win32/rndcutil.vcxproj.user X 2013,2018,2019,2020 -./bin/tests/cfg_test.c C 2001,2002,2004,2005,2007,2009,2010,2011,2015,2016,2018,2019,2020 ./bin/tests/fromhex.pl PERL 2015,2016,2018,2019,2020 ./bin/tests/headerdep_test.sh.in SH 2000,2001,2004,2007,2012,2016,2018,2019,2020 ./bin/tests/prepare-softhsm2.sh SH 2020 @@ -1024,34 +970,20 @@ ./bin/tests/win32/timer_test.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/tests/win32/timer_test.vcxproj.in X 2013,2015,2016,2017,2018,2019,2020 ./bin/tests/win32/timer_test.vcxproj.user X 2013,2018,2019,2020 -./bin/tools/arpaname.1 MAN DOCBOOK ./bin/tools/arpaname.c C 2009,2015,2016,2018,2019,2020 -./bin/tools/arpaname.docbook SGML 2009,2014,2015,2016,2018,2019,2020 -./bin/tools/arpaname.html HTML DOCBOOK -./bin/tools/dnstap-read.1 MAN DOCBOOK +./bin/tools/arpaname.rst RST 2020 ./bin/tools/dnstap-read.c C 2015,2016,2017,2018,2019,2020 -./bin/tools/dnstap-read.docbook SGML 2015,2016,2017,2018,2019,2020 -./bin/tools/dnstap-read.html HTML DOCBOOK -./bin/tools/mdig.1 MAN DOCBOOK +./bin/tools/dnstap-read.rst RST 2020 ./bin/tools/mdig.c C 2015,2016,2017,2018,2019,2020 -./bin/tools/mdig.docbook SGML 2015,2016,2017,2018,2019,2020 -./bin/tools/mdig.html HTML DOCBOOK -./bin/tools/named-journalprint.8 MAN DOCBOOK +./bin/tools/mdig.rst RST 2020 ./bin/tools/named-journalprint.c C 2000,2001,2004,2005,2006,2007,2008,2009,2015,2016,2018,2019,2020 -./bin/tools/named-journalprint.docbook SGML 2009,2014,2015,2016,2017,2018,2019,2020 -./bin/tools/named-journalprint.html HTML DOCBOOK -./bin/tools/named-nzd2nzf.8 MAN DOCBOOK +./bin/tools/named-journalprint.rst RST 2020 ./bin/tools/named-nzd2nzf.c C 2016,2017,2018,2019,2020 -./bin/tools/named-nzd2nzf.docbook SGML 2016,2018,2019,2020 -./bin/tools/named-nzd2nzf.html HTML DOCBOOK -./bin/tools/named-rrchecker.1 MAN DOCBOOK +./bin/tools/named-nzd2nzf.rst RST 2020 ./bin/tools/named-rrchecker.c C 2013,2015,2016,2017,2018,2019,2020 -./bin/tools/named-rrchecker.docbook SGML 2013,2014,2015,2016,2018,2019,2020 -./bin/tools/named-rrchecker.html HTML DOCBOOK -./bin/tools/nsec3hash.8 MAN DOCBOOK +./bin/tools/named-rrchecker.rst RST 2020 ./bin/tools/nsec3hash.c C 2006,2008,2009,2011,2014,2016,2017,2018,2019,2020 -./bin/tools/nsec3hash.docbook SGML 2009,2014,2015,2016,2017,2018,2019,2020 -./bin/tools/nsec3hash.html HTML DOCBOOK +./bin/tools/nsec3hash.rst RST 2020 ./bin/tools/win32/arpaname.vcxproj.filters.in X 2013,2015,2018,2019,2020 ./bin/tools/win32/arpaname.vcxproj.in X 2013,2015,2016,2017,2018,2019,2020 ./bin/tools/win32/arpaname.vcxproj.user X 2013,2018,2019,2020 @@ -1192,106 +1124,31 @@ ./contrib/scripts/nanny.pl PERL 2000,2001,2004,2007,2012,2014,2016,2018,2019,2020 ./contrib/scripts/zone-edit.sh.in SH 2010,2012,2014,2016,2018,2019,2020 ./custom-test-driver X 2020 -./doc/arm/Bv9ARM-book.xml SGML 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch01.html X 2000,2001,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch02.html X 2000,2001,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch03.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch04.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch05.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch06.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch07.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch08.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch09.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch10.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch11.html X 2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.ch12.html X 2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.conf X 2015,2018,2019 -./doc/arm/Bv9ARM.html X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/Bv9ARM.pdf X 2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/README-SGML TXT.BRIEF 2000,2001,2004,2015,2016,2018,2019,2020 -./doc/arm/acl.grammar.xml SGML 2018,2019,2020 -./doc/arm/catz.xml SGML 2016,2017,2018,2019,2020 -./doc/arm/controls.grammar.xml SGML 2018,2019,2020 -./doc/arm/delegation-only.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/dlz.xml SGML 2012,2013,2014,2015,2016,2018,2019,2020 -./doc/arm/dnssec-policy.grammar.xml SGML 2019,2020 -./doc/arm/dnssec.xml SGML 2010,2011,2015,2016,2017,2018,2019,2020 -./doc/arm/dyndb.xml SGML 2015,2016,2018,2019,2020 -./doc/arm/forward.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/hint.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/in-view.zoneopt.xml SGML 2018,2019,2020 +./doc/arm/advanced.rst RST 2020 +./doc/arm/catz.rst RST 2020 +./doc/arm/conf.py PYTHON 2020 +./doc/arm/configuration.rst RST 2020 +./doc/arm/dlz.rst RST 2020 +./doc/arm/dnssec.rst RST 2020 +./doc/arm/dyndb.rst RST 2020 +./doc/arm/general.rst RST 2020 +./doc/arm/history.rst RST 2020 +./doc/arm/index.rst RST 2020 +./doc/arm/introduction.rst RST 2020 ./doc/arm/isc-logo.pdf X 2005,2010,2018,2019,2020 -./doc/arm/key.grammar.xml SGML 2018,2019,2020 -./doc/arm/libdns.xml SGML 2010,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/logging-categories.xml SGML 2015,2016,2017,2018,2019,2020 -./doc/arm/logging.grammar.xml SGML 2018,2019,2020 -./doc/arm/man.arpaname.html X 2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.ddns-confgen.html X 2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.delv.html X 2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dig.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-cds.html X 2017,2018,2019,2020 -./doc/arm/man.dnssec-dsfromkey.html X 2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-importkey.html X 2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-keyfromlabel.html X 2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-keygen.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-revoke.html X 2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-settime.html X 2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-signzone.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnssec-verify.html X 2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.dnstap-read.html X 2015,2016,2017,2018,2019,2020 -./doc/arm/man.filter-aaaa.html X 2018,2019,2020 -./doc/arm/man.host.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.mdig.html X 2016,2017,2018,2019,2020 -./doc/arm/man.named-checkconf.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.named-checkzone.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.named-journalprint.html X 2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.named-nzd2nzf.html X 2016,2017,2018,2019,2020 -./doc/arm/man.named-rrchecker.html X 2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.named.conf.html X 2015,2016,2017,2018,2019,2020 -./doc/arm/man.named.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.nsec3hash.html X 2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.nslookup.html X 2016,2017,2018,2019,2020 -./doc/arm/man.nsupdate.html X 2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.pkcs11-destroy.html X 2016,2017,2018,2019,2020 -./doc/arm/man.pkcs11-keygen.html X 2016,2017,2018,2019,2020 -./doc/arm/man.pkcs11-list.html X 2016,2017,2018,2019,2020 -./doc/arm/man.pkcs11-tokens.html X 2016,2017,2018,2019,2020 -./doc/arm/man.rndc-confgen.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.rndc.conf.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/man.rndc.html X 2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/managed-keys.grammar.xml SGML 2018,2019,2020 -./doc/arm/managed-keys.xml SGML 2010,2014,2015,2016,2017,2018,2019,2020 -./doc/arm/master.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/masters.grammar.xml SGML 2018,2019,2020 -./doc/arm/mirror.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/notes-9.17.0.xml SGML 2020 +./doc/arm/libdns.rst RST 2020 +./doc/arm/logging-categories.rst RST 2020 +./doc/arm/managed-keys.rst RST 2020 +./doc/arm/manpages.rst RST 2020 ./doc/arm/notes-9.17.1.xml SGML 2020 ./doc/arm/notes-9.17.2.xml SGML 2020 -./doc/arm/notes-download.xml SGML 2019,2020 -./doc/arm/notes-eol.xml SGML 2019,2020 -./doc/arm/notes-intro.xml SGML 2019,2020 -./doc/arm/notes-license.xml SGML 2019,2020 -./doc/arm/notes-platforms.xml SGML 2019,2020 -./doc/arm/notes-thankyou.xml SGML 2019,2020 -./doc/arm/notes-wrapper.xml SGML 2014,2015,2016,2018,2019,2020 -./doc/arm/notes.conf X 2015,2018,2019 -./doc/arm/notes.html X 2014,2015,2016,2017,2018,2019,2020 -./doc/arm/notes.pdf X 2014,2015,2016,2017,2018,2019,2020 -./doc/arm/notes.xml SGML 2014,2015,2016,2017,2018,2019,2020 -./doc/arm/noteversion.xml.in SGML 2015,2016,2018,2019,2020 -./doc/arm/options.grammar.xml SGML 2018,2019,2020 -./doc/arm/pkcs11.xml SGML 2010,2012,2013,2014,2015,2016,2018,2019,2020 -./doc/arm/pkgversion.xml.in SGML 2015,2016,2018,2019,2020 -./doc/arm/plugins.xml SGML 2018,2019,2020 -./doc/arm/redirect.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/releaseinfo.xml.in SGML 2015,2016,2018,2019,2020 -./doc/arm/server.grammar.xml SGML 2018,2019,2020 -./doc/arm/slave.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/static-stub.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/statistics-channels.grammar.xml SGML 2018,2019,2020 -./doc/arm/stub.zoneopt.xml SGML 2018,2019,2020 -./doc/arm/trust-anchors.grammar.xml SGML 2019,2020 -./doc/arm/trusted-keys.grammar.xml SGML 2018,2019,2020 +./doc/arm/notes.rst RST 2020 +./doc/arm/pkcs11.rst RST 2020 +./doc/arm/plugins.rst RST 2020 +./doc/arm/reference.rst RST 2020 +./doc/arm/requirements.rst RST 2020 +./doc/arm/security.rst RST 2020 +./doc/arm/troubleshooting.rst RST 2020 ./doc/design/addressdb TXT.BRIEF 2000,2001,2004,2016,2018,2019,2020 ./doc/design/cds-child TXT.BRIEF 2015,2016,2018,2019,2020 ./doc/design/compression TXT.BRIEF 1999,2000,2001,2004,2016,2018,2019,2020 @@ -1315,7 +1172,6 @@ ./doc/design/zone TXT.BRIEF 1999,2000,2001,2004,2016,2018,2019,2020 ./doc/dev/DBC TXT.BRIEF 1999,2000,2001,2004,2016,2018,2019,2020 ./doc/dev/autoconf TXT.BRIEF 2001,2002,2004,2016,2018,2019,2020 -./doc/dev/coding.html HTML 1999,2000,2001,2002,2004,2007,2016,2018,2019,2020 ./doc/dev/cvs-usage TXT.BRIEF 2000,2001,2004,2016,2018,2019,2020 ./doc/dev/magic_numbers TXT.BRIEF 1999,2000,2001,2002,2004,2016,2018,2019,2020 ./doc/dev/rdata.md MKD 1999,2000,2001,2004,2007,2016,2017,2018,2019 @@ -1325,54 +1181,63 @@ ./doc/dev/unexpected TXT.BRIEF 1999,2000,2001,2004,2016,2018,2019,2020 ./doc/doxygen/Doxyfile.in X 2006,2017,2018,2019,2020 ./doc/doxygen/doxygen-input-filter.in PERL 2006,2007,2012,2016,2018,2019,2020 -./doc/doxygen/isc-footer.html HTML 2006,2007,2016,2018,2019,2020 -./doc/doxygen/isc-header.html HTML 2006,2007,2016,2018,2019,2020 ./doc/doxygen/mainpage X 2006,2018,2019,2020 +./doc/man/arpaname.rst RST 2020 +./doc/man/conf.py PYTHON 2020 +./doc/man/ddns-confgen.rst RST 2020 +./doc/man/delv.rst RST 2020 +./doc/man/dig.rst RST 2020 +./doc/man/dnssec-cds.rst RST 2020 +./doc/man/dnssec-dsfromkey.rst RST 2020 +./doc/man/dnssec-importkey.rst RST 2020 +./doc/man/dnssec-keyfromlabel.rst RST 2020 +./doc/man/dnssec-keygen.rst RST 2020 +./doc/man/dnssec-revoke.rst RST 2020 +./doc/man/dnssec-settime.rst RST 2020 +./doc/man/dnssec-signzone.rst RST 2020 +./doc/man/dnssec-verify.rst RST 2020 +./doc/man/dnstap-read.rst RST 2020 +./doc/man/filter-aaaa.rst RST 2020 +./doc/man/host.rst RST 2020 +./doc/man/index.rst RST 2020 +./doc/man/mdig.rst RST 2020 +./doc/man/named-checkconf.rst RST 2020 +./doc/man/named-checkzone.rst RST 2020 +./doc/man/named-journalprint.rst RST 2020 +./doc/man/named-nzd2nzf.rst RST 2020 +./doc/man/named-rrchecker.rst RST 2020 +./doc/man/named.conf.rst RST 2020 +./doc/man/named.rst RST 2020 +./doc/man/nsec3hash.rst RST 2020 +./doc/man/nslookup.rst RST 2020 +./doc/man/nsupdate.rst RST 2020 +./doc/man/pkcs11-destroy.rst RST 2020 +./doc/man/pkcs11-keygen.rst RST 2020 +./doc/man/pkcs11-list.rst RST 2020 +./doc/man/pkcs11-tokens.rst RST 2020 +./doc/man/rndc-confgen.rst RST 2020 +./doc/man/rndc.conf.rst RST 2020 +./doc/man/rndc.rst RST 2020 +./doc/misc/cfg_test.c C 2020 ./doc/misc/delegation-only.zoneopt X 2018,2019,2020 -./doc/misc/dnssec TXT.BRIEF 2000,2001,2002,2004,2016,2018,2019,2020 -./doc/misc/docbook-grammars.pl PERL 2018,2019,2020 -./doc/misc/docbook-options.pl PERL 2017,2018,2019,2020 -./doc/misc/docbook-zoneopt.pl PERL 2018,2019,2020 ./doc/misc/format-options.pl PERL 2001,2004,2007,2012,2016,2018,2019,2020 ./doc/misc/forward.zoneopt X 2018,2019,2020 ./doc/misc/hint.zoneopt X 2018,2019,2020 ./doc/misc/in-view.zoneopt X 2018,2019,2020 -./doc/misc/ipv6 TXT.BRIEF 2000,2001,2004,2016,2018,2019,2020 ./doc/misc/master.zoneopt X 2018,2019,2020 -./doc/misc/migration TXT.BRIEF 2000,2001,2003,2004,2007,2008,2016,2018,2019,2020 -./doc/misc/migration-4to9 TXT.BRIEF 2001,2004,2016,2018,2019,2020 ./doc/misc/mirror.zoneopt X 2018,2019,2020 +./doc/misc/named.conf.rst RST 2020 ./doc/misc/options X 2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020 ./doc/misc/options.active X 2019,2020 ./doc/misc/redirect.zoneopt X 2018,2019,2020 ./doc/misc/rfc-compliance TXT.BRIEF 2001,2004,2015,2016,2018,2019,2020 -./doc/misc/roadmap TXT.BRIEF 2000,2001,2004,2016,2017,2018,2019,2020 +./doc/misc/rst-grammars.pl PERL 2020 +./doc/misc/rst-options.pl PERL 2020 +./doc/misc/rst-zoneopt.pl PERL 2020 ./doc/misc/slave.zoneopt X 2018,2019,2020 ./doc/misc/sort-options.pl PERL 2007,2012,2016,2018,2019,2020 ./doc/misc/static-stub.zoneopt X 2018,2019,2020 ./doc/misc/stub.zoneopt X 2018,2019,2020 -./doc/misc/tcp-fast-open TXT.BRIEF 2016,2017,2018,2019,2020 -./doc/tex/armstyle.sty.in X 2015,2018,2019,2020 -./doc/tex/notestyle.sty X 2015,2018,2019,2020 -./doc/xsl/arm-param.xsl SGML 2015,2016,2018,2019,2020 -./doc/xsl/copyright.xsl SGML 2005,2007,2009,2015,2016,2018,2019,2020 -./doc/xsl/graphics/caution.eps X 2015,2018,2019,2020 -./doc/xsl/graphics/caution.pdf X 2015,2018,2019,2020 -./doc/xsl/graphics/important.eps X 2015,2018,2019,2020 -./doc/xsl/graphics/important.pdf X 2015,2018,2019,2020 -./doc/xsl/graphics/note.eps X 2015,2018,2019,2020 -./doc/xsl/graphics/note.pdf X 2015,2018,2019,2020 -./doc/xsl/graphics/tip.eps X 2015,2018,2019,2020 -./doc/xsl/graphics/tip.pdf X 2015,2018,2019,2020 -./doc/xsl/graphics/warning.eps X 2015,2018,2019,2020 -./doc/xsl/graphics/warning.pdf X 2015,2018,2019,2020 -./doc/xsl/isc-docbook-chunk.xsl.in SGML 2005,2007,2014,2015,2016,2018,2019,2020 -./doc/xsl/isc-docbook-html.xsl.in SGML 2005,2007,2014,2015,2016,2018,2019,2020 -./doc/xsl/isc-docbook-text.xsl SGML 2005,2007,2015,2016,2018,2019,2020 -./doc/xsl/isc-manpage.xsl.in SGML 2005,2007,2015,2016,2018,2019,2020 -./doc/xsl/isc-notes-html.xsl.in SGML 2015,2016,2018,2019,2020 -./doc/xsl/notes-param.xsl SGML 2015,2016,2018,2019,2020 -./doc/xsl/pre-latex.xsl SGML 2005,2007,2015,2016,2018,2019,2020 ./docutil/HTML_COPYRIGHT X 2001,2004,2016,2018,2019,2020 ./docutil/MAN_COPYRIGHT X 2001,2004,2016,2018,2019,2020 ./docutil/patch-db2latex-duplicate-template-bug X 2007,2018,2019,2020 @@ -2329,5 +2194,4 @@ ./win32utils/Configure PERL 2013,2014,2015,2016,2017,2018,2019,2020 ./win32utils/GeoIP.diff X 2013,2018,2019,2020 ./win32utils/bind9.sln.in X 2013,2014,2015,2016,2017,2018,2019,2020 -./win32utils/index.html HTML 2006,2007,2008,2012,2013,2014,2015,2016,2018,2019,2020 ./win32utils/libuv.diff X 2020 diff --git a/util/merge_copyrights b/util/merge_copyrights index 3e4f24bea9..5145f298c1 100644 --- a/util/merge_copyrights +++ b/util/merge_copyrights @@ -56,6 +56,10 @@ while () { \.conf\.in$ | # configuration files /(dnssafe|openssl)/.*\.[ch]$ | # imported doc/(draft|expired|rfc)/ | # imported + \.*in$ | # the generated documentation doesn't really need copyright + grammar\.rst$ | # -"- + zoneopt\.rst$ | # -"- + zoneopt$ | # -"- \.txt$ # text files don't really need copyright %x); @@ -86,9 +90,12 @@ while () { } elsif ($base =~ /\.sh$/) { $file_types{$_} = "SH"; } elsif ($base =~ /\.docbook$/ || - $base =~ /.xsl$/ || - $base =~ /.xml$/) { + $base =~ /\.xsl$/ || + $base =~ /\.xml$/) { $file_types{$_} = "SGML"; + } elsif ($base =~ /\.rst$/ || + $base =~ /\.inc$/) { + $file_types{$_} = "RST"; } elsif ($base =~ /doc\/arm\/.*\.html$/) { $file_types{$_} = "X"; } elsif ($base =~ /\.(sty|pdf|eps)$/) { diff --git a/util/update_copyrights b/util/update_copyrights index c3d44da19e..71b508051e 100644 --- a/util/update_copyrights +++ b/util/update_copyrights @@ -178,6 +178,7 @@ foreach $file (keys %file_types) { $sgml_comment = 0; $mkd_comment = 0; $man_comment = 0; + $rst_comment = 0; $python_comment = 0; $python_bin_comment = 0; $start_comment = ""; @@ -218,7 +219,12 @@ foreach $file (keys %file_types) { $prefix = " - "; $end_comment = "-->"; } elsif ($type eq "TXT") { - $prefix = ""; + $prefix = ""; + } elsif ($type eq "RST") { + $rst_comment = 1; + $start_comment = ".. \n"; + $prefix = " "; + $end_comment = ""; } else { print "$file: type '$type' not supported yet; skipping\n"; $ret++; @@ -334,7 +340,7 @@ foreach $file (keys %file_types) { if (/^; - next if (eof(SOURCE)); + next if (eof(SOURCE)); $before_copyright = "$before_copyright$_"; if (/]>$/) { @@ -406,6 +412,22 @@ foreach $file (keys %file_types) { } else { $first = $_; } + } elsif ($rst_comment) { + if ($_ =~ /\.\. \n/) { + $_ = ; + if ($_ !~ /[Cc]opyright/) { + print "$file: non-copyright comment\n"; + close(SOURCE); + $ret++; + next; + } + while () { + if ($_ !~ /^ /) { + last; + } + } + } + $first = $_; } elsif ($type eq "TXT") { if ($_ =~ /[Cc]opyright/) { $/ = ""; # paragraph at a time @@ -496,7 +518,11 @@ foreach $file (keys %file_types) { foreach $_ (@lines) { next if (/\@SYSYEARS\@/ && $sysyears eq ""); s:modify, and distribute:modify, and/or distribute: if ($andor); - print TARGET (/^$/ ? $nonspaceprefix : $prefix); + if ($type eq "RST") { + print TARGET $prefix; + } else { + print TARGET (/^$/ ? $nonspaceprefix : $prefix); + } s/\@SYSYEARS\@/$sysyears/; s/\@NOMYEARS\@/$nomyears/; print TARGET "$_"; diff --git a/win32utils/index.html b/win32utils/index.html deleted file mode 100644 index 04e6dfbf07..0000000000 --- a/win32utils/index.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - -Bind9 docs index - - -Bind 9.x documents - -BIND tools: - - -