diff --git a/bin/check/named-checkzone.8 b/bin/check/named-checkzone.8 index 3600755140..4d4153be47 100644 --- a/bin/check/named-checkzone.8 +++ b/bin/check/named-checkzone.8 @@ -1,4 +1,4 @@ -.\" Copyright (C) 2004-2007 Internet Systems Consortium, Inc. ("ISC") +.\" Copyright (C) 2004-2007, 2009 Internet Systems Consortium, Inc. ("ISC") .\" Copyright (C) 2000-2002 Internet Software Consortium. .\" .\" Permission to use, copy, modify, and distribute this software for any @@ -13,7 +13,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: named-checkzone.8,v 1.42 2007/06/20 02:27:32 marka Exp $ +.\" $Id: named-checkzone.8,v 1.43 2009/01/21 01:12:07 tbox Exp $ .\" .hy 0 .ad l @@ -82,7 +82,7 @@ When loading the zone file read the journal if it exists. .PP \-c \fIclass\fR .RS 4 -Specify the class of the zone. If not specified "IN" is assumed. +Specify the class of the zone. If not specified, "IN" is assumed. .RE .PP \-i \fImode\fR @@ -272,7 +272,7 @@ BIND 9 Administrator Reference Manual. .PP Internet Systems Consortium .SH "COPYRIGHT" -Copyright \(co 2004\-2007 Internet Systems Consortium, Inc. ("ISC") +Copyright \(co 2004\-2007, 2009 Internet Systems Consortium, Inc. ("ISC") .br Copyright \(co 2000\-2002 Internet Software Consortium. .br diff --git a/bin/check/named-checkzone.html b/bin/check/named-checkzone.html index 4e0b5ea0a2..52ab314e45 100644 --- a/bin/check/named-checkzone.html +++ b/bin/check/named-checkzone.html @@ -1,5 +1,5 @@ - +
@@ -33,7 +33,7 @@named-compilezone
[-d
] [-j
] [-q
] [-v
] [-c
] [class
-C
] [mode
-f
] [format
-F
] [format
-i
] [mode
-k
] [mode
-m
] [mode
-n
] [mode
-o
] [filename
-s
] [style
-t
] [directory
-w
] [directory
-D
] [-W
] {zonename} {filename}mode
named-checkzone checks the syntax and integrity of a zone file. It performs the same checks as named does when loading a @@ -53,7 +53,7 @@
@@ -78,7 +78,7 @@
class
- Specify the class of the zone. If not specified "IN" is assumed. + Specify the class of the zone. If not specified, "IN" is assumed.
mode
named-checkzone returns an exit status of 1 if errors were detected and 0 otherwise.
dig
[global-queryopt...] [query...]
dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and @@ -80,7 +80,7 @@
The -b
option sets the source IP address of the query
to address
. This must be a valid
@@ -230,7 +230,7 @@
dig provides a number of query options which affect the way in which lookups are made and the results displayed. Some of @@ -529,7 +529,7 @@ on its own line.
- If not specified dig will look for
+ If not specified, dig will look for
/etc/trusted-key.key
then
trusted-key.key
in the current directory.
The BIND 9 implementation of dig supports @@ -599,7 +599,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
If dig has been built with IDN (internationalized domain name) support, it can accept and display non-ASCII domain names. @@ -613,14 +613,14 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
host(1), named(8), dnssec-keygen(8), @@ -628,7 +628,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
There are probably too many query options.
diff --git a/bin/dig/host.1 b/bin/dig/host.1 index 2ec7d17c5f..f96f2746b8 100644 --- a/bin/dig/host.1 +++ b/bin/dig/host.1 @@ -1,4 +1,4 @@ -.\" Copyright (C) 2004, 2005, 2007, 2008 Internet Systems Consortium, Inc. ("ISC") +.\" Copyright (C) 2004, 2005, 2007-2009 Internet Systems Consortium, Inc. ("ISC") .\" Copyright (C) 2000-2002 Internet Software Consortium. .\" .\" Permission to use, copy, modify, and distribute this software for any @@ -13,7 +13,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: host.1,v 1.29 2008/04/05 01:09:34 tbox Exp $ +.\" $Id: host.1,v 1.30 2009/01/21 01:12:07 tbox Exp $ .\" .hy 0 .ad l @@ -132,7 +132,7 @@ option enables \fBhost\fR to mimic the behavior of a name server by making non\-recursive queries and expecting to receive answers to those queries that are usually referrals to other name servers. .PP -By default +By default, \fBhost\fR uses UDP when making queries. The \fB\-T\fR @@ -154,7 +154,7 @@ option is used to select the query type. \fItype\fR can be any recognized query type: CNAME, NS, SOA, SIG, KEY, AXFR, etc. When no query type is specified, \fBhost\fR -automatically selects an appropriate query type. By default it looks for A, AAAA, and MX records, but if the +automatically selects an appropriate query type. By default, it looks for A, AAAA, and MX records, but if the \fB\-C\fR option was given, queries will be made for SOA records, and if \fIname\fR @@ -213,7 +213,7 @@ runs. \fBdig\fR(1), \fBnamed\fR(8). .SH "COPYRIGHT" -Copyright \(co 2004, 2005, 2007, 2008 Internet Systems Consortium, Inc. ("ISC") +Copyright \(co 2004, 2005, 2007\-2009 Internet Systems Consortium, Inc. ("ISC") .br Copyright \(co 2000\-2002 Internet Software Consortium. .br diff --git a/bin/dig/host.html b/bin/dig/host.html index 6d14ef532e..30ece61874 100644 --- a/bin/dig/host.html +++ b/bin/dig/host.html @@ -1,5 +1,5 @@ - + @@ -32,7 +32,7 @@host
[-aCdlnrsTwv
] [-c
] [class
-N
] [ndots
-R
] [number
-t
] [type
-W
] [wait
-m
] [flag
-4
] [-6
] {name} [server]
host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. @@ -130,7 +130,7 @@ referrals to other name servers.
- By default host uses UDP when making
+ By default, host uses UDP when making
queries. The
-T
option makes it use a TCP connection when querying
the name server. TCP will be automatically selected for queries that
@@ -148,7 +148,7 @@
NS, SOA, SIG, KEY, AXFR, etc. When no query type is specified,
host automatically selects an appropriate
query
- type. By default it looks for A, AAAA, and MX records, but if the
+ type. By default, it looks for A, AAAA, and MX records, but if the
-C
option was given, queries will be made for SOA
records, and if name
is a
dotted-decimal IPv4
@@ -184,7 +184,7 @@
If host has been built with IDN (internationalized domain name) support, it can accept and display non-ASCII domain names. @@ -198,12 +198,12 @@
dig(1), named(8).
diff --git a/bin/named/lwresd.8 b/bin/named/lwresd.8 index 2c4e3bc34a..6d188d76ed 100644 --- a/bin/named/lwresd.8 +++ b/bin/named/lwresd.8 @@ -1,4 +1,4 @@ -.\" Copyright (C) 2004, 2005, 2007, 2008 Internet Systems Consortium, Inc. ("ISC") +.\" Copyright (C) 2004, 2005, 2007-2009 Internet Systems Consortium, Inc. ("ISC") .\" Copyright (C) 2000, 2001 Internet Software Consortium. .\" .\" Permission to use, copy, modify, and distribute this software for any @@ -13,7 +13,7 @@ .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR .\" PERFORMANCE OF THIS SOFTWARE. .\" -.\" $Id: lwresd.8,v 1.29 2008/11/07 01:11:19 tbox Exp $ +.\" $Id: lwresd.8,v 1.30 2009/01/21 01:12:07 tbox Exp $ .\" .hy 0 .ad l @@ -42,7 +42,7 @@ is the daemon providing name lookup services to clients that use the BIND 9 ligh \fBlwresd\fR listens for resolver queries on a UDP port on the IPv4 loopback interface, 127.0.0.1. This means that \fBlwresd\fR -can only be used by processes running on the local machine. By default UDP port number 921 is used for lightweight resolver requests and responses. +can only be used by processes running on the local machine. By default, UDP port number 921 is used for lightweight resolver requests and responses. .PP Incoming lightweight resolver requests are decoded by the server which then resolves them using the DNS protocol. When the DNS lookup completes, \fBlwresd\fR @@ -217,7 +217,7 @@ The default process\-id file. .PP Internet Systems Consortium .SH "COPYRIGHT" -Copyright \(co 2004, 2005, 2007, 2008 Internet Systems Consortium, Inc. ("ISC") +Copyright \(co 2004, 2005, 2007\-2009 Internet Systems Consortium, Inc. ("ISC") .br Copyright \(co 2000, 2001 Internet Software Consortium. .br diff --git a/bin/named/lwresd.html b/bin/named/lwresd.html index 65f65e32b2..1b6183a1a3 100644 --- a/bin/named/lwresd.html +++ b/bin/named/lwresd.html @@ -1,5 +1,5 @@ - + @@ -32,7 +32,7 @@lwresd
[-c
] [config-file
-C
] [config-file
-d
] [debug-level
-f
] [-g
] [-i
] [pid-file
-m
] [flag
-n
] [#cpus
-P
] [port
-p
] [port
-s
] [-t
] [directory
-u
] [user
-v
] [-4
] [-6
]
lwresd is the daemon providing name lookup services to clients that use the BIND 9 lightweight resolver @@ -44,7 +44,7 @@ listens for resolver queries on a UDP port on the IPv4 loopback interface, 127.0.0.1. This means that lwresd can only be used by - processes running on the local machine. By default UDP port + processes running on the local machine. By default, UDP port number 921 is used for lightweight resolver requests and responses.
@@ -67,7 +67,7 @@nsupdate
[-d
] [-D
] [[-y
] | [[hmac:]keyname:secret
-k
]] [keyfile
-t
] [timeout
-u
] [udptimeout
-r
] [udpretries
-R
] [randomdev
-v
] [filename]
nsupdate is used to submit Dynamic DNS Update requests as defined in RFC2136 to a name server. @@ -125,7 +125,7 @@ specified is not an HMAC-MD5 key.
- By default + By default, nsupdate uses UDP to send update requests to the name server unless they are too large to fit in a UDP request in which case TCP will be used. @@ -168,7 +168,7 @@
The TSIG key is redundantly stored in two separate files. This is a consequence of nsupdate using the DST library diff --git a/doc/arm/Bv9ARM.ch06.html b/doc/arm/Bv9ARM.ch06.html index 7a800102ab..d8450f0efa 100644 --- a/doc/arm/Bv9ARM.ch06.html +++ b/doc/arm/Bv9ARM.ch06.html @@ -14,7 +14,7 @@ - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR - PERFORMANCE OF THIS SOFTWARE. --> - +
@@ -89,14 +89,14 @@ Statement Grammar- Enable or disable all empty zones. By default they + Enable or disable all empty zones. By default, they are enabled.
- Disable individual empty zones. By default none are + Disable individual empty zones. By default, none are disabled. This option can be specified multiple times.
zone_name
[
zone_name
[
A domain name identifies a node. Each node has a set of
resource information, which may be empty. The set of resource
@@ -7243,7 +7243,7 @@ zone
As described above, domain servers store information as a
series of resource records, each of which contains a particular
@@ -7501,7 +7501,7 @@ zone
Reverse name resolution (that is, translation from IP address
to name) is achieved by means of the in-addr.arpa domain
@@ -7577,7 +7577,18 @@ zone
+ When used in the label (or name) field, the asperand or
+ at-sign (@) symbol represents the current origin.
+ At the start of the zone file, it is the
+ <
Syntax: $ORIGIN
Syntax: $INCLUDE
Syntax: $TTL
Syntax: $GENERATE
Most statistics counters that were available
in BIND 8 are also supported in
diff --git a/doc/arm/Bv9ARM.ch07.html b/doc/arm/Bv9ARM.ch07.html
index c7753c42e1..d1b83bc330 100644
--- a/doc/arm/Bv9ARM.ch07.html
+++ b/doc/arm/Bv9ARM.ch07.html
@@ -14,7 +14,7 @@
- OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- PERFORMANCE OF THIS SOFTWARE.
-->
-
+
Table of Contents
On UNIX servers, it is possible to run BIND in a chrooted environment
@@ -143,7 +143,7 @@ zone "example.com" {
In order for a chroot environment
to
@@ -171,7 +171,7 @@ zone "example.com" {
Prior to running the named daemon,
use
diff --git a/doc/arm/Bv9ARM.ch08.html b/doc/arm/Bv9ARM.ch08.html
index 258b37526b..db46230f69 100644
--- a/doc/arm/Bv9ARM.ch08.html
+++ b/doc/arm/Bv9ARM.ch08.html
@@ -14,7 +14,7 @@
- OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- PERFORMANCE OF THIS SOFTWARE.
-->
-
+
Table of Contents
The best solution to solving installation and
configuration issues is to take preventative measures by setting
@@ -68,7 +68,7 @@
Zone serial numbers are just numbers — they aren't
date related. A lot of people set them to a number that
@@ -95,7 +95,7 @@
The Internet Systems Consortium
(ISC) offers a wide range
diff --git a/doc/arm/Bv9ARM.ch09.html b/doc/arm/Bv9ARM.ch09.html
index 8d75c9d4e8..336fe089e9 100644
--- a/doc/arm/Bv9ARM.ch09.html
+++ b/doc/arm/Bv9ARM.ch09.html
@@ -14,7 +14,7 @@
- OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- PERFORMANCE OF THIS SOFTWARE.
-->
-
+
Table of Contents [RFC974] Mail Routing and the Domain System. January 1986. [RFC974] Mail Routing and the Domain System. January 1986. [RFC1995] Incremental Zone Transfer in DNS. August 1996. [RFC1995] Incremental Zone Transfer in DNS. August 1996. [RFC1996] A Mechanism for Prompt Notification of Zone Changes. August 1996. [RFC1996] A Mechanism for Prompt Notification of Zone Changes. August 1996. [RFC2136] Dynamic Updates in the Domain Name System. April 1997. [RFC2136] Dynamic Updates in the Domain Name System. April 1997. [RFC2671] Extension Mechanisms for DNS (EDNS0). August 1997. [RFC2671] Extension Mechanisms for DNS (EDNS0). August 1997. [RFC2672] Non-Terminal DNS Name Redirection. August 1999. [RFC2672] Non-Terminal DNS Name Redirection. August 1999. [RFC2845] Secret Key Transaction Authentication for DNS (TSIG). May 2000. [RFC2845] Secret Key Transaction Authentication for DNS (TSIG). May 2000. [RFC2930] Secret Key Establishment for DNS (TKEY RR). September 2000. [RFC2930] Secret Key Establishment for DNS (TKEY RR). September 2000. [RFC2931] DNS Request and Transaction Signatures (SIG(0)s). September 2000. [RFC2931] DNS Request and Transaction Signatures (SIG(0)s). September 2000. [RFC3007] Secure Domain Name System (DNS) Dynamic Update. November 2000. [RFC3007] Secure Domain Name System (DNS) Dynamic Update. November 2000. [RFC3645] Generic Security Service Algorithm for Secret
+ [RFC3645] Generic Security Service Algorithm for Secret
Key Transaction Authentication for DNS
(GSS-TSIG). October 2003. [RFC3225] Indicating Resolver Support of DNSSEC. December 2001. [RFC3225] Indicating Resolver Support of DNSSEC. December 2001. [RFC3833] Threat Analysis of the Domain Name System (DNS). August 2004. [RFC3833] Threat Analysis of the Domain Name System (DNS). August 2004. [RFC4033] DNS Security Introduction and Requirements. March 2005. [RFC4033] DNS Security Introduction and Requirements. March 2005. [RFC4034] Resource Records for the DNS Security Extensions. March 2005. [RFC4034] Resource Records for the DNS Security Extensions. March 2005. [RFC4035] Protocol Modifications for the DNS
+ [RFC4035] Protocol Modifications for the DNS
Security Extensions. March 2005. [RFC1535] A Security Problem and Proposed Correction With Widely
+ [RFC1535] A Security Problem and Proposed Correction With Widely
Deployed DNS Software.. October 1993. [RFC1536] Common DNS Implementation
+ [RFC1536] Common DNS Implementation
Errors and Suggested Fixes. October 1993. [RFC4074] Common Misbehaviour Against DNS
+ [RFC4074] Common Misbehaviour Against DNS
Queries for IPv6 Addresses. May 2005. [RFC1706] DNS NSAP Resource Records. October 1994. [RFC1706] DNS NSAP Resource Records. October 1994. [RFC2168] Resolution of Uniform Resource Identifiers using
+ [RFC2168] Resolution of Uniform Resource Identifiers using
the Domain Name System. June 1997. [RFC1876] A Means for Expressing Location Information in the
+ [RFC1876] A Means for Expressing Location Information in the
Domain
Name System. January 1996. [RFC2052] A DNS RR for Specifying the
+ [RFC2052] A DNS RR for Specifying the
Location of
Services.. October 1996. [RFC2163] Using the Internet DNS to
+ [RFC2163] Using the Internet DNS to
Distribute MIXER
Conformant Global Address Mapping. January 1998. [RFC2230] Key Exchange Delegation Record for the DNS. October 1997. [RFC2230] Key Exchange Delegation Record for the DNS. October 1997. [RFC2536] DSA KEYs and SIGs in the Domain Name System (DNS). March 1999. [RFC2536] DSA KEYs and SIGs in the Domain Name System (DNS). March 1999. [RFC2537] RSA/MD5 KEYs and SIGs in the Domain Name System (DNS). March 1999. [RFC2537] RSA/MD5 KEYs and SIGs in the Domain Name System (DNS). March 1999. [RFC2538] Storing Certificates in the Domain Name System (DNS). March 1999. [RFC2538] Storing Certificates in the Domain Name System (DNS). March 1999. [RFC2539] Storage of Diffie-Hellman Keys in the Domain Name System (DNS). March 1999. [RFC2539] Storage of Diffie-Hellman Keys in the Domain Name System (DNS). March 1999. [RFC2540] Detached Domain Name System (DNS) Information. March 1999. [RFC2540] Detached Domain Name System (DNS) Information. March 1999. [RFC2782] A DNS RR for specifying the location of services (DNS SRV). February 2000. [RFC2782] A DNS RR for specifying the location of services (DNS SRV). February 2000. [RFC2915] The Naming Authority Pointer (NAPTR) DNS Resource Record. September 2000. [RFC2915] The Naming Authority Pointer (NAPTR) DNS Resource Record. September 2000. [RFC3110] RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS). May 2001. [RFC3110] RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS). May 2001. [RFC3123] A DNS RR Type for Lists of Address Prefixes (APL RR). June 2001. [RFC3123] A DNS RR Type for Lists of Address Prefixes (APL RR). June 2001. [RFC1101] DNS Encoding of Network Names
+ [RFC1101] DNS Encoding of Network Names
and Other Types. April 1989. [RFC1123] Requirements for Internet Hosts - Application and
+ [RFC1123] Requirements for Internet Hosts - Application and
Support. October 1989. [RFC1591] Domain Name System Structure and Delegation. March 1994. [RFC1591] Domain Name System Structure and Delegation. March 1994. [RFC2317] Classless IN-ADDR.ARPA Delegation. March 1998. [RFC2317] Classless IN-ADDR.ARPA Delegation. March 1998. [RFC1033] Domain administrators operations guide.. November 1987. [RFC1033] Domain administrators operations guide.. November 1987. [RFC1912] Common DNS Operational and
+ [RFC1912] Common DNS Operational and
Configuration Errors. February 1996. [RFC2825] A Tangled Web: Issues of I18N, Domain Names,
+ [RFC2825] A Tangled Web: Issues of I18N, Domain Names,
and the Other Internet protocols. May 2000. [RFC3490] Internationalizing Domain Names in Applications (IDNA). March 2003. [RFC3490] Internationalizing Domain Names in Applications (IDNA). March 2003. [RFC1464] Using the Domain Name System To Store Arbitrary String
+ [RFC1464] Using the Domain Name System To Store Arbitrary String
Attributes. May 1993. [RFC1713] Tools for DNS Debugging. November 1994. [RFC1713] Tools for DNS Debugging. November 1994. [RFC2240] A Legal Basis for Domain Name Allocation. November 1997. [RFC2240] A Legal Basis for Domain Name Allocation. November 1997. [RFC2345] Domain Names and Company Name Retrieval. May 1998. [RFC2345] Domain Names and Company Name Retrieval. May 1998. [RFC2352] A Convention For Using Legal Names as Domain Names. May 1998. [RFC2352] A Convention For Using Legal Names as Domain Names. May 1998. [RFC3071] Reflections on the DNS, RFC 1591, and Categories of Domains. February 2001. [RFC3071] Reflections on the DNS, RFC 1591, and Categories of Domains. February 2001. [RFC3258] Distributing Authoritative Name Servers via
+ [RFC3258] Distributing Authoritative Name Servers via
Shared Unicast Addresses. April 2002. [RFC3901] DNS IPv6 Transport Operational Guidelines. September 2004. [RFC3901] DNS IPv6 Transport Operational Guidelines. September 2004. [RFC1712] DNS Encoding of Geographical
+ [RFC1712] DNS Encoding of Geographical
Location. November 1994. [RFC2065] Domain Name System Security Extensions. January 1997. [RFC2065] Domain Name System Security Extensions. January 1997. [RFC2137] Secure Domain Name System Dynamic Update. April 1997. [RFC2137] Secure Domain Name System Dynamic Update. April 1997. [RFC2535] Domain Name System Security Extensions. March 1999. [RFC2535] Domain Name System Security Extensions. March 1999. [RFC3008] Domain Name System Security (DNSSEC)
+ [RFC3008] Domain Name System Security (DNSSEC)
Signing Authority. November 2000. [RFC3090] DNS Security Extension Clarification on Zone Status. March 2001. [RFC3090] DNS Security Extension Clarification on Zone Status. March 2001. [RFC3445] Limiting the Scope of the KEY Resource Record (RR). December 2002. [RFC3445] Limiting the Scope of the KEY Resource Record (RR). December 2002. [RFC3655] Redefinition of DNS Authenticated Data (AD) bit. November 2003. [RFC3655] Redefinition of DNS Authenticated Data (AD) bit. November 2003. [RFC3658] Delegation Signer (DS) Resource Record (RR). December 2003. [RFC3658] Delegation Signer (DS) Resource Record (RR). December 2003. [RFC3755] Legacy Resolver Compatibility for Delegation Signer (DS). May 2004. [RFC3755] Legacy Resolver Compatibility for Delegation Signer (DS). May 2004. [RFC3757] Domain Name System KEY (DNSKEY) Resource Record
+ [RFC3757] Domain Name System KEY (DNSKEY) Resource Record
(RR) Secure Entry Point (SEP) Flag. April 2004. [RFC3845] DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format. August 2004. [RFC3845] DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format. August 2004. DNS and BIND. Copyright © 1998 Sebastopol, CA: O'Reilly and Associates. DNS and BIND. Copyright © 1998 Sebastopol, CA: O'Reilly and Associates. dig
(domain information groper) is a flexible tool
for interrogating DNS name servers. It performs DNS lookups and
@@ -98,7 +98,7 @@
The dig
provides a number of query options which affect
the way in which lookups are made and the results displayed. Some of
@@ -547,7 +547,7 @@
on its own line.
- If not specified dig will look for
+ If not specified, dig will look for
The BIND 9 implementation of dig
supports
@@ -617,7 +617,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
If dig has been built with IDN (internationalized
domain name) support, it can accept and display non-ASCII domain names.
@@ -631,14 +631,14 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
host(1),
named(8),
dnssec-keygen(8),
@@ -646,7 +646,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
There are probably too many query options.
dnssec-dsfromkey
outputs the Delegation Signer (DS) resource record (RR), as defined in
RFC 3658 and RFC 4509, for the given key(s).
The keyfile can be designed by the key identification
dnssec-keygen(8),
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
@@ -143,7 +143,7 @@
dnssec-keyfromlabel
gets keys with the given label from a crypto hardware and builds
key files for DNSSEC (Secure DNS), as defined in RFC 2535
@@ -58,7 +58,7 @@
When dnssec-keyfromlabel completes
successfully,
@@ -172,7 +172,7 @@
dnssec-keygen(8),
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
@@ -182,7 +182,7 @@
dnssec-keygen
generates keys for DNSSEC (Secure DNS), as defined in RFC 2535
and RFC 4034. It can also generate keys for use with
@@ -58,7 +58,7 @@
To generate a 768-bit DSA key for the domain
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
RFC 2539,
@@ -242,7 +242,7 @@
dnssec-signzone
signs a zone. It generates
NSEC and RRSIG records and produces a signed version of the
@@ -61,7 +61,7 @@
The following command signs the host
is a simple utility for performing DNS lookups.
It is normally used to convert names to IP addresses and vice versa.
@@ -148,7 +148,7 @@
referrals to other name servers.
- By default host uses UDP when making
+ By default, host uses UDP when making
queries. The
If host has been built with IDN (internationalized
domain name) support, it can accept and display non-ASCII domain names.
@@ -216,12 +216,12 @@
dig(1),
named(8).
named-checkconf
checks the syntax, but not the semantics, of a named
configuration file.
named-checkconf
returns an exit status of 1 if
errors were detected and 0 otherwise.
named-checkzone
checks the syntax and integrity of a zone file. It performs the
same checks as named does when loading a
@@ -71,7 +71,7 @@
@@ -96,7 +96,7 @@
- Specify the class of the zone. If not specified "IN" is assumed.
+ Specify the class of the zone. If not specified, "IN" is assumed.
named-checkzone
returns an exit status of 1 if
errors were detected and 0 otherwise.
named
is a Domain Name System (DNS) server,
part of the BIND 9 distribution from ISC. For more
@@ -65,7 +65,7 @@
In routine operation, signals should not be used to control
the nameserver; rndc should be used
@@ -259,7 +259,7 @@
The named configuration file is too complex
to describe in detail here. A complete description is provided
@@ -268,7 +268,7 @@
nsupdate
is used to submit Dynamic DNS Update requests as defined in RFC2136
to a name server.
@@ -143,7 +143,7 @@
specified is not an HMAC-MD5 key.
- By default
+ By default,
nsupdate
uses UDP to send update requests to the name server unless they are too
large to fit in a UDP request in which case TCP will be used.
@@ -186,7 +186,7 @@
The TSIG key is redundantly stored in two separate files.
This is a consequence of nsupdate using the DST library
diff --git a/doc/arm/man.rndc-confgen.html b/doc/arm/man.rndc-confgen.html
index 9623fbd8d1..b6c8e470bb 100644
--- a/doc/arm/man.rndc-confgen.html
+++ b/doc/arm/man.rndc-confgen.html
@@ -14,7 +14,7 @@
- OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- PERFORMANCE OF THIS SOFTWARE.
-->
-
+
rndc-confgen
generates configuration files
for rndc. It can be used as a
@@ -64,7 +64,7 @@
The name server must be configured to accept rndc connections and
to recognize the key specified in the zone_name
[
zone_name
[
zone_name
[
+zone_name
> (followed by
+ trailing dot).
+ domain-name
@@ -7587,7 +7598,8 @@ zone zone_name
[$ORIGIN
- <zone-name
>.
+ <zone_name
>.
+ (followed by trailing dot).
The current $ORIGIN is appended to
the domain specified in the $ORIGIN
argument if it is not absolute.
@@ -7605,7 +7617,7 @@ WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM.
filename
@@ -7641,7 +7653,7 @@ WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM.
default-ttl
@@ -7660,7 +7672,7 @@ WWW.EXAMPLE.COM. CNAME MAIN-SERVER.EXAMPLE.COM.
range
@@ -8064,7 +8076,7 @@ HOST-127.EXAMPLE. MX 0 .
Standards
Proposed Standards
DNS Security Proposed Standards
Other Important RFCs About DNS
Implementation
Resource Record Types
DNS and the Internet
DNS Operations
Internationalized Domain Names
Obsolete and Unimplemented Experimental RFC
dig
[global-queryopt...] [query...]DESCRIPTION
+DESCRIPTION
OPTIONS
+OPTIONS
-b
option sets the source IP address of the query
to address
. This must be a valid
@@ -248,7 +248,7 @@
QUERY OPTIONS
+QUERY OPTIONS
/etc/trusted-key.key
then
trusted-key.key
in the current directory.
MULTIPLE QUERIES
+MULTIPLE QUERIES
IDN SUPPORT
+IDN SUPPORT
SEE ALSO
+SEE ALSO
BUGS
+BUGS
dnssec-dsfromkey
{-s} [-v
] [level
-1
] [-2
] [-a
] [alg
-c
] [class
-d
] {dnsname}dir
DESCRIPTION
+DESCRIPTION
FILES
+FILES
Knnnn.+aaa+iiiii
or the full file name
@@ -128,13 +128,13 @@
SEE ALSO
+SEE ALSO
dnssec-keyfromlabel
{-a algorithm
} {-l label
} [-c
] [class
-f
] [flag
-k
] [-n
] [nametype
-p
] [protocol
-t
] [type
-v
] {name}level
DESCRIPTION
+DESCRIPTION
GENERATED KEY FILES
+GENERATED KEY FILES
SEE ALSO
+SEE ALSO
dnssec-keygen
{-a algorithm
} {-b keysize
} {-n nametype
} [-c
] [class
-e
] [-f
] [flag
-g
] [generator
-h
] [-k
] [-p
] [protocol
-r
] [randomdev
-s
] [strength
-t
] [type
-v
] {name}level
DESCRIPTION
+DESCRIPTION
EXAMPLE
+EXAMPLE
example.com
, the following command would be
@@ -233,7 +233,7 @@
SEE ALSO
+SEE ALSO
dnssec-signzone
[-a
] [-c
] [class
-d
] [directory
-e
] [end-time
-f
] [output-file
-g
] [-h
] [-k
] [key
-l
] [domain
-i
] [interval
-I
] [input-format
-j
] [jitter
-N
] [soa-serial-format
-o
] [origin
-O
] [output-format
-p
] [-r
] [randomdev
-s
] [start-time
-t
] [-v
] [level
-z
] [-3
] [salt
-H
] [iterations
-A
] {zonefile} [key...]DESCRIPTION
+DESCRIPTION
EXAMPLE
+EXAMPLE
example.com
zone with the DSA key generated by dnssec-keygen
@@ -305,14 +305,14 @@ db.example.com.signed
%
host
[-aCdlnrsTwv
] [-c
] [class
-N
] [ndots
-R
] [number
-t
] [type
-W
] [wait
-m
] [flag
-4
] [-6
] {name} [server]DESCRIPTION
+DESCRIPTION
-T
option makes it use a TCP connection when querying
the name server. TCP will be automatically selected for queries that
@@ -166,7 +166,7 @@
NS, SOA, SIG, KEY, AXFR, etc. When no query type is specified,
host automatically selects an appropriate
query
- type. By default it looks for A, AAAA, and MX records, but if the
+ type. By default, it looks for A, AAAA, and MX records, but if the
-C
option was given, queries will be made for SOA
records, and if name
is a
dotted-decimal IPv4
@@ -202,7 +202,7 @@
IDN SUPPORT
+IDN SUPPORT
SEE ALSO
+SEE ALSO
named-checkconf
[-h
] [-v
] [-j
] [-t
] {filename} [directory
-z
]DESCRIPTION
+DESCRIPTION
RETURN VALUES
+RETURN VALUES
named-compilezone
[-d
] [-j
] [-q
] [-v
] [-c
] [class
-C
] [mode
-f
] [format
-F
] [format
-i
] [mode
-k
] [mode
-m
] [mode
-n
] [mode
-o
] [filename
-s
] [style
-t
] [directory
-w
] [directory
-D
] [-W
] {zonename} {filename}mode
DESCRIPTION
+DESCRIPTION
OPTIONS
+OPTIONS
class
mode
RETURN VALUES
+RETURN VALUES
named
[-4
] [-6
] [-c
] [config-file
-d
] [debug-level
-f
] [-g
] [-m
] [flag
-n
] [#cpus
-p
] [port
-s
] [-S
] [#max-socks
-t
] [directory
-u
] [user
-v
] [-V
] [-x
]cache-file
DESCRIPTION
+DESCRIPTION
SIGNALS
+SIGNALS
CONFIGURATION
+CONFIGURATION
nsupdate
[-d
] [-D
] [[-y
] | [[hmac:]keyname:secret
-k
]] [keyfile
-t
] [timeout
-u
] [udptimeout
-r
] [udpretries
-R
] [randomdev
-v
] [filename]DESCRIPTION
+DESCRIPTION
BUGS
+BUGS
rndc-confgen
[-a
] [-b
] [keysize
-c
] [keyfile
-h
] [-k
] [keyname
-p
] [port
-r
] [randomfile
-s
] [address
-t
] [chrootdir
-u
]user
DESCRIPTION
+DESCRIPTION
rndc.conf
DESCRIPTION
+DESCRIPTION
rndc.conf
is the configuration file
for rndc, the BIND 9 name server control
utility. This file has a similar structure and syntax to
@@ -135,7 +135,7 @@
NAME SERVER CONFIGURATION
+NAME SERVER CONFIGURATION
rndc.conf
@@ -219,7 +219,7 @@
rndc
[-b
] [source-address
-c
] [config-file
-k
] [key-file
-s
] [server
-p
] [port
-V
] [-y
] {command}key_id