2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-28 13:08:06 +00:00

Add hyperlinks from program options to definition in man pages

Side-effect of hyperlinking is that typos in program and option names
are now detected by Sphinx.

Candidate -options were detected using:
    find -name *.rst | xargs grep '``-[^`]'
and then modified from ``-o`` to :option:`-o` using regex
    s/``\(-[^`]\+\)``/:option:`\1`/
+ manual modifications where necessary.

Non-hyphenated options were detected by looking at context around
program names:
    find bin -name *.rst | xargs -I{} -n1 basename {} .rst | sort -u
and grepping for program name with trailing whitespace.

Stand-alone program names like ``named`` are not hyperlinked in this
commit.
This commit is contained in:
Petr Špaček 2022-03-02 16:54:31 +01:00
parent 5f0ee7c303
commit a85df3ff9c
No known key found for this signature in database
GPG Key ID: ABD587CDF06581AE
70 changed files with 464 additions and 437 deletions

View File

@ -65,7 +65,7 @@ Options
.. option:: -p .. option:: -p
This option prints out the ``named.conf`` and included files in canonical form if This option prints out the ``named.conf`` and included files in canonical form if
no errors were detected. See also the ``-x`` option. no errors were detected. See also the :option:`-x` option.
.. option:: -t directory .. option:: -t directory
@ -84,7 +84,7 @@ Options
(``?``). This allows the contents of ``named.conf`` and related files (``?``). This allows the contents of ``named.conf`` and related files
to be shared - for example, when submitting bug reports - to be shared - for example, when submitting bug reports -
without compromising private data. This option cannot be used without without compromising private data. This option cannot be used without
``-p``. :option:`-p`.
.. option:: -z .. option:: -z

View File

@ -61,7 +61,7 @@ Options
.. option:: -J filename .. option:: -J filename
When loading the zone file, this option tells ``named`` to read the journal from the given file, if When loading the zone file, this option tells ``named`` to read the journal from the given file, if
it exists. This implies ``-j``. it exists. This implies :option:`-j`.
.. option:: -c class .. option:: -c class

View File

@ -63,7 +63,7 @@ Options
.. option:: -J filename .. option:: -J filename
When loading the zone file, this option tells ``named`` to read the journal from the given file, if When loading the zone file, this option tells ``named`` to read the journal from the given file, if
it exists. This implies ``-j``. it exists. This implies :option:`-j`.
.. option:: -c class .. option:: -c class

View File

@ -30,7 +30,7 @@ Description
The resulting keys can be used, for example, to secure dynamic DNS updates The resulting keys can be used, for example, to secure dynamic DNS updates
to a zone, or for the ``rndc`` command channel. to a zone, or for the ``rndc`` command channel.
The key name can specified using ``-k`` parameter and defaults to ``ddns-key``. The key name can specified using :option:`-k` parameter and defaults to ``ddns-key``.
The generated key is accompanied by configuration text and instructions that The generated key is accompanied by configuration text and instructions that
can be used with ``nsupdate`` and ``named`` when setting up dynamic DNS, can be used with ``nsupdate`` and ``named`` when setting up dynamic DNS,
including an example ``update-policy`` statement. including an example ``update-policy`` statement.
@ -38,7 +38,7 @@ including an example ``update-policy`` statement.
command-channel security.) command-channel security.)
Note that ``named`` itself can configure a local DDNS key for use with Note that ``named`` itself can configure a local DDNS key for use with
``nsupdate -l``; it does this when a zone is configured with :option:`nsupdate -l`; it does this when a zone is configured with
``update-policy local;``. ``ddns-confgen`` is only needed when a more ``update-policy local;``. ``ddns-confgen`` is only needed when a more
elaborate configuration is required: for instance, if ``nsupdate`` is to elaborate configuration is required: for instance, if ``nsupdate`` is to
be used from a remote system. be used from a remote system.
@ -60,7 +60,7 @@ Options
.. option:: -k keyname .. option:: -k keyname
This option specifies the key name of the DDNS authentication key. The This option specifies the key name of the DDNS authentication key. The
default is ``ddns-key`` when neither the ``-s`` nor ``-z`` option is default is ``ddns-key`` when neither the :option:`-s` nor :option:`-z` option is
specified; otherwise, the default is ``ddns-key`` as a separate label specified; otherwise, the default is ``ddns-key`` as a separate label
followed by the argument of the option, e.g., ``ddns-key.example.com.`` followed by the argument of the option, e.g., ``ddns-key.example.com.``
The key name must have the format of a valid domain name, consisting of The key name must have the format of a valid domain name, consisting of
@ -79,7 +79,7 @@ Options
an update policy for the specified name using the "name" nametype. The an update policy for the specified name using the "name" nametype. The
default key name is ``ddns-key.name``. Note that the "self" nametype default key name is ``ddns-key.name``. Note that the "self" nametype
cannot be used, since the name to be updated may differ from the key cannot be used, since the name to be updated may differ from the key
name. This option cannot be used with the ``-z`` option. name. This option cannot be used with the :option:`-z` option.
.. option:: -z zone .. option:: -z zone
@ -87,7 +87,7 @@ Options
dynamic updates of a zone. The example ``named.conf`` text shows how dynamic updates of a zone. The example ``named.conf`` text shows how
to set an update policy for the specified zone using the "zonesub" to set an update policy for the specified zone using the "zonesub"
nametype, allowing updates to all subdomain names within that zone. nametype, allowing updates to all subdomain names within that zone.
This option cannot be used with the ``-s`` option. This option cannot be used with the :option:`-s` option.
See Also See Also
~~~~~~~~ ~~~~~~~~

View File

@ -28,7 +28,7 @@ Description
``rndc-confgen`` generates configuration files for ``rndc``. It can be ``rndc-confgen`` generates configuration files for ``rndc``. It can be
used as a convenient alternative to writing the ``rndc.conf`` file and used as a convenient alternative to writing the ``rndc.conf`` file and
the corresponding ``controls`` and ``key`` statements in ``named.conf`` the corresponding ``controls`` and ``key`` statements in ``named.conf``
by hand. Alternatively, it can be run with the ``-a`` option to set up a by hand. Alternatively, it can be run with the :option:`-a` option to set up a
``rndc.key`` file and avoid the need for a ``rndc.conf`` file and a ``rndc.key`` file and avoid the need for a ``rndc.conf`` file and a
``controls`` statement altogether. ``controls`` statement altogether.
@ -44,8 +44,8 @@ Options
the local host with no further configuration. the local host with no further configuration.
If a more elaborate configuration than that generated by If a more elaborate configuration than that generated by
``rndc-confgen -a`` is required, for example if rndc is to be used :option:`rndc-confgen -a` is required, for example if rndc is to be used
remotely, run ``rndc-confgen`` without the ``-a`` option remotely, run ``rndc-confgen`` without the :option:`-a` option
and set up ``rndc.conf`` and ``named.conf`` as directed. and set up ``rndc.conf`` and ``named.conf`` as directed.
.. option:: -A algorithm .. option:: -A algorithm
@ -61,7 +61,7 @@ Options
.. option:: -c keyfile .. option:: -c keyfile
This option is used with the ``-a`` option to specify an alternate location for This option is used with the :option:`-a` option to specify an alternate location for
``rndc.key``. ``rndc.key``.
.. option:: -h .. option:: -h
@ -91,15 +91,15 @@ Options
.. option:: -t chrootdir .. option:: -t chrootdir
This option is used with the ``-a`` option to specify a directory where ``named`` This option is used with the :option:`-a` option to specify a directory where ``named``
runs chrooted. An additional copy of the ``rndc.key`` is runs chrooted. An additional copy of the ``rndc.key`` is
written relative to this directory, so that it is found by the written relative to this directory, so that it is found by the
chrooted ``named``. chrooted ``named``.
.. option:: -u user .. option:: -u user
This option is used with the ``-a`` option to set the owner of the generated ``rndc.key`` file. This option is used with the :option:`-a` option to set the owner of the generated ``rndc.key`` file.
If ``-t`` is also specified, only the file in the chroot If :option:`-t` is also specified, only the file in the chroot
area has its owner changed. area has its owner changed.
Examples Examples

View File

@ -80,7 +80,7 @@ where:
If no ``server`` argument is provided, ``delv`` consults If no ``server`` argument is provided, ``delv`` consults
``/etc/resolv.conf``; if an address is found there, it queries the ``/etc/resolv.conf``; if an address is found there, it queries the
name server at that address. If either of the ``-4`` or ``-6`` name server at that address. If either of the :option:`-4` or :option:`-6`
options is in use, then only addresses for the corresponding options is in use, then only addresses for the corresponding
transport are tried. If no usable addresses are found, ``delv`` transport are tried. If no usable addresses are found, ``delv``
sends queries to the localhost addresses (127.0.0.1 for IPv4, ::1 sends queries to the localhost addresses (127.0.0.1 for IPv4, ::1
@ -163,7 +163,7 @@ Options
.. option:: -q name .. option:: -q name
This option sets the query name to ``name``. While the query name can be This option sets the query name to ``name``. While the query name can be
specified without using the ``-q`` option, it is sometimes necessary to specified without using the :option:`-q` option, it is sometimes necessary to
disambiguate names from types or classes (for example, when looking disambiguate names from types or classes (for example, when looking
up the name "ns", which could be misinterpreted as the type NS, or up the name "ns", which could be misinterpreted as the type NS, or
"ch", which could be misinterpreted as class CH). "ch", which could be misinterpreted as class CH).
@ -172,11 +172,11 @@ Options
This option sets the query type to ``type``, which can be any valid query type This option sets the query type to ``type``, which can be any valid query type
supported in BIND 9 except for zone transfer types AXFR and IXFR. As supported in BIND 9 except for zone transfer types AXFR and IXFR. As
with ``-q``, this is useful to distinguish query-name types or classes with :option:`-q`, this is useful to distinguish query-name types or classes
when they are ambiguous. It is sometimes necessary to disambiguate when they are ambiguous. It is sometimes necessary to disambiguate
names from types. names from types.
The default query type is "A", unless the ``-x`` option is supplied The default query type is "A", unless the :option:`-x` option is supplied
to indicate a reverse lookup, in which case it is "PTR". to indicate a reverse lookup, in which case it is "PTR".
.. option:: -v .. option:: -v
@ -187,7 +187,7 @@ Options
This option performs a reverse lookup, mapping an address to a name. ``addr`` This option performs a reverse lookup, mapping an address to a name. ``addr``
is an IPv4 address in dotted-decimal notation, or a colon-delimited is an IPv4 address in dotted-decimal notation, or a colon-delimited
IPv6 address. When ``-x`` is used, there is no need to provide the IPv6 address. When :option:`-x` is used, there is no need to provide the
``name`` or ``type`` arguments; ``delv`` automatically performs a ``name`` or ``type`` arguments; ``delv`` automatically performs a
lookup for a name like ``11.12.13.10.in-addr.arpa`` and sets the lookup for a name like ``11.12.13.10.in-addr.arpa`` and sets the
query type to PTR. IPv6 addresses are looked up using nibble format query type to PTR. IPv6 addresses are looked up using nibble format
@ -243,7 +243,7 @@ assign values to options like the timeout interval. They have the form
This is equivalent to setting the debug level to 1 in the "resolver" This is equivalent to setting the debug level to 1 in the "resolver"
logging category. Setting the systemwide debug level to 1 using the logging category. Setting the systemwide debug level to 1 using the
``-d`` option produces the same output, but affects other :option:`-d` option produces the same output, but affects other
logging categories as well. logging categories as well.
.. option:: +[no]mtrace .. option:: +[no]mtrace
@ -254,7 +254,7 @@ assign values to options like the timeout interval. They have the form
This is equivalent to setting the debug level to 10 for the "packets" This is equivalent to setting the debug level to 10 for the "packets"
module of the "resolver" logging category. Setting the systemwide module of the "resolver" logging category. Setting the systemwide
debug level to 10 using the ``-d`` option produces the same debug level to 10 using the :option:`-d` option produces the same
output, but affects other logging categories as well. output, but affects other logging categories as well.
.. option:: +[no]vtrace .. option:: +[no]vtrace
@ -265,7 +265,7 @@ assign values to options like the timeout interval. They have the form
This is equivalent to setting the debug level to 3 for the This is equivalent to setting the debug level to 3 for the
"validator" module of the "dnssec" logging category. Setting the "validator" module of the "dnssec" logging category. Setting the
systemwide debug level to 3 using the ``-d`` option produces the systemwide debug level to 3 using the :option:`-d` option produces the
same output, but affects other logging categories as well. same output, but affects other logging categories as well.
.. option:: +[no]short .. option:: +[no]short
@ -324,7 +324,7 @@ assign values to options like the timeout interval. They have the form
The default is to do so. Note that (unlike in ``dig``) this does The default is to do so. Note that (unlike in ``dig``) this does
*not* control whether to request DNSSEC records or to *not* control whether to request DNSSEC records or to
validate them. DNSSEC records are always requested, and validation validate them. DNSSEC records are always requested, and validation
always occurs unless suppressed by the use of ``-i`` or always occurs unless suppressed by the use of :option:`-i` or
``+noroot``. ``+noroot``.
.. option:: +[no]root[=ROOT] .. option:: +[no]root[=ROOT]
@ -332,7 +332,7 @@ assign values to options like the timeout interval. They have the form
This option indicates whether to perform conventional DNSSEC validation, and if so, This option indicates whether to perform conventional DNSSEC validation, and if so,
specifies the name of a trust anchor. The default is to validate using a specifies the name of a trust anchor. The default is to validate using a
trust anchor of "." (the root zone), for which there is a built-in key. If trust anchor of "." (the root zone), for which there is a built-in key. If
specifying a different trust anchor, then ``-a`` must be used to specify a specifying a different trust anchor, then :option:`-a` must be used to specify a
file containing the key. file containing the key.
.. option:: +[no]tcp .. option:: +[no]tcp

View File

@ -51,12 +51,12 @@ performs an NS query for "." (the root).
It is possible to set per-user defaults for ``dig`` via It is possible to set per-user defaults for ``dig`` via
``${HOME}/.digrc``. This file is read and any options in it are applied ``${HOME}/.digrc``. This file is read and any options in it are applied
before the command-line arguments. The ``-r`` option disables this before the command-line arguments. The :option:`-r` option disables this
feature, for scripts that need predictable behavior. feature, for scripts that need predictable behavior.
The IN and CH class names overlap with the IN and CH top-level domain The IN and CH class names overlap with the IN and CH top-level domain
names. Either use the ``-t`` and ``-c`` options to specify the type and names. Either use the :option:`-t` and :option:`-c` options to specify the type and
class, use the ``-q`` to specify the domain name, or use "IN." and class, use the :option:`-q` to specify the domain name, or use "IN." and
"CH." when looking up these top-level domains. "CH." when looking up these top-level domains.
Simple Usage Simple Usage
@ -80,7 +80,7 @@ where:
If no ``server`` argument is provided, ``dig`` consults If no ``server`` argument is provided, ``dig`` consults
``/etc/resolv.conf``; if an address is found there, it queries the ``/etc/resolv.conf``; if an address is found there, it queries the
name server at that address. If either of the ``-4`` or ``-6`` name server at that address. If either of the :option:`-4` or :option:`-6`
options are in use, then only addresses for the corresponding options are in use, then only addresses for the corresponding
transport are tried. If no usable addresses are found, ``dig`` transport are tried. If no usable addresses are found, ``dig``
sends the query to the local host. The reply from the name server sends the query to the local host. The reply from the name server
@ -160,7 +160,7 @@ Options
This option indicates the resource record type to query, which can be any valid query type. If This option indicates the resource record type to query, which can be any valid query type. If
it is a resource record type supported in BIND 9, it can be given by it is a resource record type supported in BIND 9, it can be given by
the type mnemonic (such as ``NS`` or ``AAAA``). The default query type is the type mnemonic (such as ``NS`` or ``AAAA``). The default query type is
``A``, unless the ``-x`` option is supplied to indicate a reverse ``A``, unless the :option:`-x` option is supplied to indicate a reverse
lookup. A zone transfer can be requested by specifying a type of lookup. A zone transfer can be requested by specifying a type of
AXFR. When an incremental zone transfer (IXFR) is required, set the AXFR. When an incremental zone transfer (IXFR) is required, set the
``type`` to ``ixfr=N``. The incremental zone transfer contains ``type`` to ``ixfr=N``. The incremental zone transfer contains
@ -183,7 +183,7 @@ Options
This option sets simplified reverse lookups, for mapping addresses to names. The This option sets simplified reverse lookups, for mapping addresses to names. The
``addr`` is an IPv4 address in dotted-decimal notation, or a ``addr`` is an IPv4 address in dotted-decimal notation, or a
colon-delimited IPv6 address. When the ``-x`` option is used, there is no colon-delimited IPv6 address. When the :option:`-x` option is used, there is no
need to provide the ``name``, ``class``, and ``type`` arguments. need to provide the ``name``, ``class``, and ``type`` arguments.
``dig`` automatically performs a lookup for a name like ``dig`` automatically performs a lookup for a name like
``94.2.0.192.in-addr.arpa`` and sets the query type and class to PTR ``94.2.0.192.in-addr.arpa`` and sets the query type and class to PTR
@ -200,8 +200,8 @@ Options
not specified, the default is ``hmac-md5``; if MD5 was disabled, the default is not specified, the default is ``hmac-md5``; if MD5 was disabled, the default is
``hmac-sha256``. ``hmac-sha256``.
.. note:: Only the ``-k`` option should be used, rather than the ``-y`` option, .. note:: Only the :option:`-k` option should be used, rather than the :option:`-y` option,
because with ``-y`` the shared secret is supplied as a command-line because with :option:`-y` the shared secret is supplied as a command-line
argument in clear text. This may be visible in the output from ``ps1`` or argument in clear text. This may be visible in the output from ``ps1`` or
in a history file maintained by the user's shell. in a history file maintained by the user's shell.
@ -694,7 +694,7 @@ Multiple Queries
~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~
The BIND 9 implementation of ``dig`` supports specifying multiple The BIND 9 implementation of ``dig`` supports specifying multiple
queries on the command line (in addition to supporting the ``-f`` batch queries on the command line (in addition to supporting the :option:`-f` batch
file option). Each of those queries can be supplied with its own set of file option). Each of those queries can be supplied with its own set of
flags, options, and query options. flags, options, and query options.

View File

@ -42,20 +42,20 @@ Options
.. option:: -4 .. option:: -4
This option specifies that only IPv4 should be used for query transport. See also the ``-6`` option. This option specifies that only IPv4 should be used for query transport. See also the :option:`-6` option.
.. option:: -6 .. option:: -6
This option specifies that only IPv6 should be used for query transport. See also the ``-4`` option. This option specifies that only IPv6 should be used for query transport. See also the :option:`-4` option.
.. option:: -a .. option:: -a
The ``-a`` ("all") option is normally equivalent to ``-v -t ANY``. It The :option:`-a` ("all") option is normally equivalent to :option:`-v` :option:`-t ANY <-t>`. It
also affects the behavior of the ``-l`` list zone option. also affects the behavior of the :option:`-l` list zone option.
.. option:: -A .. option:: -A
The ``-A`` ("almost all") option is equivalent to ``-a``, except that RRSIG, The :option:`-A` ("almost all") option is equivalent to :option:`-a`, except that RRSIG,
NSEC, and NSEC3 records are omitted from the output. NSEC, and NSEC3 records are omitted from the output.
.. option:: -c class .. option:: -c class
@ -72,14 +72,14 @@ Options
.. option:: -d .. option:: -d
This option prints debugging traces, and is equivalent to the ``-v`` verbose option. This option prints debugging traces, and is equivalent to the :option:`-v` verbose option.
.. option:: -l .. option:: -l
This option tells ``named`` to list the zone, meaning the ``host`` command performs a zone transfer of zone This option tells ``named`` to list the zone, meaning the ``host`` command performs a zone transfer of zone
``name`` and prints out the NS, PTR, and address records (A/AAAA). ``name`` and prints out the NS, PTR, and address records (A/AAAA).
Together, the ``-l -a`` options print all records in the zone. Together, the :option:`-l` :option:`-a` options print all records in the zone.
.. option:: -N ndots .. option:: -N ndots
@ -98,7 +98,7 @@ Options
This option specifies a non-recursive query; setting this option clears the RD (recursion This option specifies a non-recursive query; setting this option clears the RD (recursion
desired) bit in the query. This means that the name server desired) bit in the query. This means that the name server
receiving the query does not attempt to resolve ``name``. The ``-r`` receiving the query does not attempt to resolve ``name``. The :option:`-r`
option enables ``host`` to mimic the behavior of a name server by option enables ``host`` to mimic the behavior of a name server by
making non-recursive queries, and expecting to receive answers to making non-recursive queries, and expecting to receive answers to
those queries that can be referrals to other name servers. those queries that can be referrals to other name servers.
@ -122,31 +122,31 @@ Options
When no query type is specified, ``host`` automatically selects an When no query type is specified, ``host`` automatically selects an
appropriate query type. By default, it looks for A, AAAA, and MX appropriate query type. By default, it looks for A, AAAA, and MX
records. If the ``-C`` option is given, queries are made for SOA records. If the :option:`-C` option is given, queries are made for SOA
records. If ``name`` is a dotted-decimal IPv4 address or records. If ``name`` is a dotted-decimal IPv4 address or
colon-delimited IPv6 address, ``host`` queries for PTR records. colon-delimited IPv6 address, ``host`` queries for PTR records.
If a query type of IXFR is chosen, the starting serial number can be If a query type of IXFR is chosen, the starting serial number can be
specified by appending an equals sign (=), followed by the starting serial specified by appending an equals sign (=), followed by the starting serial
number, e.g., ``-t IXFR=12345678``. number, e.g., :option:`-t IXFR=12345678 <-t>`.
.. option:: -T``; ``-U .. option:: -T, -U
This option specifies TCP or UDP. By default, ``host`` uses UDP when making queries; the This option specifies TCP or UDP. By default, ``host`` uses UDP when making queries; the
``-T`` option makes it use a TCP connection when querying the name :option:`-T` option makes it use a TCP connection when querying the name
server. TCP is automatically selected for queries that require server. TCP is automatically selected for queries that require
it, such as zone transfer (AXFR) requests. Type ``ANY`` queries default it, such as zone transfer (AXFR) requests. Type ``ANY`` queries default
to TCP, but can be forced to use UDP initially via ``-U``. to TCP, but can be forced to use UDP initially via :option:`-U`.
.. option:: -m flag .. option:: -m flag
This option sets memory usage debugging: the flag can be ``record``, ``usage``, or This option sets memory usage debugging: the flag can be ``record``, ``usage``, or
``trace``. The ``-m`` option can be specified more than once to set ``trace``. The :option:`-m` option can be specified more than once to set
multiple flags. multiple flags.
.. option:: -v .. option:: -v
This option sets verbose output, and is equivalent to the ``-d`` debug option. Verbose output This option sets verbose output, and is equivalent to the :option:`-d` debug option. Verbose output
can also be enabled by setting the ``debug`` option in can also be enabled by setting the ``debug`` option in
``/etc/resolv.conf``. ``/etc/resolv.conf``.
@ -157,7 +157,7 @@ Options
.. option:: -w .. option:: -w
This option sets "wait forever": the query timeout is set to the maximum possible. See This option sets "wait forever": the query timeout is set to the maximum possible. See
also the ``-W`` option. also the :option:`-W` option.
.. option:: -W wait .. option:: -W wait
@ -168,7 +168,7 @@ Options
seconds for TCP connections. These defaults can be overridden by the seconds for TCP connections. These defaults can be overridden by the
``timeout`` option in ``/etc/resolv.conf``. ``timeout`` option in ``/etc/resolv.conf``.
See also the ``-w`` option. See also the :option:`-w` option.
IDN Support IDN Support
~~~~~~~~~~~ ~~~~~~~~~~~

View File

@ -33,9 +33,9 @@ its key-signing keys (KSKs); by polling periodically with ``dnssec-cds``, the
parent can keep the DS records up-to-date and enable automatic rolling parent can keep the DS records up-to-date and enable automatic rolling
of KSKs. of KSKs.
Two input files are required. The ``-f child-file`` option specifies a Two input files are required. The :option:`-f child-file <-f>` option specifies a
file containing the child's CDS and/or CDNSKEY records, plus RRSIG and file containing the child's CDS and/or CDNSKEY records, plus RRSIG and
DNSKEY records so that they can be authenticated. The ``-d path`` option DNSKEY records so that they can be authenticated. The :option:`-d path <-d>` option
specifies the location of a file containing the current DS records. For specifies the location of a file containing the current DS records. For
example, this could be a ``dsset-`` file generated by example, this could be a ``dsset-`` file generated by
``dnssec-signzone``, or the output of ``dnssec-dsfromkey``, or the ``dnssec-signzone``, or the output of ``dnssec-dsfromkey``, or the
@ -49,7 +49,7 @@ is typically the pre-existing KSK.
For protection against replay attacks, the signatures on the child For protection against replay attacks, the signatures on the child
records must not be older than they were on a previous run of records must not be older than they were on a previous run of
``dnssec-cds``. Their age is obtained from the modification time of the ``dnssec-cds``. Their age is obtained from the modification time of the
``dsset-`` file, or from the ``-s`` option. ``dsset-`` file, or from the :option:`-s` option.
To protect against breaking the delegation, ``dnssec-cds`` ensures that To protect against breaking the delegation, ``dnssec-cds`` ensures that
the DNSKEY RRset can be verified by every key algorithm in the new DS the DNSKEY RRset can be verified by every key algorithm in the new DS
@ -57,7 +57,7 @@ RRset, and that the same set of keys are covered by every DS digest
type. type.
By default, replacement DS records are written to the standard output; By default, replacement DS records are written to the standard output;
with the ``-i`` option the input file is overwritten in place. The with the :option:`-i` option the input file is overwritten in place. The
replacement DS records are the same as the existing records, when no replacement DS records are the same as the existing records, when no
change is required. The output can be empty if the CDS/CDNSKEY records change is required. The output can be empty if the CDS/CDNSKEY records
specify that the child zone wants to be insecure. specify that the child zone wants to be insecure.
@ -66,8 +66,8 @@ specify that the child zone wants to be insecure.
Be careful not to delete the DS records when ``dnssec-cds`` fails! Be careful not to delete the DS records when ``dnssec-cds`` fails!
Alternatively, ``dnssec-cds -u`` writes an ``nsupdate`` script to the Alternatively, :option`dnssec-cds -u` writes an ``nsupdate`` script to the
standard output. The ``-u`` and ``-i`` options can be used together to standard output. The :option:`-u` and :option:`-i` options can be used together to
maintain a ``dsset-`` file as well as emit an ``nsupdate`` script. maintain a ``dsset-`` file as well as emit an ``nsupdate`` script.
Options Options
@ -107,7 +107,7 @@ Options
To protect against replay attacks, child records are rejected if they To protect against replay attacks, child records are rejected if they
were signed earlier than the modification time of the ``dsset-`` were signed earlier than the modification time of the ``dsset-``
file. This can be adjusted with the ``-s`` option. file. This can be adjusted with the :option:`-s` option.
.. option:: -f child-file .. option:: -f child-file
@ -122,7 +122,7 @@ Options
This option updates the ``dsset-`` file in place, instead of writing DS records to This option updates the ``dsset-`` file in place, instead of writing DS records to
the standard output. the standard output.
There must be no space between the ``-i`` and the extension. If There must be no space between the :option:`-i` and the extension. If
no extension is provided, the old ``dsset-`` is discarded. If an no extension is provided, the old ``dsset-`` is discarded. If an
extension is present, a backup of the old ``dsset-`` file is kept extension is present, a backup of the old ``dsset-`` file is kept
with the extension appended to its filename. with the extension appended to its filename.
@ -158,7 +158,7 @@ Options
needed. needed.
Note: The TTL of new records needs to be specified: it can be done in the Note: The TTL of new records needs to be specified: it can be done in the
original ``dsset-`` file, with the ``-T`` option, or using the original ``dsset-`` file, with the :option:`-T` option, or using the
``nsupdate`` ``ttl`` command. ``nsupdate`` ``ttl`` command.
.. option:: -V .. option:: -V

View File

@ -32,10 +32,10 @@ Description
~~~~~~~~~~~ ~~~~~~~~~~~
The ``dnssec-dsfromkey`` command outputs DS (Delegation Signer) resource records The ``dnssec-dsfromkey`` command outputs DS (Delegation Signer) resource records
(RRs), or CDS (Child DS) RRs with the ``-C`` option. (RRs), or CDS (Child DS) RRs with the :option:`-C` option.
By default, only KSKs are converted (keys with flags = 257). The By default, only KSKs are converted (keys with flags = 257). The
``-A`` option includes ZSKs (flags = 256). Revoked keys are never :option:`-A` option includes ZSKs (flags = 256). Revoked keys are never
included. included.
The input keys can be specified in a number of ways: The input keys can be specified in a number of ways:
@ -43,22 +43,22 @@ The input keys can be specified in a number of ways:
By default, ``dnssec-dsfromkey`` reads a key file named in the format By default, ``dnssec-dsfromkey`` reads a key file named in the format
``Knnnn.+aaa+iiiii.key``, as generated by ``dnssec-keygen``. ``Knnnn.+aaa+iiiii.key``, as generated by ``dnssec-keygen``.
With the ``-f file`` option, ``dnssec-dsfromkey`` reads keys from a zone With the :option:`-f file <-f>` option, ``dnssec-dsfromkey`` reads keys from a zone
file or partial zone file (which can contain just the DNSKEY records). file or partial zone file (which can contain just the DNSKEY records).
With the ``-s`` option, ``dnssec-dsfromkey`` reads a ``keyset-`` file, With the :option:`-s` option, ``dnssec-dsfromkey`` reads a ``keyset-`` file,
as generated by ``dnssec-keygen`` ``-C``. as generated by ``dnssec-keygen`` :option:`-C`.
Options Options
~~~~~~~ ~~~~~~~
.. option:: -1 .. option:: -1
This option is an abbreviation for ``-a SHA1``. This option is an abbreviation for :option:`-a SHA1 <-a>`.
.. option:: -2 .. option:: -2
This option is an abbreviation for ``-a SHA-256``. This option is an abbreviation for :option:`-a SHA-256 <-a>`.
.. option:: -a algorithm .. option:: -a algorithm
@ -74,12 +74,12 @@ Options
This option indicates that ZSKs are to be included when generating DS records. Without this option, only This option indicates that ZSKs are to be included when generating DS records. Without this option, only
keys which have the KSK flag set are converted to DS records and keys which have the KSK flag set are converted to DS records and
printed. This option is only useful in ``-f`` zone file mode. printed. This option is only useful in :option:`-f` zone file mode.
.. option:: -c class .. option:: -c class
This option specifies the DNS class; the default is IN. This option is only useful in ``-s`` keyset This option specifies the DNS class; the default is IN. This option is only useful in :option:`-s` keyset
or ``-f`` zone file mode. or :option:`-f` zone file mode.
.. option:: -C .. option:: -C

View File

@ -35,7 +35,7 @@ input, in which case both .key and .private files are generated.
The newly created .private file does *not* contain private key data, and The newly created .private file does *not* contain private key data, and
cannot be used for signing. However, having a .private file makes it cannot be used for signing. However, having a .private file makes it
possible to set publication (``-P``) and deletion (``-D``) times for the possible to set publication (:option:`-P`) and deletion (:option:`-D`) times for the
key, which means the public key can be added to and removed from the key, which means the public key can be added to and removed from the
DNSKEY RRset on schedule even if the true private key is stored offline. DNSKEY RRset on schedule even if the true private key is stored offline.

View File

@ -45,18 +45,18 @@ Options
ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448. ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448.
If no algorithm is specified, RSASHA1 is used by default If no algorithm is specified, RSASHA1 is used by default
unless the ``-3`` option is specified, in which case NSEC3RSASHA1 unless the :option:`-3` option is specified, in which case NSEC3RSASHA1
is used instead. (If ``-3`` is used and an algorithm is is used instead. (If :option:`-3` is used and an algorithm is
specified, that algorithm is checked for compatibility with specified, that algorithm is checked for compatibility with
NSEC3.) NSEC3.)
These values are case-insensitive. In some cases, abbreviations are These values are case-insensitive. In some cases, abbreviations are
supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for
ECDSAP384SHA384. If RSASHA1 is specified along with the ``-3`` ECDSAP384SHA384. If RSASHA1 is specified along with the :option:`-3`
option, then NSEC3RSASHA1 is used instead. option, then NSEC3RSASHA1 is used instead.
Since BIND 9.12.0, this option is mandatory except when using the Since BIND 9.12.0, this option is mandatory except when using the
``-S`` option, which copies the algorithm from the predecessory key. :option:`-S` option, which copies the algorithm from the predecessory key.
Previously, the default for newly generated keys was RSASHA1. Previously, the default for newly generated keys was RSASHA1.
.. option:: -3 .. option:: -3
@ -98,7 +98,7 @@ Options
date in the metadata stored with the private key; other dates may date in the metadata stored with the private key; other dates may
be set there as well, including publication date, activation date, etc. Keys be set there as well, including publication date, activation date, etc. Keys
that include this data may be incompatible with older versions of that include this data may be incompatible with older versions of
BIND; the ``-C`` option suppresses them. BIND; the :option:`-C` option suppresses them.
.. option:: -c class .. option:: -c class
@ -113,7 +113,7 @@ Options
.. option:: -G .. option:: -G
This option generates a key, but does not publish it or sign with it. This option is This option generates a key, but does not publish it or sign with it. This option is
incompatible with ``-P`` and ``-A``. incompatible with :option:`-P` and :option:`-A`.
.. option:: -h .. option:: -h
@ -128,7 +128,8 @@ Options
This option generates KEY records rather than DNSKEY records. This option generates KEY records rather than DNSKEY records.
``-L`` ttl .. option:: -L ttl
This option sets the default TTL to use for this key when it is converted into a This option sets the default TTL to use for this key when it is converted into a
DNSKEY RR. This is the TTL used when the key is imported into a zone, DNSKEY RR. This is the TTL used when the key is imported into a zone,
unless there was already a DNSKEY RRset in unless there was already a DNSKEY RRset in
@ -189,7 +190,7 @@ explicitly prevent a date from being set, use ``none`` or ``never``.
This option sets the date on which a key is to be published to the zone. After This option sets the date on which a key is to be published to the zone. After
that date, the key is included in the zone but is not used that date, the key is included in the zone but is not used
to sign it. If not set, and if the ``-G`` option has not been used, the to sign it. If not set, and if the :option:`-G` option has not been used, the
default is the current date. default is the current date.
.. option:: -P sync date/offset .. option:: -P sync date/offset
@ -201,7 +202,7 @@ explicitly prevent a date from being set, use ``none`` or ``never``.
This option sets the date on which the key is to be activated. After that date, This option sets the date on which the key is to be activated. After that date,
the key is included in the zone and used to sign it. If not set, the key is included in the zone and used to sign it. If not set,
and if the ``-G`` option has not been used, the default is the current date. and if the :option:`-G` option has not been used, the default is the current date.
.. option:: -R date/offset .. option:: -R date/offset

View File

@ -50,14 +50,14 @@ Options
``algorithm`` must be one of RSASHA1, NSEC3RSASHA1, RSASHA256, ``algorithm`` must be one of RSASHA1, NSEC3RSASHA1, RSASHA256,
RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448. For RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448. For
TKEY, the value must be DH (Diffie-Hellman); specifying this value TKEY, the value must be DH (Diffie-Hellman); specifying this value
automatically sets the ``-T KEY`` option as well. automatically sets the :option:`-T KEY <-T>` option as well.
These values are case-insensitive. In some cases, abbreviations are These values are case-insensitive. In some cases, abbreviations are
supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for
ECDSAP384SHA384. If RSASHA1 is specified along with the ``-3`` ECDSAP384SHA384. If RSASHA1 is specified along with the :option:`-3`
option, NSEC3RSASHA1 is used instead. option, NSEC3RSASHA1 is used instead.
This parameter *must* be specified except when using the ``-S`` This parameter *must* be specified except when using the :option:`-S`
option, which copies the algorithm from the predecessor key. option, which copies the algorithm from the predecessor key.
In prior releases, HMAC algorithms could be generated for use as TSIG In prior releases, HMAC algorithms could be generated for use as TSIG
@ -74,7 +74,7 @@ Options
If the key size is not specified, some algorithms have pre-defined If the key size is not specified, some algorithms have pre-defined
defaults. For example, RSA keys for use as DNSSEC zone-signing keys defaults. For example, RSA keys for use as DNSSEC zone-signing keys
have a default size of 1024 bits; RSA keys for use as key-signing have a default size of 1024 bits; RSA keys for use as key-signing
keys (KSKs, generated with ``-f KSK``) default to 2048 bits. keys (KSKs, generated with :option:`-f KSK <-f>`) default to 2048 bits.
.. option:: -C .. option:: -C
@ -83,7 +83,7 @@ Options
creation date in the metadata stored with the private key; other creation date in the metadata stored with the private key; other
dates may be set there as well, including publication date, activation date, dates may be set there as well, including publication date, activation date,
etc. Keys that include this data may be incompatible with older etc. Keys that include this data may be incompatible with older
versions of BIND; the ``-C`` option suppresses them. versions of BIND; the :option:`-C` option suppresses them.
.. option:: -c class .. option:: -c class
@ -113,7 +113,7 @@ Options
.. option:: -G .. option:: -G
This option generates a key, but does not publish it or sign with it. This option is This option generates a key, but does not publish it or sign with it. This option is
incompatible with ``-P`` and ``-A``. incompatible with :option:`-P` and :option:`-A`.
.. option:: -g generator .. option:: -g generator
@ -153,7 +153,7 @@ Options
.. option:: -l file .. option:: -l file
This option provides a configuration file that contains a ``dnssec-policy`` statement This option provides a configuration file that contains a ``dnssec-policy`` statement
(matching the policy set with ``-k``). (matching the policy set with :option:`-k`).
.. option:: -n nametype .. option:: -n nametype
@ -166,7 +166,7 @@ Options
.. option:: -p protocol .. option:: -p protocol
This option sets the protocol value for the generated key, for use with This option sets the protocol value for the generated key, for use with
``-T KEY``. The protocol is a number between 0 and 255. The default :option:`-T KEY <-T>`. The protocol is a number between 0 and 255. The default
is 3 (DNSSEC). Other possible values for this argument are listed in is 3 (DNSSEC). Other possible values for this argument are listed in
:rfc:`2535` and its successors. :rfc:`2535` and its successors.
@ -204,7 +204,7 @@ Options
.. option:: -t type .. option:: -t type
This option indicates the type of the key for use with ``-T KEY``. ``type`` This option indicates the type of the key for use with :option:`-T KEY <-T>`. ``type``
must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
is AUTHCONF. AUTH refers to the ability to authenticate data, and is AUTHCONF. AUTH refers to the ability to authenticate data, and
CONF to the ability to encrypt data. CONF to the ability to encrypt data.
@ -233,7 +233,7 @@ explicitly prevent a date from being set, use ``none`` or ``never``.
This option sets the date on which a key is to be published to the zone. After This option sets the date on which a key is to be published to the zone. After
that date, the key is included in the zone but is not used that date, the key is included in the zone but is not used
to sign it. If not set, and if the ``-G`` option has not been used, the to sign it. If not set, and if the :option:`-G` option has not been used, the
default is the current date. default is the current date.
.. option:: -P sync date/offset .. option:: -P sync date/offset
@ -245,8 +245,8 @@ explicitly prevent a date from being set, use ``none`` or ``never``.
This option sets the date on which the key is to be activated. After that date, This option sets the date on which the key is to be activated. After that date,
the key is included in the zone and used to sign it. If not set, the key is included in the zone and used to sign it. If not set,
and if the ``-G`` option has not been used, the default is the current date. If set, and if the :option:`-G` option has not been used, the default is the current date. If set,
and ``-P`` is not set, the publication date is set to the and :option:`-P` is not set, the publication date is set to the
activation date minus the prepublication interval. activation date minus the prepublication interval.
.. option:: -R date/offset .. option:: -R date/offset
@ -309,7 +309,7 @@ string. ``Knnnn.+aaa+iiiii.key`` contains the public key, and
``Knnnn.+aaa+iiiii.private`` contains the private key. ``Knnnn.+aaa+iiiii.private`` contains the private key.
The ``.key`` file contains a DNSKEY or KEY record. When a zone is being The ``.key`` file contains a DNSKEY or KEY record. When a zone is being
signed by ``named`` or ``dnssec-signzone -S``, DNSKEY records are signed by ``named`` or :option:`dnssec-signzone -S`, DNSKEY records are
included automatically. In other cases, the ``.key`` file can be included automatically. In other cases, the ``.key`` file can be
inserted into a zone file manually or with an ``$INCLUDE`` statement. inserted into a zone file manually or with an ``$INCLUDE`` statement.

View File

@ -26,10 +26,10 @@ Description
~~~~~~~~~~~ ~~~~~~~~~~~
``dnssec-settime`` reads a DNSSEC private key file and sets the key ``dnssec-settime`` reads a DNSSEC private key file and sets the key
timing metadata as specified by the ``-P``, ``-A``, ``-R``, ``-I``, and timing metadata as specified by the :option:`-P`, :option:`-A`, :option:`-R`,
``-D`` options. The metadata can then be used by ``dnssec-signzone`` or :option:`-I`, and :option:`-D` options. The metadata can then be used by
other signing software to determine when a key is to be published, ``dnssec-signzone`` or other signing software to determine when a key is
whether it should be used for signing a zone, etc. to be published, whether it should be used for signing a zone, etc.
If none of these options is set on the command line, If none of these options is set on the command line,
``dnssec-settime`` simply prints the key timing metadata already stored ``dnssec-settime`` simply prints the key timing metadata already stored
@ -45,12 +45,12 @@ the key file. The private file's permissions are always set to be
inaccessible to anyone other than the owner (mode 0600). inaccessible to anyone other than the owner (mode 0600).
When working with state files, it is possible to update the timing metadata in When working with state files, it is possible to update the timing metadata in
those files as well with ``-s``. With this option, it is also possible to update key those files as well with :option:`-s`. With this option, it is also possible
states with ``-d`` (DS), ``-k`` (DNSKEY), ``-r`` (RRSIG of KSK), or ``-z`` to update key states with :option:`-d` (DS), :option:`-k` (DNSKEY), :option:`-r`
(RRSIG of ZSK). Allowed states are HIDDEN, RUMOURED, OMNIPRESENT, and (RRSIG of KSK), or :option:`-z` (RRSIG of ZSK). Allowed states are HIDDEN,
UNRETENTIVE. RUMOURED, OMNIPRESENT, and UNRETENTIVE.
The goal state of the key can also be set with ``-g``. This should be either The goal state of the key can also be set with :option:`-g`. This should be either
HIDDEN or OMNIPRESENT, representing whether the key should be removed from the HIDDEN or OMNIPRESENT, representing whether the key should be removed from the
zone or published. zone or published.
@ -239,7 +239,7 @@ associated with a key.
.. option:: -p C/P/Pds/Psync/A/R/I/D/Dds/Dsync/all .. option:: -p C/P/Pds/Psync/A/R/I/D/Dds/Dsync/all
This option prints a specific metadata value or set of metadata values. This option prints a specific metadata value or set of metadata values.
The ``-p`` option may be followed by one or more of the following letters or The :option:`-p` option may be followed by one or more of the following letters or
strings to indicate which value or values to print: ``C`` for the strings to indicate which value or values to print: ``C`` for the
creation date, ``P`` for the publication date, ``Pds` for the DS publication creation date, ``P`` for the publication date, ``Pds` for the DS publication
date, ``Psync`` for the CDS and CDNSKEY publication date, ``A`` for the date, ``Psync`` for the CDS and CDNSKEY publication date, ``A`` for the

View File

@ -56,9 +56,9 @@ Options
This option indicates that only those record types automatically managed by This option indicates that only those record types automatically managed by
``dnssec-signzone``, i.e., RRSIG, NSEC, NSEC3 and NSEC3PARAM records, should be included in the output. ``dnssec-signzone``, i.e., RRSIG, NSEC, NSEC3 and NSEC3PARAM records, should be included in the output.
If smart signing (``-S``) is used, DNSKEY records are also included. If smart signing (:option:`-S`) is used, DNSKEY records are also included.
The resulting file can be included in the original zone file with The resulting file can be included in the original zone file with
``$INCLUDE``. This option cannot be combined with ``-O raw`` ``$INCLUDE``. This option cannot be combined with :option:`-O raw <-O>`
or serial-number updating. or serial-number updating.
.. option:: -E engine .. option:: -E engine
@ -94,7 +94,7 @@ Options
possible time before signatures that have been retrieved by resolvers possible time before signatures that have been retrieved by resolvers
expire from resolver caches. Zones that are signed with this expire from resolver caches. Zones that are signed with this
option should be configured to use a matching ``max-zone-ttl`` in option should be configured to use a matching ``max-zone-ttl`` in
``named.conf``. (Note: This option is incompatible with ``-D``, ``named.conf``. (Note: This option is incompatible with :option:`-D`,
because it modifies non-DNSSEC data in the output zone.) because it modifies non-DNSSEC data in the output zone.)
.. option:: -s start-time .. option:: -s start-time
@ -256,7 +256,7 @@ Options
signer, and a DNSKEY record has been removed and replaced with a new signer, and a DNSKEY record has been removed and replaced with a new
one, signatures from the old key that are still within their validity one, signatures from the old key that are still within their validity
period are retained. This allows the zone to continue to validate period are retained. This allows the zone to continue to validate
with cached copies of the old DNSKEY RRset. The ``-Q`` option forces with cached copies of the old DNSKEY RRset. The :option:`-Q` option forces
``dnssec-signzone`` to remove signatures from keys that are no longer ``dnssec-signzone`` to remove signatures from keys that are no longer
active. This enables ZSK rollover using the procedure described in active. This enables ZSK rollover using the procedure described in
:rfc:`4641#4.2.1.1` ("Pre-Publish Key Rollover"). :rfc:`4641#4.2.1.1` ("Pre-Publish Key Rollover").
@ -273,7 +273,7 @@ Options
This option removes signatures from keys that are no longer published. This option removes signatures from keys that are no longer published.
This option is similar to ``-Q``, except it forces This option is similar to :option:`-Q`, except it forces
``dnssec-signzone`` to remove signatures from keys that are no longer ``dnssec-signzone`` to remove signatures from keys that are no longer
published. This enables ZSK rollover using the procedure described in published. This enables ZSK rollover using the procedure described in
:rfc:`4641#4.2.1.2` ("Double Signature Zone Signing Key :rfc:`4641#4.2.1.2` ("Double Signature Zone Signing Key
@ -318,7 +318,7 @@ Options
This option specifies a TTL to be used for new DNSKEY records imported into the This option specifies a TTL to be used for new DNSKEY records imported into the
zone from the key repository. If not specified, the default is the zone from the key repository. If not specified, the default is the
TTL value from the zone's SOA record. This option is ignored when TTL value from the zone's SOA record. This option is ignored when
signing without ``-S``, since DNSKEY records are not imported from signing without :option:`-S`, since DNSKEY records are not imported from
the key repository in that case. It is also ignored if there are any the key repository in that case. It is also ignored if there are any
pre-existing DNSKEY records at the zone apex, in which case new pre-existing DNSKEY records at the zone apex, in which case new
records' TTL values are set to match them, or if any of the records' TTL values are set to match them, or if any of the
@ -371,8 +371,10 @@ Options
This option indicates that, when generating an NSEC3 chain, BIND 9 should set the OPTOUT flag on all NSEC3 This option indicates that, when generating an NSEC3 chain, BIND 9 should set the OPTOUT flag on all NSEC3
records and should not generate NSEC3 records for insecure delegations. records and should not generate NSEC3 records for insecure delegations.
Using this option twice (i.e., ``-AA``) turns the OPTOUT flag off for .. option:: -AA
all records. This is useful when using the ``-u`` option to modify an
This option turns the OPTOUT flag off for
all records. This is useful when using the :option:`-u` option to modify an
NSEC3 chain which previously had OPTOUT set. NSEC3 chain which previously had OPTOUT set.
.. option:: zonefile .. option:: zonefile
@ -391,10 +393,10 @@ Example
The following command signs the ``example.com`` zone with the The following command signs the ``example.com`` zone with the
ECDSAP256SHA256 key generated by ``dnssec-keygen`` ECDSAP256SHA256 key generated by ``dnssec-keygen``
(Kexample.com.+013+17247). Because the ``-S`` option is not being used, (Kexample.com.+013+17247). Because the :option:`-S` option is not being used,
the zone's keys must be in the master file (``db.example.com``). This the zone's keys must be in the master file (``db.example.com``). This
invocation looks for ``dsset`` files in the current directory, so that invocation looks for ``dsset`` files in the current directory, so that
DS records can be imported from them (``-g``). DS records can be imported from them (:option:`-g`).
:: ::

View File

@ -79,7 +79,7 @@ Options
Without this flag, it is assumed that the DNSKEY RRset is signed Without this flag, it is assumed that the DNSKEY RRset is signed
by all active keys. When this flag is set, it is not an error if by all active keys. When this flag is set, it is not an error if
the DNSKEY RRset is not signed by zone-signing keys. This corresponds the DNSKEY RRset is not signed by zone-signing keys. This corresponds
to the ``-x`` option in ``dnssec-signzone``. to the :option:`-x option in dnssec-signzone <dnssec-signzone -x>`.
.. option:: -z .. option:: -z
@ -94,9 +94,10 @@ Options
the KSK flag state, and that other RRsets be signed by a the KSK flag state, and that other RRsets be signed by a
non-revoked key for the same algorithm that includes the self-signed non-revoked key for the same algorithm that includes the self-signed
key; the same key may be used for both purposes. This corresponds to key; the same key may be used for both purposes. This corresponds to
the ``-z`` option in ``dnssec-signzone``. the :option:`-z option in dnssec-signzone <dnssec-signzone -z>`.
.. option:: zonefile
``zonefile``
This option indicates the file containing the zone to be signed. This option indicates the file containing the zone to be signed.
See Also See Also

View File

@ -38,13 +38,13 @@ Options
.. option:: -4 .. option:: -4
This option tells ``named`` to use only IPv4, even if the host machine is capable of IPv6. ``-4`` and This option tells ``named`` to use only IPv4, even if the host machine is capable of IPv6. :option:`-4` and
``-6`` are mutually exclusive. :option:`-6` are mutually exclusive.
.. option:: -6 .. option:: -6
This option tells ``named`` to use only IPv6, even if the host machine is capable of IPv4. ``-4`` and This option tells ``named`` to use only IPv6, even if the host machine is capable of IPv4. :option:`-4` and
``-6`` are mutually exclusive. :option:`-6` are mutually exclusive.
.. option:: -c config-file .. option:: -c config-file
@ -153,7 +153,7 @@ Options
.. warning:: .. warning::
This option should be used in conjunction with the ``-u`` option, This option should be used in conjunction with the :option:`-u` option,
as chrooting a process running as root doesn't enhance security on as chrooting a process running as root doesn't enhance security on
most systems; the way ``chroot`` is defined allows a process most systems; the way ``chroot`` is defined allows a process
with root privileges to escape a chroot jail. with root privileges to escape a chroot jail.
@ -165,8 +165,8 @@ Options
value based on the number of detected CPUs: 1 for 1 CPU, and the value based on the number of detected CPUs: 1 for 1 CPU, and the
number of detected CPUs minus one for machines with more than 1 CPU. number of detected CPUs minus one for machines with more than 1 CPU.
This cannot be increased to a value higher than the number of CPUs. This cannot be increased to a value higher than the number of CPUs.
If ``-n`` has been set to a higher value than the number of detected If :option:`-n` has been set to a higher value than the number of detected
CPUs, then ``-U`` may be increased as high as that value, but no CPUs, then :option:`-U` may be increased as high as that value, but no
higher. higher.
.. option:: -u user .. option:: -u user
@ -179,7 +179,7 @@ Options
On Linux, ``named`` uses the kernel's capability mechanism to drop On Linux, ``named`` uses the kernel's capability mechanism to drop
all root privileges except the ability to ``bind`` to a all root privileges except the ability to ``bind`` to a
privileged port and set process resource limits. Unfortunately, privileged port and set process resource limits. Unfortunately,
this means that the ``-u`` option only works when ``named`` is run this means that the :option:`-u` option only works when ``named`` is run
on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or later, since on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or later, since
previous kernels did not allow privileges to be retained after previous kernels did not allow privileges to be retained after
``setuid``. ``setuid``.

View File

@ -49,15 +49,15 @@ statements are added to |named_conf| so that the name server
can associate the appropriate secret key and algorithm with the IP can associate the appropriate secret key and algorithm with the IP
address of the client application that is using TSIG address of the client application that is using TSIG
authentication. ``ddns-confgen`` can generate suitable authentication. ``ddns-confgen`` can generate suitable
configuration fragments. ``nsupdate`` uses the ``-y`` or ``-k`` options configuration fragments. ``nsupdate`` uses the :option:`-y` or :option:`-k` options
to provide the TSIG shared secret; these options are mutually exclusive. to provide the TSIG shared secret; these options are mutually exclusive.
SIG(0) uses public key cryptography. To use a SIG(0) key, the public key SIG(0) uses public key cryptography. To use a SIG(0) key, the public key
must be stored in a KEY record in a zone served by the name server. must be stored in a KEY record in a zone served by the name server.
GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode is switched GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode is switched
on with the ``-g`` flag. A non-standards-compliant variant of GSS-TSIG on with the :option:`-g` flag. A non-standards-compliant variant of GSS-TSIG
used by Windows 2000 can be switched on with the ``-o`` flag. used by Windows 2000 can be switched on with the :option:`-o` flag.
Options Options
~~~~~~~ ~~~~~~~
@ -83,6 +83,10 @@ Options
This option sets extra debug mode. This option sets extra debug mode.
.. option:: -g
This option enables standard GSS-TSIG mode.
.. option:: -i .. option:: -i
This option forces interactive mode, even when standard input is not a terminal. This option forces interactive mode, even when standard input is not a terminal.
@ -95,7 +99,7 @@ Options
or a pair of files whose names are of the format or a pair of files whose names are of the format
``K{name}.+157.+{random}.key`` and ``K{name}.+157.+{random}.key`` and
``K{name}.+157.+{random}.private``, which can be generated by ``K{name}.+157.+{random}.private``, which can be generated by
``dnssec-keygen``. The ``-k`` option can also be used to specify a SIG(0) ``dnssec-keygen``. The :option:`-k` option can also be used to specify a SIG(0)
key used to authenticate Dynamic DNS update requests. In this case, key used to authenticate Dynamic DNS update requests. In this case,
the key specified is not an HMAC-MD5 key. the key specified is not an HMAC-MD5 key.
@ -107,12 +111,17 @@ Options
found in |session_key|, which is automatically found in |session_key|, which is automatically
generated by ``named`` if any local ``primary`` zone has set generated by ``named`` if any local ``primary`` zone has set
``update-policy`` to ``local``. The location of this key file can be ``update-policy`` to ``local``. The location of this key file can be
overridden with the ``-k`` option. overridden with the :option:`-k` option.
.. option:: -L level .. option:: -L level
This option sets the logging debug level. If zero, logging is disabled. This option sets the logging debug level. If zero, logging is disabled.
.. option:: -o
This option enables a non-standards-compliant variant of GSS-TSIG
used by Windows 2000.
.. option:: -p port .. option:: -p port
This option sets the port to use for connections to a name server. The default is This option sets the port to use for connections to a name server. The default is
@ -121,7 +130,7 @@ Options
.. option:: -P .. option:: -P
This option prints the list of private BIND-specific resource record types whose This option prints the list of private BIND-specific resource record types whose
format is understood by ``nsupdate``. See also the ``-T`` option. format is understood by ``nsupdate``. See also the :option:`-T` option.
.. option:: -r udpretries .. option:: -r udpretries
@ -137,7 +146,7 @@ Options
This option prints the list of IANA standard resource record types whose format is This option prints the list of IANA standard resource record types whose format is
understood by ``nsupdate``. ``nsupdate`` exits after the lists understood by ``nsupdate``. ``nsupdate`` exits after the lists
are printed. The ``-T`` option can be combined with the ``-P`` are printed. The :option:`-T` option can be combined with the :option:`-P`
option. option.
Other types can be entered using ``TYPEXXXXX`` where ``XXXXX`` is the Other types can be entered using ``TYPEXXXXX`` where ``XXXXX`` is the
@ -171,7 +180,7 @@ Options
``hmac-sha512``. If ``hmac`` is not specified, the default is ``hmac-sha512``. If ``hmac`` is not specified, the default is
``hmac-md5``, or if MD5 was disabled, ``hmac-sha256``. ``hmac-md5``, or if MD5 was disabled, ``hmac-sha256``.
NOTE: Use of the ``-y`` option is discouraged because the shared NOTE: Use of the :option:`-y` option is discouraged because the shared
secret is supplied as a command-line argument in clear text. This may secret is supplied as a command-line argument in clear text. This may
be visible in the output from ps1 or in a history file maintained by be visible in the output from ps1 or in a history file maintained by
the user's shell. the user's shell.
@ -231,15 +240,15 @@ The command formats and their meanings are as follows:
``keyname``-``secret`` pair. If ``hmac`` is specified, it sets ``keyname``-``secret`` pair. If ``hmac`` is specified, it sets
the signing algorithm in use. The default is ``hmac-md5``; if MD5 the signing algorithm in use. The default is ``hmac-md5``; if MD5
was disabled, the default is ``hmac-sha256``. The ``key`` command overrides any key was disabled, the default is ``hmac-sha256``. The ``key`` command overrides any key
specified on the command line via ``-y`` or ``-k``. specified on the command line via :option:`-y` or :option:`-k`.
``gsstsig`` ``gsstsig``
This command uses GSS-TSIG to sign the updates. This is equivalent to specifying This command uses GSS-TSIG to sign the updates. This is equivalent to specifying
``-g`` on the command line. :option:`-g` on the command line.
``oldgsstsig`` ``oldgsstsig``
This command uses the Windows 2000 version of GSS-TSIG to sign the updates. This is This command uses the Windows 2000 version of GSS-TSIG to sign the updates. This is
equivalent to specifying ``-o`` on the command line. equivalent to specifying :option:`-o` on the command line.
``realm [realm_name]`` ``realm [realm_name]``
When using GSS-TSIG, this command specifies the use of ``realm_name`` rather than the default realm When using GSS-TSIG, this command specifies the use of ``realm_name`` rather than the default realm

View File

@ -127,7 +127,7 @@ key statement indicates that "samplekey" uses the HMAC-SHA256 algorithm
and its secret clause contains the base-64 encoding of the HMAC-SHA256 and its secret clause contains the base-64 encoding of the HMAC-SHA256
secret enclosed in double quotes. secret enclosed in double quotes.
If ``rndc -s testserver`` is used, then ``rndc`` connects to the server If :option:`rndc -s testserver <rndc -s>` is used, then ``rndc`` connects to the server
on localhost port 5353 using the key "testkey". on localhost port 5353 using the key "testkey".
To generate a random secret with ``rndc-confgen``: To generate a random secret with ``rndc-confgen``:

View File

@ -144,7 +144,7 @@ Currently supported commands are:
(Note the brackets around and semi-colon after the zone configuration (Note the brackets around and semi-colon after the zone configuration
text.) text.)
See also ``rndc delzone`` and ``rndc modzone``. See also :option:`rndc delzone` and :option:`rndc modzone`.
.. option:: delzone [-clean] zone [class [view]] .. option:: delzone [-clean] zone [class [view]]
@ -163,7 +163,7 @@ Currently supported commands are:
recreated. To remove it permanently, it must also be removed from recreated. To remove it permanently, it must also be removed from
``named.conf``. ``named.conf``.
See also ``rndc addzone`` and ``rndc modzone``. See also :option:`rndc addzone` and :option:`rndc modzone`.
.. option:: dnssec (-status | -rollover -key id [-alg algorithm] [-when time] | -checkds [-key id [-alg algorithm]] [-when time] published | withdraw)) zone [class [view]] .. option:: dnssec (-status | -rollover -key id [-alg algorithm] [-when time] | -checkds [-key id [-alg algorithm]] [-when time] published | withdraw)) zone [class [view]]
@ -225,7 +225,7 @@ Currently supported commands are:
journal file to be synced into the master file. All dynamic update journal file to be synced into the master file. All dynamic update
attempts are refused while the zone is frozen. attempts are refused while the zone is frozen.
See also ``rndc thaw``. See also :option:`rndc thaw`.
.. option:: halt [-p] .. option:: halt [-p]
@ -236,13 +236,13 @@ Currently supported commands are:
an external process to determine when ``named`` has completed an external process to determine when ``named`` has completed
halting. halting.
See also ``rndc stop``. See also :option:`rndc stop`.
.. option:: loadkeys [zone [class [view]]] .. option:: loadkeys [zone [class [view]]]
This command fetches all DNSSEC keys for the given zone from the key directory. If This command fetches all DNSSEC keys for the given zone from the key directory. If
they are within their publication period, they are merged into the they are within their publication period, they are merged into the
zone's DNSKEY RRset. Unlike ``rndc sign``, however, the zone is not zone's DNSKEY RRset. Unlike :option:`rndc sign`, however, the zone is not
immediately re-signed by the new keys, but is allowed to immediately re-signed by the new keys, but is allowed to
incrementally re-sign over time. incrementally re-sign over time.
@ -282,7 +282,7 @@ Currently supported commands are:
restarted or reconfigured, and all existing key maintenance states restarted or reconfigured, and all existing key maintenance states
are deleted. are deleted.
Running ``rndc reconfig`` or restarting ``named`` immediately Running :option:`rndc reconfig` or restarting ``named`` immediately
after this command causes key maintenance to be reinitialized after this command causes key maintenance to be reinitialized
from scratch, just as if the server were being started for the from scratch, just as if the server were being started for the
first time. This is primarily intended for testing, but it may first time. This is primarily intended for testing, but it may
@ -298,7 +298,7 @@ Currently supported commands are:
command line is the zone configuration text that would ordinarily be command line is the zone configuration text that would ordinarily be
placed in ``named.conf``. placed in ``named.conf``.
If the zone was originally added via ``rndc addzone``, the If the zone was originally added via :option:`rndc addzone`, the
configuration changes are recorded permanently and are still configuration changes are recorded permanently and are still
in effect after the server is restarted or reconfigured. However, if in effect after the server is restarted or reconfigured. However, if
it was originally configured in ``named.conf``, then that original it was originally configured in ``named.conf``, then that original
@ -307,7 +307,7 @@ Currently supported commands are:
make the changes permanent, it must also be modified in make the changes permanent, it must also be modified in
``named.conf``. ``named.conf``.
See also ``rndc addzone`` and ``rndc delzone``. See also :option:`rndc addzone` and :option:`rndc delzone`.
.. option:: notify zone [class [view]] .. option:: notify zone [class [view]]
@ -317,7 +317,7 @@ Currently supported commands are:
This command sets the server's debugging level to 0. This command sets the server's debugging level to 0.
See also ``rndc trace``. See also :option:`rndc trace`.
.. option:: nta [(-class class | -dump | -force | -remove | -lifetime duration)] domain [view] .. option:: nta [(-class class | -dump | -force | -remove | -lifetime duration)] domain [view]
@ -453,7 +453,7 @@ Currently supported commands are:
``named.secroots``, but can be overridden via the ``secroots-file`` ``named.secroots``, but can be overridden via the ``secroots-file``
option in ``named.conf``. option in ``named.conf``.
See also ``rndc managed-keys``. See also :option:`rndc managed-keys`.
.. option:: serve-stale (on | off | reset | status) [class [view]] .. option:: serve-stale (on | off | reset | status) [class [view]]
@ -472,7 +472,7 @@ Currently supported commands are:
This command prints the configuration of a running zone. This command prints the configuration of a running zone.
See also ``rndc zonestatus``. See also :option:`rndc zonestatus`.
.. option:: sign zone [class [view]] .. option:: sign zone [class [view]]
@ -488,7 +488,7 @@ Currently supported commands are:
"Dynamic Update Policies" in the BIND 9 Administrator Reference Manual for more "Dynamic Update Policies" in the BIND 9 Administrator Reference Manual for more
details.) details.)
See also ``rndc loadkeys``. See also :option:`rndc loadkeys`.
.. option:: signing [(-list | -clear keyid/algorithm | -clear all | -nsec3param (parameters | none) | -serial value) zone [class [view]] .. option:: signing [(-list | -clear keyid/algorithm | -clear all | -nsec3param (parameters | none) | -serial value) zone [class [view]]
@ -556,7 +556,7 @@ Currently supported commands are:
This allows an external process to determine when ``named`` has This allows an external process to determine when ``named`` has
completed stopping. completed stopping.
See also ``rndc halt``. See also :option:`rndc halt`.
.. option:: sync -clean [zone [class [view]]] .. option:: sync -clean [zone [class [view]]]
@ -585,7 +585,7 @@ Currently supported commands are:
changes in the zone. Otherwise, if the zone has changed, any existing changes in the zone. Otherwise, if the zone has changed, any existing
journal file is removed. journal file is removed.
See also ``rndc freeze``. See also :option:`rndc freeze`.
.. option:: trace .. option:: trace
@ -595,7 +595,7 @@ Currently supported commands are:
This command sets the server's debugging level to an explicit value. This command sets the server's debugging level to an explicit value.
See also ``rndc notrace``. See also :option:`rndc notrace`.
.. option:: tsig-delete keyname [view] .. option:: tsig-delete keyname [view]
@ -625,10 +625,10 @@ Currently supported commands are:
signed, whether it uses automatic DNSSEC key management or inline signed, whether it uses automatic DNSSEC key management or inline
signing, and the scheduled refresh or expiry times for the zone. signing, and the scheduled refresh or expiry times for the zone.
See also ``rndc showzone``. See also :option:`rndc showzone`.
``rndc`` commands that specify zone names, such as ``reload`` ``rndc`` commands that specify zone names, such as :option:`reload`
``retransfer``, or ``zonestatus``, can be ambiguous when applied to zones :option:`retransfer`, or :option:`zonestatus`, can be ambiguous when applied to zones
of type ``redirect``. Redirect zones are always called ``.``, and can be of type ``redirect``. Redirect zones are always called ``.``, and can be
confused with zones of type ``hint`` or with secondary copies of the root confused with zones of type ``hint`` or with secondary copies of the root
zone. To specify a redirect zone, use the special zone name zone. To specify a redirect zone, use the special zone name

View File

@ -27,7 +27,7 @@ Description
``dnstap-read`` reads ``dnstap`` data from a specified file and prints ``dnstap-read`` reads ``dnstap`` data from a specified file and prints
it in a human-readable format. By default, ``dnstap`` data is printed in it in a human-readable format. By default, ``dnstap`` data is printed in
a short summary format, but if the ``-y`` option is specified, a a short summary format, but if the :option:`-y` option is specified, a
longer and more detailed YAML format is used. longer and more detailed YAML format is used.
Options Options

View File

@ -231,7 +231,7 @@ Local Options
This option sets the query type to ``type``. It can be any valid This option sets the query type to ``type``. It can be any valid
query type which is supported in BIND 9. The default query type is "A", query type which is supported in BIND 9. The default query type is "A",
unless the ``-x`` option is supplied to indicate a reverse lookup with unless the :option:`-x` option is supplied to indicate a reverse lookup with
the "PTR" query type. the "PTR" query type.
.. option:: -x addr .. option:: -x addr

View File

@ -27,7 +27,7 @@ Description
``named-nzd2nzf`` converts an NZD database to NZF format and prints it ``named-nzd2nzf`` converts an NZD database to NZF format and prints it
to standard output. This can be used to review the configuration of to standard output. This can be used to review the configuration of
zones that were added to ``named`` via ``rndc addzone``. It can also be zones that were added to ``named`` via :option:`rndc addzone`. It can also be
used to restore the old file format when rolling back from a newer used to restore the old file format when rolling back from a newer
version of BIND to an older version. version of BIND to an older version.

View File

@ -96,19 +96,19 @@ The zone files of dynamic zones cannot normally be edited by hand
because they are not guaranteed to contain the most recent dynamic because they are not guaranteed to contain the most recent dynamic
changes; those are only in the journal file. The only way to ensure changes; those are only in the journal file. The only way to ensure
that the zone file of a dynamic zone is up-to-date is to run that the zone file of a dynamic zone is up-to-date is to run
``rndc stop``. :option:`rndc stop`.
To make changes to a dynamic zone manually, follow these steps: To make changes to a dynamic zone manually, follow these steps:
first, disable dynamic updates to the zone using first, disable dynamic updates to the zone using
``rndc freeze zone``. This updates the zone file with the :option:`rndc freeze zone <rndc freeze>`. This updates the zone file with the
changes stored in its ``.jnl`` file. Then, edit the zone file. Finally, run changes stored in its ``.jnl`` file. Then, edit the zone file. Finally, run
``rndc thaw zone`` to reload the changed zone and re-enable dynamic :option:`rndc thaw zone <rndc thaw>` to reload the changed zone and re-enable dynamic
updates. updates.
``rndc sync zone`` updates the zone file with changes from the :option:`rndc sync zone <rndc sync>` updates the zone file with changes from the
journal file without stopping dynamic updates; this may be useful for journal file without stopping dynamic updates; this may be useful for
viewing the current zone state. To remove the ``.jnl`` file after viewing the current zone state. To remove the ``.jnl`` file after
updating the zone file, use ``rndc sync -clean``. updating the zone file, use :option:`rndc sync -clean <rndc sync>`.
.. _incremental_zone_transfers: .. _incremental_zone_transfers:
@ -389,8 +389,8 @@ configuration syntax and the process of creating TSIG keys.
the tools included with BIND support it for sending messages to the tools included with BIND support it for sending messages to
``named``: ``named``:
* :ref:`man_nsupdate` supports TSIG via the ``-k``, ``-l``, and ``-y`` command-line options, or via the ``key`` command when running interactively. * :ref:`man_nsupdate` supports TSIG via the :option:`-k <nsupdate -k>`, :option:`-l <nsupdate -l>`, and :option:`-y <nsupdate -y>` command-line options, or via the ``key`` command when running interactively.
* :ref:`man_dig` supports TSIG via the ``-k`` and ``-y`` command-line options. * :ref:`man_dig` supports TSIG via the :option:`-k <nsupdate -k>` and :option:`-y <nsupdate -y>` command-line options.
Generating a Shared Key Generating a Shared Key
~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
@ -446,7 +446,7 @@ the signature. If the signature is valid, the response is signed
using the same key. using the same key.
TSIG keys that are known to a server can be listed using the command TSIG keys that are known to a server can be listed using the command
``rndc tsig-list``. :option:`rndc tsig-list`.
Instructing the Server to Use a Key Instructing the Server to Use a Key
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -545,10 +545,10 @@ exchange. The shared secret can then be used to sign subsequent
transactions between the two servers. transactions between the two servers.
TSIG keys known by the server, including TKEY-negotiated keys, can be TSIG keys known by the server, including TKEY-negotiated keys, can be
listed using ``rndc tsig-list``. listed using :option:`rndc tsig-list`.
TKEY-negotiated keys can be deleted from a server using TKEY-negotiated keys can be deleted from a server using
``rndc tsig-delete``. This can also be done via the TKEY protocol :option:`rndc tsig-delete`. This can also be done via the TKEY protocol
itself, by sending an authenticated TKEY query specifying the "key itself, by sending an authenticated TKEY query specifying the "key
deletion" mode. deletion" mode.
@ -645,8 +645,8 @@ The ``dnssec-signzone`` program is used to sign a zone.
Any ``keyset`` files corresponding to secure sub-zones should be Any ``keyset`` files corresponding to secure sub-zones should be
present. The zone signer generates ``NSEC``, ``NSEC3``, and ``RRSIG`` present. The zone signer generates ``NSEC``, ``NSEC3``, and ``RRSIG``
records for the zone, as well as ``DS`` for the child zones if ``-g`` records for the zone, as well as ``DS`` for the child zones if :option:`-g <dnssec-signzone -g>`
is specified. If ``-g`` is not specified, then DS RRsets for the is specified. If :option:`-g <dnssec-signzone -g>` is not specified, then DS RRsets for the
secure child zones need to be added manually. secure child zones need to be added manually.
By default, all zone keys which have an available private key are used By default, all zone keys which have an available private key are used

View File

@ -35,7 +35,7 @@ Principle of Operation
Normally, if a zone is to be served by a secondary server, the Normally, if a zone is to be served by a secondary server, the
``named.conf`` file on the server must list the zone, or the zone must ``named.conf`` file on the server must list the zone, or the zone must
be added using ``rndc addzone``. In environments with a large number of be added using :option:`rndc addzone`. In environments with a large number of
secondary servers, and/or where the zones being served are changing secondary servers, and/or where the zones being served are changing
frequently, the overhead involved in maintaining consistent zone frequently, the overhead involved in maintaining consistent zone
configuration on all the secondary servers can be significant. configuration on all the secondary servers can be significant.
@ -56,11 +56,11 @@ To use the catalog zone feature to serve a new member zone:
- Set up the member zone to be served on the primary as normal. This - Set up the member zone to be served on the primary as normal. This
can be done by editing ``named.conf`` or by running can be done by editing ``named.conf`` or by running
``rndc addzone``. :option:`rndc addzone`.
- Add an entry to the catalog zone for the new member zone. This can - Add an entry to the catalog zone for the new member zone. This can
be done by editing the catalog zone's zone file and running be done by editing the catalog zone's zone file and running
``rndc reload``, or by updating the zone using ``nsupdate``. :option:`rndc reload`, or by updating the zone using ``nsupdate``.
The change to the catalog zone is propagated from the primary to all The change to the catalog zone is propagated from the primary to all
secondaries using the normal AXFR/IXFR mechanism. When the secondary receives the secondaries using the normal AXFR/IXFR mechanism. When the secondary receives the
@ -79,7 +79,7 @@ update, notices that the member zone has been removed, stops
serving the zone, and removes it from its list of configured zones. serving the zone, and removes it from its list of configured zones.
However, removing the member zone from the primary server must be done However, removing the member zone from the primary server must be done
by editing the configuration file or running by editing the configuration file or running
``rndc delzone``. :option:`rndc delzone`.
Configuring Catalog Zones Configuring Catalog Zones
~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~
@ -137,8 +137,8 @@ specified in any order.
Catalog zones are defined on a per-view basis. Configuring a non-empty Catalog zones are defined on a per-view basis. Configuring a non-empty
``catalog-zones`` statement in a view automatically turns on ``catalog-zones`` statement in a view automatically turns on
``allow-new-zones`` for that view. This means that ``rndc addzone`` ``allow-new-zones`` for that view. This means that :option:`rndc addzone`
and ``rndc delzone`` also work in any view that supports catalog and :option:`rndc delzone` also work in any view that supports catalog
zones. zones.
Catalog Zone Format Catalog Zone Format

View File

@ -218,10 +218,10 @@ server.
shared secret, and there is no way to provide that secret other than shared secret, and there is no way to provide that secret other than
with a configuration file. The default location for the ``rndc`` with a configuration file. The default location for the ``rndc``
configuration file is |rndc_conf|, but an alternate location configuration file is |rndc_conf|, but an alternate location
can be specified with the ``-c`` option. If the configuration file is can be specified with the :option:`-c <rndc -c>` option. If the configuration file is
not found, ``rndc`` also looks in |rndc_key| (or whatever not found, ``rndc`` also looks in |rndc_key| (or whatever
``sysconfdir`` was defined when the BIND build was configured). The ``sysconfdir`` was defined when the BIND build was configured). The
``rndc.key`` file is generated by running ``rndc-confgen -a`` as ``rndc.key`` file is generated by running :option:`rndc-confgen -a` as
described in :ref:`controls_statement_definition_and_usage`. described in :ref:`controls_statement_definition_and_usage`.
The format of the configuration file is similar to that of The format of the configuration file is similar to that of
@ -233,7 +233,7 @@ server.
The ``options`` statement has three clauses: ``default-server``, The ``options`` statement has three clauses: ``default-server``,
``default-key``, and ``default-port``. ``default-server`` takes a ``default-key``, and ``default-port``. ``default-server`` takes a
host name or address argument and represents the server that is host name or address argument and represents the server that is
contacted if no ``-s`` option is provided on the command line. contacted if no :option:`-s <rndc -s>` option is provided on the command line.
``default-key`` takes the name of a key as its argument, as defined ``default-key`` takes the name of a key as its argument, as defined
by a ``key`` statement. ``default-port`` specifies the port to which by a ``key`` statement. ``default-port`` specifies the port to which
``rndc`` should connect if no port is given on the command line or in ``rndc`` should connect if no port is given on the command line or in
@ -275,7 +275,7 @@ server.
This file, if installed as |rndc_conf|, allows the This file, if installed as |rndc_conf|, allows the
command: command:
``$ rndc reload`` :option:`rndc reload`
to connect to 127.0.0.1 port 953 and causes the name server to reload, to connect to 127.0.0.1 port 953 and causes the name server to reload,
if a name server on the local machine is running with the following if a name server on the local machine is running with the following
@ -293,7 +293,7 @@ server.
Running the ``rndc-confgen`` program conveniently creates an Running the ``rndc-confgen`` program conveniently creates an
``rndc.conf`` file, and also displays the corresponding ``rndc.conf`` file, and also displays the corresponding
``controls`` statement needed to add to ``named.conf``. ``controls`` statement needed to add to ``named.conf``.
Alternatively, it is possible to run ``rndc-confgen -a`` to set up an Alternatively, it is possible to run :option:`rndc-confgen -a` to set up an
``rndc.key`` file and not modify ``named.conf`` at all. ``rndc.key`` file and not modify ``named.conf`` at all.
Signals Signals

View File

@ -105,7 +105,7 @@ To enable automatic signing, set a ``dnssec-policy`` or add the
With ``auto-dnssec allow``, ``named`` can search the key directory for With ``auto-dnssec allow``, ``named`` can search the key directory for
keys matching the zone, insert them into the zone, and use them to sign keys matching the zone, insert them into the zone, and use them to sign
the zone. It does so only when it receives an the zone. It does so only when it receives an
``rndc sign <zonename>``. :option:`rndc sign zonename <rndc sign>`.
``auto-dnssec maintain`` includes the above functionality, but also ``auto-dnssec maintain`` includes the above functionality, but also
automatically adjusts the zone's DNSKEY records on a schedule according to automatically adjusts the zone's DNSKEY records on a schedule according to
@ -123,17 +123,17 @@ made to the zone - such as adding, removing, or revoking a key - then that
action is carried out. By default, the key directory is checked for action is carried out. By default, the key directory is checked for
changes every 60 minutes; this period can be adjusted with changes every 60 minutes; this period can be adjusted with
``dnssec-loadkeys-interval``, up to a maximum of 24 hours. The ``dnssec-loadkeys-interval``, up to a maximum of 24 hours. The
``rndc loadkeys`` command forces ``named`` to check for key updates immediately. :option:`rndc loadkeys` command forces ``named`` to check for key updates immediately.
If keys are present in the key directory the first time the zone is If keys are present in the key directory the first time the zone is
loaded, the zone is signed immediately, without waiting for an loaded, the zone is signed immediately, without waiting for an
``rndc sign`` or ``rndc loadkeys`` command. Those commands can still be :option:`rndc sign` or :option:`rndc loadkeys` command. Those commands can still be
used when there are unscheduled key changes. used when there are unscheduled key changes.
When new keys are added to a zone, the TTL is set to match that of any When new keys are added to a zone, the TTL is set to match that of any
existing DNSKEY RRset. If there is no existing DNSKEY RRset, the existing DNSKEY RRset. If there is no existing DNSKEY RRset, the
TTL is set to the TTL specified when the key was created (using the TTL is set to the TTL specified when the key was created (using the
``dnssec-keygen -L`` option), if any, or to the SOA TTL. :option:`dnssec-keygen -L` option), if any, or to the SOA TTL.
To sign the zone using NSEC3 instead of NSEC, submit an To sign the zone using NSEC3 instead of NSEC, submit an
NSEC3PARAM record via dynamic update prior to the scheduled publication NSEC3PARAM record via dynamic update prior to the scheduled publication
@ -240,7 +240,7 @@ Converting From NSEC to NSEC3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Add a ``nsec3param`` option to your ``dnssec-policy`` and Add a ``nsec3param`` option to your ``dnssec-policy`` and
run ``rndc reconfig``. run :option:`rndc reconfig`.
Or use ``nsupdate`` to add an NSEC3PARAM record. Or use ``nsupdate`` to add an NSEC3PARAM record.
@ -251,7 +251,7 @@ Converting From NSEC3 to NSEC
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To do this, remove the ``nsec3param`` option from the ``dnssec-policy`` and To do this, remove the ``nsec3param`` option from the ``dnssec-policy`` and
run ``rndc reconfig``. run :option:`rndc reconfig`.
Or use ``nsupdate`` to remove all NSEC3PARAM records with a Or use ``nsupdate`` to remove all NSEC3PARAM records with a
zero flag field. The NSEC chain is generated before the NSEC3 chain zero flag field. The NSEC chain is generated before the NSEC3 chain

View File

@ -47,7 +47,7 @@ has completed, the active KSK can be revoked, and the zone can be
The easiest way to place a stand-by key in a zone is to use the "smart The easiest way to place a stand-by key in a zone is to use the "smart
signing" features of ``dnssec-keygen`` and ``dnssec-signzone``. If a key signing" features of ``dnssec-keygen`` and ``dnssec-signzone``. If a key
exists with a publication date in the past, but an activation date which is exists with a publication date in the past, but an activation date which is
unset or in the future, ``dnssec-signzone -S`` includes the unset or in the future, :option:`dnssec-signzone -S` includes the
DNSKEY record in the zone but does not sign with it: DNSKEY record in the zone but does not sign with it:
:: ::

View File

@ -231,7 +231,7 @@ Running ``named`` With Automatic Zone Re-signing
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The zone can also be signed automatically by named. Again, we need to provide The zone can also be signed automatically by named. Again, we need to provide
the name of the OpenSSL engine using the -E command line option. the name of the OpenSSL engine using the :option:`-E <named -E>` command line option.
:: ::

View File

@ -405,7 +405,7 @@ control channel listening on the loopback address 127.0.0.1 and its IPv6
counterpart, ::1. In this case, and also when the ``controls`` statement counterpart, ::1. In this case, and also when the ``controls`` statement
is present but does not have a ``keys`` clause, ``named`` attempts is present but does not have a ``keys`` clause, ``named`` attempts
to load the command channel key from the file |rndc_key|. to load the command channel key from the file |rndc_key|.
To create an ``rndc.key`` file, run ``rndc-confgen -a``. To create an ``rndc.key`` file, run :option:`rndc-confgen -a`.
To disable the command channel, use an empty ``controls`` statement: To disable the command channel, use an empty ``controls`` statement:
``controls { };``. ``controls { };``.
@ -495,7 +495,7 @@ logging configuration is:
category unmatched { null; }; category unmatched { null; };
}; };
If ``named`` is started with the ``-L`` option, it logs to the specified If ``named`` is started with the :option:`-L <named -L>` option, it logs to the specified
file at startup, instead of using syslog. In this case the logging file at startup, instead of using syslog. In this case the logging
configuration is: configuration is:
@ -509,7 +509,7 @@ configuration is:
The logging configuration is only established when the entire The logging configuration is only established when the entire
configuration file has been parsed. When the server starts up, all configuration file has been parsed. When the server starts up, all
logging messages regarding syntax errors in the configuration file go to logging messages regarding syntax errors in the configuration file go to
the default channels, or to standard error if the ``-g`` option was the default channels, or to standard error if the :option:`-g <named -g>` option was
specified. specified.
.. _channel: .. _channel:
@ -608,8 +608,8 @@ configuration, for example.
The server can supply extensive debugging information when it is in The server can supply extensive debugging information when it is in
debugging mode. If the server's global debug level is greater than zero, debugging mode. If the server's global debug level is greater than zero,
debugging mode is active. The global debug level is set either debugging mode is active. The global debug level is set either
by starting the ``named`` server with the ``-d`` flag followed by a by starting the ``named`` server with the :option:`-d <named -d>` flag followed by a
positive integer, or by running ``rndc trace``. The global debug level positive integer, or by running :option:`rndc trace`. The global debug level
can be set to zero, and debugging mode turned off, by running ``rndc can be set to zero, and debugging mode turned off, by running ``rndc
notrace``. All debugging messages in the server have a debug level; notrace``. All debugging messages in the server have a debug level;
higher debug levels give more detailed output. Channels that specify a higher debug levels give more detailed output. Channels that specify a
@ -652,7 +652,7 @@ If ``buffered`` has been turned on, the output to files is not
flushed after each log entry. By default all log messages are flushed. flushed after each log entry. By default all log messages are flushed.
There are four predefined channels that are used for ``named``'s default There are four predefined channels that are used for ``named``'s default
logging, as follows. If ``named`` is started with the ``-L`` option, then a fifth logging, as follows. If ``named`` is started with the :option:`-L <named -L>` option, then a fifth
channel, ``default_logfile``, is added. How they are used is described in channel, ``default_logfile``, is added. How they are used is described in
:ref:`the_category_phrase`. :ref:`the_category_phrase`.
@ -699,12 +699,12 @@ The ``default_debug`` channel has the special property that it only
produces output when the server's debug level is non-zero. It normally produces output when the server's debug level is non-zero. It normally
writes to a file called ``named.run`` in the server's working directory. writes to a file called ``named.run`` in the server's working directory.
For security reasons, when the ``-u`` command-line option is used, the For security reasons, when the :option:`-u <named -u>` command-line option is used, the
``named.run`` file is created only after ``named`` has changed to the ``named.run`` file is created only after ``named`` has changed to the
new UID, and any debug output generated while ``named`` is starting - new UID, and any debug output generated while ``named`` is starting -
and still running as root - is discarded. To capture this and still running as root - is discarded. To capture this
output, run the server with the ``-L`` option to specify a output, run the server with the :option:`-L <named -L>` option to specify a
default logfile, or the ``-g`` option to log to standard error which can default logfile, or the :option:`-g <named -g>` option to log to standard error which can
be redirected to a file. be redirected to a file.
Once a channel is defined, it cannot be redefined. The Once a channel is defined, it cannot be redefined. The
@ -726,7 +726,7 @@ default category is specified, the following "default default" is used:
category default { default_syslog; default_debug; }; category default { default_syslog; default_debug; };
If ``named`` is started with the ``-L`` option, the default category If ``named`` is started with the :option:`-L <named -L>` option, the default category
is: is:
:: ::
@ -1098,7 +1098,7 @@ default is used.
``dnstap-output`` can only be set globally in ``options``. Currently, ``dnstap-output`` can only be set globally in ``options``. Currently,
it can only be set once while ``named`` is running; once set, it it can only be set once while ``named`` is running; once set, it
cannot be changed by ``rndc reload`` or ``rndc reconfig``. cannot be changed by :option:`rndc reload` or :option:`rndc reconfig`.
``dnstap-identity`` ``dnstap-identity``
This specifies an ``identity`` string to send in ``dnstap`` messages. If This specifies an ``identity`` string to send in ``dnstap`` messages. If
@ -1129,7 +1129,7 @@ default is used.
When ``named`` is built with liblmdb, this option sets a maximum size When ``named`` is built with liblmdb, this option sets a maximum size
for the memory map of the new-zone database (NZD) in LMDB database for the memory map of the new-zone database (NZD) in LMDB database
format. This database is used to store configuration information for format. This database is used to store configuration information for
zones added using ``rndc addzone``. Note that this is not the NZD zones added using :option:`rndc addzone`. Note that this is not the NZD
database file size, but the largest size that the database may grow database file size, but the largest size that the database may grow
to. to.
@ -1171,7 +1171,7 @@ default is used.
``new-zones-directory`` ``new-zones-directory``
This specifies the directory in which to store the configuration This specifies the directory in which to store the configuration
parameters for zones added via ``rndc addzone``. By default, this is parameters for zones added via :option:`rndc addzone`. By default, this is
the working directory. If set to a relative path, it is relative the working directory. If set to a relative path, it is relative
to the working directory. The directory *must* be writable by the to the working directory. The directory *must* be writable by the
effective user ID of the ``named`` process. effective user ID of the ``named`` process.
@ -1224,7 +1224,7 @@ default is used.
``dump-file`` ``dump-file``
This is the pathname of the file the server dumps the database to, when This is the pathname of the file the server dumps the database to, when
instructed to do so with ``rndc dumpdb``. If not specified, the instructed to do so with :option:`rndc dumpdb`. If not specified, the
default is ``named_dump.db``. default is ``named_dump.db``.
``memstatistics-file`` ``memstatistics-file``
@ -1239,7 +1239,7 @@ default is used.
``none``. ``none``.
Specifying ``lock-file none`` disables the use of a lock file. Specifying ``lock-file none`` disables the use of a lock file.
``lock-file`` is ignored if ``named`` was run using the ``-X`` ``lock-file`` is ignored if ``named`` was run using the :option:`-X <named -X>`
option, which overrides it. Changes to ``lock-file`` are ignored if option, which overrides it. Changes to ``lock-file`` are ignored if
``named`` is being reloaded or reconfigured; it is only effective ``named`` is being reloaded or reconfigured; it is only effective
when the server is first started. when the server is first started.
@ -1255,12 +1255,12 @@ default is used.
``recursing-file`` ``recursing-file``
This is the pathname of the file where the server dumps the queries that are This is the pathname of the file where the server dumps the queries that are
currently recursing, when instructed to do so with ``rndc recursing``. currently recursing, when instructed to do so with :option:`rndc recursing`.
If not specified, the default is ``named.recursing``. If not specified, the default is ``named.recursing``.
``statistics-file`` ``statistics-file``
This is the pathname of the file the server appends statistics to, when This is the pathname of the file the server appends statistics to, when
instructed to do so using ``rndc stats``. If not specified, the instructed to do so using :option:`rndc stats`. If not specified, the
default is ``named.stats`` in the server's current directory. The default is ``named.stats`` in the server's current directory. The
format of the file is described in :ref:`statsfile`. format of the file is described in :ref:`statsfile`.
@ -1271,7 +1271,7 @@ default is used.
``secroots-file`` ``secroots-file``
This is the pathname of the file the server dumps security roots to, when This is the pathname of the file the server dumps security roots to, when
instructed to do so with ``rndc secroots``. If not specified, the instructed to do so with :option:`rndc secroots`. If not specified, the
default is ``named.secroots``. default is ``named.secroots``.
``session-keyfile`` ``session-keyfile``
@ -1519,7 +1519,7 @@ default is used.
``nta-lifetime`` ``nta-lifetime``
This specifies the default lifetime, in seconds, for This specifies the default lifetime, in seconds, for
negative trust anchors added via ``rndc nta``. negative trust anchors added via :option:`rndc nta`.
A negative trust anchor selectively disables DNSSEC validation for A negative trust anchor selectively disables DNSSEC validation for
zones that are known to be failing because of misconfiguration, rather zones that are known to be failing because of misconfiguration, rather
@ -1537,7 +1537,7 @@ default is used.
``nta-recheck`` ``nta-recheck``
This specifies how often to check whether negative trust anchors added via This specifies how often to check whether negative trust anchors added via
``rndc nta`` are still necessary. :option:`rndc nta` are still necessary.
A negative trust anchor is normally used when a domain has stopped A negative trust anchor is normally used when a domain has stopped
validating due to operator error; it temporarily disables DNSSEC validating due to operator error; it temporarily disables DNSSEC
@ -1548,7 +1548,7 @@ default is used.
negative trust anchor is allowed to expire early. negative trust anchor is allowed to expire early.
Validity checks can be disabled for an individual NTA by using Validity checks can be disabled for an individual NTA by using
``rndc nta -f``, or for all NTAs by setting ``nta-recheck`` to zero. :option:`rndc nta -f <rndc nta>`, or for all NTAs by setting ``nta-recheck`` to zero.
For convenience, TTL-style time-unit suffixes can be used to specify the NTA For convenience, TTL-style time-unit suffixes can be used to specify the NTA
recheck interval in seconds, minutes, or hours. It also accepts ISO 8601 recheck interval in seconds, minutes, or hours. It also accepts ISO 8601
@ -1579,7 +1579,7 @@ default is used.
For stale answers to be returned, they must be enabled, either in the For stale answers to be returned, they must be enabled, either in the
configuration file using ``stale-answer-enable`` or via configuration file using ``stale-answer-enable`` or via
``rndc serve-stale on``. :option:`rndc serve-stale on <rndc serve-stale>`.
``serial-update-method`` ``serial-update-method``
Zones configured for dynamic DNS may use this option to set the Zones configured for dynamic DNS may use this option to set the
@ -1611,7 +1611,7 @@ default is used.
counters). counters).
These statistics may be accessed via the ``statistics-channel`` or These statistics may be accessed via the ``statistics-channel`` or
using ``rndc stats``, which dumps them to the file listed in the using :option:`rndc stats`, which dumps them to the file listed in the
``statistics-file``. See also :ref:`statsfile`. ``statistics-file``. See also :ref:`statsfile`.
For backward compatibility with earlier versions of BIND 9, the For backward compatibility with earlier versions of BIND 9, the
@ -1637,7 +1637,7 @@ Boolean Options
support the routing sockets for this feature to work. support the routing sockets for this feature to work.
``allow-new-zones`` ``allow-new-zones``
If ``yes``, then zones can be added at runtime via ``rndc addzone``. If ``yes``, then zones can be added at runtime via :option:`rndc addzone`.
The default is ``no``. The default is ``no``.
Newly added zones' configuration parameters are stored so that they Newly added zones' configuration parameters are stored so that they
@ -1652,7 +1652,7 @@ Boolean Options
Configurations for zones added at runtime are stored either in Configurations for zones added at runtime are stored either in
a new-zone file (NZF) or a new-zone database (NZD), depending on a new-zone file (NZF) or a new-zone database (NZD), depending on
whether ``named`` was linked with liblmdb at compile time. See whether ``named`` was linked with liblmdb at compile time. See
:ref:`man_rndc` for further details about ``rndc addzone``. :ref:`man_rndc` for further details about :option:`rndc addzone`.
``auth-nxdomain`` ``auth-nxdomain``
If ``yes``, then the ``AA`` bit is always set on NXDOMAIN responses, If ``yes``, then the ``AA`` bit is always set on NXDOMAIN responses,
@ -1661,8 +1661,8 @@ Boolean Options
``memstatistics`` ``memstatistics``
This writes memory statistics to the file specified by This writes memory statistics to the file specified by
``memstatistics-file`` at exit. The default is ``no`` unless ``-m ``memstatistics-file`` at exit. The default is ``no`` unless :option:`-m
record`` is specified on the command line, in which case it is ``yes``. record <named -m>` is specified on the command line, in which case it is ``yes``.
``dialup`` ``dialup``
If ``yes``, then the server treats all zones as if they are doing If ``yes``, then the server treats all zones as if they are doing
@ -1885,12 +1885,12 @@ Boolean Options
also enabled. The default is not to return stale answers. also enabled. The default is not to return stale answers.
Stale answers can also be enabled or disabled at runtime via Stale answers can also be enabled or disabled at runtime via
``rndc serve-stale on`` or ``rndc serve-stale off``; these override :option:`rndc serve-stale on <rndc serve-stale>` or :option:`rndc serve-stale off <rndc serve-stale>`; these override
the configured setting. ``rndc serve-stale reset`` restores the the configured setting. :option:`rndc serve-stale reset <rndc serve-stale>` restores the
setting to the one specified in ``named.conf``. Note that if stale setting to the one specified in ``named.conf``. Note that if stale
answers have been disabled by ``rndc``, they cannot be answers have been disabled by ``rndc``, they cannot be
re-enabled by reloading or reconfiguring ``named``; they must be re-enabled by reloading or reconfiguring ``named``; they must be
re-enabled with ``rndc serve-stale on``, or the server must be re-enabled with :option:`rndc serve-stale on <rndc serve-stale>`, or the server must be
restarted. restarted.
Information about stale answers is logged under the ``serve-stale`` Information about stale answers is logged under the ``serve-stale``
@ -2045,19 +2045,19 @@ Boolean Options
settings: settings:
``auto-dnssec allow;`` permits keys to be updated and the zone fully ``auto-dnssec allow;`` permits keys to be updated and the zone fully
re-signed whenever the user issues the command ``rndc sign zonename``. re-signed whenever the user issues the command :option:`rndc sign zonename <rndc sign>`.
``auto-dnssec maintain;`` includes the above, but also ``auto-dnssec maintain;`` includes the above, but also
automatically adjusts the zone's DNSSEC keys on a schedule, according automatically adjusts the zone's DNSSEC keys on a schedule, according
to the keys' timing metadata (see :ref:`man_dnssec-keygen` and to the keys' timing metadata (see :ref:`man_dnssec-keygen` and
:ref:`man_dnssec-settime`). The command ``rndc sign zonename`` :ref:`man_dnssec-settime`). The command :option:`rndc sign zonename <rndc sign>`
causes ``named`` to load keys from the key repository and sign the causes ``named`` to load keys from the key repository and sign the
zone with all keys that are active. ``rndc loadkeys zonename`` zone with all keys that are active. :option:`rndc loadkeys zonename <rndc loadkeys>`
causes ``named`` to load keys from the key repository and schedule causes ``named`` to load keys from the key repository and schedule
key maintenance events to occur in the future, but it does not sign key maintenance events to occur in the future, but it does not sign
the full zone immediately. Note: once keys have been loaded for a the full zone immediately. Note: once keys have been loaded for a
zone the first time, the repository is searched for changes zone the first time, the repository is searched for changes
periodically, regardless of whether ``rndc loadkeys`` is used. The periodically, regardless of whether :option:`rndc loadkeys` is used. The
recheck interval is defined by ``dnssec-loadkeys-interval``. recheck interval is defined by ``dnssec-loadkeys-interval``.
``auto-dnssec off;`` does not allow for DNSSEC key management. ``auto-dnssec off;`` does not allow for DNSSEC key management.
@ -2131,7 +2131,7 @@ Boolean Options
``named`` first starts. If ``querylog`` is not specified, then query logging ``named`` first starts. If ``querylog`` is not specified, then query logging
is determined by the presence of the logging category ``queries``. Query is determined by the presence of the logging category ``queries``. Query
logging can also be activated at runtime using the command ``rndc querylog logging can also be activated at runtime using the command ``rndc querylog
on``, or deactivated with ``rndc querylog off``. on``, or deactivated with :option:`rndc querylog off <rndc querylog>`.
``check-names`` ``check-names``
This option is used to restrict the character set and syntax of This option is used to restrict the character set and syntax of
@ -2219,7 +2219,7 @@ Boolean Options
the KSK bit set) are only used to sign the DNSKEY RRset at the zone the KSK bit set) are only used to sign the DNSKEY RRset at the zone
apex. However, if this option is set to ``no``, then the KSK bit is apex. However, if this option is set to ``no``, then the KSK bit is
ignored; KSKs are treated as if they were ZSKs and are used to sign ignored; KSKs are treated as if they were ZSKs and are used to sign
the entire zone. This is similar to the ``dnssec-signzone -z`` the entire zone. This is similar to the :option:`dnssec-signzone -z`
command-line option. command-line option.
When this option is set to ``yes``, there must be at least two active When this option is set to ``yes``, there must be at least two active
@ -2234,7 +2234,7 @@ Boolean Options
used to sign the DNSKEY, CDNSKEY, and CDS RRsets at the zone apex. used to sign the DNSKEY, CDNSKEY, and CDS RRsets at the zone apex.
Zone-signing keys (keys without the KSK bit set) are used to sign Zone-signing keys (keys without the KSK bit set) are used to sign
the remainder of the zone, but not the DNSKEY RRset. This is similar the remainder of the zone, but not the DNSKEY RRset. This is similar
to the ``dnssec-signzone -x`` command-line option. to the :option:`dnssec-signzone -x` command-line option.
The default is ``yes``. If ``update-check-ksk`` is set to ``no``, this The default is ``yes``. If ``update-check-ksk`` is set to ``no``, this
option is ignored. option is ignored.
@ -2317,7 +2317,7 @@ on the host machine.
able to resolve the name using only the transport it has. If the able to resolve the name using only the transport it has. If the
machine is dual-stacked, the ``dual-stack-servers`` parameter has no machine is dual-stacked, the ``dual-stack-servers`` parameter has no
effect unless access to a transport has been disabled on the command effect unless access to a transport has been disabled on the command
line (e.g., ``named -4``). line (e.g., :option:`named -4`).
.. _access_control: .. _access_control:
@ -3025,7 +3025,7 @@ system.
default is zero. default is zero.
The current list of active fetches can be dumped by running The current list of active fetches can be dumped by running
``rndc recursing``. The list includes the number of active fetches :option:`rndc recursing`. The list includes the number of active fetches
for each domain and the number of queries that have been passed for each domain and the number of queries that have been passed
(allowed) or dropped (spilled) as a result of the ``fetches-per-zone`` (allowed) or dropped (spilled) as a result of the ``fetches-per-zone``
limit. (Note: these counters are not cumulative over time; limit. (Note: these counters are not cumulative over time;
@ -3145,7 +3145,7 @@ system.
minimum are adjusted with a logged warning. (Note: this value minimum are adjusted with a logged warning. (Note: this value
must be greater than the expected round-trip delay time; otherwise, no must be greater than the expected round-trip delay time; otherwise, no
client will ever have enough time to submit a message.) This value client will ever have enough time to submit a message.) This value
can be updated at runtime by using ``rndc tcp-timeouts``. can be updated at runtime by using :option:`rndc tcp-timeouts`.
``tcp-idle-timeout`` ``tcp-idle-timeout``
This sets the amount of time (in units of 100 milliseconds) that the server waits on This sets the amount of time (in units of 100 milliseconds) that the server waits on
@ -3155,7 +3155,7 @@ system.
second). Values above the maximum or below the minimum are second). Values above the maximum or below the minimum are
adjusted with a logged warning. See ``tcp-keepalive-timeout`` for adjusted with a logged warning. See ``tcp-keepalive-timeout`` for
clients using the EDNS TCP keepalive option. This value can be clients using the EDNS TCP keepalive option. This value can be
updated at runtime by using ``rndc tcp-timeouts``. updated at runtime by using :option:`rndc tcp-timeouts`.
``tcp-keepalive-timeout`` ``tcp-keepalive-timeout``
This sets the amount of time (in units of 100 milliseconds) that the server waits on This sets the amount of time (in units of 100 milliseconds) that the server waits on
@ -3166,7 +3166,7 @@ system.
adjusted with a logged warning. This value may be greater than adjusted with a logged warning. This value may be greater than
``tcp-idle-timeout`` because clients using the EDNS TCP keepalive ``tcp-idle-timeout`` because clients using the EDNS TCP keepalive
option are expected to use TCP connections for more than one message. option are expected to use TCP connections for more than one message.
This value can be updated at runtime by using ``rndc tcp-timeouts``. This value can be updated at runtime by using :option:`rndc tcp-timeouts`.
``tcp-advertised-timeout`` ``tcp-advertised-timeout``
This sets the timeout value (in units of 100 milliseconds) that the server sends This sets the timeout value (in units of 100 milliseconds) that the server sends
@ -3176,7 +3176,7 @@ system.
and the minimum is 0, which signals that the clients must close TCP and the minimum is 0, which signals that the clients must close TCP
connections immediately. Ordinarily this should be set to the same connections immediately. Ordinarily this should be set to the same
value as ``tcp-keepalive-timeout``. This value can be updated at value as ``tcp-keepalive-timeout``. This value can be updated at
runtime by using ``rndc tcp-timeouts``. runtime by using :option:`rndc tcp-timeouts`.
.. _intervals: .. _intervals:
@ -3461,7 +3461,7 @@ Tuning
For stale answers to be returned, the retaining of them in cache must be For stale answers to be returned, the retaining of them in cache must be
enabled via the configuration option ``stale-cache-enable``, and returning enabled via the configuration option ``stale-cache-enable``, and returning
cached answers must be enabled, either in the configuration file using the cached answers must be enabled, either in the configuration file using the
``stale-answer-enable`` option or by calling ``rndc serve-stale on``. ``stale-answer-enable`` option or by calling :option:`rndc serve-stale on <rndc serve-stale>`.
When ``stale-cache-enable`` is set to ``no``, setting the ``max-stale-ttl`` When ``stale-cache-enable`` is set to ``no``, setting the ``max-stale-ttl``
has no effect, the value of ``max-cache-ttl`` will be ``0`` in such case. has no effect, the value of ``max-cache-ttl`` will be ``0`` in such case.
@ -3529,12 +3529,12 @@ Tuning
Signing-state records are used internally by ``named`` to track Signing-state records are used internally by ``named`` to track
the current state of a zone-signing process, i.e., whether it is the current state of a zone-signing process, i.e., whether it is
still active or has been completed. The records can be inspected still active or has been completed. The records can be inspected
using the command ``rndc signing -list zone``. Once ``named`` has using the command :option:`rndc signing -list zone <rndc signing>`. Once ``named`` has
finished signing a zone with a particular key, the signing-state finished signing a zone with a particular key, the signing-state
record associated with that key can be removed from the zone by record associated with that key can be removed from the zone by
running ``rndc signing -clear keyid/algorithm zone``. To clear all of running :option:`rndc signing -clear keyid/algorithm zone <rndc signing>`. To clear all of
the completed signing-state records for a zone, use the completed signing-state records for a zone, use
``rndc signing -clear all zone``. :option:`rndc signing -clear all zone <rndc signing>`.
``min-refresh-time``; ``max-refresh-time``; ``min-retry-time``; ``max-retry-time`` ``min-refresh-time``; ``max-refresh-time``; ``min-retry-time``; ``max-retry-time``
These options control the server's behavior on refreshing a zone These options control the server's behavior on refreshing a zone
@ -4953,7 +4953,7 @@ has been validated and proven secure.
The resolver attempts DNSSEC validation on all DNS data in subdomains of The resolver attempts DNSSEC validation on all DNS data in subdomains of
configured trust anchors. Validation below specified names can be configured trust anchors. Validation below specified names can be
temporarily disabled by using ``rndc nta``, or permanently disabled with temporarily disabled by using :option:`rndc nta`, or permanently disabled with
the ``validate-except`` option. the ``validate-except`` option.
All keys listed in ``trust-anchors``, and their corresponding zones, are All keys listed in ``trust-anchors``, and their corresponding zones, are
@ -5621,7 +5621,7 @@ or ``delegation-only``.
The zone data is maintained in the form of NS and (if necessary) glue A or The zone data is maintained in the form of NS and (if necessary) glue A or
AAAA RRs internally, which can be seen by dumping zone databases with AAAA RRs internally, which can be seen by dumping zone databases with
``rndc dumpdb -all``. The configured RRs are considered local configuration :option:`rndc dumpdb -all <rndc dumpdb>`. The configured RRs are considered local configuration
parameters rather than public data. Non-recursive queries (i.e., those parameters rather than public data. Non-recursive queries (i.e., those
with the RD bit off) to a static-stub zone are therefore prohibited and with the RD bit off) to a static-stub zone are therefore prohibited and
are responded to with REFUSED. are responded to with REFUSED.
@ -5675,9 +5675,9 @@ or ``delegation-only``.
Because redirect zones are not referenced directly by name, they are not Because redirect zones are not referenced directly by name, they are not
kept in the zone lookup table with normal primary and secondary zones. To reload kept in the zone lookup table with normal primary and secondary zones. To reload
a redirect zone, use ``rndc reload -redirect``; to retransfer a a redirect zone, use :option:`rndc reload -redirect <rndc reload>`; to retransfer a
redirect zone configured as a secondary, use ``rndc retransfer -redirect``. redirect zone configured as a secondary, use :option:`rndc retransfer -redirect <rndc retransfer>`.
When using ``rndc reload`` without specifying a zone name, redirect When using :option:`rndc reload` without specifying a zone name, redirect
zones are reloaded along with other zones. zones are reloaded along with other zones.
``delegation-only`` ``delegation-only``

View File

@ -152,12 +152,12 @@ matches when *both* conditions are true.
------------------------- -------------------------
On Unix servers, it is possible to run BIND in a *chrooted* environment On Unix servers, it is possible to run BIND in a *chrooted* environment
(using the ``chroot()`` function) by specifying the ``-t`` option for (using the ``chroot()`` function) by specifying the :option:`-t <named -t>` option for
``named``. This can help improve system security by placing BIND in a ``named``. This can help improve system security by placing BIND in a
"sandbox," which limits the damage done if a server is compromised. "sandbox," which limits the damage done if a server is compromised.
Another useful feature in the Unix version of BIND is the ability to run Another useful feature in the Unix version of BIND is the ability to run
the daemon as an unprivileged user (``-u`` user). We suggest running the daemon as an unprivileged user (:option:`-u <named -u>` user). We suggest running
as an unprivileged user when using the ``chroot`` feature. as an unprivileged user when using the ``chroot`` feature.
Here is an example command line to load BIND in a ``chroot`` sandbox, Here is an example command line to load BIND in a ``chroot`` sandbox,

View File

@ -75,7 +75,7 @@ Inspecting Encrypted DNS Traffic
This feature requires support from the cryptographic library that This feature requires support from the cryptographic library that
BIND 9 is built against. For OpenSSL, version 1.1.1 or newer is BIND 9 is built against. For OpenSSL, version 1.1.1 or newer is
required (use ``named -V`` to check). required (use :option:`named -V` to check).
By definition, TLS-encrypted traffic (e.g. DNS over TLS, DNS over HTTPS) By definition, TLS-encrypted traffic (e.g. DNS over TLS, DNS over HTTPS)
is opaque to packet sniffers, which makes debugging problems with is opaque to packet sniffers, which makes debugging problems with

View File

@ -885,7 +885,7 @@ care to set appropriate ownership and permissions on the keys. If the
``auto-dnssec`` zone option is set to ``maintain``, ``named`` ``auto-dnssec`` zone option is set to ``maintain``, ``named``
automatically signs the zone with the new keys, based on their timing automatically signs the zone with the new keys, based on their timing
metadata when the ``dnssec-loadkeys-interval`` elapses or when you issue the metadata when the ``dnssec-loadkeys-interval`` elapses or when you issue the
``rndc loadkeys`` command. Otherwise, for primary zones, you can use :option:`rndc loadkeys` command. Otherwise, for primary zones, you can use
``nsupdate`` to add the new DNSKEYs to the zone; this causes ``named`` ``nsupdate`` to add the new DNSKEYs to the zone; this causes ``named``
to use them to sign the zone. For secondary zones, e.g., on a to use them to sign the zone. For secondary zones, e.g., on a
"bump in the wire" signing server, ``nsupdate`` cannot be used. "bump in the wire" signing server, ``nsupdate`` cannot be used.
@ -909,9 +909,9 @@ old DNSKEYs (for primary zones only) or by automatic key rollover when
``auto-dnssec`` is set to ``maintain``. You can cause the automatic key ``auto-dnssec`` is set to ``maintain``. You can cause the automatic key
rollover to take place immediately by using the ``dnssec-settime`` rollover to take place immediately by using the ``dnssec-settime``
utility to set the *Delete* date on all keys to any time in the past. utility to set the *Delete* date on all keys to any time in the past.
(See the ``dnssec-settime -D <date/offset>`` option.) (See the :option:`dnssec-settime -D date/offset <dnssec-settime -D>` option.)
After adjusting the timing metadata, the ``rndc loadkeys`` command After adjusting the timing metadata, the :option:`rndc loadkeys` command
causes ``named`` to remove the DNSKEYs and causes ``named`` to remove the DNSKEYs and
RRSIGs for the old algorithm from the zone. Note also that with the RRSIGs for the old algorithm from the zone. Note also that with the
``nsupdate`` method, removing the DNSKEYs also causes ``named`` to ``nsupdate`` method, removing the DNSKEYs also causes ``named`` to
@ -935,8 +935,8 @@ environment.
When you have both DNSSEC and dynamic updates in your environment, When you have both DNSSEC and dynamic updates in your environment,
updating zone data works the same way as with traditional (insecure) updating zone data works the same way as with traditional (insecure)
DNS: you can use ``rndc freeze`` before editing the zone file, and DNS: you can use :option:`rndc freeze` before editing the zone file, and
``rndc thaw`` when you have finished editing, or you can use the :option:`rndc thaw` when you have finished editing, or you can use the
command ``nsupdate`` to add, edit, or remove records like this: command ``nsupdate`` to add, edit, or remove records like this:
:: ::

View File

@ -27,7 +27,7 @@ BIND Version
Most configuration examples given in this document require BIND version Most configuration examples given in this document require BIND version
9.16.0 or newer (although many do work with all versions of BIND 9.16.0 or newer (although many do work with all versions of BIND
later than 9.9). To check the version of ``named`` you have installed, later than 9.9). To check the version of ``named`` you have installed,
use the ``-v`` switch as shown below: use the :option:`-v <named -v>` switch as shown below:
:: ::
@ -47,10 +47,10 @@ DNSSEC Support in BIND
All versions of BIND 9 since BIND 9.7 can support DNSSEC, as currently All versions of BIND 9 since BIND 9.7 can support DNSSEC, as currently
deployed in the global DNS, so the BIND software you are running most deployed in the global DNS, so the BIND software you are running most
likely already supports DNSSEC. Run the command ``named -V`` likely already supports DNSSEC. Run the command :option:`named -V`
to see what flags it was built with. If it was built with OpenSSL to see what flags it was built with. If it was built with OpenSSL
(``--with-openssl``), then it supports DNSSEC. Below is an example (``--with-openssl``), then it supports DNSSEC. Below is an example
of the output from running ``named -V``: of the output from running :option:`named -V`:
:: ::

View File

@ -234,8 +234,8 @@ The first command gets us into the key directory
``/etc/bind/keys/example.com/``, where keys for ``example.com`` are ``/etc/bind/keys/example.com/``, where keys for ``example.com`` are
stored. stored.
The second, ``dnssec-settime``, sets an inactive (``-I``) date of January 1, The second, ``dnssec-settime``, sets an inactive (:option:`-I <dnssec-settime -I>`) date of January 1,
2021, and a deletion (``-D``) date of February 1, 2021, for the current ZSK 2021, and a deletion (:option:`-D <dnssec-settime -D>`) date of February 1, 2021, for the current ZSK
(``Kexample.com.+008+17694``). (``Kexample.com.+008+17694``).
The third command, ``dnssec-keygen``, creates a successor key, using The third command, ``dnssec-keygen``, creates a successor key, using
@ -487,8 +487,8 @@ The first command gets us into the key directory
``/etc/bind/keys/example.com/``, where keys for ``example.com`` are ``/etc/bind/keys/example.com/``, where keys for ``example.com`` are
stored. stored.
The second, ``dnssec-settime``, sets an inactive (``-I``) date of January 1, The second, ``dnssec-settime``, sets an inactive (:option:`-I <dnssec-settime -I>`) date of January 1,
2021, and a deletion (``-D``) date of February 1, 2021 for the current KSK 2021, and a deletion (:option:`-D <dnssec-settime -D>`) date of February 1, 2021 for the current KSK
(``Kexample.com.+007+24848``). (``Kexample.com.+007+24848``).
The third command, ``dnssec-keygen``, creates a successor key, using The third command, ``dnssec-keygen``, creates a successor key, using
@ -1095,14 +1095,14 @@ Change your ``dnssec-policy`` line to indicate you want to revert to unsigned:
dnssec-policy "insecure"; dnssec-policy "insecure";
}; };
Then use ``rndc reload`` to reload the zone. Then use :option:`rndc reload` to reload the zone.
The "insecure" policy is a built-in policy (like "default"). It will make sure The "insecure" policy is a built-in policy (like "default"). It will make sure
the zone is still DNSSEC maintained, to allow for a graceful transition to the zone is still DNSSEC maintained, to allow for a graceful transition to
unsigned. unsigned.
When the DS records have been removed from the parent zone, use When the DS records have been removed from the parent zone, use
``rndc dnssec -checkds -key <id> withdrawn example.com`` to tell ``named`` that :option:`rndc dnssec -checkds -key id withdrawn example.com <rndc dnssec>` to tell ``named`` that
the DS is removed, and the remaining DNSSEC records will be removed in a timely the DS is removed, and the remaining DNSSEC records will be removed in a timely
manner. Or if you have parental agents configured, the DNSSEC records will be manner. Or if you have parental agents configured, the DNSSEC records will be
automatically removed after BIND has seen that the parental agents no longer automatically removed after BIND has seen that the parental agents no longer

View File

@ -78,7 +78,7 @@ for most situations. We cover the creation of a custom policy in
default values. default values.
When the configuration file is updated, tell ``named`` to When the configuration file is updated, tell ``named`` to
reload the configuration file by running ``rndc reconfig``: reload the configuration file by running :option:`rndc reconfig`:
:: ::
@ -1599,7 +1599,7 @@ of the zone, which looks something like this:
file "db/example.com.signed.db"; file "db/example.com.signed.db";
}; };
Once the ``rndc reconfig`` command is issued, BIND serves a signed Once the :option:`rndc reconfig` command is issued, BIND serves a signed
zone. The file ``dsset-example.com`` (created by ``dnssec-signzone`` zone. The file ``dsset-example.com`` (created by ``dnssec-signzone``
when it signed the ``example.com`` zone) contains the DS record for the when it signed the ``example.com`` zone) contains the DS record for the
zone's KSK. You will need to pass that to the administrator of the parent zone's KSK. You will need to pass that to the administrator of the parent

View File

@ -50,7 +50,7 @@ add one line to the ``options`` section of your configuration file:
... ...
}; };
Restart ``named`` or run ``rndc reconfig``, and your recursive server is Restart ``named`` or run :option:`rndc reconfig`, and your recursive server is
now happily validating each DNS response. If this does not work for you, now happily validating each DNS response. If this does not work for you,
and you have already verified DNSSEC support as described in and you have already verified DNSSEC support as described in
:ref:`dnssec_support_in_bind`, you may have some other :ref:`dnssec_support_in_bind`, you may have some other

View File

@ -39,7 +39,7 @@ ddns-confgen \- ddns key generation tool
The resulting keys can be used, for example, to secure dynamic DNS updates The resulting keys can be used, for example, to secure dynamic DNS updates
to a zone, or for the \fBrndc\fP command channel. to a zone, or for the \fBrndc\fP command channel.
.sp .sp
The key name can specified using \fB\-k\fP parameter and defaults to \fBddns\-key\fP\&. The key name can specified using \fI\%\-k\fP parameter and defaults to \fBddns\-key\fP\&.
The generated key is accompanied by configuration text and instructions that The generated key is accompanied by configuration text and instructions that
can be used with \fBnsupdate\fP and \fBnamed\fP when setting up dynamic DNS, can be used with \fBnsupdate\fP and \fBnamed\fP when setting up dynamic DNS,
including an example \fBupdate\-policy\fP statement. including an example \fBupdate\-policy\fP statement.
@ -69,7 +69,7 @@ This option prints a short summary of options and arguments.
.TP .TP
.B \-k keyname .B \-k keyname
This option specifies the key name of the DDNS authentication key. The This option specifies the key name of the DDNS authentication key. The
default is \fBddns\-key\fP when neither the \fB\-s\fP nor \fB\-z\fP option is default is \fBddns\-key\fP when neither the \fI\%\-s\fP nor \fI\%\-z\fP option is
specified; otherwise, the default is \fBddns\-key\fP as a separate label specified; otherwise, the default is \fBddns\-key\fP as a separate label
followed by the argument of the option, e.g., \fBddns\-key.example.com.\fP followed by the argument of the option, e.g., \fBddns\-key.example.com.\fP
The key name must have the format of a valid domain name, consisting of The key name must have the format of a valid domain name, consisting of
@ -90,7 +90,7 @@ of a single hostname. The example \fBnamed.conf\fP text shows how to set
an update policy for the specified name using the "name" nametype. The an update policy for the specified name using the "name" nametype. The
default key name is \fBddns\-key.name\fP\&. Note that the "self" nametype default key name is \fBddns\-key.name\fP\&. Note that the "self" nametype
cannot be used, since the name to be updated may differ from the key cannot be used, since the name to be updated may differ from the key
name. This option cannot be used with the \fB\-z\fP option. name. This option cannot be used with the \fI\%\-z\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -99,7 +99,7 @@ This option generates a configuration example to allow
dynamic updates of a zone. The example \fBnamed.conf\fP text shows how dynamic updates of a zone. The example \fBnamed.conf\fP text shows how
to set an update policy for the specified zone using the "zonesub" to set an update policy for the specified zone using the "zonesub"
nametype, allowing updates to all subdomain names within that zone. nametype, allowing updates to all subdomain names within that zone.
This option cannot be used with the \fB\-s\fP option. This option cannot be used with the \fI\%\-s\fP option.
.UNINDENT .UNINDENT
.SH SEE ALSO .SH SEE ALSO
.sp .sp

View File

@ -94,7 +94,7 @@ DNSSEC).
.sp .sp
If no \fBserver\fP argument is provided, \fBdelv\fP consults If no \fBserver\fP argument is provided, \fBdelv\fP consults
\fB/etc/resolv.conf\fP; if an address is found there, it queries the \fB/etc/resolv.conf\fP; if an address is found there, it queries the
name server at that address. If either of the \fB\-4\fP or \fB\-6\fP name server at that address. If either of the \fI\%\-4\fP or \fI\%\-6\fP
options is in use, then only addresses for the corresponding options is in use, then only addresses for the corresponding
transport are tried. If no usable addresses are found, \fBdelv\fP transport are tried. If no usable addresses are found, \fBdelv\fP
sends queries to the localhost addresses (127.0.0.1 for IPv4, ::1 sends queries to the localhost addresses (127.0.0.1 for IPv4, ::1
@ -186,7 +186,7 @@ non\-standard port number.
.TP .TP
.B \-q name .B \-q name
This option sets the query name to \fBname\fP\&. While the query name can be This option sets the query name to \fBname\fP\&. While the query name can be
specified without using the \fB\-q\fP option, it is sometimes necessary to specified without using the \fI\%\-q\fP option, it is sometimes necessary to
disambiguate names from types or classes (for example, when looking disambiguate names from types or classes (for example, when looking
up the name "ns", which could be misinterpreted as the type NS, or up the name "ns", which could be misinterpreted as the type NS, or
"ch", which could be misinterpreted as class CH). "ch", which could be misinterpreted as class CH).
@ -196,11 +196,11 @@ up the name "ns", which could be misinterpreted as the type NS, or
.B \-t type .B \-t type
This option sets the query type to \fBtype\fP, which can be any valid query type This option sets the query type to \fBtype\fP, which can be any valid query type
supported in BIND 9 except for zone transfer types AXFR and IXFR. As supported in BIND 9 except for zone transfer types AXFR and IXFR. As
with \fB\-q\fP, this is useful to distinguish query\-name types or classes with \fI\%\-q\fP, this is useful to distinguish query\-name types or classes
when they are ambiguous. It is sometimes necessary to disambiguate when they are ambiguous. It is sometimes necessary to disambiguate
names from types. names from types.
.sp .sp
The default query type is "A", unless the \fB\-x\fP option is supplied The default query type is "A", unless the \fI\%\-x\fP option is supplied
to indicate a reverse lookup, in which case it is "PTR". to indicate a reverse lookup, in which case it is "PTR".
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -213,7 +213,7 @@ This option prints the \fBdelv\fP version and exits.
.B \-x addr .B \-x addr
This option performs a reverse lookup, mapping an address to a name. \fBaddr\fP This option performs a reverse lookup, mapping an address to a name. \fBaddr\fP
is an IPv4 address in dotted\-decimal notation, or a colon\-delimited is an IPv4 address in dotted\-decimal notation, or a colon\-delimited
IPv6 address. When \fB\-x\fP is used, there is no need to provide the IPv6 address. When \fI\%\-x\fP is used, there is no need to provide the
\fBname\fP or \fBtype\fP arguments; \fBdelv\fP automatically performs a \fBname\fP or \fBtype\fP arguments; \fBdelv\fP automatically performs a
lookup for a name like \fB11.12.13.10.in\-addr.arpa\fP and sets the lookup for a name like \fB11.12.13.10.in\-addr.arpa\fP and sets the
query type to PTR. IPv6 addresses are looked up using nibble format query type to PTR. IPv6 addresses are looked up using nibble format
@ -273,7 +273,7 @@ of trust for DNSSEC validation.
.sp .sp
This is equivalent to setting the debug level to 1 in the "resolver" This is equivalent to setting the debug level to 1 in the "resolver"
logging category. Setting the systemwide debug level to 1 using the logging category. Setting the systemwide debug level to 1 using the
\fB\-d\fP option produces the same output, but affects other \fI\%\-d\fP option produces the same output, but affects other
logging categories as well. logging categories as well.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -285,7 +285,7 @@ resolution and validation process.
.sp .sp
This is equivalent to setting the debug level to 10 for the "packets" This is equivalent to setting the debug level to 10 for the "packets"
module of the "resolver" logging category. Setting the systemwide module of the "resolver" logging category. Setting the systemwide
debug level to 10 using the \fB\-d\fP option produces the same debug level to 10 using the \fI\%\-d\fP option produces the same
output, but affects other logging categories as well. output, but affects other logging categories as well.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -297,7 +297,7 @@ unsigned, or invalid.
.sp .sp
This is equivalent to setting the debug level to 3 for the This is equivalent to setting the debug level to 3 for the
"validator" module of the "dnssec" logging category. Setting the "validator" module of the "dnssec" logging category. Setting the
systemwide debug level to 3 using the \fB\-d\fP option produces the systemwide debug level to 3 using the \fI\%\-d\fP option produces the
same output, but affects other logging categories as well. same output, but affects other logging categories as well.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -365,7 +365,7 @@ This option indicates whether to display RRSIG records in the \fBdelv\fP output.
The default is to do so. Note that (unlike in \fBdig\fP) this does The default is to do so. Note that (unlike in \fBdig\fP) this does
\fInot\fP control whether to request DNSSEC records or to \fInot\fP control whether to request DNSSEC records or to
validate them. DNSSEC records are always requested, and validation validate them. DNSSEC records are always requested, and validation
always occurs unless suppressed by the use of \fB\-i\fP or always occurs unless suppressed by the use of \fI\%\-i\fP or
\fB+noroot\fP\&. \fB+noroot\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -374,7 +374,7 @@ always occurs unless suppressed by the use of \fB\-i\fP or
This option indicates whether to perform conventional DNSSEC validation, and if so, This option indicates whether to perform conventional DNSSEC validation, and if so,
specifies the name of a trust anchor. The default is to validate using a specifies the name of a trust anchor. The default is to validate using a
trust anchor of "." (the root zone), for which there is a built\-in key. If trust anchor of "." (the root zone), for which there is a built\-in key. If
specifying a different trust anchor, then \fB\-a\fP must be used to specify a specifying a different trust anchor, then \fI\%\-a\fP must be used to specify a
file containing the key. file containing the key.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0

View File

@ -62,12 +62,12 @@ performs an NS query for "." (the root).
.sp .sp
It is possible to set per\-user defaults for \fBdig\fP via It is possible to set per\-user defaults for \fBdig\fP via
\fB${HOME}/.digrc\fP\&. This file is read and any options in it are applied \fB${HOME}/.digrc\fP\&. This file is read and any options in it are applied
before the command\-line arguments. The \fB\-r\fP option disables this before the command\-line arguments. The \fI\%\-r\fP option disables this
feature, for scripts that need predictable behavior. feature, for scripts that need predictable behavior.
.sp .sp
The IN and CH class names overlap with the IN and CH top\-level domain The IN and CH class names overlap with the IN and CH top\-level domain
names. Either use the \fB\-t\fP and \fB\-c\fP options to specify the type and names. Either use the \fI\%\-t\fP and \fI\%\-c\fP options to specify the type and
class, use the \fB\-q\fP to specify the domain name, or use "IN." and class, use the \fI\%\-q\fP to specify the domain name, or use "IN." and
"CH." when looking up these top\-level domains. "CH." when looking up these top\-level domains.
.SH SIMPLE USAGE .SH SIMPLE USAGE
.sp .sp
@ -95,7 +95,7 @@ server.
.sp .sp
If no \fBserver\fP argument is provided, \fBdig\fP consults If no \fBserver\fP argument is provided, \fBdig\fP consults
\fB/etc/resolv.conf\fP; if an address is found there, it queries the \fB/etc/resolv.conf\fP; if an address is found there, it queries the
name server at that address. If either of the \fB\-4\fP or \fB\-6\fP name server at that address. If either of the \fI\%\-4\fP or \fI\%\-6\fP
options are in use, then only addresses for the corresponding options are in use, then only addresses for the corresponding
transport are tried. If no usable addresses are found, \fBdig\fP transport are tried. If no usable addresses are found, \fBdig\fP
sends the query to the local host. The reply from the name server sends the query to the local host. The reply from the name server
@ -186,7 +186,7 @@ scripts that need predictable behavior.
This option indicates the resource record type to query, which can be any valid query type. If This option indicates the resource record type to query, which can be any valid query type. If
it is a resource record type supported in BIND 9, it can be given by it is a resource record type supported in BIND 9, it can be given by
the type mnemonic (such as \fBNS\fP or \fBAAAA\fP). The default query type is the type mnemonic (such as \fBNS\fP or \fBAAAA\fP). The default query type is
\fBA\fP, unless the \fB\-x\fP option is supplied to indicate a reverse \fBA\fP, unless the \fI\%\-x\fP option is supplied to indicate a reverse
lookup. A zone transfer can be requested by specifying a type of lookup. A zone transfer can be requested by specifying a type of
AXFR. When an incremental zone transfer (IXFR) is required, set the AXFR. When an incremental zone transfer (IXFR) is required, set the
\fBtype\fP to \fBixfr=N\fP\&. The incremental zone transfer contains \fBtype\fP to \fBixfr=N\fP\&. The incremental zone transfer contains
@ -212,7 +212,7 @@ This option prints the version number and exits.
.B \-x addr .B \-x addr
This option sets simplified reverse lookups, for mapping addresses to names. The This option sets simplified reverse lookups, for mapping addresses to names. The
\fBaddr\fP is an IPv4 address in dotted\-decimal notation, or a \fBaddr\fP is an IPv4 address in dotted\-decimal notation, or a
colon\-delimited IPv6 address. When the \fB\-x\fP option is used, there is no colon\-delimited IPv6 address. When the \fI\%\-x\fP option is used, there is no
need to provide the \fBname\fP, \fBclass\fP, and \fBtype\fP arguments. need to provide the \fBname\fP, \fBclass\fP, and \fBtype\fP arguments.
\fBdig\fP automatically performs a lookup for a name like \fBdig\fP automatically performs a lookup for a name like
\fB94.2.0.192.in\-addr.arpa\fP and sets the query type and class to PTR \fB94.2.0.192.in\-addr.arpa\fP and sets the query type and class to PTR
@ -234,8 +234,8 @@ not specified, the default is \fBhmac\-md5\fP; if MD5 was disabled, the default
\fBNOTE:\fP \fBNOTE:\fP
.INDENT 0.0 .INDENT 0.0
.INDENT 3.5 .INDENT 3.5
Only the \fB\-k\fP option should be used, rather than the \fB\-y\fP option, Only the \fI\%\-k\fP option should be used, rather than the \fI\%\-y\fP option,
because with \fB\-y\fP the shared secret is supplied as a command\-line because with \fI\%\-y\fP the shared secret is supplied as a command\-line
argument in clear text. This may be visible in the output from \fBps1\fP or argument in clear text. This may be visible in the output from \fBps1\fP or
in a history file maintained by the user\(aqs shell. in a history file maintained by the user\(aqs shell.
.UNINDENT .UNINDENT
@ -803,7 +803,7 @@ This flag is off by default.
.SH MULTIPLE QUERIES .SH MULTIPLE QUERIES
.sp .sp
The BIND 9 implementation of \fBdig\fP supports specifying multiple The BIND 9 implementation of \fBdig\fP supports specifying multiple
queries on the command line (in addition to supporting the \fB\-f\fP batch queries on the command line (in addition to supporting the \fI\%\-f\fP batch
file option). Each of those queries can be supplied with its own set of file option). Each of those queries can be supplied with its own set of
flags, options, and query options. flags, options, and query options.
.sp .sp

View File

@ -43,9 +43,9 @@ its key\-signing keys (KSKs); by polling periodically with \fBdnssec\-cds\fP, th
parent can keep the DS records up\-to\-date and enable automatic rolling parent can keep the DS records up\-to\-date and enable automatic rolling
of KSKs. of KSKs.
.sp .sp
Two input files are required. The \fB\-f child\-file\fP option specifies a Two input files are required. The \fI\%\-f child\-file\fP option specifies a
file containing the child\(aqs CDS and/or CDNSKEY records, plus RRSIG and file containing the child\(aqs CDS and/or CDNSKEY records, plus RRSIG and
DNSKEY records so that they can be authenticated. The \fB\-d path\fP option DNSKEY records so that they can be authenticated. The \fI\%\-d path\fP option
specifies the location of a file containing the current DS records. For specifies the location of a file containing the current DS records. For
example, this could be a \fBdsset\-\fP file generated by example, this could be a \fBdsset\-\fP file generated by
\fBdnssec\-signzone\fP, or the output of \fBdnssec\-dsfromkey\fP, or the \fBdnssec\-signzone\fP, or the output of \fBdnssec\-dsfromkey\fP, or the
@ -59,7 +59,7 @@ is typically the pre\-existing KSK.
For protection against replay attacks, the signatures on the child For protection against replay attacks, the signatures on the child
records must not be older than they were on a previous run of records must not be older than they were on a previous run of
\fBdnssec\-cds\fP\&. Their age is obtained from the modification time of the \fBdnssec\-cds\fP\&. Their age is obtained from the modification time of the
\fBdsset\-\fP file, or from the \fB\-s\fP option. \fBdsset\-\fP file, or from the \fI\%\-s\fP option.
.sp .sp
To protect against breaking the delegation, \fBdnssec\-cds\fP ensures that To protect against breaking the delegation, \fBdnssec\-cds\fP ensures that
the DNSKEY RRset can be verified by every key algorithm in the new DS the DNSKEY RRset can be verified by every key algorithm in the new DS
@ -67,7 +67,7 @@ RRset, and that the same set of keys are covered by every DS digest
type. type.
.sp .sp
By default, replacement DS records are written to the standard output; By default, replacement DS records are written to the standard output;
with the \fB\-i\fP option the input file is overwritten in place. The with the \fI\%\-i\fP option the input file is overwritten in place. The
replacement DS records are the same as the existing records, when no replacement DS records are the same as the existing records, when no
change is required. The output can be empty if the CDS/CDNSKEY records change is required. The output can be empty if the CDS/CDNSKEY records
specify that the child zone wants to be insecure. specify that the child zone wants to be insecure.
@ -80,7 +80,7 @@ Be careful not to delete the DS records when \fBdnssec\-cds\fP fails!
.UNINDENT .UNINDENT
.sp .sp
Alternatively, \fBdnssec\-cds \-u\fP writes an \fBnsupdate\fP script to the Alternatively, \fBdnssec\-cds \-u\fP writes an \fBnsupdate\fP script to the
standard output. The \fB\-u\fP and \fB\-i\fP options can be used together to standard output. The \fI\%\-u\fP and \fI\%\-i\fP options can be used together to
maintain a \fBdsset\-\fP file as well as emit an \fBnsupdate\fP script. maintain a \fBdsset\-\fP file as well as emit an \fBnsupdate\fP script.
.SH OPTIONS .SH OPTIONS
.INDENT 0.0 .INDENT 0.0
@ -121,7 +121,7 @@ looks for a \fBdsset\-\fP file for the domain inside the directory.
.sp .sp
To protect against replay attacks, child records are rejected if they To protect against replay attacks, child records are rejected if they
were signed earlier than the modification time of the \fBdsset\-\fP were signed earlier than the modification time of the \fBdsset\-\fP
file. This can be adjusted with the \fB\-s\fP option. file. This can be adjusted with the \fI\%\-s\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -138,7 +138,7 @@ The examples below describe how to generate this file.
This option updates the \fBdsset\-\fP file in place, instead of writing DS records to This option updates the \fBdsset\-\fP file in place, instead of writing DS records to
the standard output. the standard output.
.sp .sp
There must be no space between the \fB\-i\fP and the extension. If There must be no space between the \fI\%\-i\fP and the extension. If
no extension is provided, the old \fBdsset\-\fP is discarded. If an no extension is provided, the old \fBdsset\-\fP is discarded. If an
extension is present, a backup of the old \fBdsset\-\fP file is kept extension is present, a backup of the old \fBdsset\-\fP file is kept
with the extension appended to its filename. with the extension appended to its filename.
@ -177,7 +177,7 @@ printing the new DS reords. The output is empty if no change is
needed. needed.
.sp .sp
Note: The TTL of new records needs to be specified: it can be done in the Note: The TTL of new records needs to be specified: it can be done in the
original \fBdsset\-\fP file, with the \fB\-T\fP option, or using the original \fBdsset\-\fP file, with the \fI\%\-T\fP option, or using the
\fBnsupdate\fP \fBttl\fP command. \fBnsupdate\fP \fBttl\fP command.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0

View File

@ -42,10 +42,10 @@ dnssec-dsfromkey \- DNSSEC DS RR generation tool
.SH DESCRIPTION .SH DESCRIPTION
.sp .sp
The \fBdnssec\-dsfromkey\fP command outputs DS (Delegation Signer) resource records The \fBdnssec\-dsfromkey\fP command outputs DS (Delegation Signer) resource records
(RRs), or CDS (Child DS) RRs with the \fB\-C\fP option. (RRs), or CDS (Child DS) RRs with the \fI\%\-C\fP option.
.sp .sp
By default, only KSKs are converted (keys with flags = 257). The By default, only KSKs are converted (keys with flags = 257). The
\fB\-A\fP option includes ZSKs (flags = 256). Revoked keys are never \fI\%\-A\fP option includes ZSKs (flags = 256). Revoked keys are never
included. included.
.sp .sp
The input keys can be specified in a number of ways: The input keys can be specified in a number of ways:
@ -53,21 +53,21 @@ The input keys can be specified in a number of ways:
By default, \fBdnssec\-dsfromkey\fP reads a key file named in the format By default, \fBdnssec\-dsfromkey\fP reads a key file named in the format
\fBKnnnn.+aaa+iiiii.key\fP, as generated by \fBdnssec\-keygen\fP\&. \fBKnnnn.+aaa+iiiii.key\fP, as generated by \fBdnssec\-keygen\fP\&.
.sp .sp
With the \fB\-f file\fP option, \fBdnssec\-dsfromkey\fP reads keys from a zone With the \fI\%\-f file\fP option, \fBdnssec\-dsfromkey\fP reads keys from a zone
file or partial zone file (which can contain just the DNSKEY records). file or partial zone file (which can contain just the DNSKEY records).
.sp .sp
With the \fB\-s\fP option, \fBdnssec\-dsfromkey\fP reads a \fBkeyset\-\fP file, With the \fI\%\-s\fP option, \fBdnssec\-dsfromkey\fP reads a \fBkeyset\-\fP file,
as generated by \fBdnssec\-keygen\fP \fB\-C\fP\&. as generated by \fBdnssec\-keygen\fP \fI\%\-C\fP\&.
.SH OPTIONS .SH OPTIONS
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-1 .B \-1
This option is an abbreviation for \fB\-a SHA1\fP\&. This option is an abbreviation for \fI\%\-a SHA1\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-2 .B \-2
This option is an abbreviation for \fB\-a SHA\-256\fP\&. This option is an abbreviation for \fI\%\-a SHA\-256\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -85,13 +85,13 @@ is specified, the default is SHA\-256.
.B \-A .B \-A
This option indicates that ZSKs are to be included when generating DS records. Without this option, only This option indicates that ZSKs are to be included when generating DS records. Without this option, only
keys which have the KSK flag set are converted to DS records and keys which have the KSK flag set are converted to DS records and
printed. This option is only useful in \fB\-f\fP zone file mode. printed. This option is only useful in \fI\%\-f\fP zone file mode.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-c class .B \-c class
This option specifies the DNS class; the default is IN. This option is only useful in \fB\-s\fP keyset This option specifies the DNS class; the default is IN. This option is only useful in \fI\%\-s\fP keyset
or \fB\-f\fP zone file mode. or \fI\%\-f\fP zone file mode.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP

View File

@ -45,7 +45,7 @@ input, in which case both .key and .private files are generated.
.sp .sp
The newly created .private file does \fInot\fP contain private key data, and The newly created .private file does \fInot\fP contain private key data, and
cannot be used for signing. However, having a .private file makes it cannot be used for signing. However, having a .private file makes it
possible to set publication (\fB\-P\fP) and deletion (\fB\-D\fP) times for the possible to set publication (\fI\%\-P\fP) and deletion (\fI\%\-D\fP) times for the
key, which means the public key can be added to and removed from the key, which means the public key can be added to and removed from the
DNSKEY RRset on schedule even if the true private key is stored offline. DNSKEY RRset on schedule even if the true private key is stored offline.
.SH OPTIONS .SH OPTIONS

View File

@ -53,18 +53,18 @@ be one of RSASHA1, NSEC3RSASHA1, RSASHA256, RSASHA512,
ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448. ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448.
.sp .sp
If no algorithm is specified, RSASHA1 is used by default If no algorithm is specified, RSASHA1 is used by default
unless the \fB\-3\fP option is specified, in which case NSEC3RSASHA1 unless the \fI\%\-3\fP option is specified, in which case NSEC3RSASHA1
is used instead. (If \fB\-3\fP is used and an algorithm is is used instead. (If \fI\%\-3\fP is used and an algorithm is
specified, that algorithm is checked for compatibility with specified, that algorithm is checked for compatibility with
NSEC3.) NSEC3.)
.sp .sp
These values are case\-insensitive. In some cases, abbreviations are These values are case\-insensitive. In some cases, abbreviations are
supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for
ECDSAP384SHA384. If RSASHA1 is specified along with the \fB\-3\fP ECDSAP384SHA384. If RSASHA1 is specified along with the \fI\%\-3\fP
option, then NSEC3RSASHA1 is used instead. option, then NSEC3RSASHA1 is used instead.
.sp .sp
Since BIND 9.12.0, this option is mandatory except when using the Since BIND 9.12.0, this option is mandatory except when using the
\fB\-S\fP option, which copies the algorithm from the predecessory key. \fI\%\-S\fP option, which copies the algorithm from the predecessory key.
Previously, the default for newly generated keys was RSASHA1. Previously, the default for newly generated keys was RSASHA1.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -111,7 +111,7 @@ By default, \fBdnssec\-keyfromlabel\fP includes the key\(aqs creation
date in the metadata stored with the private key; other dates may date in the metadata stored with the private key; other dates may
be set there as well, including publication date, activation date, etc. Keys be set there as well, including publication date, activation date, etc. Keys
that include this data may be incompatible with older versions of that include this data may be incompatible with older versions of
BIND; the \fB\-C\fP option suppresses them. BIND; the \fI\%\-C\fP option suppresses them.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -129,7 +129,7 @@ The only recognized flags are KSK (Key\-Signing Key) and REVOKE.
.TP .TP
.B \-G .B \-G
This option generates a key, but does not publish it or sign with it. This option is This option generates a key, but does not publish it or sign with it. This option is
incompatible with \fB\-P\fP and \fB\-A\fP\&. incompatible with \fI\%\-P\fP and \fI\%\-A\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -149,7 +149,7 @@ This option generates KEY records rather than DNSKEY records.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \fB\-L\fP ttl .B \-L ttl
This option sets the default TTL to use for this key when it is converted into a This option sets the default TTL to use for this key when it is converted into a
DNSKEY RR. This is the TTL used when the key is imported into a zone, DNSKEY RR. This is the TTL used when the key is imported into a zone,
unless there was already a DNSKEY RRset in unless there was already a DNSKEY RRset in
@ -215,7 +215,7 @@ explicitly prevent a date from being set, use \fBnone\fP or \fBnever\fP\&.
.B \-P date/offset .B \-P date/offset
This option sets the date on which a key is to be published to the zone. After This option sets the date on which a key is to be published to the zone. After
that date, the key is included in the zone but is not used that date, the key is included in the zone but is not used
to sign it. If not set, and if the \fB\-G\fP option has not been used, the to sign it. If not set, and if the \fI\%\-G\fP option has not been used, the
default is the current date. default is the current date.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -229,7 +229,7 @@ are to be published to the zone.
.B \-A date/offset .B \-A date/offset
This option sets the date on which the key is to be activated. After that date, This option sets the date on which the key is to be activated. After that date,
the key is included in the zone and used to sign it. If not set, the key is included in the zone and used to sign it. If not set,
and if the \fB\-G\fP option has not been used, the default is the current date. and if the \fI\%\-G\fP option has not been used, the default is the current date.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP

View File

@ -59,14 +59,14 @@ This option selects the cryptographic algorithm. For DNSSEC keys, the value of
\fBalgorithm\fP must be one of RSASHA1, NSEC3RSASHA1, RSASHA256, \fBalgorithm\fP must be one of RSASHA1, NSEC3RSASHA1, RSASHA256,
RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448. For RSASHA512, ECDSAP256SHA256, ECDSAP384SHA384, ED25519, or ED448. For
TKEY, the value must be DH (Diffie\-Hellman); specifying this value TKEY, the value must be DH (Diffie\-Hellman); specifying this value
automatically sets the \fB\-T KEY\fP option as well. automatically sets the \fI\%\-T KEY\fP option as well.
.sp .sp
These values are case\-insensitive. In some cases, abbreviations are These values are case\-insensitive. In some cases, abbreviations are
supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for supported, such as ECDSA256 for ECDSAP256SHA256 and ECDSA384 for
ECDSAP384SHA384. If RSASHA1 is specified along with the \fB\-3\fP ECDSAP384SHA384. If RSASHA1 is specified along with the \fI\%\-3\fP
option, NSEC3RSASHA1 is used instead. option, NSEC3RSASHA1 is used instead.
.sp .sp
This parameter \fImust\fP be specified except when using the \fB\-S\fP This parameter \fImust\fP be specified except when using the \fI\%\-S\fP
option, which copies the algorithm from the predecessor key. option, which copies the algorithm from the predecessor key.
.sp .sp
In prior releases, HMAC algorithms could be generated for use as TSIG In prior releases, HMAC algorithms could be generated for use as TSIG
@ -84,7 +84,7 @@ curve algorithms do not need this parameter.
If the key size is not specified, some algorithms have pre\-defined If the key size is not specified, some algorithms have pre\-defined
defaults. For example, RSA keys for use as DNSSEC zone\-signing keys defaults. For example, RSA keys for use as DNSSEC zone\-signing keys
have a default size of 1024 bits; RSA keys for use as key\-signing have a default size of 1024 bits; RSA keys for use as key\-signing
keys (KSKs, generated with \fB\-f KSK\fP) default to 2048 bits. keys (KSKs, generated with \fI\%\-f KSK\fP) default to 2048 bits.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -94,7 +94,7 @@ metadata. By default, \fBdnssec\-keygen\fP includes the key\(aqs
creation date in the metadata stored with the private key; other creation date in the metadata stored with the private key; other
dates may be set there as well, including publication date, activation date, dates may be set there as well, including publication date, activation date,
etc. Keys that include this data may be incompatible with older etc. Keys that include this data may be incompatible with older
versions of BIND; the \fB\-C\fP option suppresses them. versions of BIND; the \fI\%\-C\fP option suppresses them.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -129,7 +129,7 @@ The only recognized flags are KSK (Key\-Signing Key) and REVOKE.
.TP .TP
.B \-G .B \-G
This option generates a key, but does not publish it or sign with it. This option is This option generates a key, but does not publish it or sign with it. This option is
incompatible with \fB\-P\fP and \fB\-A\fP\&. incompatible with \fI\%\-P\fP and \fI\%\-A\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -175,7 +175,7 @@ is the same as leaving it unset.
.TP .TP
.B \-l file .B \-l file
This option provides a configuration file that contains a \fBdnssec\-policy\fP statement This option provides a configuration file that contains a \fBdnssec\-policy\fP statement
(matching the policy set with \fB\-k\fP). (matching the policy set with \fI\%\-k\fP).
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -190,7 +190,7 @@ case\-insensitive. The default is ZONE for DNSKEY generation.
.TP .TP
.B \-p protocol .B \-p protocol
This option sets the protocol value for the generated key, for use with This option sets the protocol value for the generated key, for use with
\fB\-T KEY\fP\&. The protocol is a number between 0 and 255. The default \fI\%\-T KEY\fP\&. The protocol is a number between 0 and 255. The default
is 3 (DNSSEC). Other possible values for this argument are listed in is 3 (DNSSEC). Other possible values for this argument are listed in
\fI\%RFC 2535\fP and its successors. \fI\%RFC 2535\fP and its successors.
.UNINDENT .UNINDENT
@ -233,7 +233,7 @@ SIG(0).
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-t type .B \-t type
This option indicates the type of the key for use with \fB\-T KEY\fP\&. \fBtype\fP This option indicates the type of the key for use with \fI\%\-T KEY\fP\&. \fBtype\fP
must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default must be one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
is AUTHCONF. AUTH refers to the ability to authenticate data, and is AUTHCONF. AUTH refers to the ability to authenticate data, and
CONF to the ability to encrypt data. CONF to the ability to encrypt data.
@ -263,7 +263,7 @@ explicitly prevent a date from being set, use \fBnone\fP or \fBnever\fP\&.
.B \-P date/offset .B \-P date/offset
This option sets the date on which a key is to be published to the zone. After This option sets the date on which a key is to be published to the zone. After
that date, the key is included in the zone but is not used that date, the key is included in the zone but is not used
to sign it. If not set, and if the \fB\-G\fP option has not been used, the to sign it. If not set, and if the \fI\%\-G\fP option has not been used, the
default is the current date. default is the current date.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -277,8 +277,8 @@ are to be published to the zone.
.B \-A date/offset .B \-A date/offset
This option sets the date on which the key is to be activated. After that date, This option sets the date on which the key is to be activated. After that date,
the key is included in the zone and used to sign it. If not set, the key is included in the zone and used to sign it. If not set,
and if the \fB\-G\fP option has not been used, the default is the current date. If set, and if the \fI\%\-G\fP option has not been used, the default is the current date. If set,
and \fB\-P\fP is not set, the publication date is set to the and \fI\%\-P\fP is not set, the publication date is set to the
activation date minus the prepublication interval. activation date minus the prepublication interval.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0

View File

@ -36,10 +36,10 @@ dnssec-settime \- set the key timing metadata for a DNSSEC key
.SH DESCRIPTION .SH DESCRIPTION
.sp .sp
\fBdnssec\-settime\fP reads a DNSSEC private key file and sets the key \fBdnssec\-settime\fP reads a DNSSEC private key file and sets the key
timing metadata as specified by the \fB\-P\fP, \fB\-A\fP, \fB\-R\fP, \fB\-I\fP, and timing metadata as specified by the \fI\%\-P\fP, \fI\%\-A\fP, \fI\%\-R\fP,
\fB\-D\fP options. The metadata can then be used by \fBdnssec\-signzone\fP or \fI\%\-I\fP, and \fI\%\-D\fP options. The metadata can then be used by
other signing software to determine when a key is to be published, \fBdnssec\-signzone\fP or other signing software to determine when a key is
whether it should be used for signing a zone, etc. to be published, whether it should be used for signing a zone, etc.
.sp .sp
If none of these options is set on the command line, If none of these options is set on the command line,
\fBdnssec\-settime\fP simply prints the key timing metadata already stored \fBdnssec\-settime\fP simply prints the key timing metadata already stored
@ -55,12 +55,12 @@ the key file. The private file\(aqs permissions are always set to be
inaccessible to anyone other than the owner (mode 0600). inaccessible to anyone other than the owner (mode 0600).
.sp .sp
When working with state files, it is possible to update the timing metadata in When working with state files, it is possible to update the timing metadata in
those files as well with \fB\-s\fP\&. With this option, it is also possible to update key those files as well with \fI\%\-s\fP\&. With this option, it is also possible
states with \fB\-d\fP (DS), \fB\-k\fP (DNSKEY), \fB\-r\fP (RRSIG of KSK), or \fB\-z\fP to update key states with \fI\%\-d\fP (DS), \fI\%\-k\fP (DNSKEY), \fI\%\-r\fP
(RRSIG of ZSK). Allowed states are HIDDEN, RUMOURED, OMNIPRESENT, and (RRSIG of KSK), or \fI\%\-z\fP (RRSIG of ZSK). Allowed states are HIDDEN,
UNRETENTIVE. RUMOURED, OMNIPRESENT, and UNRETENTIVE.
.sp .sp
The goal state of the key can also be set with \fB\-g\fP\&. This should be either The goal state of the key can also be set with \fI\%\-g\fP\&. This should be either
HIDDEN or OMNIPRESENT, representing whether the key should be removed from the HIDDEN or OMNIPRESENT, representing whether the key should be removed from the
zone or published. zone or published.
.sp .sp
@ -266,7 +266,7 @@ This option indicates that times should be printed in Unix epoch format.
.TP .TP
.B \-p C/P/Pds/Psync/A/R/I/D/Dds/Dsync/all .B \-p C/P/Pds/Psync/A/R/I/D/Dds/Dsync/all
This option prints a specific metadata value or set of metadata values. This option prints a specific metadata value or set of metadata values.
The \fB\-p\fP option may be followed by one or more of the following letters or The \fI\%\-p\fP option may be followed by one or more of the following letters or
strings to indicate which value or values to print: \fBC\fP for the strings to indicate which value or values to print: \fBC\fP for the
creation date, \fBP\fP for the publication date, \fBPds\(ga for the DS publication creation date, \fBP\fP for the publication date, \fBPds\(ga for the DS publication
date, \(ga\(gaPsync\fP for the CDS and CDNSKEY publication date, \fBA\fP for the date, \(ga\(gaPsync\fP for the CDS and CDNSKEY publication date, \fBA\fP for the

View File

@ -68,9 +68,9 @@ This option indicates the directory where BIND 9 should look for \fBdsset\-\fP o
.B \-D .B \-D
This option indicates that only those record types automatically managed by This option indicates that only those record types automatically managed by
\fBdnssec\-signzone\fP, i.e., RRSIG, NSEC, NSEC3 and NSEC3PARAM records, should be included in the output. \fBdnssec\-signzone\fP, i.e., RRSIG, NSEC, NSEC3 and NSEC3PARAM records, should be included in the output.
If smart signing (\fB\-S\fP) is used, DNSKEY records are also included. If smart signing (\fI\%\-S\fP) is used, DNSKEY records are also included.
The resulting file can be included in the original zone file with The resulting file can be included in the original zone file with
\fB$INCLUDE\fP\&. This option cannot be combined with \fB\-O raw\fP \fB$INCLUDE\fP\&. This option cannot be combined with \fI\%\-O raw\fP
or serial\-number updating. or serial\-number updating.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -111,7 +111,7 @@ which is useful to know when rolling keys. The maxttl is the longest
possible time before signatures that have been retrieved by resolvers possible time before signatures that have been retrieved by resolvers
expire from resolver caches. Zones that are signed with this expire from resolver caches. Zones that are signed with this
option should be configured to use a matching \fBmax\-zone\-ttl\fP in option should be configured to use a matching \fBmax\-zone\-ttl\fP in
\fBnamed.conf\fP\&. (Note: This option is incompatible with \fB\-D\fP, \fBnamed.conf\fP\&. (Note: This option is incompatible with \fI\%\-D\fP,
because it modifies non\-DNSSEC data in the output zone.) because it modifies non\-DNSSEC data in the output zone.)
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -291,7 +291,7 @@ Normally, when a previously signed zone is passed as input to the
signer, and a DNSKEY record has been removed and replaced with a new signer, and a DNSKEY record has been removed and replaced with a new
one, signatures from the old key that are still within their validity one, signatures from the old key that are still within their validity
period are retained. This allows the zone to continue to validate period are retained. This allows the zone to continue to validate
with cached copies of the old DNSKEY RRset. The \fB\-Q\fP option forces with cached copies of the old DNSKEY RRset. The \fI\%\-Q\fP option forces
\fBdnssec\-signzone\fP to remove signatures from keys that are no longer \fBdnssec\-signzone\fP to remove signatures from keys that are no longer
active. This enables ZSK rollover using the procedure described in active. This enables ZSK rollover using the procedure described in
\fI\%RFC 4641#4.2.1.1\fP ("Pre\-Publish Key Rollover"). \fI\%RFC 4641#4.2.1.1\fP ("Pre\-Publish Key Rollover").
@ -310,7 +310,7 @@ zone. With the option that output is suppressed, leaving only the filename.
.B \-R .B \-R
This option removes signatures from keys that are no longer published. This option removes signatures from keys that are no longer published.
.sp .sp
This option is similar to \fB\-Q\fP, except it forces This option is similar to \fI\%\-Q\fP, except it forces
\fBdnssec\-signzone\fP to remove signatures from keys that are no longer \fBdnssec\-signzone\fP to remove signatures from keys that are no longer
published. This enables ZSK rollover using the procedure described in published. This enables ZSK rollover using the procedure described in
\fI\%RFC 4641#4.2.1.2\fP ("Double Signature Zone Signing Key \fI\%RFC 4641#4.2.1.2\fP ("Double Signature Zone Signing Key
@ -360,7 +360,7 @@ synchronization records (type CDS and/or CDNSKEY) are removed.
This option specifies a TTL to be used for new DNSKEY records imported into the This option specifies a TTL to be used for new DNSKEY records imported into the
zone from the key repository. If not specified, the default is the zone from the key repository. If not specified, the default is the
TTL value from the zone\(aqs SOA record. This option is ignored when TTL value from the zone\(aqs SOA record. This option is ignored when
signing without \fB\-S\fP, since DNSKEY records are not imported from signing without \fI\%\-S\fP, since DNSKEY records are not imported from
the key repository in that case. It is also ignored if there are any the key repository in that case. It is also ignored if there are any
pre\-existing DNSKEY records at the zone apex, in which case new pre\-existing DNSKEY records at the zone apex, in which case new
records\(aq TTL values are set to match them, or if any of the records\(aq TTL values are set to match them, or if any of the
@ -420,9 +420,12 @@ is 10.
.B \-A .B \-A
This option indicates that, when generating an NSEC3 chain, BIND 9 should set the OPTOUT flag on all NSEC3 This option indicates that, when generating an NSEC3 chain, BIND 9 should set the OPTOUT flag on all NSEC3
records and should not generate NSEC3 records for insecure delegations. records and should not generate NSEC3 records for insecure delegations.
.sp .UNINDENT
Using this option twice (i.e., \fB\-AA\fP) turns the OPTOUT flag off for .INDENT 0.0
all records. This is useful when using the \fB\-u\fP option to modify an .TP
.B \-AA
This option turns the OPTOUT flag off for
all records. This is useful when using the \fI\%\-u\fP option to modify an
NSEC3 chain which previously had OPTOUT set. NSEC3 chain which previously had OPTOUT set.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -442,10 +445,10 @@ the current directory, they are used for signing.
.sp .sp
The following command signs the \fBexample.com\fP zone with the The following command signs the \fBexample.com\fP zone with the
ECDSAP256SHA256 key generated by \fBdnssec\-keygen\fP ECDSAP256SHA256 key generated by \fBdnssec\-keygen\fP
(Kexample.com.+013+17247). Because the \fB\-S\fP option is not being used, (Kexample.com.+013+17247). Because the \fI\%\-S\fP option is not being used,
the zone\(aqs keys must be in the master file (\fBdb.example.com\fP). This the zone\(aqs keys must be in the master file (\fBdb.example.com\fP). This
invocation looks for \fBdsset\fP files in the current directory, so that invocation looks for \fBdsset\fP files in the current directory, so that
DS records can be imported from them (\fB\-g\fP). DS records can be imported from them (\fI\%\-g\fP).
.INDENT 0.0 .INDENT 0.0
.INDENT 3.5 .INDENT 3.5
.sp .sp

View File

@ -94,7 +94,7 @@ This option verifies only that the DNSKEY RRset is signed with key\-signing keys
Without this flag, it is assumed that the DNSKEY RRset is signed Without this flag, it is assumed that the DNSKEY RRset is signed
by all active keys. When this flag is set, it is not an error if by all active keys. When this flag is set, it is not an error if
the DNSKEY RRset is not signed by zone\-signing keys. This corresponds the DNSKEY RRset is not signed by zone\-signing keys. This corresponds
to the \fB\-x\fP option in \fBdnssec\-signzone\fP\&. to the \fB\-x option in dnssec\-signzone\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -110,11 +110,11 @@ be at least one non\-revoked, self\-signed DNSKEY, regardless of
the KSK flag state, and that other RRsets be signed by a the KSK flag state, and that other RRsets be signed by a
non\-revoked key for the same algorithm that includes the self\-signed non\-revoked key for the same algorithm that includes the self\-signed
key; the same key may be used for both purposes. This corresponds to key; the same key may be used for both purposes. This corresponds to
the \fB\-z\fP option in \fBdnssec\-signzone\fP\&. the \fB\-z option in dnssec\-signzone\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \fBzonefile\fP .B zonefile
This option indicates the file containing the zone to be signed. This option indicates the file containing the zone to be signed.
.UNINDENT .UNINDENT
.SH SEE ALSO .SH SEE ALSO

View File

@ -37,7 +37,7 @@ dnstap-read \- print dnstap data in human-readable form
.sp .sp
\fBdnstap\-read\fP reads \fBdnstap\fP data from a specified file and prints \fBdnstap\-read\fP reads \fBdnstap\fP data from a specified file and prints
it in a human\-readable format. By default, \fBdnstap\fP data is printed in it in a human\-readable format. By default, \fBdnstap\fP data is printed in
a short summary format, but if the \fB\-y\fP option is specified, a a short summary format, but if the \fI\%\-y\fP option is specified, a
longer and more detailed YAML format is used. longer and more detailed YAML format is used.
.SH OPTIONS .SH OPTIONS
.INDENT 0.0 .INDENT 0.0

View File

@ -50,23 +50,23 @@ server or servers listed in \fB/etc/resolv.conf\fP\&.
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-4 .B \-4
This option specifies that only IPv4 should be used for query transport. See also the \fB\-6\fP option. This option specifies that only IPv4 should be used for query transport. See also the \fI\%\-6\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-6 .B \-6
This option specifies that only IPv6 should be used for query transport. See also the \fB\-4\fP option. This option specifies that only IPv6 should be used for query transport. See also the \fI\%\-4\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-a .B \-a
The \fB\-a\fP ("all") option is normally equivalent to \fB\-v \-t ANY\fP\&. It The \fI\%\-a\fP ("all") option is normally equivalent to \fI\%\-v\fP \fI\%\-t ANY\fP\&. It
also affects the behavior of the \fB\-l\fP list zone option. also affects the behavior of the \fI\%\-l\fP list zone option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-A .B \-A
The \fB\-A\fP ("almost all") option is equivalent to \fB\-a\fP, except that RRSIG, The \fI\%\-A\fP ("almost all") option is equivalent to \fI\%\-a\fP, except that RRSIG,
NSEC, and NSEC3 records are omitted from the output. NSEC, and NSEC3 records are omitted from the output.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -86,7 +86,7 @@ found for the zone.
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-d .B \-d
This option prints debugging traces, and is equivalent to the \fB\-v\fP verbose option. This option prints debugging traces, and is equivalent to the \fI\%\-v\fP verbose option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -94,7 +94,7 @@ This option prints debugging traces, and is equivalent to the \fB\-v\fP verbose
This option tells \fBnamed\fP to list the zone, meaning the \fBhost\fP command performs a zone transfer of zone This option tells \fBnamed\fP to list the zone, meaning the \fBhost\fP command performs a zone transfer of zone
\fBname\fP and prints out the NS, PTR, and address records (A/AAAA). \fBname\fP and prints out the NS, PTR, and address records (A/AAAA).
.sp .sp
Together, the \fB\-l \-a\fP options print all records in the zone. Together, the \fI\%\-l\fP \fI\%\-a\fP options print all records in the zone.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -116,7 +116,7 @@ This option specifies the port to query on the server. The default is 53.
.B \-r .B \-r
This option specifies a non\-recursive query; setting this option clears the RD (recursion This option specifies a non\-recursive query; setting this option clears the RD (recursion
desired) bit in the query. This means that the name server desired) bit in the query. This means that the name server
receiving the query does not attempt to resolve \fBname\fP\&. The \fB\-r\fP receiving the query does not attempt to resolve \fBname\fP\&. The \fI\%\-r\fP
option enables \fBhost\fP to mimic the behavior of a name server by option enables \fBhost\fP to mimic the behavior of a name server by
making non\-recursive queries, and expecting to receive answers to making non\-recursive queries, and expecting to receive answers to
those queries that can be referrals to other name servers. those queries that can be referrals to other name servers.
@ -143,34 +143,34 @@ CNAME, NS, SOA, TXT, DNSKEY, AXFR, etc.
.sp .sp
When no query type is specified, \fBhost\fP automatically selects an When no query type is specified, \fBhost\fP automatically selects an
appropriate query type. By default, it looks for A, AAAA, and MX appropriate query type. By default, it looks for A, AAAA, and MX
records. If the \fB\-C\fP option is given, queries are made for SOA records. If the \fI\%\-C\fP option is given, queries are made for SOA
records. If \fBname\fP is a dotted\-decimal IPv4 address or records. If \fBname\fP is a dotted\-decimal IPv4 address or
colon\-delimited IPv6 address, \fBhost\fP queries for PTR records. colon\-delimited IPv6 address, \fBhost\fP queries for PTR records.
.sp .sp
If a query type of IXFR is chosen, the starting serial number can be If a query type of IXFR is chosen, the starting serial number can be
specified by appending an equals sign (=), followed by the starting serial specified by appending an equals sign (=), followed by the starting serial
number, e.g., \fB\-t IXFR=12345678\fP\&. number, e.g., \fI\%\-t IXFR=12345678\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-T\(ga\(ga; \(ga\(ga\-U .B \-T, \-U
This option specifies TCP or UDP. By default, \fBhost\fP uses UDP when making queries; the This option specifies TCP or UDP. By default, \fBhost\fP uses UDP when making queries; the
\fB\-T\fP option makes it use a TCP connection when querying the name \fI\%\-T\fP option makes it use a TCP connection when querying the name
server. TCP is automatically selected for queries that require server. TCP is automatically selected for queries that require
it, such as zone transfer (AXFR) requests. Type \fBANY\fP queries default it, such as zone transfer (AXFR) requests. Type \fBANY\fP queries default
to TCP, but can be forced to use UDP initially via \fB\-U\fP\&. to TCP, but can be forced to use UDP initially via \fI\%\-U\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-m flag .B \-m flag
This option sets memory usage debugging: the flag can be \fBrecord\fP, \fBusage\fP, or This option sets memory usage debugging: the flag can be \fBrecord\fP, \fBusage\fP, or
\fBtrace\fP\&. The \fB\-m\fP option can be specified more than once to set \fBtrace\fP\&. The \fI\%\-m\fP option can be specified more than once to set
multiple flags. multiple flags.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-v .B \-v
This option sets verbose output, and is equivalent to the \fB\-d\fP debug option. Verbose output This option sets verbose output, and is equivalent to the \fI\%\-d\fP debug option. Verbose output
can also be enabled by setting the \fBdebug\fP option in can also be enabled by setting the \fBdebug\fP option in
\fB/etc/resolv.conf\fP\&. \fB/etc/resolv.conf\fP\&.
.UNINDENT .UNINDENT
@ -183,7 +183,7 @@ This option prints the version number and exits.
.TP .TP
.B \-w .B \-w
This option sets "wait forever": the query timeout is set to the maximum possible. See This option sets "wait forever": the query timeout is set to the maximum possible. See
also the \fB\-W\fP option. also the \fI\%\-W\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -195,7 +195,7 @@ By default, \fBhost\fP waits for 5 seconds for UDP responses and 10
seconds for TCP connections. These defaults can be overridden by the seconds for TCP connections. These defaults can be overridden by the
\fBtimeout\fP option in \fB/etc/resolv.conf\fP\&. \fBtimeout\fP option in \fB/etc/resolv.conf\fP\&.
.sp .sp
See also the \fB\-w\fP option. See also the \fI\%\-w\fP option.
.UNINDENT .UNINDENT
.SH IDN SUPPORT .SH IDN SUPPORT
.sp .sp

View File

@ -264,7 +264,7 @@ query class which is supported in BIND 9. The default query class is
.B \-t type .B \-t type
This option sets the query type to \fBtype\fP\&. It can be any valid This option sets the query type to \fBtype\fP\&. It can be any valid
query type which is supported in BIND 9. The default query type is "A", query type which is supported in BIND 9. The default query type is "A",
unless the \fB\-x\fP option is supplied to indicate a reverse lookup with unless the \fI\%\-x\fP option is supplied to indicate a reverse lookup with
the "PTR" query type. the "PTR" query type.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0

View File

@ -78,7 +78,7 @@ This option ignores warnings on deprecated options.
.TP .TP
.B \-p .B \-p
This option prints out the \fBnamed.conf\fP and included files in canonical form if This option prints out the \fBnamed.conf\fP and included files in canonical form if
no errors were detected. See also the \fB\-x\fP option. no errors were detected. See also the \fI\%\-x\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -100,7 +100,7 @@ shared secrets by replacing them with strings of question marks
(\fB?\fP). This allows the contents of \fBnamed.conf\fP and related files (\fB?\fP). This allows the contents of \fBnamed.conf\fP and related files
to be shared \- for example, when submitting bug reports \- to be shared \- for example, when submitting bug reports \-
without compromising private data. This option cannot be used without without compromising private data. This option cannot be used without
\fB\-p\fP\&. \fI\%\-p\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP

View File

@ -72,7 +72,7 @@ string \fB\&.jnl\fP appended.
.TP .TP
.B \-J filename .B \-J filename
When loading the zone file, this option tells \fBnamed\fP to read the journal from the given file, if When loading the zone file, this option tells \fBnamed\fP to read the journal from the given file, if
it exists. This implies \fB\-j\fP\&. it exists. This implies \fI\%\-j\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP

View File

@ -74,7 +74,7 @@ string \fB\&.jnl\fP appended.
.TP .TP
.B \-J filename .B \-J filename
When loading the zone file, this option tells \fBnamed\fP to read the journal from the given file, if When loading the zone file, this option tells \fBnamed\fP to read the journal from the given file, if
it exists. This implies \fB\-j\fP\&. it exists. This implies \fI\%\-j\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP

View File

@ -46,14 +46,14 @@ listens for queries.
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-4 .B \-4
This option tells \fBnamed\fP to use only IPv4, even if the host machine is capable of IPv6. \fB\-4\fP and This option tells \fBnamed\fP to use only IPv4, even if the host machine is capable of IPv6. \fI\%\-4\fP and
\fB\-6\fP are mutually exclusive. \fI\%\-6\fP are mutually exclusive.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-6 .B \-6
This option tells \fBnamed\fP to use only IPv6, even if the host machine is capable of IPv4. \fB\-4\fP and This option tells \fBnamed\fP to use only IPv6, even if the host machine is capable of IPv4. \fI\%\-4\fP and
\fB\-6\fP are mutually exclusive. \fI\%\-6\fP are mutually exclusive.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -184,7 +184,7 @@ before reading the configuration file.
\fBWARNING:\fP \fBWARNING:\fP
.INDENT 0.0 .INDENT 0.0
.INDENT 3.5 .INDENT 3.5
This option should be used in conjunction with the \fB\-u\fP option, This option should be used in conjunction with the \fI\%\-u\fP option,
as chrooting a process running as root doesn\(aqt enhance security on as chrooting a process running as root doesn\(aqt enhance security on
most systems; the way \fBchroot\fP is defined allows a process most systems; the way \fBchroot\fP is defined allows a process
with root privileges to escape a chroot jail. with root privileges to escape a chroot jail.
@ -198,8 +198,8 @@ each address. If not specified, \fBnamed\fP calculates a default
value based on the number of detected CPUs: 1 for 1 CPU, and the value based on the number of detected CPUs: 1 for 1 CPU, and the
number of detected CPUs minus one for machines with more than 1 CPU. number of detected CPUs minus one for machines with more than 1 CPU.
This cannot be increased to a value higher than the number of CPUs. This cannot be increased to a value higher than the number of CPUs.
If \fB\-n\fP has been set to a higher value than the number of detected If \fI\%\-n\fP has been set to a higher value than the number of detected
CPUs, then \fB\-U\fP may be increased as high as that value, but no CPUs, then \fI\%\-U\fP may be increased as high as that value, but no
higher. higher.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -215,7 +215,7 @@ creating sockets that listen on privileged ports.
On Linux, \fBnamed\fP uses the kernel\(aqs capability mechanism to drop On Linux, \fBnamed\fP uses the kernel\(aqs capability mechanism to drop
all root privileges except the ability to \fBbind\fP to a all root privileges except the ability to \fBbind\fP to a
privileged port and set process resource limits. Unfortunately, privileged port and set process resource limits. Unfortunately,
this means that the \fB\-u\fP option only works when \fBnamed\fP is run this means that the \fI\%\-u\fP option only works when \fBnamed\fP is run
on kernel 2.2.18 or later, or kernel 2.3.99\-pre3 or later, since on kernel 2.2.18 or later, or kernel 2.3.99\-pre3 or later, since
previous kernels did not allow privileges to be retained after previous kernels did not allow privileges to be retained after
\fBsetuid\fP\&. \fBsetuid\fP\&.

View File

@ -61,15 +61,15 @@ statements are added to \fB@sysconfdir@/named.conf\fP so that the name server
can associate the appropriate secret key and algorithm with the IP can associate the appropriate secret key and algorithm with the IP
address of the client application that is using TSIG address of the client application that is using TSIG
authentication. \fBddns\-confgen\fP can generate suitable authentication. \fBddns\-confgen\fP can generate suitable
configuration fragments. \fBnsupdate\fP uses the \fB\-y\fP or \fB\-k\fP options configuration fragments. \fBnsupdate\fP uses the \fI\%\-y\fP or \fI\%\-k\fP options
to provide the TSIG shared secret; these options are mutually exclusive. to provide the TSIG shared secret; these options are mutually exclusive.
.sp .sp
SIG(0) uses public key cryptography. To use a SIG(0) key, the public key SIG(0) uses public key cryptography. To use a SIG(0) key, the public key
must be stored in a KEY record in a zone served by the name server. must be stored in a KEY record in a zone served by the name server.
.sp .sp
GSS\-TSIG uses Kerberos credentials. Standard GSS\-TSIG mode is switched GSS\-TSIG uses Kerberos credentials. Standard GSS\-TSIG mode is switched
on with the \fB\-g\fP flag. A non\-standards\-compliant variant of GSS\-TSIG on with the \fI\%\-g\fP flag. A non\-standards\-compliant variant of GSS\-TSIG
used by Windows 2000 can be switched on with the \fB\-o\fP flag. used by Windows 2000 can be switched on with the \fI\%\-o\fP flag.
.SH OPTIONS .SH OPTIONS
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -99,6 +99,11 @@ This option sets extra debug mode.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-g
This option enables standard GSS\-TSIG mode.
.UNINDENT
.INDENT 0.0
.TP
.B \-i .B \-i
This option forces interactive mode, even when standard input is not a terminal. This option forces interactive mode, even when standard input is not a terminal.
.UNINDENT .UNINDENT
@ -111,7 +116,7 @@ statement, which may be generated automatically by \fBddns\-confgen\fP;
or a pair of files whose names are of the format or a pair of files whose names are of the format
\fBK{name}.+157.+{random}.key\fP and \fBK{name}.+157.+{random}.key\fP and
\fBK{name}.+157.+{random}.private\fP, which can be generated by \fBK{name}.+157.+{random}.private\fP, which can be generated by
\fBdnssec\-keygen\fP\&. The \fB\-k\fP option can also be used to specify a SIG(0) \fBdnssec\-keygen\fP\&. The \fI\%\-k\fP option can also be used to specify a SIG(0)
key used to authenticate Dynamic DNS update requests. In this case, key used to authenticate Dynamic DNS update requests. In this case,
the key specified is not an HMAC\-MD5 key. the key specified is not an HMAC\-MD5 key.
.UNINDENT .UNINDENT
@ -124,7 +129,7 @@ overridden). Connections to the local server use a TSIG key
found in \fB@runstatedir@/session.key\fP, which is automatically found in \fB@runstatedir@/session.key\fP, which is automatically
generated by \fBnamed\fP if any local \fBprimary\fP zone has set generated by \fBnamed\fP if any local \fBprimary\fP zone has set
\fBupdate\-policy\fP to \fBlocal\fP\&. The location of this key file can be \fBupdate\-policy\fP to \fBlocal\fP\&. The location of this key file can be
overridden with the \fB\-k\fP option. overridden with the \fI\%\-k\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -133,6 +138,12 @@ This option sets the logging debug level. If zero, logging is disabled.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-o
This option enables a non\-standards\-compliant variant of GSS\-TSIG
used by Windows 2000.
.UNINDENT
.INDENT 0.0
.TP
.B \-p port .B \-p port
This option sets the port to use for connections to a name server. The default is This option sets the port to use for connections to a name server. The default is
53. 53.
@ -141,7 +152,7 @@ This option sets the port to use for connections to a name server. The default i
.TP .TP
.B \-P .B \-P
This option prints the list of private BIND\-specific resource record types whose This option prints the list of private BIND\-specific resource record types whose
format is understood by \fBnsupdate\fP\&. See also the \fB\-T\fP option. format is understood by \fBnsupdate\fP\&. See also the \fI\%\-T\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -160,7 +171,7 @@ default is 300 seconds. If zero, the timeout is disabled.
.B \-T .B \-T
This option prints the list of IANA standard resource record types whose format is This option prints the list of IANA standard resource record types whose format is
understood by \fBnsupdate\fP\&. \fBnsupdate\fP exits after the lists understood by \fBnsupdate\fP\&. \fBnsupdate\fP exits after the lists
are printed. The \fB\-T\fP option can be combined with the \fB\-P\fP are printed. The \fI\%\-T\fP option can be combined with the \fI\%\-P\fP
option. option.
.sp .sp
Other types can be entered using \fBTYPEXXXXX\fP where \fBXXXXX\fP is the Other types can be entered using \fBTYPEXXXXX\fP where \fBXXXXX\fP is the
@ -198,7 +209,7 @@ name of the key algorithm; valid choices are \fBhmac\-md5\fP,
\fBhmac\-sha512\fP\&. If \fBhmac\fP is not specified, the default is \fBhmac\-sha512\fP\&. If \fBhmac\fP is not specified, the default is
\fBhmac\-md5\fP, or if MD5 was disabled, \fBhmac\-sha256\fP\&. \fBhmac\-md5\fP, or if MD5 was disabled, \fBhmac\-sha256\fP\&.
.sp .sp
NOTE: Use of the \fB\-y\fP option is discouraged because the shared NOTE: Use of the \fI\%\-y\fP option is discouraged because the shared
secret is supplied as a command\-line argument in clear text. This may secret is supplied as a command\-line argument in clear text. This may
be visible in the output from ps1 or in a history file maintained by be visible in the output from ps1 or in a history file maintained by
the user\(aqs shell. the user\(aqs shell.
@ -258,15 +269,15 @@ This command specifies that all updates are to be TSIG\-signed using the
\fBkeyname\fP\-\fBsecret\fP pair. If \fBhmac\fP is specified, it sets \fBkeyname\fP\-\fBsecret\fP pair. If \fBhmac\fP is specified, it sets
the signing algorithm in use. The default is \fBhmac\-md5\fP; if MD5 the signing algorithm in use. The default is \fBhmac\-md5\fP; if MD5
was disabled, the default is \fBhmac\-sha256\fP\&. The \fBkey\fP command overrides any key was disabled, the default is \fBhmac\-sha256\fP\&. The \fBkey\fP command overrides any key
specified on the command line via \fB\-y\fP or \fB\-k\fP\&. specified on the command line via \fI\%\-y\fP or \fI\%\-k\fP\&.
.TP .TP
.B \fBgsstsig\fP .B \fBgsstsig\fP
This command uses GSS\-TSIG to sign the updates. This is equivalent to specifying This command uses GSS\-TSIG to sign the updates. This is equivalent to specifying
\fB\-g\fP on the command line. \fI\%\-g\fP on the command line.
.TP .TP
.B \fBoldgsstsig\fP .B \fBoldgsstsig\fP
This command uses the Windows 2000 version of GSS\-TSIG to sign the updates. This is This command uses the Windows 2000 version of GSS\-TSIG to sign the updates. This is
equivalent to specifying \fB\-o\fP on the command line. equivalent to specifying \fI\%\-o\fP on the command line.
.TP .TP
.B \fBrealm [realm_name]\fP .B \fBrealm [realm_name]\fP
When using GSS\-TSIG, this command specifies the use of \fBrealm_name\fP rather than the default realm When using GSS\-TSIG, this command specifies the use of \fBrealm_name\fP rather than the default realm

View File

@ -38,7 +38,7 @@ rndc-confgen \- rndc key generation tool
\fBrndc\-confgen\fP generates configuration files for \fBrndc\fP\&. It can be \fBrndc\-confgen\fP generates configuration files for \fBrndc\fP\&. It can be
used as a convenient alternative to writing the \fBrndc.conf\fP file and used as a convenient alternative to writing the \fBrndc.conf\fP file and
the corresponding \fBcontrols\fP and \fBkey\fP statements in \fBnamed.conf\fP the corresponding \fBcontrols\fP and \fBkey\fP statements in \fBnamed.conf\fP
by hand. Alternatively, it can be run with the \fB\-a\fP option to set up a by hand. Alternatively, it can be run with the \fI\%\-a\fP option to set up a
\fBrndc.key\fP file and avoid the need for a \fBrndc.conf\fP file and a \fBrndc.key\fP file and avoid the need for a \fBrndc.conf\fP file and a
\fBcontrols\fP statement altogether. \fBcontrols\fP statement altogether.
.SH OPTIONS .SH OPTIONS
@ -53,7 +53,7 @@ the local host with no further configuration.
.sp .sp
If a more elaborate configuration than that generated by If a more elaborate configuration than that generated by
\fBrndc\-confgen \-a\fP is required, for example if rndc is to be used \fBrndc\-confgen \-a\fP is required, for example if rndc is to be used
remotely, run \fBrndc\-confgen\fP without the \fB\-a\fP option remotely, run \fBrndc\-confgen\fP without the \fI\%\-a\fP option
and set up \fBrndc.conf\fP and \fBnamed.conf\fP as directed. and set up \fBrndc.conf\fP and \fBnamed.conf\fP as directed.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -72,7 +72,7 @@ This option specifies the size of the authentication key in bits. The size must
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-c keyfile .B \-c keyfile
This option is used with the \fB\-a\fP option to specify an alternate location for This option is used with the \fI\%\-a\fP option to specify an alternate location for
\fBrndc.key\fP\&. \fBrndc.key\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
@ -108,7 +108,7 @@ connections from \fBrndc\fP\&. The default is the loopback address
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-t chrootdir .B \-t chrootdir
This option is used with the \fB\-a\fP option to specify a directory where \fBnamed\fP This option is used with the \fI\%\-a\fP option to specify a directory where \fBnamed\fP
runs chrooted. An additional copy of the \fBrndc.key\fP is runs chrooted. An additional copy of the \fBrndc.key\fP is
written relative to this directory, so that it is found by the written relative to this directory, so that it is found by the
chrooted \fBnamed\fP\&. chrooted \fBnamed\fP\&.
@ -116,8 +116,8 @@ chrooted \fBnamed\fP\&.
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-u user .B \-u user
This option is used with the \fB\-a\fP option to set the owner of the generated \fBrndc.key\fP file. This option is used with the \fI\%\-a\fP option to set the owner of the generated \fBrndc.key\fP file.
If \fB\-t\fP is also specified, only the file in the chroot If \fI\%\-t\fP is also specified, only the file in the chroot
area has its owner changed. area has its owner changed.
.UNINDENT .UNINDENT
.SH EXAMPLES .SH EXAMPLES

View File

@ -161,7 +161,7 @@ the default view:
(Note the brackets around and semi\-colon after the zone configuration (Note the brackets around and semi\-colon after the zone configuration
text.) text.)
.sp .sp
See also \fBrndc delzone\fP and \fBrndc modzone\fP\&. See also \fI\%rndc delzone\fP and \fI\%rndc modzone\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -181,7 +181,7 @@ when the server is restarted or reconfigured, the zone is
recreated. To remove it permanently, it must also be removed from recreated. To remove it permanently, it must also be removed from
\fBnamed.conf\fP\&. \fBnamed.conf\fP\&.
.sp .sp
See also \fBrndc addzone\fP and \fBrndc modzone\fP\&. See also \fI\%rndc addzone\fP and \fI\%rndc modzone\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -250,7 +250,7 @@ normally updated by dynamic update, and causes changes in the
journal file to be synced into the master file. All dynamic update journal file to be synced into the master file. All dynamic update
attempts are refused while the zone is frozen. attempts are refused while the zone is frozen.
.sp .sp
See also \fBrndc thaw\fP\&. See also \fI\%rndc thaw\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -262,14 +262,14 @@ forward from the journal files when the server is restarted. If
an external process to determine when \fBnamed\fP has completed an external process to determine when \fBnamed\fP has completed
halting. halting.
.sp .sp
See also \fBrndc stop\fP\&. See also \fI\%rndc stop\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B loadkeys [zone [class [view]]] .B loadkeys [zone [class [view]]]
This command fetches all DNSSEC keys for the given zone from the key directory. If This command fetches all DNSSEC keys for the given zone from the key directory. If
they are within their publication period, they are merged into the they are within their publication period, they are merged into the
zone\(aqs DNSKEY RRset. Unlike \fBrndc sign\fP, however, the zone is not zone\(aqs DNSKEY RRset. Unlike \fI\%rndc sign\fP, however, the zone is not
immediately re\-signed by the new keys, but is allowed to immediately re\-signed by the new keys, but is allowed to
incrementally re\-sign over time. incrementally re\-sign over time.
.sp .sp
@ -311,7 +311,7 @@ However, key maintenance operations cease until \fBnamed\fP is
restarted or reconfigured, and all existing key maintenance states restarted or reconfigured, and all existing key maintenance states
are deleted. are deleted.
.sp .sp
Running \fBrndc reconfig\fP or restarting \fBnamed\fP immediately Running \fI\%rndc reconfig\fP or restarting \fBnamed\fP immediately
after this command causes key maintenance to be reinitialized after this command causes key maintenance to be reinitialized
from scratch, just as if the server were being started for the from scratch, just as if the server were being started for the
first time. This is primarily intended for testing, but it may first time. This is primarily intended for testing, but it may
@ -329,7 +329,7 @@ As with \fBaddzone\fP, the configuration string specified on the
command line is the zone configuration text that would ordinarily be command line is the zone configuration text that would ordinarily be
placed in \fBnamed.conf\fP\&. placed in \fBnamed.conf\fP\&.
.sp .sp
If the zone was originally added via \fBrndc addzone\fP, the If the zone was originally added via \fI\%rndc addzone\fP, the
configuration changes are recorded permanently and are still configuration changes are recorded permanently and are still
in effect after the server is restarted or reconfigured. However, if in effect after the server is restarted or reconfigured. However, if
it was originally configured in \fBnamed.conf\fP, then that original it was originally configured in \fBnamed.conf\fP, then that original
@ -338,7 +338,7 @@ reconfigured, the zone reverts to its original configuration. To
make the changes permanent, it must also be modified in make the changes permanent, it must also be modified in
\fBnamed.conf\fP\&. \fBnamed.conf\fP\&.
.sp .sp
See also \fBrndc addzone\fP and \fBrndc delzone\fP\&. See also \fI\%rndc addzone\fP and \fI\%rndc delzone\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -350,7 +350,7 @@ This command resends NOTIFY messages for the zone.
.B notrace .B notrace
This command sets the server\(aqs debugging level to 0. This command sets the server\(aqs debugging level to 0.
.sp .sp
See also \fBrndc trace\fP\&. See also \fI\%rndc trace\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -496,7 +496,7 @@ Otherwise, it is written to the secroots dump file, which defaults to
\fBnamed.secroots\fP, but can be overridden via the \fBsecroots\-file\fP \fBnamed.secroots\fP, but can be overridden via the \fBsecroots\-file\fP
option in \fBnamed.conf\fP\&. option in \fBnamed.conf\fP\&.
.sp .sp
See also \fBrndc managed\-keys\fP\&. See also \fI\%rndc managed\-keys\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -517,7 +517,7 @@ answers is currently enabled or disabled. It also reports the values of
.B showzone zone [class [view]] .B showzone zone [class [view]]
This command prints the configuration of a running zone. This command prints the configuration of a running zone.
.sp .sp
See also \fBrndc zonestatus\fP\&. See also \fI\%rndc zonestatus\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -534,7 +534,7 @@ and also requires the zone to be configured to allow dynamic DNS. (See
"Dynamic Update Policies" in the BIND 9 Administrator Reference Manual for more "Dynamic Update Policies" in the BIND 9 Administrator Reference Manual for more
details.) details.)
.sp .sp
See also \fBrndc loadkeys\fP\&. See also \fI\%rndc loadkeys\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -606,7 +606,7 @@ zones. If \fB\-p\fP is specified, \fBnamed(8)\(ga\(aqs process ID is returned.
This allows an external process to determine when \(ga\(ganamed\fP has This allows an external process to determine when \(ga\(ganamed\fP has
completed stopping. completed stopping.
.sp .sp
See also \fBrndc halt\fP\&. See also \fI\%rndc halt\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -638,7 +638,7 @@ option is in use, the journal file is updated to reflect
changes in the zone. Otherwise, if the zone has changed, any existing changes in the zone. Otherwise, if the zone has changed, any existing
journal file is removed. journal file is removed.
.sp .sp
See also \fBrndc freeze\fP\&. See also \fI\%rndc freeze\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -650,7 +650,7 @@ This command increments the server\(aqs debugging level by one.
.B trace level .B trace level
This command sets the server\(aqs debugging level to an explicit value. This command sets the server\(aqs debugging level to an explicit value.
.sp .sp
See also \fBrndc notrace\fP\&. See also \fI\%rndc notrace\fP\&.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
@ -684,11 +684,11 @@ whether the zone supports dynamic updates, whether the zone is DNSSEC
signed, whether it uses automatic DNSSEC key management or inline signed, whether it uses automatic DNSSEC key management or inline
signing, and the scheduled refresh or expiry times for the zone. signing, and the scheduled refresh or expiry times for the zone.
.sp .sp
See also \fBrndc showzone\fP\&. See also \fI\%rndc showzone\fP\&.
.UNINDENT .UNINDENT
.sp .sp
\fBrndc\fP commands that specify zone names, such as \fBreload\fP \fBrndc\fP commands that specify zone names, such as \fI\%reload\fP
\fBretransfer\fP, or \fBzonestatus\fP, can be ambiguous when applied to zones \fI\%retransfer\fP, or \fI\%zonestatus\fP, can be ambiguous when applied to zones
of type \fBredirect\fP\&. Redirect zones are always called \fB\&.\fP, and can be of type \fBredirect\fP\&. Redirect zones are always called \fB\&.\fP, and can be
confused with zones of type \fBhint\fP or with secondary copies of the root confused with zones of type \fBhint\fP or with secondary copies of the root
zone. To specify a redirect zone, use the special zone name zone. To specify a redirect zone, use the special zone name

View File

@ -63,7 +63,7 @@ Feature Changes
.. _bug: https://sourceware.org/bugzilla/show_bug.cgi?id=23844 .. _bug: https://sourceware.org/bugzilla/show_bug.cgi?id=23844
- The ``rndc nta -dump`` and ``rndc secroots`` commands now both - The :option:`rndc nta -dump <rndc nta>` and :option:`rndc secroots` commands now both
include ``validate-except`` entries when listing negative trust include ``validate-except`` entries when listing negative trust
anchors. These are indicated by the keyword ``permanent`` in place of anchors. These are indicated by the keyword ``permanent`` in place of
the expiry date. :gl:`#1532` the expiry date. :gl:`#1532`

View File

@ -50,7 +50,7 @@ Bug Fixes
Note that journals created by the current version of ``named`` are not Note that journals created by the current version of ``named`` are not
usable by versions prior to 9.16.12. Before downgrading to a prior usable by versions prior to 9.16.12. Before downgrading to a prior
release, users are advised to ensure that all dynamic zones have been release, users are advised to ensure that all dynamic zones have been
synchronized using ``rndc sync -clean``. synchronized using :option:`rndc sync -clean <rndc sync>`.
A journal file's format can be changed manually by running A journal file's format can be changed manually by running
``named-journalprint -d`` (downgrade) or ``named-journalprint -u`` ``named-journalprint -d`` (downgrade) or ``named-journalprint -u``

View File

@ -77,9 +77,9 @@ Bug Fixes
:gl:`#2517` :gl:`#2517`
- Zones using KASP could not be thawed after they were frozen using - Zones using KASP could not be thawed after they were frozen using
``rndc freeze``. This has been fixed. :gl:`#2523` :option:`rndc freeze`. This has been fixed. :gl:`#2523`
- After ``rndc dnssec -checkds`` or ``rndc dnssec -rollover`` is used, - After :option:`rndc dnssec -checkds <rndc dnssec>` or :option:`rndc dnssec -rollover <rndc dnssec>` is used,
``named`` now immediately attempts to reconfigure zone keys. This ``named`` now immediately attempts to reconfigure zone keys. This
change prevents unnecessary key rollover delays. :gl:`#2488` change prevents unnecessary key rollover delays. :gl:`#2488`

View File

@ -61,8 +61,8 @@ Bug Fixes
``stale-cache-enable`` was set to ``yes``. This has been fixed. ``stale-cache-enable`` was set to ``yes``. This has been fixed.
:gl:`#389` :gl:`#2289` :gl:`#389` :gl:`#2289`
- A deadlock could occur when multiple ``rndc addzone``, ``rndc - A deadlock could occur when multiple :option:`rndc addzone`, :option:`rndc
delzone``, and/or ``rndc modzone`` commands were invoked delzone`, and/or :option:`rndc modzone` commands were invoked
simultaneously for different zones. This has been fixed. :gl:`#2626` simultaneously for different zones. This has been fixed. :gl:`#2626`
- ``inline-signing`` was incorrectly described as being inherited from - ``inline-signing`` was incorrectly described as being inherited from

View File

@ -63,6 +63,6 @@ Bug Fixes
a Combined Signing Key (CSK). :gl:`#2857` a Combined Signing Key (CSK). :gl:`#2857`
- When a dynamic zone was made available in another view using the - When a dynamic zone was made available in another view using the
``in-view`` statement, running ``rndc freeze`` always reported an ``in-view`` statement, running :option:`rndc freeze` always reported an
``already frozen`` error even though the zone was successfully ``already frozen`` error even though the zone was successfully
frozen. This has been fixed. :gl:`#2844` frozen. This has been fixed. :gl:`#2844`

View File

@ -100,8 +100,8 @@ Feature Changes
in cache as a potential mitigation mechanism, should there be a in cache as a potential mitigation mechanism, should there be a
problem with one or more domains. Note that cache content retention problem with one or more domains. Note that cache content retention
is independent of whether stale answers are used in response to is independent of whether stale answers are used in response to
client queries (``stale-answer-enable yes|no`` and ``rndc serve-stale client queries (``stale-answer-enable yes|no`` and :option:`rndc serve-stale
on|off``). Serving of stale answers when the authoritative servers on|off <rndc serve-stale>`). Serving of stale answers when the authoritative servers
are not responding must be explicitly enabled, whereas the retention are not responding must be explicitly enabled, whereas the retention
of expired cache content takes place automatically on all versions of of expired cache content takes place automatically on all versions of
BIND 9 that have this feature available. :gl:`#1877` BIND 9 that have this feature available. :gl:`#1877`
@ -195,13 +195,13 @@ Bug Fixes
of the current active key (the predecessor) was not changed and thus of the current active key (the predecessor) was not changed and thus
never removed from the zone. :gl:`#1846` never removed from the zone. :gl:`#1846`
- When ``named-checkconf -z`` was run, it would sometimes incorrectly - When :option:`named-checkconf -z` was run, it would sometimes incorrectly
set its exit code. It reflected the status of the last view found; if set its exit code. It reflected the status of the last view found; if
zone-loading errors were found in earlier configured views but not in zone-loading errors were found in earlier configured views but not in
the last one, the exit code indicated success. Thanks to Graham the last one, the exit code indicated success. Thanks to Graham
Clinch. :gl:`#1807` Clinch. :gl:`#1807`
- ``named-checkconf -p`` could include spurious text in - :option:`named-checkconf -p` could include spurious text in
``server-addresses`` statements due to an uninitialized DSCP value. ``server-addresses`` statements due to an uninitialized DSCP value.
This has been fixed. :gl:`#1812` This has been fixed. :gl:`#1812`

View File

@ -55,7 +55,7 @@ Feature Changes
a steady response rate on a loaded resolver while these internal data a steady response rate on a loaded resolver while these internal data
structures are resized. :gl:`#2941` structures are resized. :gl:`#2941`
- The output of ``rndc serve-stale status`` has been clarified. It now - The output of :option:`rndc serve-stale status <rndc serve-stale>` has been clarified. It now
explicitly reports whether retention of stale data in the cache is explicitly reports whether retention of stale data in the cache is
enabled (``stale-cache-enable``), and whether returning such data in enabled (``stale-cache-enable``), and whether returning such data in
responses is enabled (``stale-answer-enable``). :gl:`#2742` responses is enabled (``stale-answer-enable``). :gl:`#2742`

View File

@ -59,8 +59,8 @@ Bug Fixes
~~~~~~~~~ ~~~~~~~~~
- Removing a configured ``catalog-zone`` clause from the configuration, - Removing a configured ``catalog-zone`` clause from the configuration,
running ``rndc reconfig``, then bringing back the removed running :option:`rndc reconfig`, then bringing back the removed
``catalog-zone`` clause and running ``rndc reconfig`` again caused ``catalog-zone`` clause and running :option:`rndc reconfig` again caused
``named`` to crash. This has been fixed. :gl:`#1608` ``named`` to crash. This has been fixed. :gl:`#1608`
- The resolver could hang on shutdown due to dispatch resources not - The resolver could hang on shutdown due to dispatch resources not

View File

@ -15,7 +15,7 @@ Notes for BIND 9.17.3
New Features New Features
~~~~~~~~~~~~ ~~~~~~~~~~~~
- New ``rndc`` command ``rndc dnssec -status`` shows the current DNSSEC - New ``rndc`` command :option:`rndc dnssec -status <rndc dnssec>` shows the current DNSSEC
policy and keys in use, the key states, and rollover status. policy and keys in use, the key states, and rollover status.
:gl:`#1612` :gl:`#1612`
@ -68,8 +68,8 @@ Bug Fixes
for ``check-names``, were not processed correctly and were being for ``check-names``, were not processed correctly and were being
ignored. :gl:`#1949` ignored. :gl:`#1949`
- ``rndc dnstap -roll <value>`` did not limit the number of saved files - :option:`rndc dnstap -roll value <rndc dnstap>` did not limit the number of saved files
to ``<value>``. :gl:`!3728` to ``value``. :gl:`!3728`
- The validator could fail to accept a properly signed RRset if an - The validator could fail to accept a properly signed RRset if an
unsupported algorithm appeared earlier in the DNSKEY RRset than a unsupported algorithm appeared earlier in the DNSKEY RRset than a

View File

@ -125,5 +125,5 @@ Bug Fixes
cases when it should have been calculated in days. This has been cases when it should have been calculated in days. This has been
fixed. (Thanks to Tony Finch.) :gl:`!3735` fixed. (Thanks to Tony Finch.) :gl:`!3735`
- LMDB locking code was revised to make ``rndc reconfig`` work properly - LMDB locking code was revised to make :option:`rndc reconfig` work properly
on FreeBSD and with LMDB >= 0.9.26. :gl:`#1976` on FreeBSD and with LMDB >= 0.9.26. :gl:`#1976`

View File

@ -15,7 +15,7 @@ Notes for BIND 9.17.5
New Features New Features
~~~~~~~~~~~~ ~~~~~~~~~~~~
- Add a new ``rndc`` command, ``rndc dnssec -checkds``, which signals to - Add a new ``rndc`` command, :option:`rndc dnssec -checkds <rndc dnssec>`, which signals to
``named`` that a DS record for a given zone or key has been published ``named`` that a DS record for a given zone or key has been published
or withdrawn from the parent. This command replaces the time-based or withdrawn from the parent. This command replaces the time-based
``parent-registration-delay`` configuration option. :gl:`#1613` ``parent-registration-delay`` configuration option. :gl:`#1613`

View File

@ -15,10 +15,10 @@ Notes for BIND 9.17.6
New Features New Features
~~~~~~~~~~~~ ~~~~~~~~~~~~
- Add a new ``rndc`` command, ``rndc dnssec -rollover``, which triggers - Add a new ``rndc`` command, :option:`rndc dnssec -rollover <rndc dnssec>`, which triggers
a manual rollover for a specific key. :gl:`#1749` a manual rollover for a specific key. :gl:`#1749`
- Add a new ``rndc`` command, ``rndc dumpdb -expired``, which dumps the - Add a new ``rndc`` command, :option:`rndc dumpdb -expired <rndc dumpdb>`, which dumps the
cache database, including expired RRsets that are awaiting cleanup, to cache database, including expired RRsets that are awaiting cleanup, to
the ``dump-file`` for diagnostic purposes. :gl:`#1870` the ``dump-file`` for diagnostic purposes. :gl:`#1870`