diff --git a/bin/check/named-checkconf.html b/bin/check/named-checkconf.html index 37ff16b9f0e24fc1b50dfbe67a4055de5cc738f7..8caabf260e1e4208d8d24cb271d29a23c0b49db4 100644 --- a/bin/check/named-checkconf.html +++ b/bin/check/named-checkconf.html @@ -32,7 +32,7 @@
named-checkconf
[-h
] [-v
] [-j
] [-t
] {filename} [directory
-p
] [-x
] [-z
]
named-checkconf checks the syntax, but not the semantics, of a named configuration file. The file is parsed @@ -52,7 +52,7 @@
named-checkconf returns an exit status of 1 if errors were detected and 0 otherwise.
named-compilezone
[-d
] [-j
] [-q
] [-v
] [-c
] [class
-C
] [mode
-f
] [format
-F
] [format
-J
] [filename
-i
] [mode
-k
] [mode
-m
] [mode
-n
] [mode
-l
] [ttl
-L
] [serial
-r
] [mode
-s
] [style
-t
] [directory
-T
] [mode
-w
] [directory
-D
] [-W
] {mode
-o
} {zonename} {filename}filename
named-checkzone checks the syntax and integrity of a zone file. It performs the same checks as named does when loading a @@ -53,7 +53,7 @@
named-checkzone returns an exit status of 1 if errors were detected and 0 otherwise.
ddns-confgen
[-a
] [algorithm
-h
] [-k
] [keyname
-q
] [-r
] [ -s randomfile
name
| -z zone
]
tsig-keygen and ddns-confgen are invocation methods for a utility that generates keys for use @@ -68,7 +68,7 @@
rndc-confgen
[-a
] [-A
] [algorithm
-b
] [keysize
-c
] [keyfile
-h
] [-k
] [keyname
-p
] [port
-r
] [randomfile
-s
] [address
-t
] [chrootdir
-u
]user
rndc-confgen generates configuration files for rndc. It can be used as a @@ -48,7 +48,7 @@
delv
[queryopt...] [query...]
delv (Domain Entity Lookup & Validation) is a tool for sending DNS queries and validating the results, using the the same internal @@ -78,7 +78,7 @@
delv provides a number of query options which affect the way results are displayed, and in some cases the way lookups are performed. @@ -447,12 +447,12 @@
dig(1), named(8), RFC4034, diff --git a/bin/dig/dig.html b/bin/dig/dig.html index 0e11541dbc6a4314a9d9be3775057a0a4e630821..16325e30b6ba82d4dcd60dec65001ac90c734ebf 100644 --- a/bin/dig/dig.html +++ b/bin/dig/dig.html @@ -34,7 +34,7 @@
dig
[global-queryopt...] [query...]
dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and @@ -81,7 +81,7 @@
The -b
option sets the source IP address of the query
to address
. This must be a valid
@@ -242,7 +242,7 @@
dig provides a number of query options which affect the way in which lookups are made and the results displayed. Some of @@ -637,7 +637,7 @@
The BIND 9 implementation of dig supports @@ -683,7 +683,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
If dig has been built with IDN (internationalized domain name) support, it can accept and display non-ASCII domain names. @@ -697,14 +697,14 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
host(1), named(8), dnssec-keygen(8), @@ -712,7 +712,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
There are probably too many query options.
diff --git a/bin/dig/host.html b/bin/dig/host.html index 2103aae977dfb02bb523845a80cd93e210a8ce67..3a886fab7224d13e1003ed03ce3d1a6b7c46033b 100644 --- a/bin/dig/host.html +++ b/bin/dig/host.html @@ -32,7 +32,7 @@host
[-aCdlnrsTwv
] [-c
] [class
-N
] [ndots
-R
] [number
-t
] [type
-W
] [wait
-m
] [flag
-4
] [-6
] [-v
] [-V
] {name} [server]
host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. @@ -196,7 +196,7 @@
If host has been built with IDN (internationalized domain name) support, it can accept and display non-ASCII domain names. @@ -210,12 +210,12 @@
dig(1), named(8).
diff --git a/bin/dig/nslookup.html b/bin/dig/nslookup.html index 39920df333b58cd3aee4b75e32d7b5b31fa0cb0b..96777b3106e5e3c9a2755e0a06bda1fee9e969a6 100644 --- a/bin/dig/nslookup.html +++ b/bin/dig/nslookup.html @@ -21,7 +21,7 @@nslookup — query Internet name servers interactively
@@ -31,7 +31,7 @@nslookup
[-option
] [name | -] [server]
Nslookup is a program to query Internet domain name servers. Nslookup has two modes: interactive and non-interactive. Interactive mode allows @@ -43,7 +43,7 @@
Interactive mode is entered in the following cases:
@@ -83,7 +83,7 @@ nslookup -query=hinfo -timeout=10host
[server]Andrew Cherenson
diff --git a/bin/dnssec/dnssec-dsfromkey.html b/bin/dnssec/dnssec-dsfromkey.html index 26bdaa46ce6a1c3fc1838f2232b0d59b08c5252d..3f27b49e5bc2ca496455029bc10bc211a424a422 100644 --- a/bin/dnssec/dnssec-dsfromkey.html +++ b/bin/dnssec/dnssec-dsfromkey.html @@ -33,14 +33,14 @@dnssec-dsfromkey
[-h
] [-V
]
dnssec-dsfromkey outputs the Delegation Signer (DS) resource record (RR), as defined in RFC 3658 and RFC 4509, for the given key(s).
The keyfile can be designed by the key identification
Knnnn.+aaa+iiiii
or the full file name
@@ -154,13 +154,13 @@
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, @@ -170,7 +170,7 @@
dnssec-importkey
{-f
} [filename
-K
] [directory
-L
] [ttl
-P
] [date/offset
-D
] [date/offset
-h
] [-v
] [level
-V
] [dnsname
]
A keyfile can be designed by the key identification
Knnnn.+aaa+iiiii
or the full file name
@@ -133,7 +133,7 @@
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, @@ -141,7 +141,7 @@
dnssec-keyfromlabel
{-l label
} [-3
] [-a
] [algorithm
-A
] [date/offset
-c
] [class
-D
] [date/offset
-E
] [engine
-f
] [flag
-G
] [-I
] [date/offset
-i
] [interval
-k
] [-K
] [directory
-L
] [ttl
-n
] [nametype
-P
] [date/offset
-p
] [protocol
-R
] [date/offset
-S
] [key
-t
] [type
-v
] [level
-V
] [-y
] {name}
dnssec-keyfromlabel generates a key pair of files that referencing a key object stored in a cryptographic hardware service module (HSM). The private key @@ -47,7 +47,7 @@
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the argument begins with a '+' or '-', it is interpreted as @@ -296,7 +296,7 @@
When dnssec-keyfromlabel completes successfully, @@ -335,7 +335,7 @@
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, @@ -344,7 +344,7 @@
dnssec-keygen
[-a
] [algorithm
-b
] [keysize
-n
] [nametype
-3
] [-A
] [date/offset
-C
] [-c
] [class
-D
] [date/offset
-E
] [engine
-f
] [flag
-G
] [-g
] [generator
-h
] [-I
] [date/offset
-i
] [interval
-K
] [directory
-L
] [ttl
-k
] [-P
] [date/offset
-p
] [protocol
-q
] [-R
] [date/offset
-r
] [randomdev
-S
] [key
-s
] [strength
-t
] [type
-v
] [level
-V
] [-z
] {name}
dnssec-keygen generates keys for DNSSEC (Secure DNS), as defined in RFC 2535 and RFC 4034. It can also generate keys for use with @@ -46,7 +46,7 @@
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the argument begins with a '+' or '-', it is interpreted as @@ -341,7 +341,7 @@
To generate a 768-bit DSA key for the domain
example.com
, the following command would be
@@ -408,7 +408,7 @@
dnssec-signzone(8), BIND 9 Administrator Reference Manual, RFC 2539, @@ -417,7 +417,7 @@
dnssec-revoke
[-hr
] [-v
] [level
-V
] [-K
] [directory
-E
] [engine
-f
] [-R
] {keyfile}
dnssec-revoke reads a DNSSEC key file, sets the REVOKED bit on the key as defined in RFC 5011, and creates a new pair of key files containing the @@ -39,7 +39,7 @@
dnssec-settime
[-f
] [-K
] [directory
-L
] [ttl
-P
] [date/offset
-A
] [date/offset
-R
] [date/offset
-I
] [date/offset
-D
] [date/offset
-h
] [-V
] [-v
] [level
-E
] {keyfile}engine
dnssec-settime
reads a DNSSEC private key file and sets the key timing metadata
as specified by the -P
, -A
,
@@ -57,7 +57,7 @@
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS. If the argument begins with a '+' or '-', it is interpreted as @@ -191,7 +191,7 @@
dnssec-settime can also be used to print the timing metadata associated with a key. @@ -217,7 +217,7 @@
dnssec-keygen(8), dnssec-signzone(8), BIND 9 Administrator Reference Manual, @@ -225,7 +225,7 @@
dnssec-signzone
[-a
] [-c
] [class
-d
] [directory
-D
] [-E
] [engine
-e
] [end-time
-f
] [output-file
-g
] [-h
] [-K
] [directory
-k
] [key
-L
] [serial
-l
] [domain
-M
] [domain
-i
] [interval
-I
] [input-format
-j
] [jitter
-N
] [soa-serial-format
-o
] [origin
-O
] [output-format
-P
] [-p
] [-Q
] [-R
] [-r
] [randomdev
-S
] [-s
] [start-time
-T
] [ttl
-t
] [-u
] [-v
] [level
-V
] [-X
] [extended end-time
-x
] [-z
] [-3
] [salt
-H
] [iterations
-A
] {zonefile} [key...]
dnssec-signzone signs a zone. It generates NSEC and RRSIG records and produces a signed version of the @@ -43,7 +43,7 @@
The following command signs the example.com
zone with the DSA key generated by dnssec-keygen
@@ -524,14 +524,14 @@ db.example.com.signed
%
dnssec-verify
[-c
] [class
-E
] [engine
-I
] [input-format
-o
] [origin
-v
] [level
-V
] [-x
] [-z
] {zonefile}
dnssec-verify verifies that a zone is fully signed for each algorithm found in the DNSKEY RRset for the zone, and that the NSEC / NSEC3 @@ -39,7 +39,7 @@
lwresd — lightweight resolver daemon
@@ -32,7 +32,7 @@lwresd
[-c
] [config-file
-C
] [config-file
-d
] [debug-level
-f
] [-g
] [-i
] [pid-file
-m
] [flag
-n
] [#cpus
-P
] [port
-p
] [port
-s
] [-t
] [directory
-u
] [user
-v
] [-4
] [-6
]
lwresd is the daemon providing name lookup services to clients that use the BIND 9 lightweight resolver @@ -67,7 +67,7 @@
named.conf
— configuration file for named
named.conf
named.conf
is the configuration file
for
named. Statements are enclosed
@@ -50,14 +50,14 @@
masters string
[ port integer
] {
( masters
| ipv4_address
[port integer
] |
@@ -75,7 +75,7 @@ masters
server ( ipv4_address[/prefixlen]
| ipv6_address[/prefixlen]
) {
bogus boolean
;
@@ -97,7 +97,7 @@ server
trusted-keys {
domain_name
flags
protocol
algorithm
key
; ...
@@ -105,7 +105,7 @@ trusted-keys
managed-keys {
domain_name
initial-key
flags
protocol
algorithm
key
; ...
@@ -113,7 +113,7 @@ managed-keys
controls {
inet ( ipv4_address
| ipv6_address
| * )
@@ -125,7 +125,7 @@ controls
view string
optional_class
{
match-clients { address_match_element
; ... };
@@ -529,7 +529,7 @@ view
zone string
optional_class
{
type ( master | slave | stub | hint | redirect |
@@ -626,12 +626,12 @@ zone
named(8), named-checkconf(8), rndc(8), diff --git a/bin/named/named.html b/bin/named/named.html index 988f1d01f5002e1c33844cc932c24562bbb0acd3..1602ab4f4b28687d3a7401e3b99e82513ee2894b 100644 --- a/bin/named/named.html +++ b/bin/named/named.html @@ -32,7 +32,7 @@
named
[-4
] [-6
] [-c
] [config-file
-d
] [debug-level
-D
] [string
-E
] [engine-name
-f
] [-g
] [-L
] [logfile
-m
] [flag
-n
] [#cpus
-p
] [port
-s
] [-S
] [#max-socks
-t
] [directory
-U
] [#listeners
-u
] [user
-v
] [-V
] [-x
]cache-file
named is a Domain Name System (DNS) server, part of the BIND 9 distribution from ISC. For more @@ -47,7 +47,7 @@
In routine operation, signals should not be used to control the nameserver; rndc should be used @@ -284,7 +284,7 @@
The named configuration file is too complex to describe in detail here. A complete description is provided @@ -301,7 +301,7 @@
nsupdate
[-d
] [-D
] [[-g
] | [-o
] | [-l
] | [-y
] | [[hmac:]keyname:secret
-k
]] [keyfile
-t
] [timeout
-u
] [udptimeout
-r
] [udpretries
-R
] [randomdev
-v
] [-T
] [-P
] [-V
] [filename]
nsupdate is used to submit Dynamic DNS Update requests as defined in RFC 2136 to a name server. @@ -218,7 +218,7 @@
The TSIG key is redundantly stored in two separate files. This is a consequence of nsupdate using the DST library diff --git a/bin/python/dnssec-checkds.html b/bin/python/dnssec-checkds.html index 22986bbc2e356535e79f260e2ff5845bcbeb258f..91cecd5f9e3b31eff27a6c954e7bd3f0f0ae1f5e 100644 --- a/bin/python/dnssec-checkds.html +++ b/bin/python/dnssec-checkds.html @@ -32,7 +32,7 @@
dnssec-dsfromkey
[-l
] [domain
-f
] [file
-d
] [dig path
-D
] {zone}dsfromkey path
dnssec-checkds verifies the correctness of Delegation Signer (DS) or DNSSEC Lookaside Validation (DLV) resource records for keys in a specified @@ -40,7 +40,7 @@
dnssec-coverage
[-K
] [directory
-l
] [length
-f
] [file
-d
] [DNSKEY TTL
-m
] [max TTL
-r
] [interval
-c
] [compilezone path
-k
] [-z
] [zone]
dnssec-coverage verifies that the DNSSEC keys for a given zone or a set of zones have timing metadata set properly to ensure no future lapses in DNSSEC @@ -60,7 +60,7 @@
rndc.conf
rndc.conf
is the configuration file
for rndc, the BIND 9 name server control
utility. This file has a similar structure and syntax to
@@ -118,7 +118,7 @@
The name server must be configured to accept rndc connections and
to recognize the key specified in the rndc.conf
@@ -202,7 +202,7 @@
rndc
[-b
] [source-address
-c
] [config-file
-k
] [key-file
-s
] [server
-p
] [port
-q
] [-V
] [-y
] {command}key_id
rndc controls the operation of a name server. It supersedes the ndc utility @@ -63,7 +63,7 @@
A list of commands supported by rndc can be seen by running rndc without arguments. @@ -353,15 +353,15 @@
flushname
name
[view
] - Flushes the given name from the server's DNS cache - and, if applicable, from the server's nameserver address - database or bad-server cache. + Flushes the given name from the view's DNS cache + and, if applicable, from the view's nameserver address + database, bad server cache and SERVFAIL cache.
flushtree
name
[view
] Flushes the given name, and all of its subdomains, - from the server's DNS cache, the address database, - and the bad server cache. + from the view's DNS cache, address database, + bad server cache, and SERVFAIL cache.
status
@@ -397,7 +397,7 @@
lifetime
. The default lifetime is
configured in <file>named.conf</file> via the
nta-lifetime
, and defaults to
- one hour. The lifetime cannot exceed one day.
+ one hour. The lifetime cannot exceed one week.
A negative trust anchor selectively disables @@ -581,7 +581,7 @@
There is currently no way to provide the shared secret for a
key_id
without using the configuration file.
@@ -591,7 +591,7 @@
arpaname
{ipaddress
...}
arpaname translates IP addresses (IPv4 and IPv6) to the corresponding IN-ADDR.ARPA or IP6.ARPA names.
genrandom
[-n
] {number
size
} {filename
}
genrandom generates a file or a set of files containing a specified quantity @@ -40,7 +40,7 @@
isc-hmac-fixup
{algorithm
} {secret
}
Versions of BIND 9 up to and including BIND 9.6 had a bug causing HMAC-SHA* TSIG keys which were longer than the digest length of the @@ -57,7 +57,7 @@
Secrets that have been converted by isc-hmac-fixup are shortened, but as this is how the HMAC protocol works in @@ -68,14 +68,14 @@
named-journalprint
{journal
}
named-journalprint prints the contents of a zone journal file in a human-readable @@ -57,7 +57,7 @@
named-rrchecker
[-h
] [-o
] [origin
-p
] [-u
] [-C
] [-T
] [-P
]
named-rrchecker read a individual DNS resource record from standard input and checks if it is syntactically correct. @@ -60,7 +60,7 @@
RFC 1034, RFC 1035, diff --git a/bin/tools/nsec3hash.html b/bin/tools/nsec3hash.html index 397273358414fa77938b9b2ee19417ac6a65dbd5..acb83e6ee1526c936b9ce11c26b7229366ed1779 100644 --- a/bin/tools/nsec3hash.html +++ b/bin/tools/nsec3hash.html @@ -31,7 +31,7 @@
nsec3hash
{salt
} {algorithm
} {iterations
} {domain
}
nsec3hash generates an NSEC3 hash based on a set of NSEC3 parameters. This can be used to check the validity @@ -39,7 +39,7 @@
Table of Contents
The Berkeley Internet Name Domain (BIND) implements a @@ -81,13 +81,11 @@ BIND version 9 software package for system administrators.
-- This version of the manual corresponds to BIND version 9.10. -
+This version of the manual corresponds to BIND version 9.11.
In this document, Chapter 1 introduces the basic DNS and BIND concepts. Chapter 2 @@ -116,7 +114,7 @@
In this document, we use the following general typographic conventions: @@ -243,7 +241,7 @@
The purpose of this document is to explain the installation and upkeep of the BIND (Berkeley Internet @@ -253,7 +251,7 @@
The Domain Name System (DNS) is a hierarchical, distributed database. It stores information for mapping Internet host names to @@ -275,7 +273,7 @@
The data stored in the DNS is identified by domain names that are organized as a tree according to organizational or administrative boundaries. Each node of the tree, @@ -321,7 +319,7 @@
To properly operate a name server, it is important to understand the difference between a zone @@ -374,7 +372,7 @@
Each zone is served by at least one authoritative name server, @@ -391,7 +389,7 @@
The authoritative server where the master copy of the zone data is maintained is called the @@ -411,7 +409,7 @@
The other authoritative servers, the slave servers (also known as secondary servers) @@ -427,7 +425,7 @@
Usually all of the zone's authoritative servers are listed in NS records in the parent zone. These NS records constitute @@ -462,7 +460,7 @@
The resolver libraries provided by most operating systems are stub resolvers, meaning that they are not @@ -489,7 +487,7 @@
Even a caching name server does not necessarily perform the complete recursive lookup itself. Instead, it can @@ -516,7 +514,7 @@
The BIND name server can simultaneously act as @@ -558,5 +556,6 @@ +
BIND Version 9.11