From 868bab483079a7fc41dfa76712eada93eb7a4184 Mon Sep 17 00:00:00 2001
From: Tinderbox User named-checkconf
checks the syntax, but not the semantics, of a
named configuration file. The file is parsed
@@ -52,7 +52,7 @@
named-checkconf
returns an exit status of 1 if
errors were detected and 0 otherwise.
named-checkzone
checks the syntax and integrity of a zone file. It performs the
same checks as named does when loading a
@@ -53,7 +53,7 @@
named-checkzone
returns an exit status of 1 if
errors were detected and 0 otherwise.
tsig-keygen and ddns-confgen
are invocation methods for a utility that generates keys for use
@@ -68,7 +68,7 @@
rndc-confgen
generates configuration files
for rndc. It can be used as a
@@ -48,7 +48,7 @@
delv
(Domain Entity Lookup & Validation) is a tool for sending
DNS queries and validating the results, using the the same internal
@@ -78,7 +78,7 @@
delv
provides a number of query options which affect the way results are
displayed, and in some cases the way lookups are performed.
@@ -447,12 +447,12 @@
dig(1),
named(8),
RFC4034,
diff --git a/bin/dig/dig.html b/bin/dig/dig.html
index d1d735982b..7514acfe8e 100644
--- a/bin/dig/dig.html
+++ b/bin/dig/dig.html
@@ -34,7 +34,7 @@
dig
(domain information groper) is a flexible tool
for interrogating DNS name servers. It performs DNS lookups and
@@ -81,7 +81,7 @@
The dig
provides a number of query options which affect
the way in which lookups are made and the results displayed. Some of
@@ -618,7 +618,7 @@
The BIND 9 implementation of dig
supports
@@ -664,7 +664,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
If dig has been built with IDN (internationalized
domain name) support, it can accept and display non-ASCII domain names.
@@ -678,14 +678,14 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
host(1),
named(8),
dnssec-keygen(8),
@@ -693,7 +693,7 @@ dig +qr www.isc.org any -x 127.0.0.1 isc.org ns +noqr
There are probably too many query options.
host
is a simple utility for performing DNS lookups.
It is normally used to convert names to IP addresses and vice versa.
@@ -188,7 +188,7 @@
If host has been built with IDN (internationalized
domain name) support, it can accept and display non-ASCII domain names.
@@ -202,12 +202,12 @@
dig(1),
named(8).
nslookup — query Internet name servers interactively Nslookup
is a program to query Internet domain name servers. Nslookup
has two modes: interactive and non-interactive. Interactive mode allows
@@ -43,7 +43,7 @@
Interactive mode is entered in the following cases:
Andrew Cherenson
dnssec-dsfromkey
outputs the Delegation Signer (DS) resource record (RR), as defined in
RFC 3658 and RFC 4509, for the given key(s).
The keyfile can be designed by the key identification
dnssec-keygen(8),
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
@@ -170,7 +170,7 @@
A keyfile can be designed by the key identification
dnssec-keygen(8),
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
@@ -141,7 +141,7 @@
dnssec-keyfromlabel
generates a key pair of files that referencing a key object stored
in a cryptographic hardware service module (HSM). The private key
@@ -47,7 +47,7 @@
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS.
If the argument begins with a '+' or '-', it is interpreted as
@@ -296,7 +296,7 @@
When dnssec-keyfromlabel completes
successfully,
@@ -335,7 +335,7 @@
dnssec-keygen(8),
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
@@ -344,7 +344,7 @@
dnssec-keygen
generates keys for DNSSEC (Secure DNS), as defined in RFC 2535
and RFC 4034. It can also generate keys for use with
@@ -46,7 +46,7 @@
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS.
If the argument begins with a '+' or '-', it is interpreted as
@@ -341,7 +341,7 @@
To generate a 768-bit DSA key for the domain
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
RFC 2539,
@@ -417,7 +417,7 @@
dnssec-revoke
reads a DNSSEC key file, sets the REVOKED bit on the key as defined
in RFC 5011, and creates a new pair of key files containing the
@@ -39,7 +39,7 @@
dnssec-settime
reads a DNSSEC private key file and sets the key timing metadata
as specified by the
Dates can be expressed in the format YYYYMMDD or YYYYMMDDHHMMSS.
If the argument begins with a '+' or '-', it is interpreted as
@@ -191,7 +191,7 @@
dnssec-settime can also be used to print the
timing metadata associated with a key.
@@ -217,7 +217,7 @@
dnssec-keygen(8),
dnssec-signzone(8),
BIND 9 Administrator Reference Manual,
@@ -225,7 +225,7 @@
dnssec-signzone
signs a zone. It generates
NSEC and RRSIG records and produces a signed version of the
@@ -43,7 +43,7 @@
The following command signs the dnssec-verify
verifies that a zone is fully signed for each algorithm found
in the DNSKEY RRset for the zone, and that the NSEC / NSEC3
@@ -39,7 +39,7 @@
lwresd — lightweight resolver daemon lwresd
is the daemon providing name lookup
services to clients that use the BIND 9 lightweight resolver
@@ -67,7 +67,7 @@
named(8),
named-checkconf(8),
rndc(8),
diff --git a/bin/named/named.html b/bin/named/named.html
index 53e2afbb4e..d311847fa0 100644
--- a/bin/named/named.html
+++ b/bin/named/named.html
@@ -32,7 +32,7 @@
named
is a Domain Name System (DNS) server,
part of the BIND 9 distribution from ISC. For more
@@ -47,7 +47,7 @@
In routine operation, signals should not be used to control
the nameserver; rndc should be used
@@ -279,7 +279,7 @@
The named configuration file is too complex
to describe in detail here. A complete description is provided
@@ -296,7 +296,7 @@
nsupdate
is used to submit Dynamic DNS Update requests as defined in RFC 2136
to a name server.
@@ -218,7 +218,7 @@
The TSIG key is redundantly stored in two separate files.
This is a consequence of nsupdate using the DST library
diff --git a/bin/python/dnssec-checkds.html b/bin/python/dnssec-checkds.html
index 22986bbc2e..91cecd5f9e 100644
--- a/bin/python/dnssec-checkds.html
+++ b/bin/python/dnssec-checkds.html
@@ -32,7 +32,7 @@
dnssec-checkds
verifies the correctness of Delegation Signer (DS) or DNSSEC
Lookaside Validation (DLV) resource records for keys in a specified
@@ -40,7 +40,7 @@
dnssec-coverage
verifies that the DNSSEC keys for a given zone or a set of zones
have timing metadata set properly to ensure no future lapses in DNSSEC
@@ -60,7 +60,7 @@
The name server must be configured to accept rndc connections and
to recognize the key specified in the rndc
controls the operation of a name
server. It supersedes the ndc utility
@@ -63,7 +63,7 @@
A list of commands supported by rndc can
be seen by running rndc without arguments.
@@ -519,7 +519,7 @@
There is currently no way to provide the shared secret for a
arpaname translates IP addresses (IPv4 and
IPv6) to the corresponding IN-ADDR.ARPA or IP6.ARPA names.
genrandom
generates a file or a set of files containing a specified quantity
@@ -40,7 +40,7 @@
Versions of BIND 9 up to and including BIND 9.6 had a bug causing
HMAC-SHA* TSIG keys which were longer than the digest length of the
@@ -57,7 +57,7 @@
Secrets that have been converted by isc-hmac-fixup
are shortened, but as this is how the HMAC protocol works in
@@ -68,14 +68,14 @@
named-journalprint
prints the contents of a zone journal file in a human-readable
@@ -57,7 +57,7 @@
named-rrchecker
read a individual DNS resource record from standard input and checks if it
is syntactically correct.
@@ -60,7 +60,7 @@
RFC 1034,
RFC 1035,
diff --git a/bin/tools/nsec3hash.html b/bin/tools/nsec3hash.html
index 3972733584..acb83e6ee1 100644
--- a/bin/tools/nsec3hash.html
+++ b/bin/tools/nsec3hash.html
@@ -31,7 +31,7 @@
nsec3hash generates an NSEC3 hash based on
a set of NSEC3 parameters. This can be used to check the validity
@@ -39,7 +39,7 @@
named-checkconf [-h] [-v] [-j] [-t ] {filename} [directory-p] [-x] [-z]DESCRIPTION
+DESCRIPTION
RETURN VALUES
+RETURN VALUES
named-compilezone [-d] [-j] [-q] [-v] [-c ] [class-C ] [mode-f ] [format-F ] [format-J ] [filename-i ] [mode-k ] [mode-m ] [mode-n ] [mode-l ] [ttl-L ] [serial-r ] [mode-s ] [style-t ] [directory-T ] [mode-w ] [directory-D] [-W ] {mode-o } {zonename} {filename}filenameDESCRIPTION
+DESCRIPTION
RETURN VALUES
+RETURN VALUES
ddns-confgen [-a ] [algorithm-h] [-k ] [keyname-q] [-r ] [ -s randomfilename | -z zone ]DESCRIPTION
+DESCRIPTION
rndc-confgen [-a] [-A ] [algorithm-b ] [keysize-c ] [keyfile-h] [-k ] [keyname-p ] [port-r ] [randomfile-s ] [address-t ] [chrootdir-u ]userDESCRIPTION
+DESCRIPTION
delv [queryopt...] [query...]DESCRIPTION
+DESCRIPTION
QUERY OPTIONS
+QUERY OPTIONS
SEE ALSO
+SEE ALSO
dig [global-queryopt...] [query...]DESCRIPTION
+DESCRIPTION
OPTIONS
+OPTIONS
-b option sets the source IP address of the query
to address. This must be a valid
@@ -242,7 +242,7 @@
QUERY OPTIONS
+QUERY OPTIONS
MULTIPLE QUERIES
+MULTIPLE QUERIES
IDN SUPPORT
+IDN SUPPORT
SEE ALSO
+SEE ALSO
BUGS
+BUGS
host [-aCdlnrsTwv] [-c ] [class-N ] [ndots-R ] [number-t ] [type-W ] [wait-m ] [flag-4] [-6] [-v] [-V] {name} [server]DESCRIPTION
+DESCRIPTION
IDN SUPPORT
+IDN SUPPORT
SEE ALSO
+SEE ALSO
Name
nslookup [-option] [name | -] [server]DESCRIPTION
+DESCRIPTION
ARGUMENTS
+ARGUMENTS
INTERACTIVE COMMANDS
+INTERACTIVE COMMANDS
host [server]Author
+Author
dnssec-dsfromkey [-h] [-V]DESCRIPTION
+DESCRIPTION
FILES
+FILES
Knnnn.+aaa+iiiii or the full file name
@@ -154,13 +154,13 @@
SEE ALSO
+SEE ALSO
dnssec-importkey {-f } [filename-K ] [directory-L ] [ttl-P ] [date/offset-D ] [date/offset-h] [-v ] [level-V] [dnsname]FILES
+FILES
Knnnn.+aaa+iiiii or the full file name
@@ -133,7 +133,7 @@
SEE ALSO
+SEE ALSO
dnssec-keyfromlabel {-l label} [-3] [-a ] [algorithm-A ] [date/offset-c ] [class-D ] [date/offset-E ] [engine-f ] [flag-G] [-I ] [date/offset-i ] [interval-k] [-K ] [directory-L ] [ttl-n ] [nametype-P ] [date/offset-p ] [protocol-R ] [date/offset-S ] [key-t ] [type-v ] [level-V] [-y] {name}DESCRIPTION
+DESCRIPTION
TIMING OPTIONS
+TIMING OPTIONS
GENERATED KEY FILES
+GENERATED KEY FILES
SEE ALSO
+SEE ALSO
dnssec-keygen [-a ] [algorithm-b ] [keysize-n ] [nametype-3] [-A ] [date/offset-C] [-c ] [class-D ] [date/offset-E ] [engine-f ] [flag-G] [-g ] [generator-h] [-I ] [date/offset-i ] [interval-K ] [directory-L ] [ttl-k] [-P ] [date/offset-p ] [protocol-q] [-R ] [date/offset-r ] [randomdev-S ] [key-s ] [strength-t ] [type-v ] [level-V] [-z] {name}DESCRIPTION
+DESCRIPTION
TIMING OPTIONS
+TIMING OPTIONS
EXAMPLE
+EXAMPLE
example.com, the following command would be
@@ -408,7 +408,7 @@
SEE ALSO
+SEE ALSO
dnssec-revoke [-hr] [-v ] [level-V] [-K ] [directory-E ] [engine-f] [-R] {keyfile}DESCRIPTION
+DESCRIPTION
dnssec-settime [-f] [-K ] [directory-L ] [ttl-P ] [date/offset-A ] [date/offset-R ] [date/offset-I ] [date/offset-D ] [date/offset-h] [-V] [-v ] [level-E ] {keyfile}engineDESCRIPTION
+DESCRIPTION
-P, -A,
@@ -57,7 +57,7 @@
TIMING OPTIONS
+TIMING OPTIONS
PRINTING OPTIONS
+PRINTING OPTIONS
SEE ALSO
+SEE ALSO
dnssec-signzone [-a] [-c ] [class-d ] [directory-D] [-E ] [engine-e ] [end-time-f ] [output-file-g] [-h] [-K ] [directory-k ] [key-L ] [serial-l ] [domain-M ] [domain-i ] [interval-I ] [input-format-j ] [jitter-N ] [soa-serial-format-o ] [origin-O ] [output-format-P] [-p] [-R] [-r ] [randomdev-S] [-s ] [start-time-T ] [ttl-t] [-u] [-v ] [level-V] [-X ] [extended end-time-x] [-z] [-3 ] [salt-H ] [iterations-A] {zonefile} [key...]DESCRIPTION
+DESCRIPTION
EXAMPLE
+EXAMPLE
example.com
zone with the DSA key generated by dnssec-keygen
@@ -521,14 +521,14 @@ db.example.com.signed
%
dnssec-verify [-c ] [class-E ] [engine-I ] [input-format-o ] [origin-v ] [level-V] [-x] [-z] {zonefile}DESCRIPTION
+DESCRIPTION
Name
lwresd [-c ] [config-file-C ] [config-file-d ] [debug-level-f] [-g] [-i ] [pid-file-m ] [flag-n ] [#cpus-P ] [port-p ] [port-s] [-t ] [directory-u ] [user-v] [-4] [-6]DESCRIPTION
+DESCRIPTION
Name
named.conf — configuration file for namednamed.conf DESCRIPTION
+DESCRIPTION
named.conf is the configuration file
for
named. Statements are enclosed
@@ -50,14 +50,14 @@
MASTERS
+MASTERS
masters string [ port integer ] {
( masters | ipv4_address [port integer] |
@@ -75,7 +75,7 @@ masters
SERVER
+SERVER
server ( ipv4_address[/prefixlen] | ipv6_address[/prefixlen] ) {
bogus boolean;
@@ -97,7 +97,7 @@ server
TRUSTED-KEYS
+TRUSTED-KEYS
trusted-keys {
domain_name flags protocol algorithm key; ...
@@ -105,7 +105,7 @@ trusted-keys
MANAGED-KEYS
+MANAGED-KEYS
managed-keys {
domain_name initial-key flags protocol algorithm key; ...
@@ -113,7 +113,7 @@ managed-keys
CONTROLS
+CONTROLS
controls {
inet ( ipv4_address | ipv6_address | * )
@@ -125,7 +125,7 @@ controls
VIEW
+VIEW
view string optional_class {
match-clients { address_match_element; ... };
@@ -527,7 +527,7 @@ view
ZONE
+ZONE
zone string optional_class {
type ( master | slave | stub | hint | redirect |
@@ -624,12 +624,12 @@ zone
SEE ALSO
+SEE ALSO
named [-4] [-6] [-c ] [config-file-d ] [debug-level-D ] [string-E ] [engine-name-f] [-g] [-m ] [flag-n ] [#cpus-p ] [port-s] [-S ] [#max-socks-t ] [directory-U ] [#listeners-u ] [user-v] [-V] [-x ]cache-fileDESCRIPTION
+DESCRIPTION
SIGNALS
+SIGNALS
CONFIGURATION
+CONFIGURATION
nsupdate [-d] [-D] [[-g] | [-o] | [-l] | [-y ] | [[hmac:]keyname:secret-k ]] [keyfile-t ] [timeout-u ] [udptimeout-r ] [udpretries-R ] [randomdev-v] [-T] [-P] [-V] [filename]DESCRIPTION
+DESCRIPTION
BUGS
+BUGS
dnssec-dsfromkey [-l ] [domain-f ] [file-d ] [dig path-D ] {zone}dsfromkey pathDESCRIPTION
+DESCRIPTION
dnssec-coverage [-K ] [directory-l ] [length-f ] [file-d ] [DNSKEY TTL-m ] [max TTL-r ] [interval-c ] [compilezone path-k] [-z] [zone]DESCRIPTION
+DESCRIPTION
rndc.conf DESCRIPTION
+DESCRIPTION
rndc.conf is the configuration file
for rndc, the BIND 9 name server control
utility. This file has a similar structure and syntax to
@@ -118,7 +118,7 @@
NAME SERVER CONFIGURATION
+NAME SERVER CONFIGURATION
rndc.conf
@@ -202,7 +202,7 @@
rndc [-b ] [source-address-c ] [config-file-k ] [key-file-s ] [server-p ] [port-q] [-V] [-y ] {command}key_idDESCRIPTION
+DESCRIPTION
COMMANDS
+COMMANDS
LIMITATIONS
+LIMITATIONS
key_id without using the configuration file.
@@ -529,7 +529,7 @@
arpaname {ipaddress ...}DESCRIPTION
+DESCRIPTION
genrandom [-n ] {numbersize} {filename}DESCRIPTION
+DESCRIPTION
isc-hmac-fixup {algorithm} {secret}DESCRIPTION
+DESCRIPTION
SECURITY CONSIDERATIONS
+SECURITY CONSIDERATIONS
named-journalprint {journal}DESCRIPTION
+DESCRIPTION
named-rrchecker [-h] [-o ] [origin-p] [-u] [-C] [-T] [-P]DESCRIPTION
+DESCRIPTION
SEE ALSO
+SEE ALSO
nsec3hash {salt} {algorithm} {iterations} {domain}DESCRIPTION
+DESCRIPTION
The Berkeley Internet Name Domain (BIND) implements a @@ -87,7 +87,7 @@
In this document, Chapter 1 introduces the basic DNS and BIND concepts. Chapter 2 @@ -116,7 +116,7 @@
In this document, we use the following general typographic conventions: @@ -243,7 +243,7 @@
The purpose of this document is to explain the installation and upkeep of the BIND (Berkeley Internet @@ -253,7 +253,7 @@
The Domain Name System (DNS) is a hierarchical, distributed database. It stores information for mapping Internet host names to @@ -275,7 +275,7 @@
The data stored in the DNS is identified by domain names that are organized as a tree according to organizational or administrative boundaries. Each node of the tree, @@ -321,7 +321,7 @@
To properly operate a name server, it is important to understand the difference between a zone @@ -374,7 +374,7 @@
Each zone is served by at least one authoritative name server, @@ -391,7 +391,7 @@
The authoritative server where the master copy of the zone data is maintained is called the @@ -411,7 +411,7 @@
The other authoritative servers, the slave servers (also known as secondary servers) @@ -427,7 +427,7 @@
Usually all of the zone's authoritative servers are listed in NS records in the parent zone. These NS records constitute @@ -462,7 +462,7 @@
The resolver libraries provided by most operating systems are stub resolvers, meaning that they are not @@ -489,7 +489,7 @@
Even a caching name server does not necessarily perform the complete recursive lookup itself. Instead, it can @@ -516,7 +516,7 @@
The BIND name server can simultaneously act as @@ -558,5 +558,6 @@ +
BIND Version 9.10