source: server/major/bind.xml@ 98a83b1

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts lazarus lxqt plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since 98a83b1 was 98a83b1, checked in by Bruce Dubbs <bdubbs@…>, 4 years ago

Update to bind-9.16.4

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@23295 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 32.6 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!ENTITY bind-download-http " ">
8 <!ENTITY bind-download-ftp "ftp://ftp.isc.org/isc/bind9/&bind-version;/bind-&bind-version;.tar.xz">
9 <!ENTITY bind-md5sum "35c9ac52b75232e9e6b96265bebca616">
10 <!ENTITY bind-size "3.3 MB">
11 <!ENTITY bind-buildsize "106 MB (22 MB installed)">
12 <!ENTITY bind-time "0.8 SBU (with parallelism=4; add 34+ minutes, processor independent, to run the complete test suite)">
13]>
14
15<sect1 id="bind" xreflabel="BIND-&bind-version;">
16 <?dbhtml filename="bind.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
23 <title>BIND-&bind-version;</title>
24
25 <indexterm zone="bind">
26 <primary sortas="a-BIND">BIND</primary>
27 </indexterm>
28
29 <sect2 role="package">
30 <title>Introduction to BIND</title>
31
32 <para>
33 The <application>BIND</application> package provides a DNS server
34 and client utilities. If you are only interested in the utilities, refer
35 to the <xref linkend="bind-utils"/>.
36 </para>
37
38 &lfs91_checked;
39
40 <bridgehead renderas="sect3">Package Information</bridgehead>
41 <itemizedlist spacing="compact">
42 <listitem>
43 <para>
44 Download (HTTP): <ulink url="&bind-download-http;"/>
45 </para>
46 </listitem>
47 <listitem>
48 <para>
49 Download (FTP): <ulink url="&bind-download-ftp;"/>
50 </para>
51 </listitem>
52 <listitem>
53 <para>
54 Download MD5 sum: &bind-md5sum;
55 </para>
56 </listitem>
57 <listitem>
58 <para>
59 Download size: &bind-size;
60 </para>
61 </listitem>
62 <listitem>
63 <para>
64 Estimated disk space required: &bind-buildsize;
65 </para>
66 </listitem>
67 <listitem>
68 <para>
69 Estimated build time: &bind-time;
70 </para>
71 </listitem>
72 </itemizedlist>
73
74 <bridgehead renderas="sect3">BIND Dependencies</bridgehead>
75
76 <bridgehead renderas="sect4">Required</bridgehead>
77 <para role="required">
78 <xref linkend="libuv"/>
79 </para>
80
81 <bridgehead renderas="sect4">Recommended</bridgehead>
82 <para role="recommended">
83 <xref linkend="json-c"/> and
84 <xref linkend="libcap-pam"/>
85 </para>
86
87 <bridgehead renderas="sect4">Optional</bridgehead>
88 <para role="optional">
89 <xref linkend="libidn2"/>,
90 <xref linkend="libxml2"/>,
91 <xref linkend="mitkrb"/>,
92 <ulink url="https://cmocka.org/">cmocka</ulink>, and
93 <ulink url='https://github.com/cjheath/geoip'>geoip</ulink>
94 </para>
95
96 <bridgehead renderas="sect4">Optional database backends</bridgehead>
97 <para role="optional">
98 <xref linkend="db"/>,
99 <xref linkend="mariadb"/> or <ulink url="http://www.mysql.com/">MySQL</ulink>,
100 <xref linkend="openldap"/>,
101 <xref linkend="postgresql"/>, and
102 <xref linkend="unixodbc"/>
103 </para>
104
105 <bridgehead renderas="sect4">Optional (to run the test suite)</bridgehead>
106 <para role="optional">
107 <xref linkend="perl-net-dns"/>
108 </para>
109
110 <bridgehead renderas="sect4">Optional (to rebuild the documentation)</bridgehead>
111 <para role="optional">
112 <xref linkend="doxygen"/>,
113 <xref linkend="libxslt"/>, and
114 <xref linkend="texlive"/> (or <xref linkend="tl-installer"/>)
115 </para>
116
117 <para condition="html" role="usernotes">User Notes:
118 <ulink url="&blfs-wiki;/bind"/></para>
119
120 </sect2>
121
122 <sect2 role="installation">
123 <title>Installation of BIND</title>
124
125 <para>
126 To ensure <application>BIND</application> will build dnssec-keymgr,
127 install a python module as the <systemitem
128 class="username">root</systemitem> user:
129 </para>
130
131<screen role="root"><userinput>pip3 install ply</userinput></screen>
132
133 <para>
134 Install <application>BIND</application> by running the
135 following commands:
136 </para>
137
138<screen><userinput>./configure --prefix=/usr \
139 --sysconfdir=/etc \
140 --localstatedir=/var \
141 --mandir=/usr/share/man \
142 --with-libtool \
143 --disable-static &amp;&amp;
144make</userinput></screen>
145
146 <para>
147 Issue the following commands to run the complete suite of tests.
148 First, as the <systemitem class="username">root</systemitem> user, set up
149 some test interfaces:
150 </para>
151
152 <note>
153 <para>
154 If IPv6 is not enabled in the kernel, there will be several
155 error messages: "RTNETLINK answers: Operation not permitted". These
156 messages do not affect the tests.
157 </para>
158 </note>
159
160<screen role="root"
161 remap="test"><userinput>bin/tests/system/ifconfig.sh up</userinput></screen>
162
163 <para>
164 The test suite may indicate some skipped tests depending on
165 what configuration options are used. Some tests are marked
166 <quote>UNTESTED</quote> if <xref linkend="perl-net-dns"/> is not
167 installed. To run the tests, as an unprivileged user, execute:
168 </para>
169
170<screen remap="test"><userinput>make -k check</userinput></screen>
171
172 <para>
173 Again as <systemitem class="username">root</systemitem>, clean up the
174 test interfaces:
175 </para>
176
177<screen role="root"
178 remap="test"><userinput>bin/tests/system/ifconfig.sh down</userinput></screen>
179
180 <para>
181 Finally, install the package as the <systemitem
182 class="username">root</systemitem> user:
183 </para>
184
185<screen role="root"><userinput>make install</userinput></screen>
186 </sect2>
187
188<!-- Documentation is an issue - The docs are now all in .rst format and appear
189to be sphinx based.
190-->
191
192 <sect2 role="commands">
193 <title>Command Explanations</title>
194
195 <para>
196 <parameter>--sysconfdir=/etc</parameter>: This parameter forces
197 <application>BIND</application> to look for configuration
198 files in <filename class='directory'>/etc</filename> instead of
199 <filename class='directory'>/usr/etc</filename>.
200 </para>
201
202 <para>
203 <parameter>--with-libtool</parameter>: This parameter forces the
204 building of dynamic libraries and links the installed binaries to these
205 libraries.
206 </para>
207
208 <para>
209 <option>--with-libidn2</option>: This parameter enables
210 the IDNA2008 (Internationalized Domain Names in Applications)
211 support.
212 </para>
213
214 <para>
215 <option>--enable-fetchlimit</option>: Use this option if you want
216 to be able to limit the rate of recursive client queries. This may be
217 useful on servers which receive a large number of queries.
218 </para>
219
220 <para>
221 <option>--disable-linux-caps</option>: BIND can also be built without
222 capability support by using this option, at the cost of some loss of
223 security.
224 </para>
225
226 <para>
227 <option>--with-dlz-{mysql,bdb,filesystem,ldap,odbc,stub}</option>: Use
228 one (or more) of those options to add Dynamically Loadable Zones support.
229 For more information refer to <ulink
230 url="http://bind-dlz.sourceforge.net/">bind-dlz.sourceforge.net</ulink>.
231 </para>
232
233 <xi:include xmlns:xi="http://www.w3.org/2001/XInclude"
234 href="../../xincludes/static-libraries.xml"/>
235
236 </sect2>
237
238 <sect2 role="configuration">
239 <title>Configuring BIND</title>
240
241 <sect3 id="bind-config">
242 <title>Config files</title>
243
244 <para>
245 <filename>named.conf</filename>,
246 <filename>root.hints</filename>,
247 <filename>127.0.0</filename>,
248 <filename>rndc.conf</filename>, and
249 <filename>resolv.conf</filename>
250 </para>
251
252 <indexterm zone="bind bind-config">
253 <primary sortas="e-etc-named.conf">/etc/named.conf</primary>
254 </indexterm>
255
256 <indexterm zone="bind bind-config">
257 <primary sortas="e-etc-rndc.conf">/etc/rndc.conf</primary>
258 </indexterm>
259
260 <indexterm zone="bind bind-config">
261 <primary sortas="e-etc-resolv.conf">/etc/resolv.conf</primary>
262 </indexterm>
263
264 <indexterm zone="bind bind-config">
265 <primary
266 sortas="e-etc-namedb-root.hints">/etc/namedb/root.hints</primary>
267 </indexterm>
268
269 <indexterm zone="bind bind-config">
270 <primary
271 sortas="e-etc-namedb-pz-127.0.0.0">/etc/namedb/pz/127.0.0.0</primary>
272 </indexterm>
273 </sect3>
274
275 <sect3>
276 <title>Configuration Information</title>
277
278 <para>
279 <application>BIND</application> will be configured to run in a
280 <command>chroot</command> jail as an unprivileged user (<systemitem
281 class="username">named</systemitem>). This configuration is more secure
282 in that a DNS compromise can only affect a few files in the <systemitem
283 class="username">named</systemitem> user's <envar>HOME</envar>
284 directory.
285 </para>
286
287 <para>
288 Create the unprivileged user and group <systemitem
289 class="username">named</systemitem>:
290 </para>
291
292<screen role="root"><userinput>groupadd -g 20 named &amp;&amp;
293useradd -c "BIND Owner" -g named -s /bin/false -u 20 named &amp;&amp;
294install -d -m770 -o named -g named /srv/named</userinput></screen>
295
296 <para>
297 Set up some files, directories and devices needed by
298 <application>BIND</application>:
299 </para>
300
301<screen role="root"><userinput>mkdir -p /srv/named &amp;&amp;
302cd /srv/named &amp;&amp;
303mkdir -p dev etc/named/{slave,pz} usr/lib/engines var/run/named &amp;&amp;
304mknod /srv/named/dev/null c 1 3 &amp;&amp;
305mknod /srv/named/dev/urandom c 1 9 &amp;&amp;
306chmod 666 /srv/named/dev/{null,urandom} &amp;&amp;
307cp /etc/localtime etc</userinput></screen>
308
309 <para>
310 The <filename>rndc.conf</filename> file contains information for
311 controlling <command>named</command> operations with the
312 <command>rndc</command> utility. Generate a key for use in the
313 <filename>named.conf</filename> and <filename>rdnc.conf</filename>
314 with the <command>rndc-confgen</command> command:
315 </para>
316
317<screen role="root"><userinput>rndc-confgen -a -b 512 -t /srv/named</userinput></screen>
318
319 <para>
320 Complete the <filename>named.conf</filename> file from which
321 <command>named</command> will read the location of zone files, root
322 name servers and secure DNS keys:
323 </para>
324
325<screen role="root"><?dbfo keep-together="auto"?><userinput>cat &gt;&gt; /srv/named/etc/named.conf &lt;&lt; "EOF"
326<literal>options {
327 directory "/etc/named";
328 pid-file "/var/run/named.pid";
329 statistics-file "/var/run/named.stats";
330
331};
332zone "." {
333 type hint;
334 file "root.hints";
335};
336zone "0.0.127.in-addr.arpa" {
337 type master;
338 file "pz/127.0.0";
339};
340
341// Bind 9 now logs by default through syslog (except debug).
342// These are the default logging rules.
343
344logging {
345 category default { default_syslog; default_debug; };
346 category unmatched { null; };
347
348 channel default_syslog {
349 syslog daemon; // send to syslog's daemon
350 // facility
351 severity info; // only send priority info
352 // and higher
353 };
354
355 channel default_debug {
356 file "named.run"; // write to named.run in
357 // the working directory
358 // Note: stderr is used instead
359 // of "named.run"
360 // if the server is started
361 // with the '-f' option.
362 severity dynamic; // log at the server's
363 // current debug level
364 };
365
366 channel default_stderr {
367 stderr; // writes to stderr
368 severity info; // only send priority info
369 // and higher
370 };
371
372 channel null {
373 null; // toss anything sent to
374 // this channel
375 };
376};</literal>
377EOF</userinput></screen>
378
379 <para>
380 Create a zone file with the following contents:
381 </para>
382
383<screen role="root"><userinput>cat &gt; /srv/named/etc/named/pz/127.0.0 &lt;&lt; "EOF"
384<literal>$TTL 3D
385@ IN SOA ns.local.domain. hostmaster.local.domain. (
386 1 ; Serial
387 8H ; Refresh
388 2H ; Retry
389 4W ; Expire
390 1D) ; Minimum TTL
391 NS ns.local.domain.
3921 PTR localhost.</literal>
393EOF</userinput></screen>
394
395 <para>
396 Create the <filename>root.hints</filename> file with the following
397 commands:
398 </para>
399
400 <note>
401 <para>
402 Caution must be used to ensure there are no leading spaces in
403 this file.
404 </para>
405 </note>
406
407<screen role="root"><userinput>cat &gt; /srv/named/etc/named/root.hints &lt;&lt; "EOF"
408<literal>. 6D IN NS A.ROOT-SERVERS.NET.
409. 6D IN NS B.ROOT-SERVERS.NET.
410. 6D IN NS C.ROOT-SERVERS.NET.
411. 6D IN NS D.ROOT-SERVERS.NET.
412. 6D IN NS E.ROOT-SERVERS.NET.
413. 6D IN NS F.ROOT-SERVERS.NET.
414. 6D IN NS G.ROOT-SERVERS.NET.
415. 6D IN NS H.ROOT-SERVERS.NET.
416. 6D IN NS I.ROOT-SERVERS.NET.
417. 6D IN NS J.ROOT-SERVERS.NET.
418. 6D IN NS K.ROOT-SERVERS.NET.
419. 6D IN NS L.ROOT-SERVERS.NET.
420. 6D IN NS M.ROOT-SERVERS.NET.
421A.ROOT-SERVERS.NET. 6D IN A 198.41.0.4
422A.ROOT-SERVERS.NET. 6D IN AAAA 2001:503:ba3e::2:30
423B.ROOT-SERVERS.NET. 6D IN A 192.228.79.201
424B.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:200::b
425C.ROOT-SERVERS.NET. 6D IN A 192.33.4.12
426C.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:2::c
427D.ROOT-SERVERS.NET. 6D IN A 199.7.91.13
428D.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:2d::d
429E.ROOT-SERVERS.NET. 6D IN A 192.203.230.10
430E.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:a8::e
431F.ROOT-SERVERS.NET. 6D IN A 192.5.5.241
432F.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:2f::f
433G.ROOT-SERVERS.NET. 6D IN A 192.112.36.4
434G.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:12::d0d
435H.ROOT-SERVERS.NET. 6D IN A 198.97.190.53
436H.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:1::53
437I.ROOT-SERVERS.NET. 6D IN A 192.36.148.17
438I.ROOT-SERVERS.NET. 6D IN AAAA 2001:7fe::53
439J.ROOT-SERVERS.NET. 6D IN A 192.58.128.30
440J.ROOT-SERVERS.NET. 6D IN AAAA 2001:503:c27::2:30
441K.ROOT-SERVERS.NET. 6D IN A 193.0.14.129
442K.ROOT-SERVERS.NET. 6D IN AAAA 2001:7fd::1
443L.ROOT-SERVERS.NET. 6D IN A 199.7.83.42
444L.ROOT-SERVERS.NET. 6D IN AAAA 2001:500:9f::42
445M.ROOT-SERVERS.NET. 6D IN A 202.12.27.33
446M.ROOT-SERVERS.NET. 6D IN AAAA 2001:dc3::35</literal>
447EOF</userinput></screen>
448
449 <para>
450 The <filename>root.hints</filename> file is a list of root name
451 servers. This file must be updated periodically with the
452 <command>dig</command> utility. A current copy of root.hints can be
453 obtained from <ulink url="ftp://rs.internic.net/domain/named.root" />.
454 For details, consult the "BIND 9 Administrator Reference Manual",
455 included in every source archive of BIND 9 distributed by ISC, in HTML
456 and PDF formats, also available at <ulink
457 url="ftp://ftp.isc.org/isc/bind9/cur/&bind-minor-version;/doc/arm/Bv9ARM.html">
458 BIND 9 Administrator Reference Manual</ulink>.
459 </para>
460
461 <para>
462 Create or modify <filename>resolv.conf</filename> to use the new
463 name server with the following commands:
464 </para>
465
466 <note>
467 <para>
468 Replace <replaceable>&lt;yourdomain.com&gt;</replaceable> with
469 your own valid domain name.
470 </para>
471 </note>
472
473<screen role="root"><userinput>cp /etc/resolv.conf /etc/resolv.conf.bak &amp;&amp;
474cat &gt; /etc/resolv.conf &lt;&lt; "EOF"
475<literal>search <replaceable>&lt;yourdomain.com&gt;</replaceable>
476nameserver 127.0.0.1</literal>
477EOF</userinput></screen>
478
479 <para>
480 Set permissions on the <command>chroot</command> jail with the
481 following command:
482 </para>
483
484<screen role="root"><userinput>chown -R named:named /srv/named</userinput></screen>
485
486 </sect3>
487
488 <sect3 id="bind-init">
489 <title><phrase revision="sysv">Boot Script</phrase>
490 <phrase revision="systemd">Systemd Unit</phrase></title>
491
492 <para>
493 To start the DNS server at boot, install the
494 <phrase revision="sysv"><filename>/etc/rc.d/init.d/bind</filename> init
495 script</phrase>
496 <phrase revision="systemd"><filename>named.service</filename>
497 unit</phrase> included in the
498 <xref linkend="bootscripts" revision="sysv"/>
499 <xref linkend="systemd-units" revision="systemd"/> package:
500 </para>
501
502 <indexterm zone="bind bind-init">
503 <primary sortas="f-bind">bind</primary>
504 </indexterm>
505
506<screen role="root" revision="sysv"><userinput>make install-bind</userinput></screen>
507<screen role="root" revision="systemd"><userinput>make install-named</userinput></screen>
508
509 <para>
510 Now start <application>BIND</application> with the following command:
511 </para>
512
513<screen role="root" revision="sysv"><userinput>/etc/rc.d/init.d/bind start</userinput></screen>
514<screen role="root" revision="systemd"><userinput>systemctl start named</userinput></screen>
515
516 </sect3>
517
518 <sect3>
519 <title>Testing BIND</title>
520
521 <para>
522 Test out the new <application>BIND</application> 9 installation.
523 First query the local host address with <command>dig</command>:
524 </para>
525
526<screen><userinput>dig -x 127.0.0.1</userinput></screen>
527
528 <para>
529 Now try an external name lookup, taking note of the speed
530 difference in repeated lookups due to the caching. Run the
531 <command>dig</command> command twice on the same address:
532 </para>
533
534<screen><userinput>dig www.&lfs-domainname; &amp;&amp;
535dig www.&lfs-domainname;</userinput></screen>
536
537 <para>
538 You can see almost instantaneous results with the named caching
539 lookups. Consult the <application>BIND</application> Administrator
540 Reference Manual located at
541 <ulink url="https://kb.isc.org/docs/bind-916-administrative-reference-manual"/>
542 for further configuration options.
543 </para>
544
545 </sect3>
546
547 </sect2>
548
549 <sect2 role="content">
550 <title>Contents</title>
551
552 <segmentedlist>
553 <segtitle>Installed Programs</segtitle>
554 <segtitle>Installed Libraries</segtitle>
555 <segtitle>Installed Directories</segtitle>
556
557 <seglistitem>
558
559 <seg>arpaname, bind9-config hardlinked to isc-config.sh, ddns-confgen,
560 delv, dig, dnssec-dsfromkey,
561 dnssec-importkey, dnssec-keyfromlabel, dnssec-keygen, dnssec-revoke,
562 dnssec-settime, dnssec-signzone, dnssec-verify, genrandom, host,
563 isc-hmac-fixup, lwresd hardlinked to named, named-checkconf,
564 named-checkzone, named-compilezone (symlink), named-journalprint,
565 named-rrchecker, nsec3hash, nslookup, nsupdate, rndc, rndc-confgen,
566 and tsig-keygen (symlink)</seg>
567
568 <seg>libbind9.so, libdns.so, libirs.so, libisc.so, libisccc.so,
569 libisccfg.so, and liblwres.so</seg>
570
571 <seg>/usr/include/{bind9,dns,dst,irs,isc,isccc,isccfg,lwres,pk11,pkcs11},
572 /usr/share/doc/bind-&bind-version; and /srv/named</seg>
573 </seglistitem>
574 </segmentedlist>
575
576 <variablelist>
577 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
578 <?dbfo list-presentation="list"?>
579 <?dbhtml list-presentation="table"?>
580
581 <varlistentry id="arpaname">
582 <term><command>arpaname</command></term>
583 <listitem>
584 <para>
585 translates IP addresses to the corresponding ARPA names.
586 </para>
587 <indexterm zone="bind arpaname">
588 <primary sortas="b-arpaname">arpaname</primary>
589 </indexterm>
590 </listitem>
591 </varlistentry>
592
593 <varlistentry id="bind9-config">
594 <term><command>bind9-config</command></term>
595 <listitem>
596 <para>
597 is hardlinked to <command>isc-config.sh</command>.
598 </para>
599 <indexterm zone="bind bind9-config">
600 <primary sortas="b-bind9-config">bind9-config</primary>
601 </indexterm>
602 </listitem>
603 </varlistentry>
604
605 <varlistentry id="ddns-confgen">
606 <term><command>ddns-confgen</command></term>
607 <listitem>
608 <para>
609 generates a key for use by nsupdate and named.
610 </para>
611 <indexterm zone="bind ddns-confgen">
612 <primary sortas="b-ddns-confgen">ddns-confgen</primary>
613 </indexterm>
614 </listitem>
615 </varlistentry>
616
617 <varlistentry id="delv">
618 <term><command>delv</command></term>
619 <listitem>
620 <para>
621 is a new debugging tool that is a successor to
622 <command>dig</command>.
623 </para>
624 <indexterm zone="bind delv">
625 <primary sortas="b-delv">delv</primary>
626 </indexterm>
627 </listitem>
628 </varlistentry>
629
630 <varlistentry id="dig">
631 <term><command>dig</command></term>
632 <listitem>
633 <para>
634 interrogates DNS servers.
635 </para>
636 <indexterm zone="bind dig">
637 <primary sortas="b-dig">dig</primary>
638 </indexterm>
639 </listitem>
640 </varlistentry>
641<!--
642 <varlistentry id="dnssec-checkds">
643 <term><command>dnssec-checkds</command></term>
644 <listitem>
645 <para>
646 is a DNSSEC delegation consistency checking tool.
647 </para>
648 <indexterm zone="bind dnssec-checkds">
649 <primary sortas="b-dnssec-checkds">dnssec-checkds</primary>
650 </indexterm>
651 </listitem>
652 </varlistentry>
653
654 <varlistentry id="dnssec-coverage">
655 <term><command>dnssec-coverage</command></term>
656 <listitem>
657 <para>
658 verifies that the DNSSEC keys for a given zone or a set of zones
659 have timing metadata set properly to ensure no future lapses
660 in DNSSEC coverage.
661 </para>
662 <indexterm zone="bind dnssec-coverage">
663 <primary sortas="b-dnssec-coverage">dnssec-coverage</primary>
664 </indexterm>
665 </listitem>
666 </varlistentry>-->
667
668 <varlistentry id="dnssec-dsfromkey">
669 <term><command>dnssec-dsfromkey</command></term>
670 <listitem>
671 <para>
672 outputs the Delegation Signer (DS) resource record (RR).
673 </para>
674 <indexterm zone="bind dnssec-dsfromkey">
675 <primary sortas="b-dnssec-dsfromkey">dnssec-dsfromkey</primary>
676 </indexterm>
677 </listitem>
678 </varlistentry>
679
680 <varlistentry id="dnssec-importkey">
681 <term><command>dnssec-importkey</command></term>
682 <listitem>
683 <para>
684 reads a public DNSKEY record and generates a pair of
685 .key/.private files.
686 </para>
687 <indexterm zone="bind dnssec-importkey">
688 <primary sortas="b-dnssec-importkey">dnssec-importkey</primary>
689 </indexterm>
690 </listitem>
691 </varlistentry>
692
693 <varlistentry id="dnssec-keyfromlabel">
694 <term><command>dnssec-keyfromlabel</command></term>
695 <listitem>
696 <para>
697 gets keys with the given label from a crypto hardware and builds
698 key files for DNSSEC.
699 </para>
700 <indexterm zone="bind dnssec-keyfromlabel">
701 <primary sortas="b-dnssec-keyfromlabel">dnssec-keyfromlabel</primary>
702 </indexterm>
703 </listitem>
704 </varlistentry>
705
706 <varlistentry id="dnssec-keygen">
707 <term><command>dnssec-keygen</command></term>
708 <listitem>
709 <para>
710 is a key generator for secure DNS.
711 </para>
712 <indexterm zone="bind dnssec-keygen">
713 <primary sortas="b-dnssec-keygen">dnssec-keygen</primary>
714 </indexterm>
715 </listitem>
716 </varlistentry>
717
718 <varlistentry id="dnssec-revoke">
719 <term><command>dnssec-revoke</command></term>
720 <listitem>
721 <para>
722 sets the REVOKED bit on a DNSSEC key.
723 </para>
724 <indexterm zone="bind dnssec-revoke">
725 <primary sortas="b-dnssec-revoke">dnssec-revoke</primary>
726 </indexterm>
727 </listitem>
728 </varlistentry>
729
730 <varlistentry id="dnssec-settime">
731 <term><command>dnssec-settime</command></term>
732 <listitem>
733 <para>
734 sets the key timing metadata for a DNSSEC key.
735 </para>
736 <indexterm zone="bind dnssec-settime">
737 <primary sortas="b-dnssec-settime">dnssec-settime</primary>
738 </indexterm>
739 </listitem>
740 </varlistentry>
741
742 <varlistentry id="dnssec-signzone">
743 <term><command>dnssec-signzone</command></term>
744 <listitem>
745 <para>
746 generates signed versions of zone files.
747 </para>
748 <indexterm zone="bind dnssec-signzone">
749 <primary sortas="b-dnssec-signzone">dnssec-signzone</primary>
750 </indexterm>
751 </listitem>
752 </varlistentry>
753
754 <varlistentry id="dnssec-verify">
755 <term><command>dnssec-verify</command></term>
756 <listitem>
757 <para>
758 verifies that a zone is fully signed for each algorithm found
759 in the DNSKEY RRset for the zone, and that the NSEC / NSEC3
760 chains are complete.
761 </para>
762 <indexterm zone="bind dnssec-verify">
763 <primary sortas="b-dnssec-verify">dnssec-verify</primary>
764 </indexterm>
765 </listitem>
766 </varlistentry>
767
768 <varlistentry id="genrandom">
769 <term><command>genrandom</command></term>
770 <listitem>
771 <para>
772 generates a file containing random data.
773 </para>
774 <indexterm zone="bind genrandom">
775 <primary sortas="b-genrandom">genrandom</primary>
776 </indexterm>
777 </listitem>
778 </varlistentry>
779
780 <varlistentry id="host">
781 <term><command>host</command></term>
782 <listitem>
783 <para>
784 is a utility for DNS lookups.
785 </para>
786 <indexterm zone="bind host">
787 <primary sortas="b-host">host</primary>
788 </indexterm>
789 </listitem>
790 </varlistentry>
791
792 <varlistentry id="isc-config.sh">
793 <term><command>isc-config.sh</command></term>
794 <listitem>
795 <para>
796 prints information related to the installed version of ISC BIND.
797 </para>
798 <indexterm zone="bind isc-config.sh">
799 <primary sortas="b-isc-config.sh">isc-config.sh</primary>
800 </indexterm>
801 </listitem>
802 </varlistentry>
803
804 <varlistentry id="isc-hmac-fixup">
805 <term><command>isc-hmac-fixup</command></term>
806 <listitem>
807 <para>
808 fixes HMAC keys generated by older versions of BIND.
809 </para>
810 <indexterm zone="bind isc-hmac-fixup">
811 <primary sortas="b-isc-hmac-fixup">isc-hmac-fixup</primary>
812 </indexterm>
813 </listitem>
814 </varlistentry>
815
816 <varlistentry id="lwresd">
817 <term><command>lwresd</command></term>
818 <listitem>
819 <para>
820 is a caching-only name server for local process use.
821 </para>
822 <indexterm zone="bind lwresd">
823 <primary sortas="b-lwresd">lwresd</primary>
824 </indexterm>
825 </listitem>
826 </varlistentry>
827
828 <varlistentry id="named">
829 <term><command>named</command></term>
830 <listitem>
831 <para>
832 is the name server daemon.
833 </para>
834 <indexterm zone="bind named">
835 <primary sortas="b-named">named</primary>
836 </indexterm>
837 </listitem>
838 </varlistentry>
839
840 <varlistentry id="named-checkconf">
841 <term><command>named-checkconf</command></term>
842 <listitem>
843 <para>
844 checks the syntax of <filename>named.conf</filename>
845 files.
846 </para>
847 <indexterm zone="bind named-checkconf">
848 <primary sortas="b-named-checkconf">named-checkconf</primary>
849 </indexterm>
850 </listitem>
851 </varlistentry>
852
853 <varlistentry id="named-checkzone">
854 <term><command>named-checkzone</command></term>
855 <listitem>
856 <para>
857 checks zone file validity.
858 </para>
859 <indexterm zone="bind named-checkzone">
860 <primary sortas="b-named-checkzone">named-checkzone</primary>
861 </indexterm>
862 </listitem>
863 </varlistentry>
864
865 <varlistentry id="named-compilezone">
866 <term><command>named-compilezone</command></term>
867 <listitem>
868 <para>
869 is similar to <command>named-checkzone</command>, but it always
870 dumps the zone contents to a specified file in a specified format.
871 </para>
872 <indexterm zone="bind named-compilezone">
873 <primary sortas="b-named-compilezone">named-compilezone</primary>
874 </indexterm>
875 </listitem>
876 </varlistentry>
877
878 <varlistentry id="named-journalprint">
879 <term><command>named-journalprint</command></term>
880 <listitem>
881 <para>
882 prints the zone journal in human-readable form.
883 </para>
884 <indexterm zone="bind named-journalprint">
885 <primary sortas="b-named-journalprint">named-journalprint</primary>
886 </indexterm>
887 </listitem>
888 </varlistentry>
889
890 <varlistentry id="named-rrchecker">
891 <term><command>named-rrchecker</command></term>
892 <listitem>
893 <para>
894 reads an individual DNS resource record from standard input and
895 checks if it is syntactically correct.
896 </para>
897 <indexterm zone="bind named-rrchecker">
898 <primary sortas="b-named-rrchecker">named-rrchecker</primary>
899 </indexterm>
900 </listitem>
901 </varlistentry>
902
903 <varlistentry id="nsec3hash">
904 <term><command>nsec3hash</command></term>
905 <listitem>
906 <para>
907 generates an NSEC3 hash based on a set of NSEC3 parameters.
908 </para>
909 <indexterm zone="bind nsec3hash">
910 <primary sortas="b-nsec3hash">nsec3hash</primary>
911 </indexterm>
912 </listitem>
913 </varlistentry>
914
915 <varlistentry id="nslookup">
916 <term><command>nslookup</command></term>
917 <listitem>
918 <para>
919 is a program used to query Internet domain nameservers.
920 </para>
921 <indexterm zone="bind nslookup">
922 <primary sortas="b-nslookup">nslookup</primary>
923 </indexterm>
924 </listitem>
925 </varlistentry>
926
927 <varlistentry id="nsupdate">
928 <term><command>nsupdate</command></term>
929 <listitem>
930 <para>
931 is used to submit DNS update requests.
932 </para>
933 <indexterm zone="bind nsupdate">
934 <primary sortas="b-nsupdate">nsupdate</primary>
935 </indexterm>
936 </listitem>
937 </varlistentry>
938
939 <varlistentry id="rndc">
940 <term><command>rndc</command></term>
941 <listitem>
942 <para>
943 controls the operation of <application>BIND</application>.
944 </para>
945 <indexterm zone="bind rndc">
946 <primary sortas="b-rndc">rndc</primary>
947 </indexterm>
948 </listitem>
949 </varlistentry>
950
951 <varlistentry id="rndc-confgen">
952 <term><command>rndc-confgen</command></term>
953 <listitem>
954 <para>
955 generates <filename>rndc.conf</filename> files.
956 </para>
957 <indexterm zone="bind rndc-confgen">
958 <primary sortas="b-rndc-confgen">rndc-confgen</primary>
959 </indexterm>
960 </listitem>
961 </varlistentry>
962
963 <varlistentry id="tsig-keygen">
964 <term><command>tsig-keygen</command></term>
965 <listitem>
966 <para>
967 is a symlink to <command>ddns-confgen</command>.
968 </para>
969 <indexterm zone="bind tsig-keygen">
970 <primary sortas="b-tsig-keygen">tsig-keygen</primary>
971 </indexterm>
972 </listitem>
973 </varlistentry>
974
975 </variablelist>
976
977 </sect2>
978
979</sect1>
Note: See TracBrowser for help on using the repository browser.