Bv9ARM.5.html revision 77071cec207e44f7ef91f0af03830ec3cd00294d
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML EXPERIMENTAL 970324//EN">
<HTML>
<HEAD>
<TITLE> Section 5. BINDv9 Configuration Reference</TITLE></HEAD>
<BODY BGCOLOR="#ffffff">
<OL>
<H1 CLASS="1Level">
<A NAME="pgfId=997350">
</A>
Section 5. BINDv9 Configuration Reference</H1>
</OL>
<P CLASS="2LevelContinued">
<A NAME="pgfId=997351">
</A>
BINDv9 configuration is broadly similar to BIND 8.x; however, there are a few new areas of configuration, such as views. BIND 8.x configuration files should work with few alterations in BINDv9, although more complex configurations should be reviewed to check if they can be more efficiently implemented using the new features found in BINDv9.</P>
<P CLASS="2LevelContinued">
<A NAME="pgfId=997352">
</A>
BIND 4.9.x configuration files can be converted to the new format by using the Perl script <EM CLASS="pathname">
from the BIND 8 release kit.</P>
<DIV>
<OL>
<H3 CLASS="2Level">
<A NAME="pgfId=997353">
</A>
5.1 Configuration file elements</H3>
</OL>
<P CLASS="2LevelContinued">
<A NAME="pgfId=997354">
</A>
Following is a list of elements used throughout the BIND configuration file documentation:</P>
<P CLASS="2LevelContinued">
<A NAME="pgfId=997410">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022979">
</A>
<EM CLASS="variable">
acl_name</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022981">
</A>
The name of an <EM CLASS="variable">
address_match_list</EM>
as defined by the <CODE CLASS="Program-Process">
acl</CODE>
statement.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022983">
</A>
<EM CLASS="variable">
address_match_list</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022985">
</A>
A list of one or more <EM CLASS="variable">
ip_addr</EM>
<CODE CLASS="Program-Process">
, </CODE>
<EM CLASS="variable">
ip_prefix</EM>
<CODE CLASS="Program-Process">
, </CODE>
<EM CLASS="variable">
key_id</EM>
<CODE CLASS="Program-Process">
, </CODE>
or <EM CLASS="variable">
acl_name</EM>
Address Match Lists</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022990">
</A>
<EM CLASS="variable">
domain_name</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022992">
</A>
A quoted string which will be used as a DNS name, for example <EM CLASS="grammar_literal">
"</EM>
<EM CLASS="URL">
my.test.domain</EM>
<EM CLASS="grammar_literal">
"</EM>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022994">
</A>
<EM CLASS="variable">
dotted_decimal</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022996">
</A>
One or more integers valued 0 through 255 separated only by dots (`.'), such as <CODE CLASS="Program-Process">
123</CODE>
, <CODE CLASS="Program-Process">
45.67</CODE>
or <CODE CLASS="Program-Process">
89.123.45.67</CODE>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1022998">
</A>
<EM CLASS="variable">
ip4_addr</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023000">
</A>
An IPv4 address with exactly four elements in <EM CLASS="variable">
dotted_decimal</EM>
notation.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023033">
</A>
<EM CLASS="variable">
ip6_addr</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023035">
</A>
An IPv6 address, like <CODE CLASS="Program-Process">
fe80::200:f8ff:fe01:9742</CODE>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023098">
</A>
<EM CLASS="variable">
ip_addr</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023100">
</A>
An <EM CLASS="variable">
ip4_addr</EM>
or<CODE CLASS="Program-Process">
</CODE>
<EM CLASS="variable">
ip6_addr</EM>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023002">
</A>
<EM CLASS="variable">
ip_port</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023004">
</A>
An IP port <EM CLASS="variable">
number</EM>
. <EM CLASS="variable">
number</EM>
is limited to 0 through 65535, with values below 1024 typically restricted to root-owned processes. In some cases an asterisk (`*') character can be used as a placeholder to select a random high-numbered port.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023006">
</A>
<EM CLASS="variable">
ip_prefix</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023008">
</A>
An IP network specified as an <EM CLASS="variable">
ip_addr</EM>
, followed by a slash (`/') and then the number of bits in the netmask. For example, <CODE CLASS="Program-Process">
127/8</CODE>
is the network <CODE CLASS="Program-Process">
127.0.0.0</CODE>
with netmask <CODE CLASS="Program-Process">
255.0.0.0</CODE>
and <CODE CLASS="Program-Process">
is network <CODE CLASS="Program-Process">
1.2.3.0</CODE>
with netmask <CODE CLASS="Program-Process">
255.255.255.240</CODE>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023010">
</A>
<EM CLASS="variable">
key_name</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023012">
</A>
A <EM CLASS="variable">
domain_name</EM>
representing the name of a shared key, to be used for transaction security.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023014">
</A>
<EM CLASS="variable">
number</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023016">
</A>
A non-negative integer with an entire range limited by the range of a C language signed integer (2,147,483,647 on a machine with 32 bit integers). Its acceptable value might further be limited by the context in which it is used.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023018">
</A>
<EM CLASS="variable">
path_name</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023020">
</A>
A quoted string which will be used as a pathname, such as <EM CLASS="grammar_literal">
"</EM>
<EM CLASS="pathname">
<EM CLASS="grammar_literal">
"</EM>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023022">
</A>
<EM CLASS="variable">
size_spec</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023024">
</A>
A number, the word <EM CLASS="variable">
unlimited</EM>
, or the word <EM CLASS="variable">
default</EM>
.</P>
<P CLASS="CellBody">
<A NAME="pgfId=1023025">
</A>
The maximum value of <EM CLASS="variable">
size_spec</EM>
is that of unsigned long integers on the machine. An <EM CLASS="variable">
unlimited</EM>
<EM CLASS="variable">
size_spec</EM>
requests unlimited use, or the maximum available amount. A <EM CLASS="variable">
default size_spec</EM>
uses the limit that was in force when the server was started.</P>
<P CLASS="CellBody">
<A NAME="pgfId=1023026">
</A>
A <EM CLASS="variable">
number</EM>
can optionally be followed by a scaling factor: <EM CLASS="variable">
K</EM>
or <EM CLASS="variable">
k</EM>
<CODE CLASS="Program-Process">
</CODE>
for kilobytes, <EM CLASS="variable">
M</EM>
or <EM CLASS="variable">
m</EM>
for megabytes, and <EM CLASS="variable">
G</EM>
or <EM CLASS="variable">
g</EM>
for gigabytes, which scale by 1024, 1024*1024, and 1024*1024*1024 respectively.</P>
<P CLASS="CellBody">
<A NAME="pgfId=1023027">
</A>
Integer storage overflow is currently silently ignored during conversion of scaled values, resulting in values less than intended, possibly even negative. Using <EM CLASS="variable">
unlimited</EM>
is the best way to safely set a really large number.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023029">
</A>
<EM CLASS="variable">
yes_or_no</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023031">
</A>
Either <EM CLASS="variable">
yes</EM>
or <EM CLASS="variable">
no</EM>
. The words <EM CLASS="variable">
true</EM>
and <EM CLASS="variable">
false</EM>
are also accepted, as are the numbers <EM CLASS="variable">
1</EM>
and <EM CLASS="variable">
0</EM>
.</P>
</TD>
</TR>
</TABLE>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997412">
</A>
5.1.1 <A NAME="28183">
</A>
Address Match Lists</H4>
</OL>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997413">
</A>
5.1.1.1 Syntax</H5>
</OL>
<PRE>
<CODE>
address_match_list = <VAR>address_match_list_element</VAR> ;
[ <VAR>address_match_list_element</VAR>; ... ]
address_match_list_element = [ <STRONG>!</STRONG> ] (<VAR>ip_address</VAR> [<STRONG>/</STRONG><VAR>length</VAR>] |
key <VAR>key_id</VAR> | <VAR>acl_name</VAR> | { <VAR>address_match_list</VAR> } )</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997415">
</A>
5.1.1.2 Definition and Usage</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997416">
</A>
Address match lists are primarily used to determine access control for various server operations. They are also used to define priorities for querying other nameservers and to set the addresses on which <CODE CLASS="Program-Process">
named</CODE>
will listen for queries. The elements which constitute an address match list can be any of the following:</P>
<UL>
<LI CLASS="4Level-bullet1">
<A NAME="pgfId=997417">
</A>
an IP address (IPv4 or IPv6)</LI>
<LI CLASS="4Level-bullet2">
<A NAME="pgfId=997418">
</A>
an IP prefix (in the "/"-notation)</LI>
<LI CLASS="4Level-bullet2">
<A NAME="pgfId=997419">
</A>
a key ID, as defined by the key statement</LI>
<LI CLASS="4Level-bullet2">
<A NAME="pgfId=997420">
</A>
the name of an address match list previously defined with the <CODE CLASS="Program-Process">
acl</CODE>
statment</LI>
<LI CLASS="4Level-bullet2">
<A NAME="pgfId=997421">
</A>
a nested address match list enclosed in braces</LI>
</UL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997422">
</A>
Elements can be negated with a leading exclamation mark ("!"), and the match list names "any", "none", "localhost" and "localnets" are predefined. More information on those names can be found in the description of the acl statement.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997423">
</A>
The addition of the key clause made the name of this syntactic element something of a misnomer, since security keys can be used to validate access without regard to a host or network address. Nonetheless, the term "address match list" is still used throughout the documentation.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997424">
</A>
When a given IP address or prefix is compared to an address match list, the list is traversed in order until an element matches. The interpretation of a match depends on whether the list is being used for access control, defining listen-on ports, or as a topology, and whether the element was negated.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997425">
</A>
When used as an access control list, a non-negated match allows access and a negated match denies access. If there is no match, access is denied. The clauses allow-query, allow-transfer, allow-update and blackhole all use address match lists like this. Similarly, the listen-on option will cause the server to not accept queries on any of the machine's addresses which do not match the list.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997426">
</A>
When used with the topology clause, a non-negated match returns a distance based on its position on the list (the closer the match is to the start of the list, the shorter the distance is between it and the server). A negated match will be assigned the maximum distance from the server. If there is no match, the address will get a distance which is further than any non-negated list element, and closer than any negated element.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997427">
</A>
Because of the first-match aspect of the algorithm, an element that defines a subset of another element in the list should come before the broader element, regardless of whether either is negated. For example, in<BR>
<CODE CLASS="Program-Process">
the 1.2.3.13 element is completely useless because the algorithm will match any lookup for 1.2.3.13 to the 1.2.3/24 element. Using <CODE CLASS="Program-Process">
fixes that problem by having 1.2.3.13 blocked by the negation but all other 1.2.3.* hosts fall through.</P>
</DIV>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997428">
</A>
5.1.2 Comment Syntax</H4>
</OL>
<P CLASS="2LevelContinued">
<A NAME="pgfId=997429">
</A>
The BINDv9 comment syntax allows for comments to appear anywhere that white space may appear in a BIND configuration file. To appeal to programmers of all kinds, they can be written in C, C++, or shell/perl constructs.</P>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997430">
</A>
5.1.2.1 Syntax</H5>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997431">
</A>
/* This is a BIND comment as in C */<BR>
// This is a BIND comment as in C++<BR>
# This is a BIND comment as in common UNIX shells and perl</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997432">
</A>
5.1.2.2 Definition and Usage</H5>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997433">
</A>
Comments may appear anywhere that whitespace may appear in a BIND configuration file.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997434">
</A>
C-style comments start with the two characters /* (slash, star) and end with */ (star, slash). Because they are completely delimited with these characters, they can be used to comment only a portion of a line or to span multiple lines.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997435">
</A>
C-style comments cannot be nested. For example, the following is not valid because the entire comment ends with the first */:</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997436">
</A>
/* This is the start of a comment.<BR>
This is still part of the comment.<BR>
/* This is an incorrect attempt at nesting a comment. */<BR>
This is no longer in any comment. */</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997437">
</A>
C++-style comments start with the two characters // (slash, slash) and continue to the end of the physical line. They cannot be continued across multiple physical lines; to have one logical comment span multiple lines, each line must use the // pair.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997438">
</A>
For example:</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997439">
</A>
// This is the start of a comment. The next line<BR>
// is a new comment, even though it is logically<BR>
// part of the previous comment.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997440">
</A>
Shell-style (or perl-style, if you prefer) comments start with the character # (number sign) and continue to the end of the physical line, like C++ comments.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997441">
</A>
For example:</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997442">
</A>
# This is the start of a comment. The next line<BR>
# is a new comment, even though it is logically<BR>
# part of the previous comment.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997443">
</A>
WARNING: you cannot use the semicolon (";") character to start a comment such as you would in a zone file. The semicolon indicates the end of a configuration statement.</P>
</DIV>
</DIV>
</DIV>
<DIV>
<OL>
<H3 CLASS="2Level">
<A NAME="pgfId=997445">
</A>
5.2 <A NAME="40894">
</A>
Configuration File Grammar</H3>
</OL>
<P CLASS="2LevelContinued">
<A NAME="pgfId=997446">
</A>
A BINDv9 configuration consists of statements and comments. Statements end with a semicolon. Statements and comments are the only elements that can appear without enclosing braces. Many statements contain a block of substatements, which are also terminated with a semicolon.</P>
<P CLASS="2LevelContinued">
<A NAME="pgfId=997447">
</A>
The following statements are supported:</P>
<P CLASS="2LevelContinued">
<A NAME="pgfId=1023879">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023840">
</A>
<CODE CLASS="Program-Process">
acl</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023842">
</A>
defines a named IP address matching list, for access control and other uses</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023844">
</A>
<CODE CLASS="Program-Process">
controls</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023846">
</A>
declares control channels to be used by the <CODE CLASS="Program-Process">
rndc</CODE>
utility</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023848">
</A>
<CODE CLASS="Program-Process">
include</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023850">
</A>
includes a file</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023852">
</A>
<CODE CLASS="Program-Process">
key</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023854">
</A>
specifies key information for use in authentication and authorization using TSIG. See <EM CLASS="pathname">
for more information.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023856">
</A>
<CODE CLASS="Program-Process">
logging</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023858">
</A>
specifies what the server logs, and where the log messages are sent</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023860">
</A>
<CODE CLASS="Program-Process">
options</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023862">
</A>
controls global server configuration options and sets defaults for other statements</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023864">
</A>
<CODE CLASS="Program-Process">
server</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023866">
</A>
sets certain configuration options on a per-server basis</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023868">
</A>
<CODE CLASS="Program-Process">
trusted-keys</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023870">
</A>
defines keys that are preconfigured into the server and implicitly trusted. See RFC 2535 for more information.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023872">
</A>
<CODE CLASS="Program-Process">
view</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023874">
</A>
defines a view</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023876">
</A>
<CODE CLASS="Program-Process">
zone</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023878">
</A>
defines a zone</P>
</TD>
</TR>
</TABLE>
<P CLASS="2LevelContinued">
<A NAME="pgfId=1023880">
</A>
The <CODE CLASS="Program-Process">
logging</CODE>
and <CODE CLASS="Program-Process">
options</CODE>
statements may only occur once per configuration.</P>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=1023881">
</A>
5.2.1 <CODE CLASS="Program-Process">
acl</CODE>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>
acl <VAR>acl-name</VAR> {
<VAR>address_match_list</VAR>
};</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997496">
</A>
5.2.2 <CODE CLASS="Program-Process">
acl</CODE>
<A NAME="14672">
</A>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997497">
</A>
The <CODE CLASS="Program-Process">
acl</CODE>
statement assigns a symbolic name to an address match list. It gets its name from a primary use of address match lists: Access Control Lists (ACLs).</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997498">
</A>
Note that an address match list's name must be defined with <CODE CLASS="Program-Process">
acl</CODE>
before it can be used elsewhere; no forward references are allowed.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997499">
</A>
The following ACLs are built-in:</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997517">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<H6 CLASS="CellBody21">
<A NAME="pgfId=997502">
</A>
<CODE CLASS="Program-Process">
any</CODE>
</H6>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997504">
</A>
Matches all hosts.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<H6 CLASS="CellBody21">
<A NAME="pgfId=997506">
</A>
<CODE CLASS="Program-Process">
none</CODE>
</H6>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997508">
</A>
Matches no hosts.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<H6 CLASS="CellBody21">
<A NAME="pgfId=997510">
</A>
<CODE CLASS="Program-Process">
localhost</CODE>
</H6>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997512">
</A>
Matches the IP addresses of all interfaces on the system.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<H6 CLASS="CellBody21">
<A NAME="pgfId=997514">
</A>
<CODE CLASS="Program-Process">
localnets</CODE>
</H6>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997516">
</A>
Matches any host on a network for which the system has an interface.</P>
</TD>
</TR>
</TABLE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997518">
</A>
5.2.3 <CODE CLASS="Program-Process">
control</CODE>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>
controls {
[ inet (<VAR>ip_addr</VAR>|*) port <VAR>ip_port</VAR> allow { <VAR>address_match_list</VAR> } ;
[ inet...;[...]]]
[ unix <VAR>string</VAR> permission <VAR>number</VAR> owner <VAR>number</VAR> group <VAR>number</VAR> ;
[ unix...;[..]]]
};</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997523">
</A>
5.2.4 <CODE CLASS="Program-Process">
controls</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997524">
</A>
The <CODE CLASS="Program-Process">
controls</CODE>
statement declares control channels to be used by system administrators to affect the operation of the local nameserver. These control channels are used by the <CODE CLASS="Program-Process">
ndc</CODE>
utility to send commands to and retrieve non-DNS results from a nameserver.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997525">
</A>
A UNIX control channel is a "first in first out" (FIFO) named pipe in the file system, and access to it is controlled by normal file system permissions. It is created by <CODE CLASS="Program-Process">
named</CODE>
with the specified file mode bits (see the <CODE CLASS="Program-Process">
chmod(1)</CODE>
manual page), user and group owner. Note that, unlike <CODE CLASS="Program-Process">
chmod</CODE>
, the mode bits specified for <CODE CLASS="Program-Process">
permission</CODE>
will normally have a leading <CODE CLASS="Program-Process">
0</CODE>
so the number is interpreted as octal. Also note that the user and group ownership specified as owner and group must be given as numbers, not names. It is recommended that the permissions be restricted to administrative personnel only to prevent random users on the system from having the ability to manage the local nameserver.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997526">
</A>
An <CODE CLASS="Program-Process">
inet</CODE>
control channel is a TCP/IP socket accessible to the Internet, created at the specified <CODE CLASS="Program-Process">
ip_port</CODE>
on the specified <CODE CLASS="Program-Process">
ip_addr</CODE>
. It is recommended that 127.0.0.1 be the only <CODE CLASS="Program-Process">
ip_addr</CODE>
used, and this only if you trust all non-privileged users on the local host to manage your nameserver.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1023964">
</A>
<EM CLASS="Emphasis">
The </EM>
<CODE CLASS="Program-Process">
controls</CODE>
<EM CLASS="Emphasis">
statement is not yet implemented in BINDv9. The server always listens for control connections on IP address 127.0.0.1, port 953.</EM>
</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997527">
</A>
5.2.5 <CODE CLASS="Program-Process">
include</CODE>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>
include <VAR>filename</VAR>;
</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997529">
</A>
5.2.6 <CODE CLASS="Program-Process">
include</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997530">
</A>
The <CODE CLASS="Program-Process">
include</CODE>
statement inserts the specified file at the point that the <CODE CLASS="Program-Process">
include</CODE>
statement is encountered. The <CODE CLASS="Program-Process">
include</CODE>
statement facilitates the administration of configuration files by permitting the reading or writing of some things but not others. For example, the statement could include private keys that are readable only by a nameserver.</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997531">
</A>
5.2.7 <CODE CLASS="Program-Process">
key</CODE>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>key <VAR>key_id</VAR> {
algorithm <VAR>string</VAR>;
secret <VAR>string</VAR>;
};
</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997536">
</A>
5.2.8 <CODE CLASS="Program-Process">
key</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997537">
</A>
The <CODE CLASS="Program-Process">
key</CODE>
statement defines a key ID which can be used in a server statement to associate an authentication method with a particular nameserver.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997538">
</A>
A key ID must be created with the <CODE CLASS="Program-Process">
key</CODE>
statement before it can be used in a server definition or an address match list.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997539">
</A>
The <EM CLASS="variable">
algorithm_id</EM>
is a string that specifies a security/authentication algorithm. The only algorithm currently supported with tsig authentication is <EM CLASS="variable">
hmac-md5</EM>
. The <EM CLASS="variable">
secret_string</EM>
is the secret to be used by the algorithm, and is treated as a base-64 encoded string.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997540">
</A>
The <CODE CLASS="Program-Process">
key</CODE>
statement is intended for use in transaction security. Unless included in a server statement, it is not used to sign any requests. It is used to verify requests matching the <CODE CLASS="Program-Process">
key_id</CODE>
and <CODE CLASS="Program-Process">
algorithm_id</CODE>
, and sign replies to those requests.</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997541">
</A>
5.2.9 <CODE CLASS="Program-Process">
logging</CODE>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>
logging {
[ channel <VAR>channel_name</VAR> {
( file <VAR>path name</VAR>
[ versions ( <VAR>number</VAR> | unlimited ) ]
[ size <VAR>size spec</VAR> ]
| syslog ( <STRONG>syslog_facility</STRONG> )
| <VAR>null</VAR> );
[ severity (<VAR>critical</VAR> | <VAR>error</VAR> | <VAR>warning</VAR> | <VAR>notice</VAR> |
<VAR>info</VAR> | <VAR>debug</VAR> [ level ] | <VAR>dynamic</VAR> ); ]
[ print-category <VAR>yes or no</VAR>; ]
[ print-severity <VAR>yes or no</VAR>; ]
[ print-time <VAR>yes or no</VAR>; ]
}; ]
[ category <VAR>category_name</VAR> {
channel_name ; [ <VAR>channel_name</VAR> ; ... ]
}; ]
...
};</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997554">
</A>
5.2.10 <CODE CLASS="Program-Process">
logging</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997555">
</A>
The <CODE CLASS="Program-Process">
logging</CODE>
statement configures a wide variety of logging options for the nameserver. Its <CODE CLASS="Program-Process">
channel</CODE>
phrase associates output methods, format options and severity levels with a name that can then be used with the <CODE CLASS="Program-Process">
category</CODE>
phrase to select how various classes of messages are logged.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997556">
</A>
Only one <CODE CLASS="Program-Process">
logging</CODE>
statement is used to define as many channels and categories as are wanted. If there are multiple <CODE CLASS="Program-Process">
logging</CODE>
statements in a configuration, the first defined determines the logging, and warnings are issued for the others via the default <CODE CLASS="Program-Process">
syslog</CODE>
. If there is no <CODE CLASS="Program-Process">
logging</CODE>
statement, the logging configuration will be:</P>
<PRE CLASS="3Level-fixed"><A NAME="pgfId=997558"></A>
</PRE>
<PRE>
<CODE>logging {
category default { default_syslog; default_debug; };
};</CODE>
</PRE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997565">
</A>
In BINDv9, the logging configuration is only established when the entire configuration file has been parsed. In BIND 8, it was established as soon as the <CODE CLASS="Program-Process">
logging</CODE>
statement was parsed. When the server is starting up, all logging messages regarding syntax errors in the configuration file go to the default channels, or to standard error if the <CODE CLASS="Program-Process">
-g</CODE>
option was specified.</P>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=1022605">
</A>
5.2.10.1 The <CODE CLASS="Program-Process">
channel</CODE>
Phrase</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022606">
</A>
All log output goes to one or more "channels"; you can make as many of them as you want.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022607">
</A>
Every channel definition must include a clause that says whether messages selected for the channel go to a file, to a particular syslog facility, or are discarded. It can optionally also limit the message severity level that will be accepted by the channel (the default is <CODE CLASS="Program-Process">
info</CODE>
), and whether to include a <CODE CLASS="Program-Process">
named</CODE>
-generated time stamp, the category name and/or severity level (the default is not to include any).</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022608">
</A>
The word <CODE CLASS="Program-Process">
null</CODE>
as the destination option for the channel will cause all messages sent to it to be discarded; in that case, other options for the channel are meaningless.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022609">
</A>
The <CODE CLASS="Program-Process">
file</CODE>
clause can include limitations both on how large the file is allowed to become, and how many versions of the file will be saved each time the file is opened.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022610">
</A>
The <CODE CLASS="Program-Process">
size</CODE>
option for files is simply a hard ceiling on log growth. If the file ever exceeds the size, then <CODE CLASS="Program-Process">
named</CODE>
will not write anything more to it until the file is reopened; exceeding the size does not automatically trigger a reopen. The default behavior is not to limit the size of the file.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022611">
</A>
If you use the <CODE CLASS="Program-Process">
version</CODE>
log file option, then <CODE CLASS="Program-Process">
named</CODE>
will retain that many backup versions of the file by renaming them when opening. For example, if you choose to keep 3 old versions of the file <EM CLASS="Optional-meta-syntax">
lamers.log</EM>
then just before it is opened <EM CLASS="Optional-meta-syntax">
lamers.log.1</EM>
is renamed to <EM CLASS="Optional-meta-syntax">
lames.log.2</EM>
, <EM CLASS="Optional-meta-syntax">
lamers.log.0</EM>
is renamed to <EM CLASS="Optional-meta-syntax">
lamers.log.1</EM>
, and <EM CLASS="Optional-meta-syntax">
lamers.log</EM>
is renamed to <EM CLASS="Optional-meta-syntax">
lamers.log.0</EM>
. No rolled versions are kept by default; any existing log file is simply appended. The <CODE CLASS="Program-Process">
unlimited</CODE>
keyword is synonymous with <CODE CLASS="Program-Process">
99</CODE>
in current BIND releases.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022612">
</A>
Example usage of the size and versions options:</P>
<PRE>
<CODE>
channel <VAR>an_example_level</VAR> {
print-time <VAR>yes</VAR>;
print-category <VAR>yes</VAR>;
};</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022614">
</A>
The argument for the <CODE CLASS="Program-Process">
syslog</CODE>
clause is a syslog facility as described in the <CODE CLASS="Program-Process">
syslog</CODE>
man page. How <CODE CLASS="Program-Process">
syslog</CODE>
will handle messages sent to this facility is described in the <CODE CLASS="Program-Process">
syslog.conf</CODE>
manual page. If you have a system which uses a very old version of <CODE CLASS="Program-Process">
syslog</CODE>
that only uses two arguments to the <CODE CLASS="Program-Process">
openlog()</CODE>
function, then this clause is silently ignored.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022615">
</A>
The <CODE CLASS="Program-Process">
severity</CODE>
clause works like <CODE CLASS="Program-Process">
syslog</CODE>
's "priorities," except that they can also be used if you are writing straight to a file rather than using <CODE CLASS="Program-Process">
syslog</CODE>
. Messages which are not at least of the severity level given will not be selected for the channel; messages of higher severity levels will be accepted.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022616">
</A>
If you are using <CODE CLASS="Program-Process">
syslog</CODE>
, then the <CODE CLASS="Program-Process">
syslog.conf</CODE>
priorities will also determine what eventually passes through. For example, defining a channel facility and severity as <CODE CLASS="Program-Process">
daemon</CODE>
and <CODE CLASS="Program-Process">
debug</CODE>
but only logging <CODE CLASS="Program-Process">
daemon.warning</CODE>
via <CODE CLASS="Program-Process">
syslog.conf</CODE>
will cause messages of severity <CODE CLASS="Program-Process">
info</CODE>
and <CODE CLASS="Program-Process">
notice</CODE>
to be dropped. If the situation were reversed, with <CODE CLASS="Program-Process">
named</CODE>
writing messages of only <CODE CLASS="Program-Process">
warning</CODE>
or higher, then <CODE CLASS="Program-Process">
syslogd</CODE>
would print all messages it received from the channel.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022617">
</A>
The server can supply extensive debugging information when it is in debugging mode. If the server's global debug level is greater than zero, then debugging mode will be active. The global debug level is set either by starting the <CODE CLASS="Program-Process">
named</CODE>
server with the "<CODE CLASS="Program-Process">
-d</CODE>
" flag followed by a positive integer, or by running <CODE CLASS="Program-Process">
rndc trace</CODE>
(<EM CLASS="Emphasis">
the latter method is not yet implemented</EM>
). The global debug level can be set to zero, and debugging mode turned off, by running <CODE CLASS="Program-Process">
ndc notrace</CODE>
. All debugging messages in the server have a debug level, and higher debug levels give more detailed output. Channels that specify a specific debug severity, e.g.</P>
<PRE>
<CODE> channel <VAR>specific_debug_level</VAR> {
file "<EM>foo</EM>";
severity debug 3;
};</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022619">
</A>
will get debugging output of level 3 or less any time the server is in debugging mode, regardless of the global debugging level. Channels with <CODE CLASS="Program-Process">
dynamic</CODE>
severity use the server's global level to determine what messages to print.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022620">
</A>
If <CODE CLASS="Program-Process">
print-time</CODE>
has been turned on, then the date and time will be logged. <CODE CLASS="Program-Process">
print-time</CODE>
may be specified for a <CODE CLASS="Program-Process">
syslog</CODE>
channel, but is usually pointless since <CODE CLASS="Program-Process">
syslog</CODE>
also prints the date and time. If <CODE CLASS="Program-Process">
print-category</CODE>
is requested, then the category of the message will be logged as well. Finally, if <CODE CLASS="Program-Process">
print-severity</CODE>
is on, then the severity level of the message will be logged. The <CODE CLASS="Program-Process">
print-</CODE>
options may be used in any combination, and will always be printed in the following order: time, category, severity. Here is an example where all three <CODE CLASS="Program-Process">
print-</CODE>
options are on:</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022621">
</A>
<CODE CLASS="Program-Process">
28-Feb-2000 15:05:32.863 general: notice: running</CODE>
</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022622">
</A>
There are four predefined channels that are used for <CODE CLASS="Program-Process">
named</CODE>
's default logging as follows. How they are used is described in the section <A HREF="Bv9ARM.5.html#36082" CLASS="XRef">
The category Phrase</A>
.</P>
<PRE>
<CODE>
channel default_syslog {
syslog daemon; // end to syslog's daemon facility
severity info; // only send priority info and higher
};
channel default_debug {
// the working directory
// Note: stderr is used instead of
// "named.run"
// if the server is started
// with the "-f" option.
severity dynamic // log at the server's
// current debug level
};
channel default_stderr { // writes to stderr
file "<stderr>"; // this is illustrative only;
// there's currently no way of
// specifying an internal file
// descriptor in the configuration
// language.
severity info; // only send priority info and higher
};
channel null {
null; // toss anything sent to this channel
};</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1038366">
</A>
The <CODE CLASS="Program-Process">
default_debug</CODE>
channel normally writes to a file <EM CLASS="pathname">
named.run</EM>
in the server's working directory. For security reasons, when the "<CODE CLASS="Program-Process">
-u</CODE>
"command line option is used, the <EM CLASS="pathname">
named.run</EM>
file is created only after <CODE CLASS="Program-Process">
named</CODE>
has changed to the new UID, and any debug output generated while <CODE CLASS="Program-Process">
named</CODE>
is starting up and still running as root is discarded. If you need to capture this output, you must run the server with the <CODE CLASS="Program-Process">
-g</CODE>
option and redirect standard error to a file.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1038348">
</A>
Once a channel is defined, it cannot be redefined. Thus you cannot alter the built-in channels directly, but you can modify the default logging by pointing categories at channels you have defined.</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=1022629">
</A>
5.2.10.2 <A NAME="36082">
</A>
The <CODE CLASS="Program-Process">
category</CODE>
Phrase</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022630">
</A>
There are many categories, so you can send the logs you want to see wherever you want, without seeing logs you don't want. If you don't specify a list of channels for a category, then log messages in that category will be sent to the <CODE CLASS="Program-Process">
default</CODE>
category instead. If you don't specify a default category, the following "default default" is used:</P>
<PRE>
<CODE> category default { default_syslog; default_debug; };
</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022632">
</A>
As an example, let's say you want to log security events to a file, but you also want keep the default logging behavior. You'd specify the following:</P>
<PRE>
<CODE>
channel <VAR>my_security_channel</VAR> {
file "<EM>my_security_file</EM>";
severity <VAR>info</VAR>;
};
category <VAR>security</VAR> {
<VAR>my_security_channel</VAR>;
default_syslog;
default_debug;
};
</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1022634">
</A>
To discard all messages in a category, specify the <CODE CLASS="Program-Process">
null</CODE>
channel:</P>
<PRE>
<CODE>
category lame-<VAR>servers</VAR> { <VAR>null</VAR>; };
category <VAR>cname</VAR> { <VAR>null</VAR>; };
</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1024497">
</A>
Following are the available categories and brief descriptions of the types of log information they contain. <EM CLASS="Emphasis">
This list is still subject to change.</EM>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024500">
</A>
<CODE CLASS="Program-Process">
default</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024502">
</A>
The default category defines the logging options for those categories where no specific configuration has been defined. If you do not define a default category, the following definition is used:<BR>
<EM CLASS="Command">
category default { default_syslog; default_debug; };</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024504">
</A>
<CODE CLASS="Program-Process">
general</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024506">
</A>
The catch-all. Many things still aren't classified into categories, and they all end up here.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024508">
</A>
<CODE CLASS="Program-Process">
database</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024510">
</A>
Messages relating to the databases used internally by the name server to store zone and cache data.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024512">
</A>
<CODE CLASS="Program-Process">
security</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024514">
</A>
Approval and denial of requests.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024516">
</A>
<CODE CLASS="Program-Process">
config</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024518">
</A>
Configuration file parsing and processing.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024520">
</A>
<CODE CLASS="Program-Process">
resolver</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024522">
</A>
DNS resolution, such as the recursive lookups performed on behalf of clients by a caching name server.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024524">
</A>
<CODE CLASS="Program-Process">
xfer-in</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024526">
</A>
Zone transfers the server is receiving.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024528">
</A>
<CODE CLASS="Program-Process">
xfer-out</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024530">
</A>
Zone transfers the server is sending.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024532">
</A>
<CODE CLASS="Program-Process">
notify</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024534">
</A>
The NOTIFY protocol.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024536">
</A>
<CODE CLASS="Program-Process">
client</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024538">
</A>
Processing of client requests.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024540">
</A>
<CODE CLASS="Program-Process">
network</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024542">
</A>
Network operations.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024544">
</A>
<CODE CLASS="Program-Process">
update</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024546">
</A>
Dynamic updates.</P>
</TD>
</TR>
</TABLE>
</DIV>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=1024547">
</A>
5.2.11 <CODE CLASS="Program-Process">
options</CODE>
Statement Grammar</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1024267">
</A>
This is the grammar of the <CODE CLASS="Program-Process">
option</CODE>
statement in the <EM CLASS="pathname">
named.conf</EM>
file:</P>
<PRE>
<CODE>options {
[ version <VAR>version_string</VAR>; ]
[ directory <VAR>path_name</VAR>; ]
[ named-xfer <VAR>path_name</VAR>; ]
[ tkey-domain <VAR>domainname</VAR>; ]
[ tkey-dhkey <VAR>keyname</VAR> <VAR>keyid</VAR>; ]
[ dump-file <VAR>path_name</VAR>; ]
[ memstatistics-file <VAR>path_name</VAR>; ]
[ pid-file <VAR>path_name</VAR>; ]
[ statistics-file <VAR>path_name</VAR>; ]
[ auth-nxdomain <VAR>yes_or_no</VAR>; ]
[ deallocate-on-exit <VAR>yes_or_no</VAR>; ]
[ dialup <VAR>yes_or_no</VAR>; ]
[ fake-iquery <VAR>yes_or_no</VAR>; ]
[ fetch-glue <VAR>yes_or_no</VAR>; ]
[ has-old-clients <VAR>yes_or_no</VAR>; ]
[ host-statistics <VAR>yes_or_no</VAR>; ]
[ multiple-cnames <VAR>yes_or_no</VAR>; ]
[ notify <VAR>yes_or_no</VAR>; ]
[ recursion <VAR>yes_or_no</VAR>; ]
[ rfc2308-type1 <VAR>yes_or_no</VAR>; ]
[ use-id-pool <VAR>yes_or_no</VAR>; ]
[ maintain-ixfr-base <VAR>yes_or_no</VAR>; ]
[ forward ( only | first ); ]
[ forwarders { [ <VAR>in_addr</VAR> ; [ <VAR>in_addr</VAR> ; ... ] ] }; ]
[ check-names ( master | slave | response )( warn | fail | ignore ); ]
[ allow-query { <VAR>address_match_list</VAR> }; ]
[ allow-transfer { <VAR>address_match_list</VAR> }; ]
[ allow-recursion { <VAR>address_match_list</VAR> }; ]
[ blackhole { <VAR>address_match_list</VAR> }; ]
[ listen-on [ port <VAR>ip_port</VAR> ] { <VAR>address_match_list</VAR> }; ]
[ query-source [ address ( <VAR>ip_addr</VAR> | * ) ] [ port ( <VAR>ip_port</VAR> | * ) ]; ]
[ max-transfer-time-in <VAR>number</VAR>; ]
[ max-transfer-time-out <VAR>number</VAR>; ]
[ max-transfer-idle-in <VAR>number</VAR>; ]
[ max-transfer-idle-out <VAR>number</VAR>; ]
[ tcp-clients <VAR>number</VAR>; ]
[ recursive-clients <VAR>number</VAR>; ]
[ serial-queries <VAR>number</VAR>; ]
[ transfer-format ( one-answer | many-answers ); ]
[ transfers-in <VAR>number</VAR>; ]
[ transfers-out <VAR>number</VAR>; ]
[ transfers-per-ns <VAR>number</VAR>; ]
[ transfer-source <VAR>ip_addr</VAR>; ]
[ also-notify { <VAR>ip_addr</VAR>; [ <VAR>ip_addr</VAR>; ... ] }; ]
[ max-ixfr-log-size <VAR>number</VAR>; ]
[ coresize <VAR>size_spec</VAR> ; ]
[ datasize <VAR>size_spec</VAR> ; ]
[ files <VAR>size_spec</VAR> ; ]
[ stacksize <VAR>size_spec</VAR> ; ]
[ cleaning-interval <VAR>number</VAR>; ]
[ heartbeat-interval <VAR>number</VAR>; ]
[ interface-interval <VAR>number</VAR>; ]
[ statistics-interval <VAR>number</VAR>; ]
[ topology { <VAR>address_match_list</VAR> }; ]
[ sortlist { <VAR>address_match_list</VAR> };]
[ rrset-order { <VAR>order_spec</VAR> ; [ <VAR>order_spec</VAR> ; ... ] ] };
[ lame-ttl <VAR>number</VAR>; ]
[ max-ncache-ttl <VAR>number</VAR>; ]
[ min-roots <VAR>number</VAR>; ]
[ use-ixfr <VAR>yes_or_no</VAR> ; ]
[ treat-cr-as-space <VAR>yes_or_no</VAR> ; ]
};
</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997632">
</A>
5.2.12 <CODE CLASS="Program-Process">
options</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997633">
</A>
The <CODE CLASS="Program-Process">
options</CODE>
statement sets up global options to be used by BIND. This statement may appear only once in a configuration file. If more than one occurrence is found, the first occurrence determines the actual options used, and a warning will be generated. If there is no <CODE CLASS="Program-Process">
options</CODE>
statement, an options block with each option set to its default will be used. </P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997636">
</A>
<CODE CLASS="Program-Process">
version</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997638">
</A>
The version the server should report via a query of name <EM CLASS="pathname">
version.bind</EM>
in class <CODE CLASS="Program-Process">
chaos</CODE>
. The default is the real version number of this server.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997640">
</A>
<CODE CLASS="Program-Process">
directory</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997642">
</A>
The working directory of the server. Any non-absolute pathnames in the configuration file will be taken as relative to this directory. The default location for most server output files (e.g. <EM CLASS="pathname">
named.run</EM>
) is this directory. If a directory is not specified, the working directory defaults to `<EM CLASS="pathname">
.</EM>
', the directory from which the server was started. The directory specified should be an absolute path.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997644">
</A>
<CODE CLASS="Program-Process">
named-xfer</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997646">
</A>
<EM CLASS="Emphasis">
This option is obsolete.</EM>
It was used in BIND 8 to specify the pathname to the <CODE CLASS="Program-Process">
named-xfer</CODE>
program. In BINDv9, no separate <CODE CLASS="Program-Process">
named-xfer</CODE>
program is needed; its functionality is built into the name server.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1038439">
</A>
<CODE CLASS="Program-Process">
tkey-domain</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1038441">
</A>
The domain appended to the names of all shared keys generated with <CODE CLASS="Program-Process">
TKEY</CODE>
. When a client requests a <CODE CLASS="Program-Process">
TKEY</CODE>
exchange, it may or may not specify the desired name for the key. If present, the name of the shared key will be "<EM CLASS="variable">
client specified part</EM>
" + "<EM CLASS="variable">
tkey-domain</EM>
". Otherwise, the name of the shared key will be "<EM CLASS="variable">
random hex digits</EM>
" + "<EM CLASS="variable">
tkey-domain</EM>
". In most cases, the <CODE CLASS="Program-Process">
domainname</CODE>
should be the server's domain name.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1038443">
</A>
<CODE CLASS="Program-Process">
tkey-dhkey</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1038445">
</A>
The Diffie-Hellman key used by the server to generate shared keys with clients using the Diffie-Hellman mode of <CODE CLASS="Program-Process">
TKEY</CODE>
. The server must be able to load the public and private keys from files in the working directory. In most cases, the keyname should be the server's host name.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997648">
</A>
<CODE CLASS="Program-Process">
dump-file</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997650">
</A>
The pathname of the file the server dumps the database to when it receives <CODE CLASS="Program-Process">
SIGINT</CODE>
signal (<CODE CLASS="Program-Process">
ndc dumpdb</CODE>
). If not specified, the default is <EM CLASS="pathname">
named_dump.db</EM>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997652">
</A>
<CODE CLASS="Program-Process">
memstatistics-file</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997654">
</A>
The pathname of the file the server writes memory usage statistics to on exit. If not specified, the default is <EM CLASS="pathname">
named.memstats</EM>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997656">
</A>
<CODE CLASS="Program-Process">
pid-file</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997658">
</A>
The pathname of the file the server writes its process ID in. If not specified, the default is operating system dependent, but is usually<BR>
<EM CLASS="pathname">
or <EM CLASS="pathname">
. The pid-file is used by programs that want to send signals to the running nameserver.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997660">
</A>
<CODE CLASS="Program-Process">
statistics-file</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997662">
</A>
The pathname of the file the server appends statistics to. If not specified, the default is <EM CLASS="pathname">
named.stats</EM>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9</EM>
.</P>
</TD>
</TR>
</TABLE>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997664">
</A>
5.2.12.1 <A NAME="12205">
</A>
Boolean Options</H5>
</OL>
<P CLASS="CellBody">
<A NAME="pgfId=997722">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997667">
</A>
<CODE CLASS="Program-Process">
auth-nxdomain</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997669">
</A>
If <EM CLASS="variable">
yes</EM>
, then the <CODE CLASS="Program-Process">
AA</CODE>
bit is always set on NXDOMAIN responses, even if the server is not actually authoritative. The default is <EM CLASS="variable">
no</EM>
; this is a change from BIND 8. If you are using very old DNS software, you may need to set it to <EM CLASS="variable">
yes</EM>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997671">
</A>
<CODE CLASS="Program-Process">
deallocate-on-exit</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997673">
</A>
This option was used in BIND 8 to enable checking for memory leaks on exit. BINDv9 ignores the option and always performs the checks.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997675">
</A>
<CODE CLASS="Program-Process">
dialup</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997677">
</A>
If <EM CLASS="variable">
yes</EM>
, then the server treats all zones as if they are doing zone transfers across a dial on demand dialup link, which can be brought up by traffic originating from this server. This has different effects according to zone type and concentrates the zone maintenance so that it all happens in a short interval, once every <CODE CLASS="Program-Process">
heartbeat-interval</CODE>
and hopefully during the one call. It also suppresses some of the normal zone maintenance traffic. The default is <EM CLASS="variable">
no</EM>
.</P>
<P CLASS="CellBody">
<A NAME="pgfId=997678">
</A>
The <CODE CLASS="Program-Process">
dialup</CODE>
option may also be specified in the <CODE CLASS="Program-Process">
zone</CODE>
statement, in which case it overrides the <CODE CLASS="Program-Process">
options dialup </CODE>
statement.</P>
<P CLASS="CellBody">
<A NAME="pgfId=997679">
</A>
If the zone is a master then the server will send out a NOTIFY request to all the slaves. This will trigger the zone serial number check in the slave (providing it supports NOTIFY) allowing the slave to verify the zone while the connection is active.</P>
<P CLASS="CellBody">
<A NAME="pgfId=997680">
</A>
If the zone is a slave or stub then the server will suppress the regular "zone up to date" queries and only perform them when the<BR>
<CODE CLASS="Program-Process">
heartbeat-interval</CODE>
expires. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997682">
</A>
<CODE CLASS="Program-Process">
fake-iquery</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997684">
</A>
In BIND 8, this option was used to enable simulating the obsolete DNS query type IQUERY. BINDv9 never does IQUERY simulation.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997686">
</A>
<CODE CLASS="Program-Process">
fetch-glue</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997688">
</A>
If <CODE CLASS="Program-Process">
yes</CODE>
(the default), the server will fetch "glue" resource records it doesn't have when constructing the additional data section of a response. (Information present outside of the authoritative nodes in the zone is called "glue" information). <CODE CLASS="Program-Process">
fetch-glue no </CODE>
can be used in conjunction with <CODE CLASS="Program-Process">
recursion no </CODE>
to prevent the server's cache from growing or becoming corrupted (at the cost of requiring more work from the client). <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997690">
</A>
<CODE CLASS="Program-Process">
has-old-clients</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997692">
</A>
This option was incorrectly implemented in BIND 8, and is ignored by BINDv9. To achieve the intended effect of<BR>
<CODE CLASS="Program-Process">
has-old-clients yes</CODE>
, specify the two separate options <CODE CLASS="Program-Process">
auth-nxdomain yes</CODE>
and <CODE CLASS="Program-Process">
rfc2308-type-1 no</CODE>
instead.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997695">
</A>
<CODE CLASS="Program-Process">
host-statistics</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997697">
</A>
If <EM CLASS="variable">
yes</EM>
, then statistics are kept for every host that the nameserver interacts with. The default is <EM CLASS="variable">
no</EM>
. Note: turning on <CODE CLASS="Program-Process">
host-statistics</CODE>
can consume huge amounts of memory. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997699">
</A>
<CODE CLASS="Program-Process">
maintain-ixfr-base</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997701">
</A>
<EM CLASS="Emphasis">
This option is obsolete</EM>
. It was used in BIND 8 to determine whether a transaction log was kept for Incremental Zone Transfer. BINDv9 maintains a transaction log whenever possible. If you need to disable outgoing incremental zone transfers, use <CODE CLASS="Program-Process">
provide-ixfr no</CODE>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997703">
</A>
<CODE CLASS="Program-Process">
multiple-cnames</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997705">
</A>
This option was used in BIND 8 to allow a domain name to allow multiple CNAME records in violation of the DNS standards. BINDv9 currently does not check for multiple CNAMEs in zone data loaded from master files, but such checks may be introduced in a later release. BINDv9 always strictly enforces the CNAME rules in dynamic updates.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997707">
</A>
<CODE CLASS="Program-Process">
notify</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997709">
</A>
If <EM CLASS="variable">
yes</EM>
(the default), DNS NOTIFY messages are sent when a zone the server is authoritative for changes. The use of NOTIFY speeds synchronization between the master and its slaves. Slave servers that receive a NOTIFY message and understand it will contact the master server for the zone and see if they need to do a zone transfer, and if they do, they will initiate it immediately. The <CODE CLASS="Program-Process">
notify</CODE>
option may also be specified in the <CODE CLASS="Program-Process">
zone</CODE>
statement, in which case it overrides the <CODE CLASS="Program-Process">
options notify</CODE>
statement. It would only be necessary to turn off this option if it caused slaves to crash. <EM CLASS="Emphasis">
Not yet supported in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997711">
</A>
<CODE CLASS="Program-Process">
recursion</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997713">
</A>
If <EM CLASS="variable">
yes</EM>
, and a DNS query requests recursion, then the server will attempt to do all the work required to answer the query. If recursion is not on, the server will return a referral to the client if it doesn't know the answer. The default is <EM CLASS="variable">
yes</EM>
. See also <CODE CLASS="Program-Process">
fetch-glue</CODE>
above.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997715">
</A>
<CODE CLASS="Program-Process">
rfc2308-type1</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997717">
</A>
If <EM CLASS="variable">
yes</EM>
, the server will send NS records along with the SOA record for negative answers. You need to set this to <EM CLASS="variable">
no</EM>
if you have an old BIND server using you as a forwarder that does not understand negative answers which contain both SOA and NS records or you have an old version of sendmail. The correct fix is to upgrade the broken server or sendmail. The default is <EM CLASS="variable">
no</EM>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9</EM>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023686">
</A>
<CODE CLASS="Program-Process">
use-id-pool</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023688">
</A>
<EM CLASS="Emphasis">
This option is obsolete</EM>
. BINDv9 always allocates query IDs from a pool.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997719">
</A>
<CODE CLASS="Program-Process">
treat-cr-as-space</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997721">
</A>
This option was used in BIND 8 to make the server treat `<CODE CLASS="Program-Process">
\r</CODE>
' characters the same way as <CODE CLASS="Program-Process">
<space> </CODE>
`<CODE CLASS="Program-Process">
</CODE>
` or `<CODE CLASS="Program-Process">
\t</CODE>
', to facilitate loading of zone files on a UNIX system that were generated on an NT or DOS machine. In BINDv9, both UNIX `<CODE CLASS="Program-Process">
\n</CODE>
\r\n</CODE>
' newlines are always accepted, and the option is ignored.</P>
</TD>
</TR>
</TABLE>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997723">
</A>
5.2.12.2 Forwarding</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997724">
</A>
The forwarding facility can be used to create a large site-wide cache on a few servers, reducing traffic over links to external nameservers. It can also be used to allow queries by servers that do not have direct access to the Internet, but wish to look up exterior names anyway. Forwarding occurs only on those queries for which the server is not authoritative and does not have the answer in its cache.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997734">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997727">
</A>
<CODE CLASS="Program-Process">
forward</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997729">
</A>
This option is only meaningful if the forwarders list is not empty. A value of <EM CLASS="variable">
first</EM>
, the default, causes the server to query the forwarders first, and if that doesn't answer the question the server will then look for the answer itself. If <EM CLASS="variable">
only</EM>
is specified, the server will only query the forwarders.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997731">
</A>
<CODE CLASS="Program-Process">
forwarders</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997733">
</A>
Specifies the IP addresses to be used for forwarding. The default is the empty list (no forwarding).</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997735">
</A>
Forwarding can also be configured on a per-domain basis, allowing for the global forwarding options to be overridden in a variety of ways. You can set particular domains to use different forwarders, or have different <CODE CLASS="Program-Process">
zone Statement Grammar</A>
for more information.</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997741">
</A>
5.2.12.3 <A NAME="30910">
</A>
Name Checking</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997742">
</A>
The server can check domain names based upon their expected client contexts. For example, a domain name used as a hostname can be checked for compliance with the RFCs defining valid hostnames.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997743">
</A>
Three checking methods are available:</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997757">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997746">
</A>
<CODE CLASS="Program-Process">
ignore</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997748">
</A>
No checking is done.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997750">
</A>
<CODE CLASS="Program-Process">
warn</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997752">
</A>
Names are checked against their expected client contexts. Invalid names are logged, but processing continues normally.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997754">
</A>
<CODE CLASS="Program-Process">
fail</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997756">
</A>
Names are checked against their expected client contexts. Invalid names are logged, and the offending data is rejected.</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997758">
</A>
The server can check names in three areas: master zone files, slave zone files, and in responses to queries the server has initiated. If <CODE CLASS="Program-Process">
check-names response fail</CODE>
has been specified, and answering the client's question would require sending an invalid name to the client, the server will send a REFUSED response code to the client.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997759">
</A>
The defaults are:</P>
<PRE>
<CODE> check-names master fail;
check-names slave warn;
check-names response ignore;</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997763">
</A>
<CODE CLASS="Program-Process">
check-names</CODE>
may also be specified in the <CODE CLASS="Program-Process">
zone</CODE>
statement, in which case it overrides the <CODE CLASS="Program-Process">
options check-names</CODE>
statement. When used in a <CODE CLASS="Program-Process">
zone</CODE>
statement, the area is not specified (because it can be deduced from the zone type).</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1023294">
</A>
<EM CLASS="Emphasis">
Name checking is not yet implemented in BINDv9.</EM>
</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997765">
</A>
5.2.12.4 <A NAME="40536">
</A>
Access Control</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997766">
</A>
Access to the server can be restricted based on the IP address of the requesting system. See <A HREF="Bv9ARM.5.html#28183" CLASS="XRef">
Address Match Lists</A>
for details on how to specify IP address lists.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997787">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997772">
</A>
<CODE CLASS="Program-Process">
allow-query</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997774">
</A>
Specifies which hosts are allowed to ask ordinary questions. <CODE CLASS="Program-Process">
allow-query</CODE>
may also be specified in the <CODE CLASS="Program-Process">
zone</CODE>
statement, in which case it overrides the <CODE CLASS="Program-Process">
options allow-query</CODE>
statement. If not specified, the default is to allow queries from all hosts.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997776">
</A>
<CODE CLASS="Program-Process">
allow-recursion</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997778">
</A>
Specifies which hosts are allowed to make recursive queries through this server. If not specified, the default is to allow recursive queries from all hosts. </P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997780">
</A>
<CODE CLASS="Program-Process">
allow-transfer</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997782">
</A>
Specifies which hosts are allowed to receive zone transfers from the server. <CODE CLASS="Program-Process">
allow-transfer</CODE>
may also be specified in the <CODE CLASS="Program-Process">
zone</CODE>
statement, in which case it overrides the <CODE CLASS="Program-Process">
options allow-transfer</CODE>
statement. If not specified, the default is to allow transfers from all hosts.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997784">
</A>
<CODE CLASS="Program-Process">
blackhole</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997786">
</A>
Specifies a list of addresses that the server will not accept queries from or use to resolve a query. Queries from these addresses will not be responded to. The default is <CODE CLASS="Program-Process">
none</CODE>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
</TABLE>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997788">
</A>
5.2.12.5 Interfaces</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997789">
</A>
The interfaces and ports that the server will answer queries from may be specified using the <CODE CLASS="Program-Process">
listen-on</CODE>
option. <CODE CLASS="Program-Process">
listen-on</CODE>
takes an optional port, and an <CODE CLASS="Program-Process">
address_match_list</CODE>
. The server will listen on all interfaces allowed by the address match list. If a port is not specified, port 53 will be used.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997790">
</A>
Multiple listen-on statements are allowed. For example,</P>
<PRE>
<CODE>listen-on { 5.6.7.8; };
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997793">
</A>
will enable the nameserver on port 53 for the IP address 5.6.7.8, and on port 1234 of an address on the machine in net 1.2 that is not 1.2.3.4.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997794">
</A>
If no <CODE CLASS="Program-Process">
listen-on</CODE>
is specified, the server will listen on port 53 on all interfaces.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1023295">
</A>
The listen-on option only applies to IPv4. Currently, the server always listens for IPv6 requests on a wildcard address and port 53. A separate <CODE CLASS="Program-Process">
listen-on-v6</CODE>
option may be added in a later release.</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997795">
</A>
5.2.12.6 Query Address</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997796">
</A>
If the server doesn't know the answer to a question, it will query other nameservers. <CODE CLASS="Program-Process">
query-source</CODE>
specifies the address and port used for such queries. For queries sent over IPv6, there is a separate <CODE CLASS="Program-Process">
query-source-v6</CODE>
option. If <CODE CLASS="Program-Process">
address</CODE>
is <CODE CLASS="Program-Process">
*</CODE>
or is omitted, a wildcard IP address (<CODE CLASS="Program-Process">
INADDR_ANY</CODE>
) will be used. If <CODE CLASS="Program-Process">
port</CODE>
is <CODE CLASS="Program-Process">
*</CODE>
or is omitted, a random unprivileged port will be used. The defaults are</P>
<PRE>
<CODE>query-source address * port *;
query-source-v6 address * port *</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997798">
</A>
Note: <CODE CLASS="Program-Process">
query-source</CODE>
currently applies only to UDP queries; TCP queries always use a wildcard IP address and a random unprivileged port.</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997800">
</A>
5.2.12.7 <A NAME="32057">
</A>
Zone Transfers</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997801">
</A>
BIND has mechanisms in place to facilitate zone transfers and set limits on the amount of load that transfers place on the system. The following options apply to zone transfers.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997835">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1040036">
</A>
<CODE CLASS="Program-Process">
also-notify</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1040039">
</A>
Defines a global list of IP addresses that are also sent NOTIFY messages whenever a fresh copy of the zone is loaded. This helps to ensure that copies of the zones will quickly converge on "stealth" servers. If an <CODE CLASS="Program-Process">
also-notify</CODE>
list is given in a <CODE CLASS="Program-Process">
zone</CODE>
statement, it will override the <CODE CLASS="Program-Process">
options also-notify</CODE>
statement. When a <CODE CLASS="Program-Process">
zone notify</CODE>
statement is set to <CODE CLASS="Program-Process">
no</CODE>
, the IP addresses in the global <CODE CLASS="Program-Process">
also-notify</CODE>
list will not be sent NOTIFY messages for that zone. The default is the empty list (no global notification list). <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997804">
</A>
<CODE CLASS="Program-Process">
max-transfer-time-in</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997806">
</A>
Inbound zone transfers running longer than this many minutes will be terminated. The default is 120 minutes (2 hours).</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023326">
</A>
<CODE CLASS="Program-Process">
max-transfer-idle-in</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023328">
</A>
Inbound zone transfers making no progress in this many minutes will be terminated. The default is 60 minutes (1 hour).</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023322">
</A>
<CODE CLASS="Program-Process">
max-transfer-time-out</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023324">
</A>
Outbound zone transfers running longer than this many minutes will be terminated. The default is 120 minutes (2 hours).</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023318">
</A>
<CODE CLASS="Program-Process">
max-transfer-idle-out</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023320">
</A>
Outbound zone transfers making no progress in this many minutes will be terminated. The default is 60 minutes</P>
<P CLASS="CellBody">
<A NAME="pgfId=1059994">
</A>
(1 hour).</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1040047">
</A>
<CODE CLASS="Program-Process">
serial-queries</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1040049">
</A>
Slave servers will periodically query master servers to find out if zone serial numbers have changed. Each such query uses a minute amount of the slave server's network bandwidth, but more importantly each query uses a small amount of memory in the slave server while waiting for the master server to respond. The <CODE CLASS="Program-Process">
serial-queries </CODE>
option sets the maximum number of concurrent serial-number queries allowed to be outstanding at any given time. The default is 4. Note: If a server loads a large (tens or hundreds of thousands) number of slave zones, then this limit should be raised to the high hundreds or low thousands -- otherwise the slave server may never actually become aware of zone changes in the master servers. Beware, though, that setting this limit arbitrarily high can spend a considerable amount of your slave server's network, CPU, and memory resources. As with all tunable limits, this one should be changed gently and monitored for its effects. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997808">
</A>
<CODE CLASS="Program-Process">
transfer-format</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997810">
</A>
The server supports two zone transfer methods. <CODE CLASS="Program-Process">
one-answer</CODE>
uses one DNS message per resource record transferred. <CODE CLASS="Program-Process">
many-answers</CODE>
packs as many resource records as possible into a message. <CODE CLASS="Program-Process">
many-answers</CODE>
is more efficient, but is only known to be understood by BINDv9, BIND 8.x and patched versions of BIND 4.9.5. The default is <CODE CLASS="Program-Process">
one-answer</CODE>
. <CODE CLASS="Program-Process">
transfer-format</CODE>
may be overridden on a per-server basis by using the <CODE CLASS="Program-Process">
server</CODE>
statement.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997812">
</A>
<CODE CLASS="Program-Process">
transfers-in</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997814">
</A>
The maximum number of inbound zone transfers that can be running concurrently. The default value is 10. Increasing <CODE CLASS="Program-Process">
transfers-in</CODE>
may speed up the convergence of slave zones, but it also may increase the load on the local system.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997816">
</A>
<CODE CLASS="Program-Process">
transfers-out</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997818">
</A>
The maximum number of outbound zone transfers that can be running concurrently. Zone transfer requests in excess of the limit will be refused. The default value is 10.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997820">
</A>
<CODE CLASS="Program-Process">
transfers-per-ns</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997822">
</A>
The maximum number of inbound zone transfers that can be concurrently transferring from a given remote nameserver. The default value is 2. Increasing <CODE CLASS="Program-Process">
transfers-per-ns</CODE>
may speed up the convergence of slave zones, but it also may increase the load on the remote nameserver. <CODE CLASS="Program-Process">
transfers-per-ns</CODE>
may be overridden on a per-server basis by using the <CODE CLASS="Program-Process">
transfers</CODE>
phrase of the <CODE CLASS="Program-Process">
server</CODE>
statement.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997824">
</A>
<CODE CLASS="Program-Process">
transfer-source</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997826">
</A>
<CODE CLASS="Program-Process">
transfer-source</CODE>
determines which local address will be bound to IPv4 TCP connections used to fetch zones transferred inbound by the server. If not set, it defaults to a system controlled value which will usually be the address of the interface "closest to" the remote end. This address must appear in the remote end's <CODE CLASS="Program-Process">
allow-transfer</CODE>
option for the zone being transferred, if one is specified. This statement sets the <CODE CLASS="Program-Process">
transfer-source</CODE>
for all zones, but can be overridden on a per-zone basis by including a<BR>
<CODE CLASS="Program-Process">
transfer-source</CODE>
statement within the <CODE CLASS="Program-Process">
zone</CODE>
block in the configuration file.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023338">
</A>
<CODE CLASS="Program-Process">
transfer-source-v6</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023340">
</A>
Like <CODE CLASS="Program-Process">
transfer-source</CODE>
, but for zone transfers performed using IPv6.</P>
</TD>
</TR>
</TABLE>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997836">
</A>
5.2.12.8 Resource Limits</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997837">
</A>
The server's usage of many system resources can be limited. Some operating systems don't support some of the limits. On such systems, a warning will be issued if the unsupported limit is used. Some operating systems don't support limiting resources.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997838">
</A>
Scaled values are allowed when specifying resource limits. For example, <CODE CLASS="Program-Process">
1G</CODE>
can be used instead of <CODE CLASS="Program-Process">
1073741824</CODE>
to specify a limit of one gigabyte. <CODE CLASS="Program-Process">
unlimited</CODE>
requests unlimited use, or the maximum available amount. <CODE CLASS="Program-Process">
default</CODE>
uses the limit that was in force when the server was started. See the description of <CODE CLASS="Program-Process">
size_spec</CODE>
Configuration File Grammar</A>
for more details.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997863">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997844">
</A>
<CODE CLASS="Program-Process">
coresize</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997846">
</A>
The maximum size of a core dump. The default is <EM CLASS="variable">
default</EM>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997848">
</A>
<CODE CLASS="Program-Process">
datasize</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997850">
</A>
The maximum amount of data memory the server may use. The default is <EM CLASS="variable">
default</EM>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997852">
</A>
<CODE CLASS="Program-Process">
files</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997854">
</A>
The maximum number of files the server may have open concurrently. The default is <EM CLASS="variable">
unlimited</EM>
. Note: on some operating systems the server cannot set an unlimited value and cannot determine the maximum number of open files the kernel can support. On such systems, choosing <EM CLASS="variable">
unlimited</EM>
will cause the server to use the larger of the <CODE CLASS="Program-Process">
rlim_max</CODE>
for <CODE CLASS="Program-Process">
RLIMIT_NOFILE</CODE>
and the value returned by <CODE CLASS="Program-Process">
sysconf(_SC_OPEN_MAX)</CODE>
. If the actual kernel limit is larger than this value, use <CODE CLASS="Program-Process">
limit files </CODE>
to specify the limit explicitly. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997856">
</A>
<CODE CLASS="Program-Process">
max-ixfr-log-size</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997858">
</A>
The <CODE CLASS="Program-Process">
max-ixfr-log-size</CODE>
will be used in a future release of the server to limit the size of the transaction log kept for Incremental Zone Transfer. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1040060">
</A>
<CODE CLASS="Program-Process">
recursive-clients</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1040062">
</A>
The maximum number of simultaneous recursive lookup the server will perform on behalf of clients. The default is 100.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997860">
</A>
<CODE CLASS="Program-Process">
stacksize</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997862">
</A>
The maximum amount of stack memory the server may use. The default is <EM CLASS="variable">
default</EM>
. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023744">
</A>
<CODE CLASS="Program-Process">
tcp-clients</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023746">
</A>
The maximum number of simultaneous client TCP connections that the server will accept. The default is 100.</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1023396">
</A>
<EM CLASS="Emphasis">
Resource limits are not yet implemented in BINDv9.</EM>
</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=1023375">
</A>
5.2.12.9 Periodic Task Intervals</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1023393">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023378">
</A>
<CODE CLASS="Program-Process">
cleaning-interval</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023380">
</A>
The server will remove expired resource records from the cache every <CODE CLASS="Program-Process">
cleaning-interval </CODE>
minutes. The default is 60 minutes. If set to 0, no periodic cleaning will occur.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023382">
</A>
<CODE CLASS="Program-Process">
heartbeat-interval</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023384">
</A>
The server will perform zone maintenance tasks for all zones marked <CODE CLASS="Program-Process">
dialup yes</CODE>
whenever this interval expires. The default is 60 minutes. Reasonable values are up to 1 day (1440 minutes). If set to 0, no zone maintenance for these zones will occur. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023386">
</A>
<CODE CLASS="Program-Process">
interface-interval</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023388">
</A>
The server will scan the network interface list every <CODE CLASS="Program-Process">
interface-interval</CODE>
minutes. The default is 60 minutes. If set to 0, interface scanning will only occur when the configuration file is loaded. After the scan, listeners will be started on any new interfaces (provided they are allowed by the <CODE CLASS="Program-Process">
listen-on</CODE>
configuration). Listeners on interfaces that have gone away will be cleaned up.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023390">
</A>
<CODE CLASS="Program-Process">
statistics-interval</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1023392">
</A>
Nameserver statistics will be logged every <CODE CLASS="Program-Process">
statistics-interval</CODE>
minutes. The default is 60. If set to 0, no statistics will be logged. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
</TABLE>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997884">
</A>
5.2.12.10 <A NAME="15119">
</A>
Topology</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997885">
</A>
All other things being equal, when the server chooses a nameserver to query from a list of nameservers, it prefers the one that is topologically closest to itself. The <CODE CLASS="Program-Process">
topology</CODE>
statement takes an <CODE CLASS="Program-Process">
address_match_list</CODE>
and interprets it in a special way. Each top-level list element is assigned a distance. Non-negated elements get a distance based on their position in the list, where the closer the match is to the start of the list, the shorter the distance is between it and the server. A negated match will be assigned the maximum distance from the server. If there is no match, the address will get a distance which is further than any non-negated list element, and closer than any negated element. For example,</P>
<PRE>
<CODE> topology {
10/8;
};</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997891">
</A>
will prefer servers on network 10 the most, followed by hosts on network 1.2.0.0 (netmask 255.255.0.0) and network 3, with the exception of hosts on network 1.2.3 (netmask 255.255.255.0), which is preferred least of all.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997892">
</A>
The default topology is</P>
<PRE>
CODE> topology { localhost; localnets; };
</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1023427">
</A>
<EM CLASS="Emphasis">
The </EM>
<CODE CLASS="Program-Process">
topology</CODE>
<EM CLASS="Emphasis">
option is not yet implemented in BINDv9.</EM>
</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=1023411">
</A>
5.2.12.11 <A NAME="39491">
</A>
The <CODE CLASS="Program-Process">
sortlist</CODE>
Statement</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997896">
</A>
Resource Records (RRs) are the data associated with the names in a domain name space. The data is maintained in the form of sets of RRs. The order of RRs in a set is, by default, not significant. Therefore, to control the sorting of records in a set resource records, or <EM CLASS="Optional-meta-syntax">
RRset</EM>
, you must use the <CODE CLASS="Program-Process">
sortlist</CODE>
statement.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997899">
</A>
See Types of Resource Records and When to Use Them.</A>
. Specifications for RRs are documented in RFC 1035.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997901">
</A>
When returning multiple RRs, the nameserver will normally return them in <EM CLASS="Emphasis">
Round Robin </EM>
order, i.e. after each request, the first RR is put at the end of the list. The client resolver code should rearrange the RRs as appropriate, i.e. using any addresses on the local net in preference to other addresses. However, not all resolvers can do this or are correctly configured. When a client is using a local server the sorting can be performed in the server, based on the client's address. This only requires configuring the nameservers, not all the clients.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997902">
</A>
The <CODE CLASS="Program-Process">
sortlist</CODE>
statement (see below) takes an <CODE CLASS="Program-Process">
address_match_list </CODE>
and interprets it even more specifically than the <CODE CLASS="Program-Process">
topology</CODE>
Topology</A>
). Each top level statement in the <CODE CLASS="Program-Process">
sortlist</CODE>
must itself be an explicit <CODE CLASS="Program-Process">
address_match_list</CODE>
with one or two elements. The first element (which may be an IP address, an IP prefix, an ACL name or a nested <CODE CLASS="Program-Process">
address_match_list</CODE>
) of each top level list is checked against the source address of the query until a match is found.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997906">
</A>
Once the source address of the query has been matched, if the top level statement contains only one element, the actual primitive element that matched the source address is used to select the address in the response to move to the beginning of the response. If the statement is a list of two elements, then the second element is treated like the <CODE CLASS="Program-Process">
address_match_list</CODE>
in a <CODE CLASS="Program-Process">
topology</CODE>
statement. Each top level element is assigned a distance and the address in the response with the minimum distance is moved to the beginning of the response.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997907">
</A>
In the following example, any queries received from any of the addresses of the host itself will get responses preferring addresses on any of the locally connected networks. Next most preferred are addresses on the 192.168.1/24 network, and after that either the 192.168.2/24 or<BR>
192.168.3/24 network with no preference shown between these two networks. Queries received from a host on the 192.168.1/24 network will prefer other addresses on that network to the 192.168.2/24 and<BR>
192.168.3/24 networks. Queries received from a host on the 192.168.4/24 or the 192.168.5/24 network will only prefer other addresses on their directly connected networks.</P>
<PRE>
<CODE>sortlist {
{ localhost; // IF the local host
{ localnets; // THEN first fit on the
// if .4 or .5, prefer that net
};
};</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997923">
</A>
The following example will give reasonable behavior for the local host and hosts on directly connected networks. It is similar to the behavior of the address sort in BIND 8.x. Responses sent to queries from the local host will favor any of the directly connected networks. Responses sent to queries from any other hosts on a directly connected network will prefer addresses on that same network. Responses to other queries will not be sorted.</P>
<PRE>
<CODE>
sortlist {
{ localhost; localnets; };
{ localnets; };
};</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1023426">
</A>
<EM CLASS="Emphasis">
The </EM>
<CODE CLASS="Program-Process">
sortlist</CODE>
<EM CLASS="Emphasis">
option is not yet implemented in BINDv9.</EM>
</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997929">
</A>
5.2.12.12 <A NAME="22766">
</A>
RRset Ordering</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997930">
</A>
When multiple records are returned in an answer it may be useful to configure the order of the records placed into the response. For example, the records for a zone might be configured always to be returned in the order they are defined in the zone file. Or perhaps a random shuffle of the records as they are returned is wanted. The <CODE CLASS="Program-Process">
rrset-order</CODE>
statement permits configuration of the ordering made of the records in a multiple record response. The default, if no ordering is defined, is a cyclic ordering (round robin).</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997931">
</A>
An <CODE CLASS="Program-Process">
order_spec</CODE>
is defined as follows:</P>
<PRE>
<CODE>
[ class <VAR>class_name</VAR> ][ type <VAR>type_name</VAR> ][ name "<EM>domain_name</EM>"]
order <VAR>ordering</VAR></CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997933">
</A>
If no class is specified, the default is <CODE CLASS="Program-Process">
ANY</CODE>
. If no type is specified, the default is <CODE CLASS="Program-Process">
ANY</CODE>
. If no name is specified, the default is `<CODE CLASS="Program-Process">
*</CODE>
'.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997934">
</A>
The legal values for <CODE CLASS="Program-Process">
ordering</CODE>
are:</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997948">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997937">
</A>
<CODE CLASS="Program-Process">
fixed</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997939">
</A>
Records are returned in the order they are defined in the zone file.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997941">
</A>
<CODE CLASS="Program-Process">
random</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997943">
</A>
Records are returned in some random order.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997945">
</A>
<CODE CLASS="Program-Process">
cyclic</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997947">
</A>
Records are returned in a round-robin order.</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997949">
</A>
For example:</P>
<PRE>
<CODE> rrset-order {
class <VAR>IN</VAR> type <VAR>A</VAR> name "<EM>host.example.com</EM>" order <VAR>random</VAR>;
order <VAR>cyclic</VAR>;
};
</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997954">
</A>
will cause any responses for type <EM CLASS="Optional-meta-syntax">
A</EM>
records in class <EM CLASS="Optional-meta-syntax">
IN</EM>
that have "host.example.com" as a suffix, to always be returned in random order. All other records are returned in cyclic order.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997955">
</A>
If multiple <CODE CLASS="Program-Process">
rrset-order</CODE>
statements appear, they are not combined--the last one applies.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997956">
</A>
If no <CODE CLASS="Program-Process">
rrset-order</CODE>
statement is specified, then a default one of:</P>
<PRE>
<CODE> rrset-order { class <VAR>ANY</VAR> type <VAR>ANY</VAR> name "<EM>*</EM>"; order <VAR>cyclic</VAR>
};</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997958">
</A>
is used.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1023432">
</A>
<EM CLASS="Emphasis">
The </EM>
<CODE CLASS="Program-Process">
rrset-order</CODE>
<EM CLASS="Emphasis">
statement is not yet implemented in BINDv9.</EM>
</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997959">
</A>
5.2.12.13 Tuning</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=997973">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997962">
</A>
<CODE CLASS="Program-Process">
lame-ttl</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997964">
</A>
Sets the number of seconds to cache a lame server indication. 0 disables caching. (This is NOT recommended.) Default is 600 (10 minutes). Maximum value is 1800 (30 minutes). <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997966">
</A>
<CODE CLASS="Program-Process">
max-ncache-ttl</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997968">
</A>
To reduce network traffic and increase performance the server stores negative answers. <CODE CLASS="Program-Process">
max-ncache-ttl</CODE>
is used to set a maximum retention time for these answers in the server in seconds. The default<BR>
<CODE CLASS="Program-Process">
max-ncache-ttl</CODE>
is 10800 seconds (3 hours).<BR>
<CODE CLASS="Program-Process">
max-ncache-ttl</CODE>
cannot exceed the maximum retention time for ordinary (positive) answers (7 days) and will be silently truncated to 7 days if set to a value which is greater that 7 days. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997970">
</A>
<CODE CLASS="Program-Process">
min-roots</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=997972">
</A>
The minimum number of root servers that is required for a request for the root servers to be accepted. Default is 2. <EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
</TABLE>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=997974">
</A>
5.2.12.14 Deprecated Features</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1038290">
</A>
<CODE CLASS="Program-Process">
use-ixfr</CODE>
is deprecated in BINDv9. If you need to disable IXFR to a particular server or servers see information on the <CODE CLASS="Program-Process">
provide-ixfr</CODE>
server Statement Grammar</A>
, below) and in the description of Incremental Transfer (IXFR) in the section <A HREF="Bv9ARM.4.html#19780" CLASS="XRef">
Incremental Zone Transfers (IXFR)</A>
.</P>
</DIV>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=1038295">
</A>
5.2.13 <CODE CLASS="Program-Process">
server</CODE>
<A NAME="34774">
</A>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>
<PRE>
server <VAR>ip_addr</VAR> {
[ bogus <VAR>yes_or_no</VAR> ; ]
[ provide-ixfr <VAR>yes_or_no</VAR> ; ]
[ request-ixfr <VAR>yes_or_no</VAR> ; ]
[ transfers <VAR>number</VAR> ; ]
[ transfer-format (one-answer | many-answers) ; ]
[ keys { <VAR>string</VAR> ; [ <VAR>string</VAR> ; [...]] } ; ]
};
</CODE>
</PRE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997991">
</A>
5.2.14 <CODE CLASS="Program-Process">
server</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997992">
</A>
The server statement defines the characteristics to be associated with a remote nameserver.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997993">
</A>
If you discover that a remote server is giving out bad data, marking it as bogus will prevent further queries to it. The default value of <CODE CLASS="Program-Process">
bogus</CODE>
is <CODE CLASS="Program-Process">
no</CODE>
. <EM CLASS="Emphasis">
The </EM>
<CODE CLASS="Program-Process">
bogus</CODE>
<EM CLASS="Emphasis">
clause is not yet implemented in BINDv9.</EM>
</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997994">
</A>
The <CODE CLASS="Program-Process">
provide-ixfr</CODE>
clause determines whether the local server, acting as master, will respond with an incremental zone transfer when the given remote server, a slave, requests it. If set to <CODE CLASS="Program-Process">
yes</CODE>
, incremental transfer will be provided whenever possible. If set to <CODE CLASS="Program-Process">
no</CODE>
, all transfers to the remote server will be nonincremental. If not set, the value of the <CODE CLASS="Program-Process">
provide-ixfr </CODE>
option in the global options block is used as a default.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1023455">
</A>
The <CODE CLASS="Program-Process">
request-ixfr</CODE>
clause determines whether the local server, acting as a slave, will request incremental zone transfers from the given remote server, a master. If not set, the value of the <CODE CLASS="Program-Process">
request-ixfr</CODE>
option in the global options block is used as a default.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1023490">
</A>
IXFR requests to servers that do not support IXFR will automatically fall back to AXFR. Therefore, there is no need to manually list which servers support IXFR and which ones do not; the global default of <CODE CLASS="Program-Process">
yes</CODE>
should always work. The purpose of the <CODE CLASS="Program-Process">
provide-ixfr</CODE>
and <CODE CLASS="Program-Process">
request-ixfr</CODE>
clauses is to make it possible to disable the use of IXFR even when both master and slave claim to support it, for example if one of the servers is buggy and crashes or corrupts data when IXFR is used.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1023509">
</A>
The server supports two zone transfer methods. The first, <CODE CLASS="Program-Process">
one-answer</CODE>
, uses one DNS message per resource record transferred. <CODE CLASS="Program-Process">
many-answers</CODE>
packs as many resource records as possible into a message. <CODE CLASS="Program-Process">
many-answers</CODE>
is more efficient, but is only known to be understood by BINDv9, BIND 8.x, and patched versions of BIND 4.9.5. You can specify which method to use for a server with the <CODE CLASS="Program-Process">
transfer-format </CODE>
option. If <CODE CLASS="Program-Process">
transfer-format </CODE>
is not specified, the <CODE CLASS="Program-Process">
transfer-format</CODE>
specified by the <CODE CLASS="Program-Process">
options</CODE>
statement will be used.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997995">
</A>
<CODE CLASS="Program-Process">
transfers</CODE>
is used to limit the number of concurrent in-bound zone transfers from the specified server.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=997996">
</A>
The <CODE CLASS="Program-Process">
keys</CODE>
clause is used to identify a <CODE CLASS="Program-Process">
key_id </CODE>
defined by the <CODE CLASS="Program-Process">
key</CODE>
statement, to be used for transaction security when talking to the remote server. The <CODE CLASS="Program-Process">
key</CODE>
statement must come before the <CODE CLASS="Program-Process">
server</CODE>
statement that references it. When a request is sent to the remote server, a request signature will be generated using the key specified here and appended to the message. A request originating from the remote server is not required to be signed by this key.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1023566">
</A>
Although the grammar of the <CODE CLASS="Program-Process">
keys</CODE>
clause allows for multiple keys, only a single key per server is currently supported.</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=997997">
</A>
5.2.15 <CODE CLASS="Program-Process">
trusted-keys</CODE>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>trusted-keys {
<VAR>string number number number string</VAR> ;
[ <VAR>string number number number string</VAR> ; [...]]
};
</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998002">
</A>
5.2.16 <CODE CLASS="Program-Process">
trusted-keys</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998003">
</A>
The trusted-keys statement is for use with DNSSEC-style security, originally specified in RFC 2065. DNSSEC is meant to provide three distinct services: key distribution, data origin authentication, and transaction and request authentication. A complete description of DNSSEC and its use is beyond the scope of this document, and readers interested in more information should start with RFC 2065 and then continue with the relevant <EM CLASS="Emphasis">
Internet Drafts </EM>
(IDs) documents. A list of the IDs pertaining to DNSSEC can be found in <A HREF="Bv9ARM.7.html#" CLASS="XRef">
Internet Drafts</A>
in Appendix C of this document. (Their filenames begin with "<EM CLASS="pathname">
draft-ietf-dnssec</EM>
."). IDs are RFCs in the preliminary stages of development--they are the working drafts of IETF working groups--and can be obtained via anonymous FTP from<BR>
<EM CLASS="URL">
. </P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998007">
</A>
Each trusted key is associated with a domain name. Its attributes are the non-negative integral flags, protocol, and algorithm, as well as a base-64 encoded string representing the key.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998008">
</A>
A trusted key is added when a public key for a non-authoritative zone is known, but cannot be securely obtained through DNS. This occurs when a signed zone is a child of an unsigned zone. Adding the trusted key here allows data signed by that zone to be considered secure.</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998162">
</A>
5.2.17 <CODE CLASS="Program-Process">
view</CODE>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>
view <VAR>view name</VAR> {
match_clients { <VAR>address_match_list</VAR> } ;
[view_option; ...]
[zone_statement; ...]]
};
</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=1038533">
</A>
5.2.18 <CODE CLASS="Program-Process">
view</CODE>
Statement Definition and Usage</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1038546">
</A>
The <CODE CLASS="Program-Process">
view</CODE>
statement is a powerful new feature of BINDv9 that lets a name server answer a DNS query differently depending on who is asking. It is particularly useful for implementing split DNS setups without having to run multiple servers.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1038875">
</A>
Each <CODE CLASS="Program-Process">
view</CODE>
statement defines a view of the DNS namespace that will be seen by those clients whose IP addresses match the <CODE CLASS="Program-Process">
address_match_list</CODE>
of the view's <CODE CLASS="Program-Process">
match-clients</CODE>
clause. The order of the <CODE CLASS="Program-Process">
view</CODE>
statements is significant--a client query will be resolved in the context of the first <CODE CLASS="Program-Process">
view</CODE>
whose <CODE CLASS="Program-Process">
match-clients </CODE>
list matches the client's IP address.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1038605">
</A>
Zones defined within a <CODE CLASS="Program-Process">
view</CODE>
statement will be only be accessible to clients that match the <CODE CLASS="Program-Process">
view</CODE>
. By defining a zone of the same name in multiple views, different zone data can be given to different clients, e.g. "internal" and "external" clients in a split DNS setup.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1038606">
</A>
Many of the options given in the <CODE CLASS="Program-Process">
options</CODE>
statement can also be used within a <CODE CLASS="Program-Process">
view</CODE>
statement, and then apply only when resolving queries with that view. When no a view-specific value is given, the value in the <CODE CLASS="Program-Process">
options</CODE>
statement is used as a default. Also, zone options can have default values specified in the <CODE CLASS="Program-Process">
view</CODE>
statement; these view-specific defaults take precedence over those in the <CODE CLASS="Program-Process">
options</CODE>
statement. </P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1038571">
</A>
Views are class specific. If no class is given, class IN is assumed.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1038607">
</A>
If there are no <CODE CLASS="Program-Process">
view</CODE>
statements in the config file, a default view that matches any client is automatically created in class IN, and any <CODE CLASS="Program-Process">
zone</CODE>
statements specified on the top level of the configuration file are considered to be part of this default view. If any explicit <CODE CLASS="Program-Process">
view</CODE>
statements are present, all <CODE CLASS="Program-Process">
zone</CODE>
statements must occur inside <CODE CLASS="Program-Process">
view</CODE>
statements.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1038608">
</A>
Here is an example of a typical split DNS setup implemented using <CODE CLASS="Program-Process">
view</CODE>
statements.</P>
<PRE>
<CODE>
view "internal" { // This should match our internal networks.
match-clients { 10.0.0.0/8; }; // Provide recursive service to internal clients only.
recursion yes;
// Provide a complete view of the example.com zone
// including addresses of internal hosts.
type <VAR>master</VAR>;
};
};
view "external" {
match-clients { <VAR>any</VAR>; };
// Refuse recursive service to external clients.
recursion no;
// Provide a restricted view of the example.com zone
// containing only publicly accessible hosts.
type <VAR>master</VAR>;
};
};</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=1038536">
</A>
5.2.19 <CODE CLASS="Program-Process">
zone</CODE>
<A NAME="20328">
</A>
Statement Grammar</H4>
</OL>
<PRE>
<CODE>
zone <VAR>zone name</VAR> [<VAR>class</VAR>] [{
type ( master|slave|hint|stub|forward ) ;
[ allow-query { <VAR>address_match_list</VAR> } ; ]
[ allow-transfer { <VAR>address_match_list</VAR> } ; ]
[ allow-update { <VAR>address_match_list</VAR> } ; ]
[ update-policy { <VAR>update_policy_rule</VAR> [...] } ; ]
[ allow-update-forwarding { <VAR>address_match_list</VAR> } ; ]
[ also-notify { [ <VAR>ip_addr</VAR> ; [<VAR>ip_addr</VAR> ; [...]]] } ; ]
[ check-names (warn|fail|ignore) ; ]
[ dialup <VAR>true_or_false</VAR> ; ]
[ file <VAR>string</VAR> ; ]
[ forward (only|first) ; ]
[ forwarders { [ <VAR>ip_addr</VAR> ; [ <VAR>ip_addr</VAR> ; [...]]] } ; ]
[ ixfr-base <VAR>string</VAR> ; ]
[ ixfr-tmp-file <VAR>string</VAR> ; ]
[ maintain-ixfr-base <VAR>true_or_false</VAR> ; ]
[ masters [port number] { <VAR>ip_addr</VAR> ; [<VAR>ip_addr</VAR> ; [...]] } ; ]
[ max-ixfr-log-size <VAR>number</VAR> ; ]
[ max-transfer-idle-in <VAR>number</VAR> ; ]
[ max-transfer-idle-out <VAR>number</VAR> ; ]
[ max-transfer-time-in <VAR>number</VAR> ; ]
[ max-transfer-time-out <VAR>number</VAR> ; ]
[ notify <VAR>true_or_false</VAR> ; ]
[ pubkey <VAR>number</VAR> <VAR>number</VAR> <VAR>number</VAR> <VAR>string</VAR> ; ]
[ transfer-source (<VAR>ip_addr</VAR> | *) ; ]
}];</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998197">
</A>
5.2.20 <CODE CLASS="Program-Process">
zone</CODE>
Statement Definition and Usage</H4>
</OL>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=998221">
</A>
5.2.20.1 Zone Types</H5>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998200">
</A>
<EM CLASS="Emphasis">
master</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998202">
</A>
The server has a master copy of the data for the zone and will be able to provide authoritative answers for it.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998204">
</A>
<EM CLASS="Emphasis">
slave</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998206">
</A>
A slave zone is a replica of a master zone. The masters list specifies one or more IP addresses that the slave contacts to update its copy of the zone. If a port is specified, the slave then checks to see if the zone is current and zone transfers will be done to the port given. If a file is specified, then the replica will be written to this file whenever the zone is changed, and reloaded from this file on a server restart. Use of a file is recommended, since it often speeds server start-up and eliminates a needless waste of bandwidth. Note that for large numbers (in the tens or hundreds of thousands) of zones per server, it is best to use a two level naming scheme for zone file names. For example, a slave server for the zone <EM CLASS="Optional-meta-syntax">
example.com</EM>
might place the zone contents into a file called<BR>
<EM CLASS="Optional-meta-syntax">
where <EM CLASS="Optional-meta-syntax">
ex/</EM>
is just the first two letters of the zone name. (Most operating systems behave very slowly if you put 100K files into a single directory.)</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998208">
</A>
<EM CLASS="Emphasis">
stub</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998210">
</A>
A stub zone is like a slave zone, except that it replicates only the NS records of a master zone instead of the entire zone.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998212">
</A>
<EM CLASS="Emphasis">
forward</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998214">
</A>
A "forward zone" is a way to configure forwarding on a per-domain basis. A <CODE CLASS="Program-Process">
zone</CODE>
statement of type <CODE CLASS="Program-Process">
forward</CODE>
can contain a <CODE CLASS="Program-Process">
forward</CODE>
forwarders</CODE>
statement, which will apply to queries within the domain given by the zone name.If no <CODE CLASS="Program-Process">
forwarders</CODE>
statement is present or an empty list for <CODE CLASS="Program-Process">
forwarders</CODE>
is given, then no forwarding will be done for the domain, cancelling the effects of any forwarders in the <CODE CLASS="Program-Process">
options</CODE>
statement. Thus if you want to use this type of zone to change the behavior of the global <CODE CLASS="Program-Process">
forward</CODE>
option (i.e., "forward first to", then "forward only", or vice versa, but want to use the same servers as set globally) you need to respecify the global forwarders.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998218">
</A>
<EM CLASS="Emphasis">
hint</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998220">
</A>
The initial set of root nameservers is specified using a "hint zone". When the server starts up, it uses the root hints to find a root nameserver and get the most recent list of root nameservers.</P>
</TD>
</TR>
</TABLE>
</OL>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=998222">
</A>
5.2.20.2 Class</H5>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998223">
</A>
The zone's name may optionally be followed by a class. If a class is not specified, class <CODE CLASS="Program-Process">
in</CODE>
(for <EM CLASS="Optional-meta-syntax">
internet</EM>
), is assumed. This is correct for the vast majority of cases.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998224">
</A>
The <EM CLASS="Optional-meta-syntax">
hesiod </EM>
class is named for an information service from MIT's Project Athena. It is used to share information about various systems databases, such as users, groups, printers and so on. The keyword <CODE CLASS="Program-Process">
hs</CODE>
is a synonym for hesiod.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1024705">
</A>
Another MIT development is CHAOSnet, a LAN protocol created in the mid-1970s. Zone data for it can be specified with the <CODE CLASS="Program-Process">
chaos</CODE>
class.</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=1024807">
</A>
5.2.20.3 Zone Options</H5>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031068">
</A>
<CODE CLASS="Program-Process">
allow-query</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031070">
</A>
See the description of <CODE CLASS="Program-Process">
allow-query</CODE>
Access Control</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031075">
</A>
<CODE CLASS="Program-Process">
allow-transfer</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031077">
</A>
See the description of <CODE CLASS="Program-Process">
allow-transfer</CODE>
Access Control</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031082">
</A>
<CODE CLASS="Program-Process">
allow-update</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031084">
</A>
Specifies which hosts are allowed to submit Dynamic DNS updates for master zones. The default is to deny updates from all hosts.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031086">
</A>
<CODE CLASS="Program-Process">
update-policy</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031088">
</A>
Specifies a "Simple Secure Update" policy. See description below.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031090">
</A>
<CODE CLASS="Program-Process">
allow-update-forwarding</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031092">
</A>
Specifies which hosts are allowed to submit Dynamic DNS updates to slave zones to be forwarded to the master. The default is to deny update forwarding from all hosts. <EM CLASS="Emphasis">
Update forwarding is not yet implemented.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031094">
</A>
<CODE CLASS="Program-Process">
also-notify</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031096">
</A>
Only meaningful if <CODE CLASS="Program-Process">
notify</CODE>
is active for this zone. The set of machines that will receive a <EM CLASS="Optional-meta-syntax">
DNS NOTIFY</EM>
message for this zone is made up of all the listed nameservers for the zone (other than the primary master) plus any IP addresses specified with <CODE CLASS="Program-Process">
also-notify</CODE>
.<BR>
<CODE CLASS="Program-Process">
also-notify</CODE>
is not meaningful for stub zones. The default is the empty list.<BR>
<EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031098">
</A>
<CODE CLASS="Program-Process">
check-names</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031103">
</A>
Name Checking</A>
.<BR>
<EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031105">
</A>
<CODE CLASS="Program-Process">
dialup</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031107">
</A>
See the description of <CODE CLASS="Program-Process">
dialup</CODE>
Boolean Options</A>
.<BR>
<EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031112">
</A>
<CODE CLASS="Program-Process">
forward</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031114">
</A>
Only meaningful if the zone has a forwarders list. The <CODE CLASS="Program-Process">
only</CODE>
value causes the lookup to fail after trying the forwarders and getting no answer, while <CODE CLASS="Program-Process">
first</CODE>
would allow a normal lookup to be tried.<BR>
<EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031116">
</A>
<CODE CLASS="Program-Process">
forwarders</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031118">
</A>
Used to override the list of global forwarders. If it is not specified in a zone of type <CODE CLASS="Program-Process">
forward</CODE>
, no forwarding is done for the zone; the global options are not used.</P>
<P CLASS="CellBody">
<A NAME="pgfId=1031119">
</A>
<EM CLASS="Emphasis">
Not yet implemented in BINDv9.</EM>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031121">
</A>
<CODE CLASS="Program-Process">
ixfr-base</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031123">
</A>
Specifies the file name for the transaction log file used for dynamic update and IXFR.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031125">
</A>
<CODE CLASS="Program-Process">
max-transfer-time-in</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031127">
</A>
See the description of<BR>
<CODE CLASS="Program-Process">
max-transfer-time-in</CODE>
Zone Transfers</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031132">
</A>
<CODE CLASS="Program-Process">
max-transfer-idle-in</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031134">
</A>
See the description of<BR>
<CODE CLASS="Program-Process">
max-transfer-idle-in</CODE>
Zone Transfers</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031139">
</A>
<CODE CLASS="Program-Process">
max-transfer-time-out</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031141">
</A>
See the description of<BR>
<CODE CLASS="Program-Process">
max-transfer-time-outn</CODE>
Zone Transfers</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031146">
</A>
<CODE CLASS="Program-Process">
max-transfer-idle-out</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031148">
</A>
See the description of<BR>
<CODE CLASS="Program-Process">
max-transfer-idle-out</CODE>
Zone Transfers</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031153">
</A>
<CODE CLASS="Program-Process">
notify</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031155">
</A>
See the description of <CODE CLASS="Program-Process">
notify</CODE>
Boolean Options</A>
.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031160">
</A>
<CODE CLASS="Program-Process">
pubkey</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031162">
</A>
Represents a public key for this zone. It is needed when this is the top level authoritative zone served by this server and there is no chain of trust to a trusted key. It is considered secure, so that data that it signs will be considered secure. The DNSSEC flags, protocol, and algorithm are specified, as well as a base-64 encoded string representing the key.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031164">
</A>
<CODE CLASS="Program-Process">
transfer-source</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1031166">
</A>
Determines which local address will be bound to the TCP connection used to fetch this zone. If not set, it defaults to a system controlled value which will usually be the address of the interface <EM CLASS="Optional-meta-syntax">
closest to</EM>
the remote end. This address must appear in the remote end's <CODE CLASS="Program-Process">
allow-transfer</CODE>
option for this zone if one is specified.</P>
</TD>
</TR>
</TABLE>
</OL>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=1024815">
</A>
5.2.20.4 Dynamic Update Policies</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1025001">
</A>
BINDv9 supports two alternative methods of granting clients the right to perform dynamic updates to a zone, configured by the <CODE CLASS="Program-Process">
allow-update</CODE>
and <CODE CLASS="Program-Process">
update-policy</CODE>
option, respectively.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1024859">
</A>
The <CODE CLASS="Program-Process">
allow-update</CODE>
clause works the same way as in previous versions of BIND. It grants given clients the permission to update any record of any name in the zone.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1024862">
</A>
The <CODE CLASS="Program-Process">
update-policy</CODE>
clause is new in BINDv9 and allows more fine-grained control over what updates are allowed. A set of rules is specified, where each rule either grants or denies permissions for one or more names to be updated by one or more identities. If the dynamic update request message is signed (that is, it includes either a TSIG or SIG(0) record), the identity of the signer can be determined.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1024826">
</A>
Rules are specified in the <CODE CLASS="Program-Process">
update-policy</CODE>
zone option, and are only meaninful for master zones. When the <CODE CLASS="Program-Process">
update-policy</CODE>
statement is present, it is a configuration error for the <CODE CLASS="Program-Process">
allow-update</CODE>
statement to be present. The <CODE CLASS="Program-Process">
update-policy</CODE>
statement only examines the signer of a message; the source address is not relevant.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1024827">
</A>
A rule definition looks like:</P>
<PRE>
<CODE>( grant | deny ) identity nametype nam [ types ]
</CODE>
</PRE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1024829">
</A>
Each rule grants or denies privileges. Once a messages has successfully matched a rule, the operation is immediately granted or denied - no further rules are examined. A rule is matched when the signer matches the identity field, the name matches the name field, and the type is specified in the type field.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1024969">
</A>
The identity field specifies a name or a wildcard name. The nametype field has 4 values: <EM CLASS="Emphasis">
name</EM>
, <EM CLASS="Emphasis">
subdomain</EM>
, <EM CLASS="Emphasis">
wildcard</EM>
, and <EM CLASS="Emphasis">
self</EM>
. </P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024972">
</A>
<EM CLASS="variable">
name</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024974">
</A>
Matches when the updated name is the same as the name in the name field.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024976">
</A>
<EM CLASS="variable">
subdomain</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024978">
</A>
Matches when the updated name is a subdomain of the name in the name field.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024980">
</A>
<EM CLASS="variable">
wildcard</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024982">
</A>
Matches when the updated name is a valid expansion of the wildcard name in the name field.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024984">
</A>
<EM CLASS="variable">
self</EM>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1024986">
</A>
Matches when the updated name is the same as the message signer. The name field is ignored.</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=1025025">
</A>
If no types are specified, the rule matches all types except SIG, NS, SOA, and NXT. Types may be specified by name, including "ANY" (ANY matches all types except NXT, which can never be updated).</P>
</DIV>
</DIV>
</DIV>
<DIV>
<OL>
<H3 CLASS="2Level">
<A NAME="pgfId=1024987">
</A>
5.3 Zone File</H3>
</OL>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=1024701">
</A>
5.3.1 <A NAME="29114">
</A>
Types of Resource Records and When to Use Them</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1024991">
</A>
This section, largely borrowed from RFC 1034, describes the concept of a Resource Record (RR) and explains when each is used. Since the publication of RFC 1034, several new RRs have been identified and implemented in the DNS. These are also included.</P>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=998303">
</A>
5.3.1.1 Resource Records</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998304">
</A>
A domain name identifies a node. Each node has a set of resource information, which may be empty. The set of resource information associated with a particular name is composed of separate RRs. The order of RRs in a set is not significant and need not be preserved by nameservers, resolvers, or other parts of the DNS. However, sorting of multiple RRs is permitted for optimization purposes, for example, to specify that a particular nearby server be tried first. See <A HREF="Bv9ARM.5.html#39491" CLASS="XRef">
The sortlist Statement</A>
RRset Ordering</A>
for details.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998332">
</A>
The components of a RR are</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998313">
</A>
owner name</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998315">
</A>
the domain name where the RR is found.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998317">
</A>
type</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998319">
</A>
an encoded 16 bit value that specifies the type of the resource in this resource record. Types refer to abstract resources.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998321">
</A>
TTL</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998323">
</A>
the time to live of the RR. This field is a 32 bit integer in units of seconds, and is primarily used by resolvers when they cache RRs. The TTL describes how long a RR can be cached before it should be discarded.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998325">
</A>
class</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998327">
</A>
an encoded 16 bit value that identifies a protocol family or instance of a protocol.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998329">
</A>
RDATA</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998331">
</A>
the type and sometimes class-dependent data that describes the resource.</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998333">
</A>
The following are <EM CLASS="Optional-meta-syntax">
types</EM>
of valid RRs (some of these listed, although not obsolete, are experimental (x) or historical (h) and no longer in general use):</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998336">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998338">
</A>
a host address.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998340">
</A>
A6</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998342">
</A>
an IPv6 address.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998344">
</A>
AAAA</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998346">
</A>
Obsolete format of IPv6 address</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998348">
</A>
AFSDB</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998350">
</A>
(x) location of AFS database servers. Experimental.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998352">
</A>
CNAME</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998354">
</A>
identifies the canonical name of an alias.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998356">
</A>
DNAME</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998358">
</A>
for delegation of reverse addresses. Replaces the domain name specified with another name to be looked up. Described in RFC 2672.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998360">
</A>
HINFO</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998362">
</A>
identifies the CPU and OS used by a host.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998364">
</A>
ISDN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998366">
</A>
(x) representation of ISDN addresses. Experimental.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998368">
</A>
KEY</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998370">
</A>
stores a public key associated with a DNS name.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998372">
</A>
LOC</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998374">
</A>
(x) for storing GPS info. See RFC 1876. Experimental.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998376">
</A>
MX</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998378">
</A>
identifies a mail exchange for the domain. See RFC 974 for details.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998380">
</A>
NS</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998382">
</A>
the authoritative nameserver for the domain.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998384">
</A>
NXT</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998386">
</A>
used in DNSSEC to securely indicate that RRs with an owner name in a certain name interval do not exist in a zone and indicate what RR types are present for an existing name. See RFC 2535 for details.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998388">
</A>
PTR</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998390">
</A>
a pointer to another part of the domain name space.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998392">
</A>
RP</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998394">
</A>
(x) information on persons responsible for the domain. Experimental.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998396">
</A>
RT</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998398">
</A>
(x) route-through binding for hosts that do not have their own direct wide area network addresses. Experimental.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998400">
</A>
SIG</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998402">
</A>
("signature") contains data authenticated in the secure DNS. See RFC 2535 for details.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998404">
</A>
SOA</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998406">
</A>
identifies the start of a zone of authority.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998408">
</A>
SRV</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998410">
</A>
information about well known network services (replaces WKS).</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998412">
</A>
WKS</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998414">
</A>
(h) information about which well known network services, such as SMTP, that a domain supports. Historical, replaced by newer RR SRV.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998416">
</A>
X25</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998418">
</A>
(x) representation of X.25 network addresses. Experimental.</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998431">
</A>
The following <EM CLASS="Optional-meta-syntax">
classes</EM>
of resource records are currently valid in the DNS:</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998421">
</A>
IN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998423">
</A>
the Internet system.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="2">
<P CLASS="CellBody">
<A NAME="pgfId=1030860">
</A>
Historical DNS Information</A>
of Appendix B .</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998432">
</A>
<EM CLASS="Optional-meta-syntax">
RDATA</EM>
is the type-dependent or class-dependent data that describes the resource:</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998435">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998437">
</A>
for the IN class, a 32 bit IP address</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998439">
</A>
A6</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998441">
</A>
maps a domain name to an IPv6 address, with a provision for indirection for leading "prefix" bits.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998443">
</A>
CNAME</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998445">
</A>
a domain name</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998447">
</A>
DNAME</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998449">
</A>
provides alternate naming to an entire subtree of the domain name space, rather than to a single node. It causes some suffix of a queried name to be substituted with a name from the DNAME record's RDATA.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998451">
</A>
MX</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998453">
</A>
a 16 bit preference value (lower is better) followed by a host name willing to act as a mail exchange for the owner domain.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998455">
</A>
NS</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998457">
</A>
a fully qualified domain name.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998459">
</A>
PTR</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998461">
</A>
a fully qualified doman name.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998463">
</A>
SOA</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998465">
</A>
several fields.</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998466">
</A>
The owner name is often implicit, rather than forming an integral part of the RR. For example, many nameservers internally form tree or hash structures for the name space, and chain RRs off nodes. The remaining RR parts are the fixed header (type, class, TTL) which is consistent for all RRs, and a variable part (RDATA) that fits the needs of the resource being described.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998467">
</A>
The meaning of the TTL field is a time limit on how long an RR can be kept in a cache. This limit does not apply to authoritative data in zones; it is also timed out, but by the refreshing policies for the zone. The TTL is assigned by the administrator for the zone where the data originates. While short TTLs can be used to minimize caching, and a zero TTL prohibits caching, the realities of Internet performance suggest that these times should be on the order of days for the typical host. If a change can be anticipated, the TTL can be reduced prior to the change to minimize inconsistency during the change, and then increased back to its former value following the change.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998468">
</A>
The data in the RDATA section of RRs is carried as a combination of binary strings and domain names. The domain names are frequently used as "pointers" to other data in the DNS.</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=998469">
</A>
5.3.1.2 Textual expression of RRs</H5>
</OL>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998470">
</A>
RRs are represented in binary form in the packets of the DNS protocol, and are usually represented in highly encoded form when stored in a nameserver or resolver. In the examples provided in RFC 1034, a style similar to that used in master files was employed in order to show the contents of RRs. In this format, most RRs are shown on a single line, although continuation lines are possible using parentheses.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998471">
</A>
The start of the line gives the owner of the RR. If a line begins with a blank, then the owner is assumed to be the same as that of the previous RR. Blank lines are often included for readability.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998472">
</A>
Following the owner, we list the TTL, type, and class of the RR. Class and type use the mnemonics defined above, and TTL is an integer before the type field. In order to avoid ambiguity in parsing, type and class mnemonics are disjoint, TTLs are integers, and the type mnemonic is always last. The IN class and TTL values are often omitted from examples in the interests of clarity.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998473">
</A>
The resource data or RDATA section of the RR are given using knowledge of the typical representation for the data.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998511">
</A>
For example, we might show the RRs carried in a message as: </P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998476">
</A>
ISI.EDU.</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998478">
</A>
MX</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998480">
</A>
10 VENERA.ISI.EDU.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998482">
</A>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998484">
</A>
MX</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998486">
</A>
10 VAXA.ISI.EDU</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998488">
</A>
VENERA.ISI.EDU</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998490">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998492">
</A>
128.9.0.32</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998494">
</A>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998496">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998498">
</A>
10.1.0.52</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998500">
</A>
VAXA.ISI.EDU</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998502">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998504">
</A>
10.2.0.27</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998506">
</A>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998508">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998510">
</A>
128.9.0.33</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998512">
</A>
The MX RRs have an RDATA section which consists of a 16 bit number followed by a domain name. The address RRs use a standard IP address format to contain a 32 bit internet address.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998513">
</A>
This example shows six RRs, with two RRs at each of three domain names.</P>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998527">
</A>
Similarly we might see:</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998516">
</A>
XX.LCS.MIT.EDU. IN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998518">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998520">
</A>
10.0.0.44</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998522">
</A>
CH</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998524">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998526">
</A>
MIT.EDU. 2420</P>
</TD>
</TR>
</TABLE>
<P CLASS="4LevelContinued">
<A NAME="pgfId=998528">
</A>
This example shows two addresses for <EM CLASS="pathname">
XX.LCS.MIT.EDU</EM>
, each of a different class.</P>
</DIV>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998529">
</A>
5.3.2 Discussion of MX Records</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998530">
</A>
As described above, domain servers store information as a series of resource records, each of which contains a particular piece of information about a given domain name (which is usually, but not always, a host). The simplest way to think of a RR is as a typed pair of datum, a domain name matched with relevant data, and stored with some additional type information to help systems determine when the RR is relevant.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998531">
</A>
MX records are used to control delivery of email. The data specified in the record is a priority and a domain name. The priority controls the order in which email delivery is attempted, with the lowest number first. If two priorities are the same, a server is chosen randomly. If no servers at a given priority are responding, the mail transport agent will fall back to the next largest priority. Priority numbers do not have any absolute meaning - they are relevant only respective to other MX records for that domain name. The domain name given is the machine to which the mail will be delivered. It <EM CLASS="Optional-meta-syntax">
must</EM>
have an associated A record--a CNAME is not sufficient.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998532">
</A>
For a given domain, if there is both a CNAME record and an MX record, the MX record is in error, and will be ignored. Instead, the mail will be delivered to the server specified in the MX record pointed to by the CNAME.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998584">
</A>
For example:</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998535">
</A>
example.com.</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998537">
</A>
IN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998539">
</A>
MX</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998541">
</A>
10</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998543">
</A>
mail.foo.com.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998545">
</A>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998547">
</A>
IN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998549">
</A>
MX</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998551">
</A>
10</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998553">
</A>
mail2.foo.com.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998555">
</A>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998557">
</A>
IN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998559">
</A>
MX</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998561">
</A>
20</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998563">
</A>
mail.backup.org.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998565">
</A>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998567">
</A>
IN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998569">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998571">
</A>
10.0.0.1</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998573">
</A>
</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998575">
</A>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998577">
</A>
IN</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998579">
</A>
A</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998581">
</A>
10.0.0.2</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody-fixedfontLG">
<A NAME="pgfId=998583">
</A>
</P>
</TD>
</TR>
</TABLE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998585">
</A>
Mail delivery will be attempted to mail.foo.com and mail2.foo.com (in any order), and if neither of those succeed, delivery to mail.backup.org will be attempted.</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998586">
</A>
5.3.3 <A NAME="19693">
</A>
Setting TTLs</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998587">
</A>
The time to live of the RR field is a 32 bit integer represented in units of seconds, and is primarily used by resolvers when they cache RRs. The TTL describes how long a RR can be cached before it should be discarded. The following three types of TTL are currently used in a zone file.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998602">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998590">
</A>
SOA</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998592">
</A>
The last field in the SOA is the negative caching TTL. This controls how long other servers will cache no-such-domain (NXDOMAIN) responses from you.</P>
<P CLASS="CellBody">
<A NAME="pgfId=998593">
</A>
The maximum time for negative caching is 3 hours (3h).</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998595">
</A>
$TTL</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998597">
</A>
The $TTL directive at the top of the zone file (before the SOA) gives a default TTL for every RR without a specific TTL set.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998599">
</A>
RR TTLs</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998601">
</A>
Each RR can have a TTL as the second field in the RR, which will control how long other servers can cache the it.</P>
</TD>
</TR>
</TABLE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998603">
</A>
All of these TTLs default to units of seconds, though units can be explicitly specified, e.g. <EM CLASS="Optional-meta-syntax">
1h30m</EM>
. </P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998604">
</A>
5.3.4 Inverse Mapping in IPv4</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998605">
</A>
Reverse name resolution (i.e., translation from IP address to name) is achieved by means of the in-addr.arpa domain and PTR records. Entries in the in-addr.arpa domain are made in least-to-most significant order, read left to right. This is the opposite order to the way IP addresses are usually written. Thus, a machine with an IP address of 10.1.2.3 would have a corresponding in-addr.arpa name of<BR>
3.2.1.10.in-addr.arpa. This name should have a PTR resource record whose data field is the name of the machine or, optionally, multiple PTR records if the machine has more than one name. For example, in the <EM CLASS="Optional-meta-syntax">
example.com</EM>
domain:</P>
<PRE CLASS="3Level-fixed"><A NAME="pgfId=998606"></A>
$ORIGIN 2.1.10.in-addr.arpa
3 IN PTR foo.example.com.</PRE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998607">
</A>
(Note: The <CODE CLASS="Program-Process">
$ORIGIN</CODE>
lines in the examples are for providing context to the examples only--they do not necessarily appear in the actual usage. They are only used here to indicate that the example is relative to the listed origin.)</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998608">
</A>
5.3.5 Other Zone File Directives</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998609">
</A>
The Master File Format was initially defined in RFC 1035 and has subsequently been extended. While the Master File Format itself is class independent all records in a Master File must be of the same class.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998610">
</A>
Master File Directives include <CODE CLASS="Program-Process">
$ORIGIN</CODE>
, <CODE CLASS="Program-Process">
$INCLUDE</CODE>
, and <CODE CLASS="Program-Process">
$TTL.</CODE>
</P>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=998611">
</A>
5.3.5.1 The <CODE CLASS="Program-Process">
$ORIGIN</CODE>
Directive</H5>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998612">
</A>
Syntax: <CODE>$ORIGIN < <EM>domain-name</EM> > [<<EM>comment</EM>>]</CODE>
</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998613">
</A>
<CODE CLASS="Program-Process">
$ORIGIN </CODE>
sets the domain name that will be appended to any unqualified records. When a zone is first read in there is an implicit <CODE CLASS="Program-Process">
$ORIGIN </CODE>
<<EM CLASS="variable">
zone-name</EM>
><CODE CLASS="Program-Process">
.</CODE>
The current <CODE CLASS="Program-Process">
$ORIGIN</CODE>
is appended to the domain specified in the <CODE CLASS="Program-Process">
$ORIGIN</CODE>
argument if it is not absolute.</P>
<PRE>
<CODE>$ORIGIN example.com
WWW CNAME MAIN-SERVER</CODE>
</PRE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998615">
</A>
is equivalent to</P>
<PRE>
</CODE>
</PRE>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=998617">
</A>
5.3.5.2 The <CODE CLASS="Program-Process">
$INCLUDE</CODE>
Directive</H5>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998618">
</A>
<PRE>
Syntax: <CODE>$INCLUDE < filename> [< origin>] [<comment>]</CODE>
</PRE>
</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998619">
</A>
Read and process the file <EM CLASS="pathname">
filename</EM>
as if it were included into the file at this point. If <CODE CLASS="Program-Process">
origin</CODE>
is specified the file is processed with <CODE CLASS="Program-Process">
$ORIGIN </CODE>
set to that value, otherwise the current <CODE CLASS="Program-Process">
$ORIGIN</CODE>
is used.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998620">
</A>
<EM CLASS="Emphasis">
NOTE:</EM>
The behavior when <CODE CLASS="Program-Process">
origin</CODE>
is specified differs from that described in RFC 1035. The origin and current domain revert to the values they were prior to the <CODE CLASS="Program-Process">
$INCLUDE</CODE>
once the file has been read.</P>
</DIV>
<DIV>
<OL>
<H5 CLASS="4Level">
<A NAME="pgfId=998621">
</A>
5.3.5.3 The <CODE CLASS="Program-Process">
$TTL</CODE>
Directive</H5>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998622">
</A>
<PRE>
<CODE>Syntax: $TTL <default-ttl> [<comment>]
</CODE>
</PRE>
</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998623">
</A>
Set the default Time To Live (TTL) for subsequent records with undefined TTLs. Valid TTLs are of the range 0-2147483647 seconds.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998624">
</A>
<CODE CLASS="Program-Process">
$TTL</CODE>
is defined in RFC 2308.</P>
</DIV>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998625">
</A>
5.3.6 BIND Master File Extension: the <CODE CLASS="Program-Process">
$GENERATE</CODE>
Directive</H4>
</OL>
<PRE CLASS="3Level-fixed"><A NAME="pgfId=998626"></A>
$GENERATE</PRE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998627">
</A>
Syntax: <CODE CLASS="Program-Process">
$GENERATE <</CODE>
<EM CLASS="variable">
range</EM>
<CODE CLASS="Program-Process">
> <</CODE>
<EM CLASS="variable">
lhs</EM>
<CODE CLASS="Program-Process">
> <</CODE>
<EM CLASS="variable">
type</EM>
<CODE CLASS="Program-Process">
> <</CODE>
<EM CLASS="variable">
rhs</EM>
<CODE CLASS="Program-Process">
> </CODE>
<EM CLASS="Optional-meta-syntax">
[</EM>
<CODE CLASS="Program-Process">
<</CODE>
<EM CLASS="variable">
comment</EM>
<CODE CLASS="Program-Process">
></CODE>
<EM CLASS="Optional-meta-syntax">
]</EM>
</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998628">
</A>
<CODE CLASS="Program-Process">
$GENERATE</CODE>
is used to create a series of resource records that only differ from each other by an iterator. <CODE CLASS="Program-Process">
$GENERATE </CODE>
can be used to easily generate the sets of records required to support sub /24 reverse delegations described in RFC 2317: Classless IN-ADDR.ARPA delegation.</P>
<PRE CLASS="3Level-fixed"><A NAME="pgfId=998629"></A>
$ORIGIN 0.0.192.IN-ADDR.ARPA.
$GENERATE 1-2 0 NS SERVER$.EXAMPLE.
$GENERATE 1-127 $ CNAME $.0</PRE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998630">
</A>
is equivalent to</P>
<PRE CLASS="3Level-fixed"><A NAME="pgfId=998631"></A>
...
.</PRE>
<P CLASS="3LevelContinued21">
<A NAME="pgfId=998649">
</A>
<CODE CLASS="Program-Process">
</CODE>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998634">
</A>
<CODE CLASS="Program-Process">
range</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998636">
</A>
This can be one of two forms: start-stop or start-stop/step. If the first form is used then step is set to 1. All of start, stop and step must be positive.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998638">
</A>
<CODE CLASS="Program-Process">
lhs</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998640">
</A>
<CODE CLASS="Program-Process">
lhs</CODE>
describes the owner name of the resource records to be created. Any single <CODE CLASS="Program-Process">
$</CODE>
symbols within the <CODE CLASS="Program-Process">
lhs</CODE>
side are replaced by the iterator value. To get a $ in the output use a double <CODE CLASS="Program-Process">
$</CODE>
$$</CODE>
. If the <CODE CLASS="Program-Process">
lhs</CODE>
is not absolute, the current <CODE CLASS="Program-Process">
$ORIGIN </CODE>
is appended to the name.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998642">
</A>
<CODE CLASS="Program-Process">
type</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998644">
</A>
At present the only supported types are PTR, CNAME and NS.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998646">
</A>
<CODE CLASS="Program-Process">
rhs</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=998648">
</A>
rhs is a domain name. It is processed similarly to lhs.</P>
</TD>
</TR>
</TABLE>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1024137">
</A>
The <CODE CLASS="Program-Process">
$GENERATE</CODE>
directive is a BIND extension and not part of the standard zone file format. <EM CLASS="Emphasis">
It is not yet implemented in BINDv9.</EM>
</P>
</DIV>
<DIV>
<OL>
<H4 CLASS="3Level">
<A NAME="pgfId=998650">
</A>
5.3.7 Signals</H4>
</OL>
<P CLASS="3LevelContinued">
<A NAME="pgfId=998651">
</A>
Certain UNIX signals cause the name server to take specific actions, as described in the following table. These signals can be sent using the <CODE CLASS="Program-Process">
kill</CODE>
command.</P>
<P CLASS="3LevelContinued">
<A NAME="pgfId=1073295">
</A>
</P>
<TABLE>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073306">
</A>
<CODE CLASS="Program-Process">
SIGHUP</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073308">
</A>
Causes the server to read <CODE CLASS="Program-Process">
named.conf</CODE>
and reload the database. </P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073310">
</A>
<CODE CLASS="Program-Process">
SIGTERM</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073312">
</A>
Causes the server to clean up and exit.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073322">
</A>
<CODE CLASS="Program-Process">
SIGINT</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073324">
</A>
Causes the server to clean up and exit.</P>
</TD>
</TR>
<TR>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073326">
</A>
<CODE CLASS="Program-Process">
SIGQUIT</CODE>
</P>
</TD>
<TD ROWSPAN="1" COLSPAN="1">
<P CLASS="CellBody">
<A NAME="pgfId=1073328">
</A>
Causes the server to clean up and exit.</P>
</TD>
</TR>
</TABLE>
</DIV>
</DIV>
</BODY>
</HTML>