Bv9ARM.ch06.html revision 85d259b3cf22bdbf7c1c1dadd95dfea4d5a84375
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - Copyright (C) 2004-2013 Internet Systems Consortium, Inc. ("ISC")
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews - Copyright (C) 2000-2003 Internet Software Consortium.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - Permission to use, copy, modify, and/or distribute this software for any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - purpose with or without fee is hereby granted, provided that the above
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - copyright notice and this permission notice appear in all copies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - PERFORMANCE OF THIS SOFTWARE.
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews<!-- $Id$ -->
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<title>Chapter�6.�BIND 9 Configuration Reference</title>
cedb0bd0c1e3c461b7e479a16d3adfd5b150f1f4Mark Andrews<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="prev" href="Bv9ARM.ch05.html" title="Chapter�5.�The BIND 9 Lightweight Resolver">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="next" href="Bv9ARM.ch07.html" title="Chapter�7.�BIND 9 Security Considerations">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<tr><th colspan="3" align="center">Chapter�6.�<acronym class="acronym">BIND</acronym> 9 Configuration Reference</th></tr>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="Bv9ARM.ch05.html">Prev</a>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch07.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="Bv9ARM.ch06"></a>Chapter�6.�<acronym class="acronym">BIND</acronym> 9 Configuration Reference</h2></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect1"><a href="Bv9ARM.ch06.html#configuration_file_elements">Configuration File Elements</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#address_match_lists">Address Match Lists</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2574782">Comment Syntax</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect1"><a href="Bv9ARM.ch06.html#Configuration_File_Grammar">Configuration File Grammar</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2575443"><span><strong class="command">acl</strong></span> Statement Grammar</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#acl"><span><strong class="command">acl</strong></span> Statement Definition and
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2575686"><span><strong class="command">controls</strong></span> Statement Grammar</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#controls_statement_definition_and_usage"><span><strong class="command">controls</strong></span> Statement Definition and
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2576045"><span><strong class="command">include</strong></span> Statement Grammar</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2576062"><span><strong class="command">include</strong></span> Statement Definition and
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2576086"><span><strong class="command">key</strong></span> Statement Grammar</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2576109"><span><strong class="command">key</strong></span> Statement Definition and Usage</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2576268"><span><strong class="command">logging</strong></span> Statement Grammar</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2576531"><span><strong class="command">logging</strong></span> Statement Definition and
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2578522"><span><strong class="command">lwres</strong></span> Statement Grammar</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2578606"><span><strong class="command">lwres</strong></span> Statement Definition and Usage</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2578739"><span><strong class="command">masters</strong></span> Statement Grammar</a></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2578788"><span><strong class="command">masters</strong></span> Statement Definition and
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2578809"><span><strong class="command">options</strong></span> Statement Grammar</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#options"><span><strong class="command">options</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#server_statement_grammar"><span><strong class="command">server</strong></span> Statement Grammar</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#server_statement_definition_and_usage"><span><strong class="command">server</strong></span> Statement Definition and
cedb0bd0c1e3c461b7e479a16d3adfd5b150f1f4Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#statschannels"><span><strong class="command">statistics-channels</strong></span> Statement Grammar</a></span></dt>
cedb0bd0c1e3c461b7e479a16d3adfd5b150f1f4Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2591972"><span><strong class="command">statistics-channels</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#trusted-keys"><span><strong class="command">trusted-keys</strong></span> Statement Grammar</a></span></dt>
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2592254"><span><strong class="command">trusted-keys</strong></span> Statement Definition
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2592301"><span><strong class="command">managed-keys</strong></span> Statement Grammar</a></span></dt>
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#managed-keys"><span><strong class="command">managed-keys</strong></span> Statement Definition
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#view_statement_grammar"><span><strong class="command">view</strong></span> Statement Grammar</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2592743"><span><strong class="command">view</strong></span> Statement Definition and Usage</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#zone_statement_grammar"><span><strong class="command">zone</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2594732"><span><strong class="command">zone</strong></span> Statement Definition and Usage</a></span></dt>
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch06.html#id2598282">Zone File</a></span></dt>
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch06.html#types_of_resource_records_and_when_to_use_them">Types of Resource Records and When to Use Them</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2600513">Discussion of MX Records</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#Setting_TTLs">Setting TTLs</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2601196">Inverse Mapping in IPv4</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2601323">Other Zone File Directives</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#id2601528"><acronym class="acronym">BIND</acronym> Master File Extension: the <span><strong class="command">$GENERATE</strong></span> Directive</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect2"><a href="Bv9ARM.ch06.html#zonefile_format">Additional File Formats</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect1"><a href="Bv9ARM.ch06.html#statistics">BIND9 Statistics</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dd><dl><dt><span class="sect2"><a href="Bv9ARM.ch06.html#statistics_counters">Statistics Counters</a></span></dt></dl></dd>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 9 configuration is broadly similar
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to <acronym class="acronym">BIND</acronym> 8; however, there are a few new
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of configuration, such as views. <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 8 configuration files should work with few alterations in <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 9, although more complex configurations should be reviewed to check
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if they can be more efficiently implemented using the new features
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein found in <acronym class="acronym">BIND</acronym> 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 4 configuration files can be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein converted to the new format
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein using the shell script
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">contrib/named-bootconf/named-bootconf.sh</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title" style="clear: both">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="configuration_file_elements"></a>Configuration File Elements</h2></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Following is a list of elements used throughout the <acronym class="acronym">BIND</acronym> configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file documentation:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The name of an <code class="varname">address_match_list</code> as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defined by the <span><strong class="command">acl</strong></span> statement.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A list of one or more
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <code class="varname">ip_prefix</code>, <code class="varname">key_id</code>,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews or <code class="varname">acl_name</code> elements, see
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <a href="Bv9ARM.ch06.html#address_match_lists" title="Address Match Lists">the section called “Address Match Lists”</a>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews A named list of one or more <code class="varname">ip_addr</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with optional <code class="varname">key_id</code> and/or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A <code class="varname">masters_list</code> may include other
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A quoted string which will be used as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a DNS name, for example "<code class="literal">my.test.domain</code>".
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A list of one or more <code class="varname">domain_name</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein One to four integers valued 0 through
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 255 separated by dots (`.'), such as <span><strong class="command">123</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">45.67</strong></span> or <span><strong class="command">89.123.45.67</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An IPv4 address with exactly four elements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in <code class="varname">dotted_decimal</code> notation.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An IPv6 address, such as <span><strong class="command">2001:db8::1234</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6 scoped addresses that have ambiguity on their
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein scope zones must be disambiguated by an appropriate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone ID with the percent character (`%') as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein delimiter. It is strongly recommended to use
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein string zone names rather than numeric identifiers,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in order to be robust against system configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein changes. However, since there is no standard
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein mapping for such names and identifier values,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein currently only interface names as link identifiers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are supported, assuming one-to-one mapping between
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interfaces and links. For example, a link-local
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address <span><strong class="command">fe80::1</strong></span> on the link
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein attached to the interface <span><strong class="command">ne0</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be specified as <span><strong class="command">fe80::1%ne0</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that on most systems link-local addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein always have the ambiguity, and need to be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein disambiguated.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An <code class="varname">ip4_addr</code> or <code class="varname">ip6_addr</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A <code class="varname">number</code> between 0 and 63, used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to select a differentiated services code point (DSCP)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value for use with outgoing traffic on operating systems
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that support DSCP.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <code class="varname">number</code> is limited to 0
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein through 65535, with values
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein below 1024 typically restricted to use by processes running
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In some cases, an asterisk (`*') character can be used as a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein placeholder to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein select a random high-numbered port.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An IP network specified as an <code class="varname">ip_addr</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein followed by a slash (`/') and then the number of bits in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Trailing zeros in a <code class="varname">ip_addr</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may omitted.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, <span><strong class="command">127/8</strong></span> is the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein network <span><strong class="command">127.0.0.0</strong></span> with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein netmask <span><strong class="command">255.0.0.0</strong></span> and <span><strong class="command">1.2.3.0/28</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein network <span><strong class="command">1.2.3.0</strong></span> with netmask <span><strong class="command">255.255.255.240</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When specifying a prefix involving a IPv6 scoped address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the scope may be omitted. In that case the prefix will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein match packets from any scope.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A <code class="varname">domain_name</code> representing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the name of a shared key, to be used for transaction
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A list of one or more
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein separated by semicolons and ending with a semicolon.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A non-negative 32-bit integer
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews (i.e., a number between 0 and 4294967295, inclusive).
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Its acceptable value might further
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews be limited by the context in which it is used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A quoted string which will be used as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a pathname, such as <code class="filename">zones/master/my.test.domain</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A list of an <code class="varname">ip_port</code> or a port
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A port range is specified in the form of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>range</code></strong> followed by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="varname">port_high</code>, which represents
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein port numbers from <code class="varname">port_low</code> through
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="varname">port_high</code>, inclusive.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="varname">port_low</code> must not be larger than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>range 1024 65535</code></strong> represents
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ports from 1024 through 65535.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In either case an asterisk (`*') character is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allowed as a valid <code class="varname">ip_port</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A 64-bit unsigned integer, or the keywords
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>unlimited</code></strong> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>default</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Integers may take values
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 0 <= value <= 18446744073709551615, though
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein certain parameters
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce (such as <span><strong class="command">max-journal-size</strong></span>) may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein use a more limited range within these extremes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In most cases, setting a value to 0 does not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein literally mean zero; it means "undefined" or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "as big as possible", depending on the context.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews See the expalantions of particular parameters
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for details on how they interpret its use.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Numeric values can optionally be followed by a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein scaling factor:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>K</code></strong> or <strong class="userinput"><code>k</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for kilobytes,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>M</code></strong> or <strong class="userinput"><code>m</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for megabytes, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>G</code></strong> or <strong class="userinput"><code>g</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for gigabytes, which scale by 1024, 1024*1024, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 1024*1024*1024 respectively.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="varname">unlimited</code> generally means
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "as big as possible", and is usually the best
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein way to safely set a very large number.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein uses the limit that was in force when the server was started.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Either <strong class="userinput"><code>yes</code></strong> or <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The words <strong class="userinput"><code>true</code></strong> and <strong class="userinput"><code>false</code></strong> are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also accepted, as are the numbers <strong class="userinput"><code>1</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <strong class="userinput"><code>0</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein One of <strong class="userinput"><code>yes</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>no</code></strong>, <strong class="userinput"><code>notify</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>notify-passive</code></strong>, <strong class="userinput"><code>refresh</code></strong> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>passive</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When used in a zone, <strong class="userinput"><code>notify-passive</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>refresh</code></strong>, and <strong class="userinput"><code>passive</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are restricted to slave and stub zones.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="address_match_lists"></a>Address Match Lists</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2574617"></a>Syntax</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><code class="varname">address_match_list</code> = address_match_list_element ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> address_match_list_element; ... </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<code class="varname">address_match_list_element</code> = [<span class="optional"> ! </span>] (ip_address [<span class="optional">/length</span>] |
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein key key_id | acl_name | { address_match_list } )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2574645"></a>Definition and Usage</h4></div></div></div>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews Address match lists are primarily used to determine access
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein control for various server operations. They are also used in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">listen-on</strong></span> and <span><strong class="command">sortlist</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements. The elements which constitute an address match
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein list can be any of the following:
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews a key ID, as defined by the <span><strong class="command">key</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>the name of an address match list defined with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">acl</strong></span> statement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>a nested address match list enclosed in braces</li>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Elements can be negated with a leading exclamation mark (`!'),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and the match list names "any", "none", "localhost", and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "localnets" are predefined. More information on those names
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be found in the description of the acl statement.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews The addition of the key clause made the name of this syntactic
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein element something of a misnomer, since security keys can be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to validate access without regard to a host or network address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Nonetheless, the term "address match list" is still used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein throughout the documentation.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When a given IP address or prefix is compared to an address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein match list, the comparison takes place in approximately O(1)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein time. However, key comparisons require that the list of keys
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be traversed until a matching key is found, and therefore may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be somewhat slower.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The interpretation of a match depends on whether the list is being
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used for access control, defining <span><strong class="command">listen-on</strong></span> ports, or in a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">sortlist</strong></span>, and whether the element was negated.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce When used as an access control list, a non-negated match
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce allows access and a negated match denies access. If
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce there is no match, access is denied. The clauses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-notify</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-recursion</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-recursion-on</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query-on</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query-cache</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query-cache-on</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-transfer</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-update</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-update-forwarding</strong></span>, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">blackhole</strong></span> all use address match
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lists. Similarly, the <span><strong class="command">listen-on</strong></span> option will cause the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server to refuse queries on any of the machine's
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein addresses which do not match the list.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Order of insertion is significant. If more than one element
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce in an ACL is found to match a given IP address or prefix,
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce preference will be given to the one that came
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>first</em></span> in the ACL definition.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Because of this first-match behavior, an element that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defines a subset of another element in the list should
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein come before the broader element, regardless of whether
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein either is negated. For example, in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">1.2.3/24; ! 1.2.3.13;</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the 1.2.3.13 element is completely useless because the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein algorithm will match any lookup for 1.2.3.13 to the 1.2.3/24
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein element. Using <span><strong class="command">! 1.2.3.13; 1.2.3/24</strong></span> fixes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that problem by having 1.2.3.13 blocked by the negation, but
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all other 1.2.3.* hosts fall through.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2574782"></a>Comment Syntax</h3></div></div></div>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce The <acronym class="acronym">BIND</acronym> 9 comment syntax allows for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein comments to appear
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein anywhere that whitespace may appear in a <acronym class="acronym">BIND</acronym> configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file. To appeal to programmers of all kinds, they can be written
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2574797"></a>Syntax</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">/* This is a <acronym class="acronym">BIND</acronym> comment as in C */</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">// This is a <acronym class="acronym">BIND</acronym> comment as in C++</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"># This is a <acronym class="acronym">BIND</acronym> comment as in common UNIX shells
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein# and perl</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2574827"></a>Definition and Usage</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Comments may appear anywhere that whitespace may appear in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a <acronym class="acronym">BIND</acronym> configuration file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein C-style comments start with the two characters /* (slash,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein star) and end with */ (star, slash). Because they are completely
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein delimited with these characters, they can be used to comment only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a portion of a line or to span multiple lines.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein C-style comments cannot be nested. For example, the following
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is not valid because the entire comment ends with the first */:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">/* This is the start of a comment.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is still part of the comment.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein/* This is an incorrect attempt at nesting a comment. */
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is no longer in any comment. */
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein C++-style comments start with the two characters // (slash,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein slash) and continue to the end of the physical line. They cannot
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be continued across multiple physical lines; to have one logical
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein comment span multiple lines, each line must use the // pair.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">// This is the start of a comment. The next line
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein// is a new comment, even though it is logically
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein// part of the previous comment.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Shell-style (or perl-style, if you prefer) comments start
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with the character <code class="literal">#</code> (number sign)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and continue to the end of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein physical line, as in C++ comments.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"># This is the start of a comment. The next line
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein# is a new comment, even though it is logically
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein# part of the previous comment.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein You cannot use the semicolon (`;') character
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to start a comment such as you would in a zone file. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein semicolon indicates the end of a configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title" style="clear: both">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="Configuration_File_Grammar"></a>Configuration File Grammar</h2></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A <acronym class="acronym">BIND</acronym> 9 configuration consists of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements and comments.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Statements end with a semicolon. Statements and comments are the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only elements that can appear without enclosing braces. Many
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements contain a block of sub-statements, which are also
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein terminated with a semicolon.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The following statements are supported:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">acl</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defines a named IP address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein matching list, for access control and other uses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">controls</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein declares control channels to be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by the <span><strong class="command">rndc</strong></span> utility.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">include</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein includes a file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">key</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specifies key information for use in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authentication and authorization using TSIG.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">logging</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specifies what the server logs, and where
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the log messages are sent.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">lwres</strong></span></p>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews configures <span><strong class="command">named</strong></span> to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews also act as a light-weight resolver daemon (<span><strong class="command">lwresd</strong></span>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">masters</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defines a named masters list for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein inclusion in stub and slave zones'
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">masters</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">also-notify</strong></span> lists.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">options</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein controls global server configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein options and sets defaults for other statements.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">server</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sets certain configuration options on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a per-server basis.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">statistics-channels</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein declares communication channels to get access to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> statistics.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">trusted-keys</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defines trusted DNSSEC keys.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">managed-keys</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lists DNSSEC keys to be kept up to date
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein using RFC 5011 trust anchor maintenance.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">view</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defines a view.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <p><span><strong class="command">zone</strong></span></p>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews defines a zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">logging</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">options</strong></span> statements may only occur once
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuration.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2575443"></a><span><strong class="command">acl</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">acl</strong></span> acl-name {
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews address_match_list
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<div class="titlepage"><div><div><h3 class="title">
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<a name="acl"></a><span><strong class="command">acl</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">acl</strong></span> statement assigns a symbolic
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews name to an address match list. It gets its name from a primary
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein use of address match lists: Access Control Lists (ACLs).
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Note that an address match list's name must be defined
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with <span><strong class="command">acl</strong></span> before it can be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein elsewhere; no forward references are allowed.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The following ACLs are built-in:
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <p><span><strong class="command">any</strong></span></p>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Matches all hosts.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <p><span><strong class="command">none</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Matches no hosts.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">localhost</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Matches the IPv4 and IPv6 addresses of all network
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews interfaces on the system.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <p><span><strong class="command">localnets</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Matches any host on an IPv4 or IPv6 network
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews for which the system has an interface.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Some systems do not provide a way to determine the prefix
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein local IPv6 addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In such a case, <span><strong class="command">localnets</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only matches the local
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6 addresses, just like <span><strong class="command">localhost</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When <acronym class="acronym">BIND</acronym> 9 is built with GeoIP support,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ACLs can also be used for geographic access restrictions.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is done by specifying an ACL element of the form:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">geoip [<span class="optional">db <em class="replaceable"><code>database</code></em></span>] <em class="replaceable"><code>field</code></em> <em class="replaceable"><code>value</code></em></strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <em class="replaceable"><code>field</code></em> indicates which field
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to search for a match. Available fields are "country",
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "region", "city", "continent", "postal" (postal code),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "metro" (metro code), "area" (area code), "tz" (timezone),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "isp", "org", "asnum", "domain" and "netspeed".
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>value</code></em> is the value to searched for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein within the database. A string may be quoted if it contains
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews spaces or other special characters. If this is a "country"
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews search and the string is two characters long, then it must be a
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews standard ISO-3166-1 two-letter country code, and if it is three
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein characters long then it must be an ISO-3166-1 three-letter
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein country code; otherwise it is the full name of the country.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Similarly, if this is a "region" search and the string is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein two characters long, then it must be a standard two-letter state
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews or province abbreviation; otherwise it is the full name of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein state or province.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <em class="replaceable"><code>database</code></em> field indicates which
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews GeoIP database to search for a match. In most cases this is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein unnecessary, because most search fields can only be found in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a single database. However, searches for country can be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein answered from the "city", "region", or "country" databases,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and searches for region (i.e., state or provice) can be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein answered from the "city" or "region" databases. For these
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein search types, specifying a <em class="replaceable"><code>database</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will force the query to be answered from that database and no
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein other. If <em class="replaceable"><code>database</code></em> is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified, then these queries will be answered from the "city",
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein database if it is installed, or the "region" database if it is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein installed, or the "country" database, in that order.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Some example GeoIP ACLs:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeingeoip country JAP;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeingeoip db country country Canada;
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Lucegeoip db region region WA;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeingeoip city "San Francisco";
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeingeoip region Oklahoma;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeingeoip postal 95062;
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrewsgeoip org "Internet Systems Consortium";
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2575686"></a><span><strong class="command">controls</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">controls</strong></span> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ inet ( ip_addr | * ) [ port ip_port ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allow { <em class="replaceable"><code> address_match_list </code></em> }
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein keys { <em class="replaceable"><code>key_list</code></em> }; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ inet ...; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ unix <em class="replaceable"><code>path</code></em> perm <em class="replaceable"><code>number</code></em> owner <em class="replaceable"><code>number</code></em> group <em class="replaceable"><code>number</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein keys { <em class="replaceable"><code>key_list</code></em> }; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ unix ...; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="controls_statement_definition_and_usage"></a><span><strong class="command">controls</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">controls</strong></span> statement declares control
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein channels to be used by system administrators to control the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein operation of the name server. These control channels are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used by the <span><strong class="command">rndc</strong></span> utility to send
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein commands to and retrieve non-DNS results from a name server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An <span><strong class="command">inet</strong></span> control channel is a TCP socket
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein listening at the specified <span><strong class="command">ip_port</strong></span> on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified <span><strong class="command">ip_addr</strong></span>, which can be an IPv4 or IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address. An <span><strong class="command">ip_addr</strong></span> of <code class="literal">*</code> (asterisk) is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interpreted as the IPv4 wildcard address; connections will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein accepted on any of the system's IPv4 addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To listen on the IPv6 wildcard address,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein use an <span><strong class="command">ip_addr</strong></span> of <code class="literal">::</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If you will only use <span><strong class="command">rndc</strong></span> on the local host,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein using the loopback address (<code class="literal">127.0.0.1</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or <code class="literal">::1</code>) is recommended for maximum security.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no port is specified, port 953 is used. The asterisk
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews "<code class="literal">*</code>" cannot be used for <span><strong class="command">ip_port</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The ability to issue commands over the control channel is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein restricted by the <span><strong class="command">allow</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">keys</strong></span> clauses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Connections to the control channel are permitted based on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">address_match_list</strong></span>. This is for simple
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IP address based filtering only; any <span><strong class="command">key_id</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein elements of the <span><strong class="command">address_match_list</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are ignored.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A <span><strong class="command">unix</strong></span> control channel is a UNIX domain
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce socket listening at the specified path in the file system.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Access to the socket is specified by the <span><strong class="command">perm</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">owner</strong></span> and <span><strong class="command">group</strong></span> clauses.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Note on some platforms (SunOS and Solaris) the permissions
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce (<span><strong class="command">perm</strong></span>) are applied to the parent directory
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce as the permissions on the socket itself are ignored.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The primary authorization mechanism of the command
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein channel is the <span><strong class="command">key_list</strong></span>, which
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews contains a list of <span><strong class="command">key_id</strong></span>s.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each <span><strong class="command">key_id</strong></span> in the <span><strong class="command">key_list</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is authorized to execute commands over the control channel.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See <a href="Bv9ARM.ch03.html#rndc">Remote Name Daemon Control application</a> in <a href="Bv9ARM.ch03.html#admin_tools" title="Administrative Tools">the section called “Administrative Tools”</a>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for information about configuring keys in <span><strong class="command">rndc</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no <span><strong class="command">controls</strong></span> statement is present,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will set up a default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein control channel listening on the loopback address 127.0.0.1
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and its IPv6 counterpart ::1.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In this case, and also when the <span><strong class="command">controls</strong></span> statement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is present but does not have a <span><strong class="command">keys</strong></span> clause,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will attempt to load the command channel key
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from the file <code class="filename">rndc.key</code> in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">/etc</code> (or whatever <code class="varname">sysconfdir</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein was specified as when <acronym class="acronym">BIND</acronym> was built).
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson To create a <code class="filename">rndc.key</code> file, run
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson <strong class="userinput"><code>rndc-confgen -a</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <code class="filename">rndc.key</code> feature was created to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ease the transition of systems from <acronym class="acronym">BIND</acronym> 8,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which did not have digital signatures on its command channel
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein messages and thus did not have a <span><strong class="command">keys</strong></span> clause.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It makes it possible to use an existing <acronym class="acronym">BIND</acronym> 8
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuration file in <acronym class="acronym">BIND</acronym> 9 unchanged,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and still have <span><strong class="command">rndc</strong></span> work the same way
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">ndc</strong></span> worked in BIND 8, simply by executing the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein command <strong class="userinput"><code>rndc-confgen -a</code></strong> after BIND 9 is
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews Since the <code class="filename">rndc.key</code> feature
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is only intended to allow the backward-compatible usage of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 8 configuration files, this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein feature does not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein have a high degree of configurability. You cannot easily change
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the key name or the size of the secret, so you should make a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">rndc.conf</code> with your own key if you
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein wish to change
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein those things. The <code class="filename">rndc.key</code> file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also has its
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein permissions set such that only the owner of the file (the user that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> is running as) can access it.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein desire greater flexibility in allowing other users to access
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">rndc</strong></span> commands, then you need to create
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">rndc.conf</code> file and make it group
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein readable by a group
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that contains the users who should have access.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To disable the command channel, use an empty
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">controls</strong></span> statement:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">controls { };</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2576045"></a><span><strong class="command">include</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">include</strong></span> <em class="replaceable"><code>filename</code></em>;</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2576062"></a><span><strong class="command">include</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">include</strong></span> statement inserts the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified file at the point where the <span><strong class="command">include</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement is encountered. The <span><strong class="command">include</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement facilitates the administration of configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by permitting the reading or writing of some things but not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein others. For example, the statement could include private keys
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that are readable only by the name server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2576086"></a><span><strong class="command">key</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">key</strong></span> <em class="replaceable"><code>key_id</code></em> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein algorithm <em class="replaceable"><code>string</code></em>;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein secret <em class="replaceable"><code>string</code></em>;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2576109"></a><span><strong class="command">key</strong></span> Statement Definition and Usage</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">key</strong></span> statement defines a shared
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein secret key for use with TSIG (see <a href="Bv9ARM.ch04.html#tsig" title="TSIG">the section called “TSIG”</a>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or the command channel
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (see <a href="Bv9ARM.ch06.html#controls_statement_definition_and_usage" title="controls Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage">the section called “<span><strong class="command">controls</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage”</a>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">key</strong></span> statement can occur at the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the configuration file or inside a <span><strong class="command">view</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement. Keys defined in top-level <span><strong class="command">key</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements can be used in all views. Keys intended for use in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a <span><strong class="command">controls</strong></span> statement
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce (see <a href="Bv9ARM.ch06.html#controls_statement_definition_and_usage" title="controls Statement Definition and
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Usage">the section called “<span><strong class="command">controls</strong></span> Statement Definition and
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Usage”</a>)
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce must be defined at the top level.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <em class="replaceable"><code>key_id</code></em>, also known as the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein key name, is a domain name uniquely identifying the key. It can
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be used in a <span><strong class="command">server</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement to cause requests sent to that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server to be signed with this key, or in address match lists to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein verify that incoming requests have been signed with a key
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein matching this name, algorithm, and secret.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <em class="replaceable"><code>algorithm_id</code></em> is a string
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that specifies a security/authentication algorithm. Named
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">hmac-sha1</code>, <code class="literal">hmac-sha224</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">hmac-sha256</code>, <code class="literal">hmac-sha384</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <code class="literal">hmac-sha512</code> TSIG authentication.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Truncated hashes are supported by appending the minimum
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein number of required bits preceded by a dash, e.g.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>secret_string</code></em> is the secret
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to be used by the algorithm, and is treated as a base-64
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein encoded string.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2576268"></a><span><strong class="command">logging</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">logging</strong></span> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">channel</strong></span> <em class="replaceable"><code>channel_name</code></em> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ( <span><strong class="command">file</strong></span> <em class="replaceable"><code>path_name</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">versions</strong></span> ( <em class="replaceable"><code>number</code></em> | <span><strong class="command">unlimited</strong></span> ) ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">size</strong></span> <em class="replaceable"><code>size_spec</code></em> ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein | <span><strong class="command">syslog</strong></span> <em class="replaceable"><code>syslog_facility</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein | <span><strong class="command">stderr</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein | <span><strong class="command">null</strong></span> );
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">severity</strong></span> (<code class="option">critical</code> | <code class="option">error</code> | <code class="option">warning</code> | <code class="option">notice</code> |
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">info</code> | <code class="option">debug</code> [ <em class="replaceable"><code>level</code></em> ] | <code class="option">dynamic</code> ); ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">print-category</strong></span> <code class="option">yes</code> or <code class="option">no</code>; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">print-severity</strong></span> <code class="option">yes</code> or <code class="option">no</code>; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">print-time</strong></span> <code class="option">yes</code> or <code class="option">no</code>; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ <span><strong class="command">category</strong></span> <em class="replaceable"><code>category_name</code></em> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>channel_name</code></em> ; [ <em class="replaceable"><code>channel_name</code></em> ; ... ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2576531"></a><span><strong class="command">logging</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">logging</strong></span> statement configures a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein variety of logging options for the name server. Its <span><strong class="command">channel</strong></span> phrase
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein associates output methods, format options and severity levels with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a name that can then be used with the <span><strong class="command">category</strong></span> phrase
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to select how various classes of messages are logged.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Only one <span><strong class="command">logging</strong></span> statement is used to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as many channels and categories as are wanted. If there is no <span><strong class="command">logging</strong></span> statement,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the logging configuration will be:
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce category default { default_syslog; default_debug; };
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce category unmatched { null; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In <acronym class="acronym">BIND</acronym> 9, the logging configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is only established when
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the entire configuration file has been parsed. In <acronym class="acronym">BIND</acronym> 8, it was
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein established as soon as the <span><strong class="command">logging</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein was parsed. When the server is starting up, all logging messages
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein regarding syntax errors in the configuration file go to the default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein channels, or to standard error if the "<code class="option">-g</code>" option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein was specified.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2576583"></a>The <span><strong class="command">channel</strong></span> Phrase</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein All log output goes to one or more <span class="emphasis"><em>channels</em></span>;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein you can make as many of them as you want.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Every channel definition must include a destination clause that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein says whether messages selected for the channel go to a file, to a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein particular syslog facility, to the standard error stream, or are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein discarded. It can optionally also limit the message severity level
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that will be accepted by the channel (the default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">info</strong></span>), and whether to include a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span>-generated time stamp, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein category name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and/or severity level (the default is not to include any).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">null</strong></span> destination clause
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein causes all messages sent to the channel to be discarded;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in that case, other options for the channel are meaningless.
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson The <span><strong class="command">file</strong></span> destination clause directs
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson to a disk file. It can include limitations
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson both on how large the file is allowed to become, and how many
7c0ebe385b36d64c2424dd5a3e62d441c08e7037Andreas Gustafsson of the file will be saved each time the file is opened.
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson If you use the <span><strong class="command">versions</strong></span> log file
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson <span><strong class="command">named</strong></span> will retain that many backup
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson versions of the file by
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson renaming them when opening. For example, if you choose to keep
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson three old versions
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson of the file <code class="filename">lamers.log</code>, then just
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce before it is opened
7c0ebe385b36d64c2424dd5a3e62d441c08e7037Andreas Gustafsson <code class="filename">lamers.log.1</code> is renamed to
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson <code class="filename">lamers.log.2</code>, <code class="filename">lamers.log.0</code> is renamed
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson to <code class="filename">lamers.log.1</code>, and <code class="filename">lamers.log</code> is
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson renamed to <code class="filename">lamers.log.0</code>.
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson You can say <span><strong class="command">versions unlimited</strong></span> to
7c0ebe385b36d64c2424dd5a3e62d441c08e7037Andreas Gustafsson the number of versions.
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson If a <span><strong class="command">size</strong></span> option is associated with
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson then renaming is only done when the file being opened exceeds the
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce indicated size. No backup versions are kept by default; any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein log file is simply appended.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">size</strong></span> option for files is used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to limit log
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein growth. If the file ever exceeds the size, then <span><strong class="command">named</strong></span> will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein stop writing to the file unless it has a <span><strong class="command">versions</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein associated with it. If backup versions are kept, the files are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein described above and a new one begun. If there is no
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">versions</strong></span> option, no more data will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be written to the log
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein until some out-of-band mechanism removes or truncates the log to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein less than the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum size. The default behavior is not to limit the size of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Example usage of the <span><strong class="command">size</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">versions</strong></span> options:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">channel an_example_channel {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file "example.log" versions 3 size 20m;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein print-time yes;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein print-category yes;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">syslog</strong></span> destination clause
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein channel to the system log. Its argument is a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein syslog facility as described in the <span><strong class="command">syslog</strong></span> man
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein page. Known facilities are <span><strong class="command">kern</strong></span>, <span><strong class="command">user</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">mail</strong></span>, <span><strong class="command">daemon</strong></span>, <span><strong class="command">auth</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">syslog</strong></span>, <span><strong class="command">lpr</strong></span>, <span><strong class="command">news</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">uucp</strong></span>, <span><strong class="command">cron</strong></span>, <span><strong class="command">authpriv</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">ftp</strong></span>, <span><strong class="command">local0</strong></span>, <span><strong class="command">local1</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">local2</strong></span>, <span><strong class="command">local3</strong></span>, <span><strong class="command">local4</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">local5</strong></span>, <span><strong class="command">local6</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">local7</strong></span>, however not all facilities
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are supported on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all operating systems.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein How <span><strong class="command">syslog</strong></span> will handle messages
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce this facility is described in the <span><strong class="command">syslog.conf</strong></span> man
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce page. If you have a system which uses a very old version of <span><strong class="command">syslog</strong></span> that
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce only uses two arguments to the <span><strong class="command">openlog()</strong></span> function,
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson then this clause is silently ignored.
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson The <span><strong class="command">severity</strong></span> clause works like <span><strong class="command">syslog</strong></span>'s
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "priorities", except that they can also be used if you are writing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein straight to a file rather than using <span><strong class="command">syslog</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Messages which are not at least of the severity level given will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not be selected for the channel; messages of higher severity
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson will be accepted.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If you are using <span><strong class="command">syslog</strong></span>, then the <span><strong class="command">syslog.conf</strong></span> priorities
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will also determine what eventually passes through. For example,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defining a channel facility and severity as <span><strong class="command">daemon</strong></span> and <span><strong class="command">debug</strong></span> but
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only logging <span><strong class="command">daemon.warning</strong></span> via <span><strong class="command">syslog.conf</strong></span> will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cause messages of severity <span><strong class="command">info</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">notice</strong></span> to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be dropped. If the situation were reversed, with <span><strong class="command">named</strong></span> writing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein messages of only <span><strong class="command">warning</strong></span> or higher,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then <span><strong class="command">syslogd</strong></span> would
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein print all messages it received from the channel.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">stderr</strong></span> destination clause
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein channel to the server's standard error stream. This is intended
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein use when the server is running as a foreground process, for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when debugging a configuration.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server can supply extensive debugging information when
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it is in debugging mode. If the server's global debug level is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein than zero, then debugging mode will be active. The global debug
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein level is set either by starting the <span><strong class="command">named</strong></span> server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with the <code class="option">-d</code> flag followed by a positive integer,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or by running <span><strong class="command">rndc trace</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The global debug level
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be set to zero, and debugging mode turned off, by running <span><strong class="command">rndc
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinnotrace</strong></span>. All debugging messages in the server have a debug
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein level, and higher debug levels give more detailed output. Channels
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that specify a specific debug severity, for example:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">channel specific_debug_level {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein severity debug 3;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will get debugging output of level 3 or less any time the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server is in debugging mode, regardless of the global debugging
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein level. Channels with <span><strong class="command">dynamic</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein severity use the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server's global debug level to determine what messages to print.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">print-time</strong></span> has been turned on,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the date and time will be logged. <span><strong class="command">print-time</strong></span> may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be specified for a <span><strong class="command">syslog</strong></span> channel,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but is usually
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein pointless since <span><strong class="command">syslog</strong></span> also logs
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the date and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein time. If <span><strong class="command">print-category</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein requested, then the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein category of the message will be logged as well. Finally, if <span><strong class="command">print-severity</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on, then the severity level of the message will be logged. The <span><strong class="command">print-</strong></span> options may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be used in any combination, and will always be printed in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein order: time, category, severity. Here is an example where all
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein three <span><strong class="command">print-</strong></span> options
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="computeroutput">28-Feb-2000 15:05:32.863 general: notice: running</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein There are four predefined channels that are used for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span>'s default logging as follows.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein How they are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used is described in <a href="Bv9ARM.ch06.html#the_category_phrase" title="The category Phrase">the section called “The <span><strong class="command">category</strong></span> Phrase”</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">channel default_syslog {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // send to syslog's daemon facility
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein syslog daemon;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // only send priority info and higher
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein severity info;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinchannel default_debug {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // write to named.run in the working directory
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // Note: stderr is used instead of "named.run" if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // the server is started with the '-f' option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // log at the server's current debug level
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein severity dynamic;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinchannel default_stderr {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // writes to stderr
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // only send priority info and higher
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein severity info;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinchannel null {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // toss anything sent to this channel
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">default_debug</strong></span> channel has the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein property that it only produces output when the server's debug
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein nonzero. It normally writes to a file called <code class="filename">named.run</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the server's working directory.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For security reasons, when the "<code class="option">-u</code>"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein command line option is used, the <code class="filename">named.run</code> file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is created only after <span><strong class="command">named</strong></span> has
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein changed to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein new UID, and any debug output generated while <span><strong class="command">named</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein starting up and still running as root is discarded. If you need
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to capture this output, you must run the server with the "<code class="option">-g</code>"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option and redirect standard error to a file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Once a channel is defined, it cannot be redefined. Thus you
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cannot alter the built-in channels directly, but you can modify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the default logging by pointing categories at channels you have
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="the_category_phrase"></a>The <span><strong class="command">category</strong></span> Phrase</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein There are many categories, so you can send the logs you want
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to see wherever you want, without seeing logs you don't want. If
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein you don't specify a list of channels for a category, then log
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in that category will be sent to the <span><strong class="command">default</strong></span> category
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein instead. If you don't specify a default category, the following
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "default default" is used:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">category default { default_syslog; default_debug; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein As an example, let's say you want to log security events to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a file, but you also want keep the default logging behavior. You'd
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specify the following:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">channel my_security_channel {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file "my_security_file";
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein severity info;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeincategory security {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein my_security_channel;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default_syslog;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default_debug;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To discard all messages in a category, specify the <span><strong class="command">null</strong></span> channel:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">category xfer-out { null; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeincategory notify { null; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Following are the available categories and brief descriptions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the types of log information they contain. More
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein categories may be added in future <acronym class="acronym">BIND</acronym> releases.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">default</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default category defines the logging
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein options for those categories where no specific
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuration has been
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">general</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The catch-all. Many things still aren't
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein classified into categories, and they all end up here.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">database</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Messages relating to the databases used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein internally by the name server to store zone and cache
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">security</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Approval and denial of requests.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">config</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Configuration file parsing and processing.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">resolver</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS resolution, such as the recursive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lookups performed on behalf of clients by a caching name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">xfer-in</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Zone transfers the server is receiving.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">xfer-out</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Zone transfers the server is sending.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">notify</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The NOTIFY protocol.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">client</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Processing of client requests.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">unmatched</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Messages that <span><strong class="command">named</strong></span> was unable to determine the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein class of or for which there was no matching <span><strong class="command">view</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A one line summary is also logged to the <span><strong class="command">client</strong></span> category.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This category is best sent to a file or stderr, by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default it is sent to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">null</strong></span> channel.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">network</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Network operations.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">update</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Dynamic updates.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <p><span><strong class="command">update-security</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Approval and denial of update requests.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">queries</strong></span></p>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews Specify where queries should be logged to.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein At startup, specifying the category <span><strong class="command">queries</strong></span> will also
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein enable query logging unless <span><strong class="command">querylog</strong></span> option has been
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The query log entry reports the client's IP
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address and port number, and the query name,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein class and type. Next it reports whether the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Recursion Desired flag was set (+ if set, -
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if not set), if the query was signed (S),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein EDNS was in use (E), if TCP was used (T), if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DO (DNSSEC Ok) was set (D), or if CD (Checking
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Disabled) was set (C). After this the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein destination address the query was sent to is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="computeroutput">client 127.0.0.1#62536 (www.example.com): query: www.example.com IN AAAA +SE</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="computeroutput">client ::1#62537 (www.example.net): query: www.example.net IN AAAA -SE</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (The first part of this log message, showing the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein repeated in all subsequent log messages related
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the same query.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">query-errors</strong></span></p>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Information about queries that resulted in some
a057e8e33baa5fa369be28a9680585200ce3ff73Mark Andrews <p><span><strong class="command">dispatch</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Dispatching of incoming packets to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server modules where they are to be processed.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">dnssec</strong></span></p>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews DNSSEC and TSIG protocol processing.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <p><span><strong class="command">lame-servers</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Lame servers. These are misconfigurations
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in remote servers, discovered by BIND 9 when trying to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein query those servers during resolution.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">delegation-only</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Delegation only. Logs queries that have been
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein forced to NXDOMAIN as the result of a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein delegation-only zone or a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">delegation-only</strong></span> in a hint
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or stub zone declaration.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">edns-disabled</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Log queries that have been forced to use plain
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS due to timeouts. This is often due to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the remote servers not being RFC 1034 compliant
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (not always returning FORMERR or similar to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein EDNS queries and other extensions to the DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when they are not understood). In other words, this is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein targeted at servers that fail to respond to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS queries that they don't understand.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note: the log message can also be due to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein packet loss. Before reporting servers for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein non-RFC 1034 compliance they should be re-tested
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to determine the nature of the non-compliance.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This testing should prevent or reduce the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein number of false-positive reports.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note: eventually <span><strong class="command">named</strong></span> will have to stop
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein treating such timeouts as due to RFC 1034 non
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein compliance and start treating it as plain
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein packet loss. Falsely classifying packet
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein loss as due to RFC 1034 non compliance impacts
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on DNSSEC validation which requires EDNS for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the DNSSEC records to be returned.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">RPZ</strong></span></p>
538a83db7509d598da95a93bd7b74ef3112123a4Mark Andrews Information about errors in response policy zone files,
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews rewritten responses, and at the highest
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews <span><strong class="command">debug</strong></span> levels, mere rewriting
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">rate-limit</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The start, periodic, and final notices of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rate limiting of a stream of responses are logged at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">info</strong></span> severity in this category.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These messages include a hash value of the domain name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the response and the name itself,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein except when there is insufficient memory to record
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the name for the final notice
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The final notice is normally delayed until about one
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein minute after rate limit stops.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A lack of memory can hurry the final notice,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in which case it starts with an asterisk (*).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Various internal events are logged at debug 1 level
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Rate limiting of individual requests
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is logged in the <span><strong class="command">query-errors</strong></span> category.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2577934"></a>The <span><strong class="command">query-errors</strong></span> Category</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">query-errors</strong></span> category is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specifically intended for debugging purposes: To identify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein why and how specific queries result in responses which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein indicate an error.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Messages of this category are therefore only logged
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with <span><strong class="command">debug</strong></span> levels.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein At the debug levels of 1 or higher, each response with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rcode of SERVFAIL is logged as follows:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="computeroutput">client 127.0.0.1#61502: query failed (SERVFAIL) for www.example.com/IN/AAAA at query.c:3880</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This means an error resulting in SERVFAIL was
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein detected at line 3880 of source file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Log messages of this level will particularly
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein help identify the cause of SERVFAIL for an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authoritative server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein At the debug levels of 2 or higher, detailed context
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein information of recursive resolutions that resulted in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein SERVFAIL is logged.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The log message will look like as follows:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinfetch completed at resolver.c:2970 for www.example.com/A
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinin 30.000183: timed out/success [domain:example.com,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinreferral:2,restart:7,qrysent:8,timeout:5,lame:0,neterr:0,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinbadresp:1,adberr:0,findfail:0,valfail:0]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The first part before the colon shows that a recursive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resolution for AAAA records of www.example.com completed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in 30.000183 seconds and the final result that led to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein SERVFAIL was determined at line 2970 of source file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The following part shows the detected final result and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein latest result of DNSSEC validation.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The latter is always success when no validation attempt
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In this example, this query resulted in SERVFAIL probably
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein because all name servers are down or unreachable, leading
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to a timeout in 30 seconds.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNSSEC validation was probably not attempted.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The last part enclosed in square brackets shows statistics
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein information collected for this particular resolution
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <code class="varname">domain</code> field shows the deepest zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that the resolver reached;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it is the zone where the error was finally detected.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The meaning of the other fields is summarized in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein following table.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The number of referrals the resolver received
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein throughout the resolution process.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In the above example this is 2, which are most
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein likely com and example.com.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The number of cycles that the resolver tried
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein remote servers at the <code class="varname">domain</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In each cycle the resolver sends one query
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (possibly resending it, depending on the response)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to each known name server of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The number of queries the resolver sent at the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The number of timeouts since the resolver
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein received the last response.
3970098dcd2a7122541667b4b56cea8abce8ccf2Mark Andrews The number of lame servers the resolver detected
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein at the <code class="varname">domain</code> zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A server is detected to be lame either by an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein invalid response or as a result of lookup in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein BIND9's address database (ADB), where lame
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers are cached.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The number of erroneous results that the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resolver encountered in sending queries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein at the <code class="varname">domain</code> zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein One common case is the remote server is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein unreachable and the resolver receives an ICMP
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein unreachable error message.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The number of unexpected responses (other than
1e5dad05abfe288985b83f2912729aeed46a43acMark Andrews <code class="varname">lame</code>) to queries sent by the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resolver at the <code class="varname">domain</code> zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Failures in finding remote server addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the <code class="varname">domain</code> zone in the ADB.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein One common case of this is that the remote
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server's name does not have any address records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Failures of resolving remote server addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is a total number of failures throughout
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the resolution process.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Failures of DNSSEC validation.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Validation failures are counted throughout
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the resolution process (not limited to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <code class="varname">domain</code> zone), but should
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only happen in <code class="varname">domain</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein At the debug levels of 3 or higher, the same messages
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as those at the debug 1 level are logged for other errors
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein than SERVFAIL.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that negative responses such as NXDOMAIN are not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein regarded as errors here.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein At the debug levels of 4 or higher, the same messages
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as those at the debug 2 level are logged for other errors
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein than SERVFAIL.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Unlike the above case of level 3, messages are logged for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein negative responses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is because any unexpected results can be difficult to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein debug in the recursion case.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2578522"></a><span><strong class="command">lwres</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is the grammar of the <span><strong class="command">lwres</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement in the <code class="filename">named.conf</code> file:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">lwres</strong></span> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> listen-on { <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; ... </span>] }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> view <em class="replaceable"><code>view_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> search { <em class="replaceable"><code>domain_name</code></em> ; [<span class="optional"> <em class="replaceable"><code>domain_name</code></em> ; ... </span>] }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> ndots <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2578606"></a><span><strong class="command">lwres</strong></span> Statement Definition and Usage</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">lwres</strong></span> statement configures the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server to also act as a lightweight resolver server. (See
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="Bv9ARM.ch05.html#lwresd" title="Running a Resolver Daemon">the section called “Running a Resolver Daemon”</a>.) There may be multiple
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">lwres</strong></span> statements configuring
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lightweight resolver servers with different properties.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">listen-on</strong></span> statement specifies a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein addresses (and ports) that this instance of a lightweight resolver
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein should accept requests on. If no port is specified, port 921 is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If this statement is omitted, requests will be accepted on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">view</strong></span> statement binds this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein instance of a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lightweight resolver daemon to a view in the DNS namespace, so that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein response will be constructed in the same manner as a normal DNS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein matching this view. If this statement is omitted, the default view
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used, and if there is no default view, an error is triggered.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">search</strong></span> statement is equivalent to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">search</strong></span> statement in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">/etc/resolv.conf</code>. It provides a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein list of domains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which are appended to relative names in queries.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">ndots</strong></span> statement is equivalent to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">ndots</strong></span> statement in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">/etc/resolv.conf</code>. It indicates the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein number of dots in a relative domain name that should result in an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein exact match lookup before search path elements are appended.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2578739"></a><span><strong class="command">masters</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span><strong class="command">masters</strong></span> <em class="replaceable"><code>name</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] { ( <em class="replaceable"><code>masters_list</code></em> |
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">key <em class="replaceable"><code>key</code></em></span>] ) ; [<span class="optional">...</span>] };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2578788"></a><span><strong class="command">masters</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">masters</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lists allow for a common set of masters to be easily used by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein multiple stub and slave zones in their <span><strong class="command">masters</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or <span><strong class="command">also-notify</strong></span> lists.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2578809"></a><span><strong class="command">options</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is the grammar of the <span><strong class="command">options</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement in the <code class="filename">named.conf</code> file:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">options</strong></span> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> attach-cache <em class="replaceable"><code>cache_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> version <em class="replaceable"><code>version_string</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> hostname <em class="replaceable"><code>hostname_string</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> server-id <em class="replaceable"><code>server_id_string</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> directory <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> key-directory <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> managed-keys-directory <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> named-xfer <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> tkey-gssapi-keytab <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> tkey-gssapi-credential <em class="replaceable"><code>principal</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> tkey-domain <em class="replaceable"><code>domainname</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> tkey-dhkey <em class="replaceable"><code>key_name</code></em> <em class="replaceable"><code>key_tag</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> cache-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dump-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> bindkeys-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> secroots-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> session-keyfile <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> session-keyname <em class="replaceable"><code>key_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> session-keyalg <em class="replaceable"><code>algorithm_id</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> memstatistics <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> memstatistics-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> pid-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> recursing-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> statistics-file <em class="replaceable"><code>path_name</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> zone-statistics <em class="replaceable"><code>full</code></em> | <em class="replaceable"><code>terse</code></em> | <em class="replaceable"><code>none</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> auth-nxdomain <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> deallocate-on-exit <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dialup <em class="replaceable"><code>dialup_option</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> fake-iquery <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> fetch-glue <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> flush-zones-on-shutdown <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> has-old-clients <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> host-statistics <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> host-statistics-max <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> minimal-responses <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> multiple-cnames <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> notify <em class="replaceable"><code>yes_or_no</code></em> | <em class="replaceable"><code>explicit</code></em> | <em class="replaceable"><code>master-only</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> recursion <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> request-nsid <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> rfc2308-type1 <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> use-id-pool <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> maintain-ixfr-base <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> ixfr-from-differences (<em class="replaceable"><code>yes_or_no</code></em> | <code class="constant">master</code> | <code class="constant">slave</code>); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-enable <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-validation (<em class="replaceable"><code>yes_or_no</code></em> | <code class="constant">auto</code>); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-lookaside ( <em class="replaceable"><code>auto</code></em> |
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>domain</code></em> trust-anchor <em class="replaceable"><code>domain</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-must-be-secure <em class="replaceable"><code>domain yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-accept-expired <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> forward ( <em class="replaceable"><code>only</code></em> | <em class="replaceable"><code>first</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> forwarders { [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; ... </span>] }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dual-stack-servers [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ( <em class="replaceable"><code>domain_name</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] |
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>]) ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ... }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-names ( <em class="replaceable"><code>master</code></em> | <em class="replaceable"><code>slave</code></em> | <em class="replaceable"><code>response</code></em> )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ( <em class="replaceable"><code>warn</code></em> | <em class="replaceable"><code>fail</code></em> | <em class="replaceable"><code>ignore</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-dup-records ( <em class="replaceable"><code>warn</code></em> | <em class="replaceable"><code>fail</code></em> | <em class="replaceable"><code>ignore</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-mx ( <em class="replaceable"><code>warn</code></em> | <em class="replaceable"><code>fail</code></em> | <em class="replaceable"><code>ignore</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-wildcard <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-integrity <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-mx-cname ( <em class="replaceable"><code>warn</code></em> | <em class="replaceable"><code>fail</code></em> | <em class="replaceable"><code>ignore</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-srv-cname ( <em class="replaceable"><code>warn</code></em> | <em class="replaceable"><code>fail</code></em> | <em class="replaceable"><code>ignore</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-sibling <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> check-spf ( <em class="replaceable"><code>warn</code></em> | <em class="replaceable"><code>fail</code></em> | <em class="replaceable"><code>ignore</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-new-zones { <em class="replaceable"><code>yes_or_no</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-notify { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-query { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-query-on { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-query-cache { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-query-cache-on { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-transfer { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-recursion { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-recursion-on { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-update { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-update-forwarding { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> update-check-ksk <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-update-mode ( <em class="replaceable"><code>maintain</code></em> | <em class="replaceable"><code>no-resign</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-dnskey-kskonly <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-loadkeys-interval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dnssec-secure-to-insecure <em class="replaceable"><code>yes_or_no</code></em> ;</span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> try-tcp-refresh <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> allow-v6-synthesis { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> blackhole { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> use-v4-udp-ports { <em class="replaceable"><code>port_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> avoid-v4-udp-ports { <em class="replaceable"><code>port_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> use-v6-udp-ports { <em class="replaceable"><code>port_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> avoid-v6-udp-ports { <em class="replaceable"><code>port_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> listen-on [<span class="optional"> port <em class="replaceable"><code>ip_port</code></em> </span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> listen-on-v6 [<span class="optional"> port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein{ <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> query-source ( ( <em class="replaceable"><code>ip4_addr</code></em> | <em class="replaceable"><code>*</code></em> )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> port ( <em class="replaceable"><code>ip_port</code></em> | <em class="replaceable"><code>*</code></em> ) </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dscp <em class="replaceable"><code>ip_dscp</code></em></span>] |
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> address ( <em class="replaceable"><code>ip4_addr</code></em> | <em class="replaceable"><code>*</code></em> ) </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> port ( <em class="replaceable"><code>ip_port</code></em> | <em class="replaceable"><code>*</code></em> ) </span>] )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> query-source-v6 ( ( <em class="replaceable"><code>ip6_addr</code></em> | <em class="replaceable"><code>*</code></em> )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> port ( <em class="replaceable"><code>ip_port</code></em> | <em class="replaceable"><code>*</code></em> ) </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dscp <em class="replaceable"><code>ip_dscp</code></em></span>] |
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> address ( <em class="replaceable"><code>ip6_addr</code></em> | <em class="replaceable"><code>*</code></em> ) </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> port ( <em class="replaceable"><code>ip_port</code></em> | <em class="replaceable"><code>*</code></em> ) </span>] )
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> use-queryport-pool <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> queryport-pool-ports <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> queryport-pool-updateinterval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-transfer-time-in <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-transfer-time-out <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-transfer-idle-in <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-transfer-idle-out <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> tcp-clients <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> reserved-sockets <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> recursive-clients <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> serial-query-rate <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> serial-queries <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> tcp-listen-queue <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfer-format <em class="replaceable"><code>( one-answer | many-answers )</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfers-in <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfers-out <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfers-per-ns <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfer-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfer-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> alt-transfer-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> alt-transfer-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> use-alt-transfer-source <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> notify-delay <em class="replaceable"><code>seconds</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> notify-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> notify-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> notify-to-soa <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> also-notify { <em class="replaceable"><code>ip_addr</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] [<span class="optional">key <em class="replaceable"><code>keyname</code></em></span>] ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] [<span class="optional">key <em class="replaceable"><code>keyname</code></em></span>] ; ... </span>] }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-ixfr-log-size <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-journal-size <em class="replaceable"><code>size_spec</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> coresize <em class="replaceable"><code>size_spec</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> datasize <em class="replaceable"><code>size_spec</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> files <em class="replaceable"><code>size_spec</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> stacksize <em class="replaceable"><code>size_spec</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> cleaning-interval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> heartbeat-interval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> interface-interval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> statistics-interval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> topology { <em class="replaceable"><code>address_match_list</code></em> }</span>];
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> sortlist { <em class="replaceable"><code>address_match_list</code></em> }</span>];
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> rrset-order { <em class="replaceable"><code>order_spec</code></em> ; [<span class="optional"> <em class="replaceable"><code>order_spec</code></em> ; ... </span>] </span>] };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> lame-ttl <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-ncache-ttl <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-cache-ttl <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> sig-validity-interval <em class="replaceable"><code>number</code></em> [<span class="optional"><em class="replaceable"><code>number</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> sig-signing-nodes <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> sig-signing-signatures <em class="replaceable"><code>number</code></em> ; </span>]
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews [<span class="optional"> sig-signing-type <em class="replaceable"><code>number</code></em> ; </span>]
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews [<span class="optional"> min-roots <em class="replaceable"><code>number</code></em>; </span>]
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews [<span class="optional"> use-ixfr <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> provide-ixfr <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> request-ixfr <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> treat-cr-as-space <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> min-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews [<span class="optional"> max-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> min-retry-time <em class="replaceable"><code>number</code></em> ; </span>]
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews [<span class="optional"> max-retry-time <em class="replaceable"><code>number</code></em> ; </span>]
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews [<span class="optional"> port <em class="replaceable"><code>ip_port</code></em>; </span>]
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews [<span class="optional"> dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> additional-from-auth <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> additional-from-cache <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> random-device <em class="replaceable"><code>path_name</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-cache-size <em class="replaceable"><code>size_spec</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> match-mapped-addresses <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> filter-aaaa-on-v4 ( <em class="replaceable"><code>yes_or_no</code></em> | <em class="replaceable"><code>break-dnssec</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> filter-aaaa-on-v6 ( <em class="replaceable"><code>yes_or_no</code></em> | <em class="replaceable"><code>break-dnssec</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> filter-aaaa { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dns64 <em class="replaceable"><code>ipv6-prefix</code></em> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> clients { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> mapped { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> exclude { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> suffix IPv6-address; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> recursive-only <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> break-dnssec <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein }; </span>];
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dns64-server <em class="replaceable"><code>name</code></em> </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> dns64-contact <em class="replaceable"><code>name</code></em> </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> preferred-glue ( <em class="replaceable"><code>A</code></em> | <em class="replaceable"><code>AAAA</code></em> | <em class="replaceable"><code>NONE</code></em> ); </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> edns-udp-size <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-udp-size <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-rsa-exponent-size <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> root-delegation-only [<span class="optional"> exclude { <em class="replaceable"><code>namelist</code></em> } </span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> querylog <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> disable-algorithms <em class="replaceable"><code>domain</code></em> { <em class="replaceable"><code>algorithm</code></em>;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> <em class="replaceable"><code>algorithm</code></em>; </span>] }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> disable-ds-digests <em class="replaceable"><code>domain</code></em> { <em class="replaceable"><code>digest_type</code></em>;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> <em class="replaceable"><code>digest_type</code></em>; </span>] }; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> acache-enable <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> acache-cleaning-interval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-acache-size <em class="replaceable"><code>size_spec</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> clients-per-query <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-clients-per-query <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (<code class="constant">text</code>|<code class="constant">raw</code>|<code class="constant">map</code>) ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> empty-server <em class="replaceable"><code>name</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> empty-contact <em class="replaceable"><code>name</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> empty-zones-enable <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> disable-empty-zone <em class="replaceable"><code>zone_name</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> zero-no-soa-ttl <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> zero-no-soa-ttl-cache <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> resolver-query-timeout <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> deny-answer-addresses { <em class="replaceable"><code>address_match_list</code></em> } [<span class="optional"> except-from { <em class="replaceable"><code>namelist</code></em> } </span>];</span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> deny-answer-aliases { <em class="replaceable"><code>namelist</code></em> } [<span class="optional"> except-from { <em class="replaceable"><code>namelist</code></em> } </span>];</span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> responses-per-second <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> referrals-per-second <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> nodata-per-second <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> nxdomains-per-second <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> errors-per-second <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> all-per-second <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> window <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> log-only <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> qps-scale <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> ipv4-prefix-length <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> ipv6-prefix-length <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> slip <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> exempt-clients { <em class="replaceable"><code>address_match_list</code></em> } ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-table-size <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> min-table-size <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein } ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> response-policy { <em class="replaceable"><code>zone_name</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> policy given | disabled | passthru | nxdomain | nodata | cname <em class="replaceable"><code>domain</code></em> </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> recursive-only <em class="replaceable"><code>yes_or_no</code></em> </span>] [<span class="optional"> max-policy-ttl <em class="replaceable"><code>number</code></em> </span>] ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein } [<span class="optional"> recursive-only <em class="replaceable"><code>yes_or_no</code></em> </span>] [<span class="optional"> max-policy-ttl <em class="replaceable"><code>number</code></em> </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> break-dnssec <em class="replaceable"><code>yes_or_no</code></em> </span>] [<span class="optional"> min-ns-dots <em class="replaceable"><code>number</code></em> </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> qname-wait-recurse <em class="replaceable"><code>yes_or_no</code></em> </span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="options"></a><span><strong class="command">options</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">options</strong></span> statement sets up global
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to be used by <acronym class="acronym">BIND</acronym>. This statement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may appear only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein once in a configuration file. If there is no <span><strong class="command">options</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement, an options block with each option set to its default will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">attach-cache</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Allows multiple views to share a single cache
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each view has its own cache database by default, but
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if multiple views have the same operational policy
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for name resolution and caching, those views can
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein share a single cache to save memory and possibly
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein improve resolution efficiency by using this option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">attach-cache</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may also be specified in <span><strong class="command">view</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements, in which case it overrides the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein global <span><strong class="command">attach-cache</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <em class="replaceable"><code>cache_name</code></em> specifies
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the cache to be shared.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When the <span><strong class="command">named</strong></span> server configures
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein views which are supposed to share a cache, it
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein creates a cache with the specified name for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein first view of these sharing views.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The rest of the views will simply refer to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein already created cache.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein One common configuration to share a cache would be to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allow all views to share a single cache.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This can be done by specifying
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">attach-cache</strong></span> as a global
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option with an arbitrary name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Another possible operation is to allow a subset of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all views to share a cache while the others to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein retain their own caches.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, if there are three views A, B, and C,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and only A and B should share a cache, specify the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">attach-cache</strong></span> option as a view A (or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein B)'s option, referring to the other view name:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // this view has its own cache
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // this view refers to A's cache
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein attach-cache "A";
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // this view has its own cache
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Views that share a cache must have the same policy
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on configurable parameters that may affect caching.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The current implementation requires the following
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configurable options be consistent among these
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">check-names</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">cleaning-interval</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dnssec-accept-expired</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dnssec-validation</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-cache-ttl</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-ncache-ttl</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-cache-size</strong></span>, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">zero-no-soa-ttl</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that there may be other parameters that may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cause confusion if they are inconsistent for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein different views that share a single cache.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, if these views define different sets of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein forwarders that can return different answers for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein same question, sharing the answer does not make
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sense or could even be harmful.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is administrator's responsibility to ensure
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuration differences in different views do
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not cause disruption with a shared cache.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">directory</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The working directory of the server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Any non-absolute pathnames in the configuration file will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as relative to this directory. The default location for most
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein output files (e.g. <code class="filename">named.run</code>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is this directory.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If a directory is not specified, the working directory
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defaults to `<code class="filename">.</code>', the directory from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which the server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein was started. The directory specified should be an absolute
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">key-directory</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When performing dynamic update of secure zones, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein directory where the public and private DNSSEC key files
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein should be found, if different than the current working
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein directory. (Note that this option has no effect on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein paths for files containing non-DNSSEC keys such as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">managed-keys-directory</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies the directory in which to store the files that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein track managed DNSSEC keys. By default, this is the working
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">named</strong></span> is not configured to use views,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then managed keys for the server will be tracked in a single
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file called <code class="filename">managed-keys.bind</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Otherwise, managed keys will be tracked in separate files,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one file per view; each file name will be the SHA256 hash
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the view name, followed by the extension
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">named-xfer</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>This option is obsolete.</em></span> It
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein was used in <acronym class="acronym">BIND</acronym> 8 to specify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the pathname to the <span><strong class="command">named-xfer</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein program. In <acronym class="acronym">BIND</acronym> 9, no separate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named-xfer</strong></span> program is needed;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein its functionality is built into the name server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">tkey-gssapi-keytab</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The KRB5 keytab file to use for GSS-TSIG updates. If
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this option is set and tkey-gssapi-credential is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set, then updates will be allowed with any key
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein matching a principal in the specified keytab.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">tkey-gssapi-credential</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The security credential with which the server should
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authenticate keys requested by the GSS-TSIG protocol.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Currently only Kerberos 5 authentication is available
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and the credential is a Kerberos principal which the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server can acquire through the default system key
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file, normally <code class="filename">/etc/krb5.keytab</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The location keytab file can be overridden using the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein tkey-gssapi-keytab option. Normally this principal is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the form "<strong class="userinput"><code>DNS/</code></strong><code class="varname">server.domain</code>".
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To use GSS-TSIG, <span><strong class="command">tkey-domain</strong></span> must
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also be set if a specific keytab is not set with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein tkey-gssapi-keytab.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">tkey-domain</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The domain appended to the names of all shared keys
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein generated with <span><strong class="command">TKEY</strong></span>. When a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein client requests a <span><strong class="command">TKEY</strong></span> exchange,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it may or may not specify the desired name for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein key. If present, the name of the shared key will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be <code class="varname">client specified part</code> +
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="varname">tkey-domain</code>. Otherwise, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein name of the shared key will be <code class="varname">random hex
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein digits</code> + <code class="varname">tkey-domain</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In most cases, the <span><strong class="command">domainname</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein should be the server's domain name, or an otherwise
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein non-existent subdomain like
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "_tkey.<code class="varname">domainname</code>". If you are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein using GSS-TSIG, this variable must be defined, unless
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein you specify a specific keytab using tkey-gssapi-keytab.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">tkey-dhkey</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The Diffie-Hellman key used by the server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to generate shared keys with clients using the Diffie-Hellman
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of <span><strong class="command">TKEY</strong></span>. The server must be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein able to load the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein public and private keys from files in the working directory.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein most cases, the keyname should be the server's host name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">cache-file</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is for testing only. Do not use.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dump-file</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The pathname of the file the server dumps
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the database to when instructed to do so with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">rndc dumpdb</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If not specified, the default is <code class="filename">named_dump.db</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">memstatistics-file</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The pathname of the file the server writes memory
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein usage statistics to on exit. If not specified,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the default is <code class="filename">named.memstats</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">pid-file</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The pathname of the file the server writes its process ID
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in. If not specified, the default is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <code class="filename">/var/run/named/named.pid</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The PID file is used by programs that want to send signals to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews name server. Specifying <span><strong class="command">pid-file none</strong></span> disables the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews use of a PID file — no file will be written and any
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews existing one will be removed. Note that <span><strong class="command">none</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews is a keyword, not a filename, and therefore is not enclosed
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews double quotes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">recursing-file</strong></span></span></dt>
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews The pathname of the file the server dumps
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews the queries that are currently recursing when instructed
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews to do so with <span><strong class="command">rndc recursing</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If not specified, the default is <code class="filename">named.recursing</code>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term"><span><strong class="command">statistics-file</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The pathname of the file the server appends statistics
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to when instructed to do so using <span><strong class="command">rndc stats</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If not specified, the default is <code class="filename">named.stats</code> in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server's current directory. The format of the file is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in <a href="Bv9ARM.ch06.html#statsfile" title="The Statistics File">the section called “The Statistics File”</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">bindkeys-file</strong></span></span></dt>
a057e8e33baa5fa369be28a9680585200ce3ff73Mark Andrews The pathname of a file to override the built-in trusted
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews keys provided by <span><strong class="command">named</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews See the discussion of <span><strong class="command">dnssec-lookaside</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews and <span><strong class="command">dnssec-validation</strong></span> for details.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If not specified, the default is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term"><span><strong class="command">secroots-file</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The pathname of the file the server dumps
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews security roots to when instructed to do so with
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">rndc secroots</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If not specified, the default is
a057e8e33baa5fa369be28a9680585200ce3ff73Mark Andrews<dt><span class="term"><span><strong class="command">session-keyfile</strong></span></span></dt>
a057e8e33baa5fa369be28a9680585200ce3ff73Mark Andrews The pathname of the file into which to write a TSIG
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein session key generated by <span><strong class="command">named</strong></span> for use by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">nsupdate -l</strong></span>. If not specified, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default is <code class="filename">/var/run/named/session.key</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (See <a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called “Dynamic Update Policies”</a>, and in
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews particular the discussion of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">update-policy</strong></span> statement's
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>local</code></strong> option for more
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein information about this feature.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">session-keyname</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The key name to use for the TSIG session key.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If not specified, the default is "local-ddns".
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">session-keyalg</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The algorithm to use for the TSIG session key.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Valid values are hmac-sha1, hmac-sha224, hmac-sha256,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein hmac-sha384, hmac-sha512 and hmac-md5. If not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified, the default is hmac-sha256.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">port</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein receiving and sending DNS protocol traffic.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is 53. This option is mainly intended for server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a server using a port other than 53 will not be able to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein communicate with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the global DNS.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">random-device</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The source of entropy to be used by the server. Entropy is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein primarily needed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for DNSSEC operations, such as TKEY transactions and dynamic
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein update of signed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zones. This options specifies the device (or file) from which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein entropy. If this is a file, operations requiring entropy will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein fail when the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file has been exhausted. If not specified, the default value
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (or equivalent) when present, and none otherwise. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">random-device</strong></span> option takes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein effect during
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the initial configuration load at server startup time and
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews is ignored on subsequent reloads.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">preferred-glue</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If specified, the listed type (A or AAAA) will be emitted
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein before other glue
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the additional section of a query response.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is not to prefer any type (NONE).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="root_delegation_only"></a><span class="term"><span><strong class="command">root-delegation-only</strong></span></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Turn on enforcement of delegation-only in TLDs
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (top level domains) and root zones with an optional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein exclude list.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DS queries are expected to be made to and be answered by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein delegation only zones. Such queries and responses are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein treated as an exception to delegation-only processing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and are not converted to NXDOMAIN responses provided
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a CNAME is not discovered at the query name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If a delegation only zone server also serves a child
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone it is not always possible to determine whether
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an answer comes from the delegation only zone or the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein child zone. SOA NS and DNSKEY records are apex
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only records and a matching response that contains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein these records or DS is treated as coming from a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein child zone. RRSIG records are also examined to see
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if they are signed by a child zone or not. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authority section is also examined to see if there
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is evidence that the answer is from the child zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Answers that are determined to be from a child zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are not converted to NXDOMAIN responses. Despite
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all these checks there is still a possibility of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein false negatives when a child zone is being served.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Similarly false positives can arise from empty nodes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (no records at the name) in the delegation only zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when the query type is not ANY.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note some TLDs are not delegation only (e.g. "DE", "LV",
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "US" and "MUSEUM"). This list is not exhaustive.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein root-delegation-only exclude { "de"; "lv"; "us"; "museum"; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">disable-algorithms</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Disable the specified DNSSEC algorithms at and below the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Multiple <span><strong class="command">disable-algorithms</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements are allowed.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Only the best match <span><strong class="command">disable-algorithms</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clause will be used to determine which algorithms are used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If all supported algorithms are disabled, the zones covered
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by the <span><strong class="command">disable-algorithms</strong></span> will be treated
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as insecure.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">disable-ds-digests</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Disable the specified DS/DLV digest types at and below the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Multiple <span><strong class="command">disable-ds-digests</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements are allowed.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Only the best match <span><strong class="command">disable-ds-digests</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clause will be used to determine which digest types are used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If all supported digest types are disabled, the zones covered
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by the <span><strong class="command">disable-ds-digests</strong></span> will be treated
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as insecure.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-lookaside</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When set, <span><strong class="command">dnssec-lookaside</strong></span> provides the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein validator with an alternate method to validate DNSKEY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein records at the top of a zone. When a DNSKEY is at or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein below a domain specified by the deepest
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dnssec-lookaside</strong></span>, and the normal DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein validation has left the key untrusted, the trust-anchor
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be appended to the key name and a DLV record will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein looked up to see if it can validate the key. If the DLV
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein record validates a DNSKEY (similarly to the way a DS
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein record does) the DNSKEY RRset is deemed to be trusted.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">dnssec-lookaside</strong></span> is set to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>auto</code></strong>, then built-in default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein values for the DLV domain and trust anchor will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used, along with a built-in key for validation.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">dnssec-lookaside</strong></span> is set to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>no</code></strong>, then dnssec-lookaside
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is not used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default DLV key is stored in the file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will load that key at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein startup if <span><strong class="command">dnssec-lookaside</strong></span> is set to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="constant">auto</code>. A copy of the file is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein installed along with <acronym class="acronym">BIND</acronym> 9, and is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein current as of the release date. If the DLV key expires, a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein new copy of <code class="filename">bind.keys</code> can be downloaded
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from <a href="https://www.isc.org/solutions/dlv/" target="_top">https://www.isc.org/solutions/dlv/</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (To prevent problems if <code class="filename">bind.keys</code> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not found, the current key is also compiled in to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span>. Relying on this is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein recommended, however, as it requires <span><strong class="command">named</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to be recompiled with a new key when the DLV key expires.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NOTE: <span><strong class="command">named</strong></span> only loads certain specific
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein keys from <code class="filename">bind.keys</code>: those for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DLV zone and for the DNS root zone. The file cannot be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used to store keys for other zones.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-must-be-secure</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specify hierarchies which must be or may not be secure
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (signed and validated). If <strong class="userinput"><code>yes</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then <span><strong class="command">named</strong></span> will only accept answers if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein they are secure. If <strong class="userinput"><code>no</code></strong>, then normal
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNSSEC validation applies allowing for insecure answers to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be accepted. The specified domain must be under a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">trusted-keys</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">managed-keys</strong></span> statement, or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dnssec-lookaside</strong></span> must be active.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dns64</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This directive instructs <span><strong class="command">named</strong></span> to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein return mapped IPv4 addresses to AAAA queries when
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein there are no AAAA records. It is intended to be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used in conjunction with a NAT64. Each
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dns64</strong></span> defines one DNS64 prefix.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Multiple DNS64 prefixes can be defined.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Compatible IPv6 prefixes have lengths of 32, 40, 48, 56,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 64 and 96 as per RFC 6052.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews Additionally a reverse IP6.ARPA zone will be created for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the prefix to provide a mapping from the IP6.ARPA names
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the corresponding IN-ADDR.ARPA names using synthesized
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein CNAMEs. <span><strong class="command">dns64-server</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dns64-contact</strong></span> can be used to specify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the name of the server and contact for the zones. These
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are settable at the view / options level. These are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not settable on a per-prefix basis.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each <span><strong class="command">dns64</strong></span> supports an optional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">clients</strong></span> ACL that determines which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clients are affected by this directive. If not defined,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it defaults to <strong class="userinput"><code>any;</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each <span><strong class="command">dns64</strong></span> supports an optional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">mapped</strong></span> ACL that selects which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 addresses are to be mapped in the corresponding
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A RRset. If not defined it defaults to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>any;</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Normally, DNS64 won't apply to a domain name that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein owns one or more AAAA records; these records will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein simply be returned. The optional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">exclude</strong></span> ACL allows specification
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of a list of IPv6 addresses that will be ignored
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if they appear in a domain name's AAAA records, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS64 will be applied to any A records the domain
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein name owns. If not defined, <span><strong class="command">exclude</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defaults to none.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A optional <span><strong class="command">suffix</strong></span> can also
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be defined to set the bits trailing the mapped
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 address bits. By default these bits are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set to <strong class="userinput"><code>::</code></strong>. The bits
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein matching the prefix and mapped IPv4 address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein must be zero.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">recursive-only</strong></span> is set to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">yes</strong></span> the DNS64 synthesis will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only happen for recursive queries. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is <span><strong class="command">no</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">break-dnssec</strong></span> is set to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">yes</strong></span> the DNS64 synthesis will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein happen even if the result, if validated, would
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cause a DNSSEC validation failure. If this option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is set to <span><strong class="command">no</strong></span> (the default), the DO
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is set on the incoming query, and there are RRSIGs on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the applicable records, then synthesis will not happen.
3eb9ec750c9088869170dda63e8899b2ba462823Mark Andrews dns64 64:FF9B::/96 {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clients { any; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein mapped { !rfc1918; any; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-update-mode</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If this option is set to its default value of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">maintain</code> in a zone of type
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">master</code> which is DNSSEC-signed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and configured to allow dynamic updates (see
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called “Dynamic Update Policies”</a>), and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if <span><strong class="command">named</strong></span> has access to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein private signing key(s) for the zone, then
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will automatically sign all new
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or changed records and maintain signatures for the zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by regenerating RRSIG records whenever they approach
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews their expiration date.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the option is changed to <code class="literal">no-resign</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then <span><strong class="command">named</strong></span> will sign all new or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein changed records, but scheduled maintenance of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein signatures is disabled.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein With either of these settings, <span><strong class="command">named</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will reject updates to a DNSSEC-signed zone when the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein signing keys are inactive or unavailable to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span>. (A planned third option,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">external</code>, will disable all automatic
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein signing and allow DNSSEC data to be submitted into a zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein via dyanmic update; this is not yet implemented.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">zone-statistics</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>full</code></strong>, the server will collect
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statistical data on all zones (unless specifically
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein turned off on a per-zone basis by specifying
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">zone-statistics terse</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">zone-statistics none</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the <span><strong class="command">zone</strong></span> statement).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>terse</code></strong>, providing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein minimal statistics on zones (including name and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein current serial number, but not query type
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These statistics may be accessed via the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">statistics-channel</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein using <span><strong class="command">rndc stats</strong></span>, which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will dump them to the file listed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the <span><strong class="command">statistics-file</strong></span>. See
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also <a href="Bv9ARM.ch06.html#statsfile" title="The Statistics File">the section called “The Statistics File”</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For backward compatibility with earlier versions
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of BIND 9, the <span><strong class="command">zone-statistics</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option can also accept <strong class="userinput"><code>yes</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or <strong class="userinput"><code>no</code></strong>; <strong class="userinput"><code>yes</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein has the same meaning as <strong class="userinput"><code>full</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein As of <acronym class="acronym">BIND</acronym> 9.10,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>no</code></strong> has the same meaning
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as <strong class="userinput"><code>none</code></strong>; previously, it
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein was the same as <strong class="userinput"><code>terse</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="boolean_options"></a>Boolean Options</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-new-zones</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong>, then zones can be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein added at runtime via <span><strong class="command">rndc addzone</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or deleted via <span><strong class="command">rndc delzone</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">auth-nxdomain</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong>, then the <span><strong class="command">AA</strong></span> bit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is always set on NXDOMAIN responses, even if the server is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not actually
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authoritative. The default is <strong class="userinput"><code>no</code></strong>;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a change from <acronym class="acronym">BIND</acronym> 8. If you
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are using very old DNS software, you
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may need to set it to <strong class="userinput"><code>yes</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">deallocate-on-exit</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option was used in <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 8 to enable checking
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for memory leaks on exit. <acronym class="acronym">BIND</acronym> 9 ignores the option and always performs
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">memstatistics</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Write memory statistics to the file specified by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">memstatistics-file</strong></span> at exit.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>no</code></strong> unless
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein '-m record' is specified on the command line in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which case it is <strong class="userinput"><code>yes</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dialup</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong>, then the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server treats all zones as if they are doing zone transfers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a dial-on-demand dialup link, which can be brought up by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein originating from this server. This has different effects
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to zone type and concentrates the zone maintenance so that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein happens in a short interval, once every <span><strong class="command">heartbeat-interval</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein hopefully during the one call. It also suppresses some of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone maintenance traffic. The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">dialup</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may also be specified in the <span><strong class="command">view</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">zone</strong></span> statements,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in which case it overrides the global <span><strong class="command">dialup</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the zone is a master zone, then the server will send out a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein request to all the slaves (default). This should trigger the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein number check in the slave (providing it supports NOTIFY)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allowing the slave
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to verify the zone while the connection is active.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The set of servers to which NOTIFY is sent can be controlled
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">notify</strong></span> and <span><strong class="command">also-notify</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews zone is a slave or stub zone, then the server will suppress
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews "zone up to date" (refresh) queries and only perform them
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">heartbeat-interval</strong></span> expires in
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews addition to sending
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews NOTIFY requests.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Finer control can be achieved by using
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <strong class="userinput"><code>notify</code></strong> which only sends NOTIFY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>notify-passive</code></strong> which sends NOTIFY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein messages and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein suppresses the normal refresh queries, <strong class="userinput"><code>refresh</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which suppresses normal refresh processing and sends refresh
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when the <span><strong class="command">heartbeat-interval</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein expires, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>passive</code></strong> which just disables normal
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein normal refresh
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein heart-beat refresh
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein heart-beat notify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">no</strong></span> (default)</p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">yes</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">notify</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">refresh</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">passive</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">notify-passive</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that normal NOTIFY processing is not affected by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dialup</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">fake-iquery</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In <acronym class="acronym">BIND</acronym> 8, this option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein enabled simulating the obsolete DNS query type
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IQUERY. <acronym class="acronym">BIND</acronym> 9 never does
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IQUERY simulation.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">fetch-glue</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is obsolete.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In BIND 8, <strong class="userinput"><code>fetch-glue yes</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein caused the server to attempt to fetch glue resource records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein didn't have when constructing the additional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein data section of a response. This is now considered a bad
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and BIND 9 never does it.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">flush-zones-on-shutdown</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When the nameserver exits due receiving SIGTERM,
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews flush or do not flush any pending zone writes. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">flush-zones-on-shutdown</strong></span> <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">has-old-clients</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option was incorrectly implemented
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in <acronym class="acronym">BIND</acronym> 8, and is ignored by <acronym class="acronym">BIND</acronym> 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To achieve the intended effect
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">has-old-clients</strong></span> <strong class="userinput"><code>yes</code></strong>, specify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the two separate options <span><strong class="command">auth-nxdomain</strong></span> <strong class="userinput"><code>yes</code></strong>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews and <span><strong class="command">rfc2308-type1</strong></span> <strong class="userinput"><code>no</code></strong> instead.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">host-statistics</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In BIND 8, this enables keeping of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statistics for every host that the name server interacts
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Not implemented in BIND 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">maintain-ixfr-base</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>This option is obsolete</em></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It was used in <acronym class="acronym">BIND</acronym> 8 to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein determine whether a transaction log was
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein kept for Incremental Zone Transfer. <acronym class="acronym">BIND</acronym> 9 maintains a transaction
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein log whenever possible. If you need to disable outgoing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein incremental zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein transfers, use <span><strong class="command">provide-ixfr</strong></span> <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">minimal-responses</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong>, then when generating
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein responses the server will only add records to the authority
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and additional data sections when they are required (e.g.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein delegations, negative responses). This may improve the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein performance of the server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">multiple-cnames</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option was used in <acronym class="acronym">BIND</acronym> 8 to allow
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a domain name to have multiple CNAME records in violation of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the DNS standards. <acronym class="acronym">BIND</acronym> 9.2 onwards
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein always strictly enforces the CNAME rules both in master
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein files and dynamic updates.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">notify</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong> (the default),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS NOTIFY messages are sent when a zone the server is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authoritative for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein changes, see <a href="Bv9ARM.ch04.html#notify" title="Notify">the section called “Notify”</a>. The messages are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers listed in the zone's NS records (except the master
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server identified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the SOA MNAME field), and to any servers listed in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">also-notify</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>master-only</code></strong>, notifies are only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for master zones.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>explicit</code></strong>, notifies are sent only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers explicitly listed using <span><strong class="command">also-notify</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>no</code></strong>, no notifies are sent.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">notify</strong></span> option may also be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified in the <span><strong class="command">zone</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in which case it overrides the <span><strong class="command">options notify</strong></span> statement.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It would only be necessary to turn off this option if it
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein caused slaves
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">notify-to-soa</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong> do not check the nameservers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the NS RRset against the SOA MNAME. Normally a NOTIFY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein message is not sent to the SOA MNAME (SOA ORIGIN) as it is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein supposed to contain the name of the ultimate master.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sometimes, however, a slave is listed as the SOA MNAME in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein hidden master configurations and in that case you would
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein want the ultimate master to still send NOTIFY messages to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all the nameservers listed in the NS RRset.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">recursion</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong>, and a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS query requests recursion, then the server will attempt
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all the work required to answer the query. If recursion is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and the server does not already know the answer, it will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein referral response. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>yes</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that setting <span><strong class="command">recursion no</strong></span> does not prevent
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clients from getting data from the server's cache; it only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein prevents new data from being cached as an effect of client
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Caching may still occur as an effect the server's internal
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein operation, such as NOTIFY address lookups.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See also <span><strong class="command">fetch-glue</strong></span> above.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">request-nsid</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong>, then an empty EDNS(0)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NSID (Name Server Identifier) option is sent with all
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein queries to authoritative name servers during iterative
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resolution. If the authoritative server returns an NSID
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option in its response, then its contents are logged in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">resolver</strong></span> category at level
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">info</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">rfc2308-type1</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Setting this to <strong class="userinput"><code>yes</code></strong> will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cause the server to send NS records along with the SOA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein record for negative
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein answers. The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Not yet implemented in <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">use-id-pool</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>This option is obsolete</em></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 9 always allocates query
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IDs from a pool.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">use-ixfr</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>This option is obsolete</em></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If you need to disable IXFR to a particular server or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers, see
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the information on the <span><strong class="command">provide-ixfr</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in <a href="Bv9ARM.ch06.html#server_statement_definition_and_usage" title="server Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage">the section called “<span><strong class="command">server</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage”</a>.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <a href="Bv9ARM.ch04.html#incremental_zone_transfers" title="Incremental Zone Transfers (IXFR)">the section called “Incremental Zone Transfers (IXFR)”</a>.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term"><span><strong class="command">provide-ixfr</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See the description of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">provide-ixfr</strong></span> in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="Bv9ARM.ch06.html#server_statement_definition_and_usage" title="server Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage">the section called “<span><strong class="command">server</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage”</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">request-ixfr</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See the description of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">request-ixfr</strong></span> in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="Bv9ARM.ch06.html#server_statement_definition_and_usage" title="server Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage">the section called “<span><strong class="command">server</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usage”</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">treat-cr-as-space</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option was used in <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server treat carriage return ("<span><strong class="command">\r</strong></span>") characters the same way
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as a space or tab character,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to facilitate loading of zone files on a UNIX system that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein were generated
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on an NT or DOS machine. In <acronym class="acronym">BIND</acronym> 9, both UNIX "<span><strong class="command">\n</strong></span>"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and NT/DOS "<span><strong class="command">\r\n</strong></span>" newlines
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are always accepted,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and the option is ignored.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span class="term"><span><strong class="command">additional-from-auth</strong></span>, </span><span class="term"><span><strong class="command">additional-from-cache</strong></span></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These options control the behavior of an authoritative
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein answering queries which have additional data, or when
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein following CNAME
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and DNAME chains.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When both of these options are set to <strong class="userinput"><code>yes</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (the default) and a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein query is being answered from authoritative data (a zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configured into the server), the additional data section of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein reply will be filled in using data from other authoritative
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and from the cache. In some situations this is undesirable,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as when there is concern over the correctness of the cache,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in servers where slave zones may be added and modified by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein untrusted third parties. Also, avoiding
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the search for this additional data will speed up server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein at the possible expense of additional queries to resolve
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein otherwise be provided in the additional section.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, if a query asks for an MX record for host <code class="literal">foo.example.com</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and the record found is "<code class="literal">MX 10 mail.example.net</code>", normally the address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein records (A and AAAA) for <code class="literal">mail.example.net</code> will be provided as well,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if known, even though they are not in the example.com zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Setting these options to <span><strong class="command">no</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein disables this behavior and makes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server only search for additional data in the zone it
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein answers from.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These options are intended for use in authoritative-only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers, or in authoritative-only views. Attempts to set
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein them to <span><strong class="command">no</strong></span> without also
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">recursion no</strong></span> will cause the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ignore the options and log a warning message.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifying <span><strong class="command">additional-from-cache no</strong></span> actually
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein disables the use of the cache not only for additional data
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but also when looking up the answer. This is usually the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein behavior in an authoritative-only server where the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein correctness of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the cached data is an issue.
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson When a name server is non-recursively queried for a name
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson below the apex of any served zone, it normally answers with
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson "upwards referral" to the root servers or the servers of
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce known parent of the query name. Since the data in an
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson upwards referral
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson comes from the cache, the server will not be able to provide
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson referrals when <span><strong class="command">additional-from-cache no</strong></span>
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson has been specified. Instead, it will respond to such
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson with REFUSED. This should not cause any problems since
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce upwards referrals are not required for the resolution
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">match-mapped-addresses</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>yes</code></strong>, then an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4-mapped IPv6 address will match any address match
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein list entries that match the corresponding IPv4 address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option was introduced to work around a kernel quirk
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in some operating systems that causes IPv4 TCP
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein connections, such as zone transfers, to be accepted on an
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce IPv6 socket using mapped addresses. This caused address
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce match lists designed for IPv4 to fail to match. However,
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <span><strong class="command">named</strong></span> now solves this problem
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein internally. The use of this option is discouraged.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">filter-aaaa-on-v4</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is only available when
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 9 is compiled with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>--enable-filter-aaaa</code></strong> option on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "configure" command line. It is intended to help the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein transition from IPv4 to IPv6 by not giving IPv6 addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to DNS clients unless they have connections to the IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Internet. This is not recommended unless absolutely
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein necessary. The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">filter-aaaa-on-v4</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may also be specified in <span><strong class="command">view</strong></span> statements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to override the global <span><strong class="command">filter-aaaa-on-v4</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If <strong class="userinput"><code>yes</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the DNS client is at an IPv4 address, in <span><strong class="command">filter-aaaa</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and if the response does not include DNSSEC signatures,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews then all AAAA records are deleted from the response.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews This filtering applies to all responses and not only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authoritative responses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <strong class="userinput"><code>break-dnssec</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then AAAA records are deleted even when DNSSEC is enabled.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein As suggested by the name, this makes the response not verify,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein because the DNSSEC protocol is designed detect deletions.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This mechanism can erroneously cause other servers to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not give AAAA records to their clients.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A recursing server with both IPv6 and IPv4 network connections
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that queries an authoritative server using this mechanism
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein via IPv4 will be denied AAAA records even if its client is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This mechanism is applied to authoritative as well as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein non-authoritative records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A client using IPv4 that is not allowed recursion can
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein erroneously be given AAAA records because the server is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allowed to check for A records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Some AAAA records are given to IPv4 clients in glue records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 clients that are servers can then erroneously
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein answer requests for AAAA records received via IPv4.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">filter-aaaa-on-v6</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Identical to <span><strong class="command">filter-aaaa-on-v4</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein except it filters AAAA responses to queries from IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clients instead of IPv4 clients. To filter all
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein responses, set both options to <strong class="userinput"><code>yes</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">ixfr-from-differences</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When <strong class="userinput"><code>yes</code></strong> and the server loads a new
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein version of a master zone from its zone file or receives a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein new version of a slave file via zone transfer, it will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein compare the new version to the previous one and calculate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a set of differences. The differences are then logged in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the zone's journal file such that the changes can be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein transmitted to downstream slaves as an incremental zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein By allowing incremental zone transfers to be used for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein non-dynamic zones, this option saves bandwidth at the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein expense of increased CPU and memory consumption at the
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce In particular, if the new version of a zone is completely
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce different from the previous one, the set of differences
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be of a size comparable to the combined size of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein old and new zone version, and the server will need to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein temporarily allocate memory to hold this complete
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein difference set.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">ixfr-from-differences</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also accepts <span><strong class="command">master</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">slave</strong></span> at the view and options
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein levels which causes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">ixfr-from-differences</strong></span> to be enabled for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all <span><strong class="command">master</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">slave</strong></span> zones respectively.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is off by default.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">multi-master</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews This should be set when you have multiple masters for a zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein addresses refer to different machines. If <strong class="userinput"><code>yes</code></strong>, <span><strong class="command">named</strong></span> will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when the serial number on the master is less than what <span><strong class="command">named</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein has. The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-enable</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Enable DNSSEC support in <span><strong class="command">named</strong></span>. Unless set to <strong class="userinput"><code>yes</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> behaves as if it does not support DNSSEC.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>yes</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-validation</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Enable DNSSEC validation in <span><strong class="command">named</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note <span><strong class="command">dnssec-enable</strong></span> also needs to be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set to <strong class="userinput"><code>yes</code></strong> to be effective.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If set to <strong class="userinput"><code>no</code></strong>, DNSSEC validation
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is disabled. If set to <strong class="userinput"><code>auto</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNSSEC validation is enabled, and a default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein trust-anchor for the DNS root zone is used. If set to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>yes</code></strong>, DNSSEC validation is enabled,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but a trust anchor must be manually configured using
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a <span><strong class="command">trusted-keys</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">managed-keys</strong></span> statement. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is <strong class="userinput"><code>yes</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-accept-expired</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Accept expired signatures when verifying DNSSEC signatures.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>no</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Setting this option to <strong class="userinput"><code>yes</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein leaves <span><strong class="command">named</strong></span> vulnerable to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein replay attacks.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">querylog</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specify whether query logging should be started when <span><strong class="command">named</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">querylog</strong></span> is not specified,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then the query logging
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is determined by the presence of the logging category <span><strong class="command">queries</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">check-names</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is used to restrict the character set and syntax
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein certain domain names in master files and/or DNS responses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from the network. The default varies according to usage
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">master</strong></span> zones the default is <span><strong class="command">fail</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For <span><strong class="command">slave</strong></span> zones the default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is <span><strong class="command">warn</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For answers received from the network (<span><strong class="command">response</strong></span>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the default is <span><strong class="command">ignore</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The rules for legal hostnames and mail domains are derived
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from RFC 952 and RFC 821 as modified by RFC 1123.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">check-names</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein applies to the owner names of A, AAAA and MX records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It also applies to the domain names in the RDATA of NS, SOA,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein MX, and SRV records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It also applies to the RDATA of PTR records where the owner
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein name indicated that it is a reverse lookup of a hostname
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (the owner name ends in IN-ADDR.ARPA, IP6.ARPA, or IP6.INT).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">check-dup-records</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Check master zones for records that are treated as different
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by DNSSEC but are semantically equal in plain DNS. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default is to <span><strong class="command">warn</strong></span>. Other possible
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein values are <span><strong class="command">fail</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">ignore</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">check-mx</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Check whether the MX record appears to refer to a IP address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is to <span><strong class="command">warn</strong></span>. Other possible
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein values are <span><strong class="command">fail</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">ignore</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term"><span><strong class="command">check-wildcard</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is used to check for non-terminal wildcards.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The use of non-terminal wildcards is almost always as a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein result of a failure
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to understand the wildcard matching algorithm (RFC 1034).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein affects master zones. The default (<span><strong class="command">yes</strong></span>) is to check
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for non-terminal wildcards and issue a warning.
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews<dt><span class="term"><span><strong class="command">check-integrity</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Perform post load zone integrity checks on master
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews zones. This checks that MX and SRV records refer
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews to address (A or AAAA) records and that glue
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews address records exist for delegated zones. For
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews MX and SRV records only in-zone hostnames are
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews checked (for out-of-zone hostnames use
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">named-checkzone</strong></span>).
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews For NS records only names below top of zone are
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews checked (for out-of-zone names and glue consistency
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews checks use <span><strong class="command">named-checkzone</strong></span>).
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The default is <span><strong class="command">yes</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Check that the two forms of Sender Policy Framework
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews records (TXT records starting with "v=spf1" and SPF) either
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews both exist or both don't exist. Warnings are
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews emitted it they don't and be suppressed with
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">check-spf</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term"><span><strong class="command">check-mx-cname</strong></span></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews If <span><strong class="command">check-integrity</strong></span> is set then
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews fail, warn or ignore MX records that refer
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews to CNAMES. The default is to <span><strong class="command">warn</strong></span>.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="term"><span><strong class="command">check-srv-cname</strong></span></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews If <span><strong class="command">check-integrity</strong></span> is set then
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews fail, warn or ignore SRV records that refer
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews to CNAMES. The default is to <span><strong class="command">warn</strong></span>.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="term"><span><strong class="command">check-sibling</strong></span></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews When performing integrity checks, also check that
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews sibling glue exists. The default is <span><strong class="command">yes</strong></span>.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="term"><span><strong class="command">check-spf</strong></span></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews When performing integrity checks, check that the
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews two forms of Sender Policy Framwork records (TXT
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews records starting with "v=spf1" and SPF) both exist
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews or both don't exist and issue a warning if not
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews met. The default is <span><strong class="command">warn</strong></span>.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="term"><span><strong class="command">zero-no-soa-ttl</strong></span></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews When returning authoritative negative responses to
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews SOA queries set the TTL of the SOA record returned in
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews the authority section to zero.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews The default is <span><strong class="command">yes</strong></span>.
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews<dt><span class="term"><span><strong class="command">zero-no-soa-ttl-cache</strong></span></span></dt>
68abac6cb23aa2c6489ccc16663e051d7aad3ad9Mark Andrews When caching a negative response to a SOA query
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set the TTL to zero.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <span><strong class="command">no</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">update-check-ksk</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When set to the default value of <code class="literal">yes</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein check the KSK bit in each key to determine how the key
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein should be used when generating RRSIGs for a secure zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Ordinarily, zone-signing keys (that is, keys without the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein KSK bit set) are used to sign the entire zone, while
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein key-signing keys (keys with the KSK bit set) are only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used to sign the DNSKEY RRset at the zone apex.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein However, if this option is set to <code class="literal">no</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then the KSK bit is ignored; KSKs are treated as if they
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein were ZSKs and are used to sign the entire zone. This is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein similar to the <span><strong class="command">dnssec-signzone -z</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein command line option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When this option is set to <code class="literal">yes</code>, there
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein must be at least two active keys for every algorithm
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein represented in the DNSKEY RRset: at least one KSK and one
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ZSK per algorithm. If there is any algorithm for which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this requirement is not met, this option will be ignored
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for that algorithm.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-dnskey-kskonly</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When this option and <span><strong class="command">update-check-ksk</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are both set to <code class="literal">yes</code>, only key-signing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein keys (that is, keys with the KSK bit set) will be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to sign the DNSKEY RRset at the zone apex. Zone-signing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein keys (keys without the KSK bit set) will be used to sign
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the remainder of the zone, but not the DNSKEY RRset.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is similar to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dnssec-signzone -x</strong></span> command line option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <span><strong class="command">no</strong></span>. If
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">update-check-ksk</strong></span> is set to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">no</code>, this option is ignored.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">dnssec-loadkeys-interval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When a zone is configured with <span><strong class="command">auto-dnssec
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maintain;</strong></span> its key repository must be checked
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein periodically to see if any new keys have been added
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or any existing keys' timing metadata has been updated
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (see <a href="man.dnssec-keygen.html" title="dnssec-keygen"><span class="refentrytitle"><span class="application">dnssec-keygen</span></span>(8)</a> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="man.dnssec-settime.html" title="dnssec-settime"><span class="refentrytitle"><span class="application">dnssec-settime</span></span>(8)</a>). The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">dnssec-loadkeys-interval</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sets the frequency of autoatic repository checks, in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein minutes. The default is <code class="literal">60</code> (1 hour),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the minimum is <code class="literal">1</code> (1 minute), and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum is <code class="literal">1440</code> (24 hours); any higher
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value is silently reduced.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">try-tcp-refresh</strong></span></span></dt>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Try to refresh the zone using TCP if UDP queries fail.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews For BIND 8 compatibility, the default is
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews <span><strong class="command">yes</strong></span>.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<dt><span class="term"><span><strong class="command">dnssec-secure-to-insecure</strong></span></span></dt>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Allow a dynamic zone to transition from secure to
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews insecure (i.e., signed to unsigned) by deleting all
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews of the DNSKEY records. The default is <span><strong class="command">no</strong></span>.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews If set to <span><strong class="command">yes</strong></span>, and if the DNSKEY RRset
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews at the zone apex is deleted, all RRSIG and NSEC records
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews will be removed from the zone as well.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews If the zone uses NSEC3, then it is also necessary to
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews delete the NSEC3PARAM RRset from the zone apex; this will
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews cause the removal of all corresponding NSEC3 records.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews (It is expected that this requirement will be eliminated
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews in a future release.)
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Note that if a zone has been configured with
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews <span><strong class="command">auto-dnssec maintain</strong></span> and the
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews private keys remain accessible in the key repository,
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews then the zone will be automatically signed again the
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews next time <span><strong class="command">named</strong></span> is started.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<div class="titlepage"><div><div><h4 class="title">
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<a name="id2585083"></a>Forwarding</h4></div></div></div>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews The forwarding facility can be used to create a large site-wide
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews cache on a few servers, reducing traffic over links to external
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews name servers. It can also be used to allow queries by servers that
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews do not have direct access to the Internet, but wish to look up
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews names anyway. Forwarding occurs only on those queries for which
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews the server is not authoritative and does not have the answer in
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<dt><span class="term"><span><strong class="command">forward</strong></span></span></dt>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews This option is only meaningful if the
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews forwarders list is not empty. A value of <code class="varname">first</code>,
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews the default, causes the server to query the forwarders
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews first — and
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews if that doesn't answer the question, the server will then
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews the answer itself. If <code class="varname">only</code> is
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews specified, the
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews server will only query the forwarders.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<dt><span class="term"><span><strong class="command">forwarders</strong></span></span></dt>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Specifies the IP addresses to be used
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews for forwarding. The default is the empty list (no
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews forwarding).
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Forwarding can also be configured on a per-domain basis, allowing
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews for the global forwarding options to be overridden in a variety
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews of ways. You can set particular domains to use different
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews or have a different <span><strong class="command">forward only/first</strong></span> behavior,
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews or not forward at all, see <a href="Bv9ARM.ch06.html#zone_statement_grammar" title="zone
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Statement Grammar">the section called “<span><strong class="command">zone</strong></span>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Statement Grammar”</a>.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<div class="titlepage"><div><div><h4 class="title">
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<a name="id2585210"></a>Dual-stack Servers</h4></div></div></div>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Dual-stack servers are used as servers of last resort to work
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews problems in reachability due the lack of support for either IPv4
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews on the host machine.
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<dt><span class="term"><span><strong class="command">dual-stack-servers</strong></span></span></dt>
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews Specifies host names or addresses of machines with access to
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews both IPv4 and IPv6 transports. If a hostname is used, the
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews server must be able
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews to resolve the name using only the transport it has. If the
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews machine is dual
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews stacked, then the <span><strong class="command">dual-stack-servers</strong></span> have no effect unless
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews access to a transport has been disabled on the command line
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews (e.g. <span><strong class="command">named -4</strong></span>).
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<div class="titlepage"><div><div><h4 class="title">
1586d8cbac5d73031716561386f60758c6c332d5Mark Andrews<a name="access_control"></a>Access Control</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Access to the server can be restricted based on the IP address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the requesting system. See <a href="Bv9ARM.ch06.html#address_match_lists" title="Address Match Lists">the section called “Address Match Lists”</a> for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein details on how to specify IP address lists.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-notify</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which hosts are allowed to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein notify this server, a slave, of zone changes in addition
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the zone masters.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-notify</strong></span> may also be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">zone</strong></span> statement, in which case
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it overrides the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">options allow-notify</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement. It is only meaningful
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for a slave zone. If not specified, the default is to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein process notify messages
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only from a zone's master.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-query</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which hosts are allowed to ask ordinary
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS questions. <span><strong class="command">allow-query</strong></span> may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also be specified in the <span><strong class="command">zone</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement, in which case it overrides the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">options allow-query</strong></span> statement.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If not specified, the default is to allow queries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from all hosts.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query-cache</strong></span> is now
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used to specify access to the cache.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-query-on</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which local addresses can accept ordinary
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS questions. This makes it possible, for instance,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to allow queries on internal-facing interfaces but
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein disallow them on external-facing ones, without
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein necessarily knowing the internal network's addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that <span><strong class="command">allow-query-on</strong></span> is only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein checked for queries that are permitted by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query</strong></span>. A query must be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allowed by both ACLs, or it will be refused.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query-on</strong></span> may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also be specified in the <span><strong class="command">zone</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement, in which case it overrides the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">options allow-query-on</strong></span> statement.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If not specified, the default is to allow queries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on all addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query-cache</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used to specify access to the cache.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-query-cache</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which hosts are allowed to get answers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from the cache. If <span><strong class="command">allow-query-cache</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is not set then <span><strong class="command">allow-recursion</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is used if set, otherwise <span><strong class="command">allow-query</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is used if set unless <span><strong class="command">recursion no;</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set in which case <span><strong class="command">none;</strong></span> is used,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein otherwise the default (<span><strong class="command">localnets;</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">localhost;</strong></span>) is used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-query-cache-on</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which local addresses can give answers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from the cache. If not specified, the default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to allow cache queries on any address,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">localnets</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">localhost</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-recursion</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which hosts are allowed to make recursive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein queries through this server. If
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-recursion</strong></span> is not set
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then <span><strong class="command">allow-query-cache</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used if set, otherwise <span><strong class="command">allow-query</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is used if set, otherwise the default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (<span><strong class="command">localnets;</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">localhost;</strong></span>) is used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-recursion-on</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which local addresses can accept recursive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein queries. If not specified, the default is to allow
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein recursive queries on all addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-update</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which hosts are allowed to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein submit Dynamic DNS updates for master zones. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein updates from all hosts. Note that allowing updates based
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on the requestor's IP address is insecure; see
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="Bv9ARM.ch07.html#dynamic_update_security" title="Dynamic Update Security">the section called “Dynamic Update Security”</a> for details.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-update-forwarding</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Specifies which hosts are allowed to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews submit Dynamic DNS updates to slave zones to be forwarded to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews master. The default is <strong class="userinput"><code>{ none; }</code></strong>,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews means that no update forwarding will be performed. To
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein update forwarding, specify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>allow-update-forwarding { any; };</code></strong>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Specifying values other than <strong class="userinput"><code>{ none; }</code></strong> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>{ any; }</code></strong> is usually
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein counterproductive, since
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the responsibility for update access control should rest
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews master server, not the slaves.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Note that enabling the update forwarding feature on a slave
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews may expose master servers relying on insecure IP address
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews access control to attacks; see <a href="Bv9ARM.ch07.html#dynamic_update_security" title="Dynamic Update Security">the section called “Dynamic Update Security”</a>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews for more details.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-v6-synthesis</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews This option was introduced for the smooth transition from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to A6 and from "nibble labels" to binary labels.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews However, since both A6 and binary labels were then
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this option was also deprecated.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is now ignored with some warning messages.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">allow-transfer</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies which hosts are allowed to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein receive zone transfers from the server. <span><strong class="command">allow-transfer</strong></span> may
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews also be specified in the <span><strong class="command">zone</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews statement, in which
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews case it overrides the <span><strong class="command">options allow-transfer</strong></span> statement.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If not specified, the default is to allow transfers to all
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">blackhole</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Specifies a list of addresses that the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews server will not accept queries from or use to resolve a
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews query. Queries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from these addresses will not be responded to. The default
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews is <strong class="userinput"><code>none</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">filter-aaaa</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Specifies a list of addresses to which
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">filter-aaaa-on-v4</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is applies. The default is <strong class="userinput"><code>any</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">resolver-query-timeout</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The amount of time the resolver will spend attempting
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews to resolve a recursive query before failing. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and minimum is <code class="literal">10</code> and the maximum is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">30</code>. Setting it to <code class="literal">0</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will result in the default being used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2585703"></a>Interfaces</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The interfaces and ports that the server will answer queries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from may be specified using the <span><strong class="command">listen-on</strong></span> option. <span><strong class="command">listen-on</strong></span> takes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an optional port and an <code class="varname">address_match_list</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server will listen on all interfaces allowed by the address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein match list. If a port is not specified, port 53 will be used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Multiple <span><strong class="command">listen-on</strong></span> statements are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">listen-on { 5.6.7.8; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will enable the name server on port 53 for the IP address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 5.6.7.8, and on port 1234 of an address on the machine in net
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 1.2 that is not 1.2.3.4.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no <span><strong class="command">listen-on</strong></span> is specified, the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews server will listen on port 53 on all IPv4 interfaces.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">listen-on-v6</strong></span> option is used to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specify the interfaces and the ports on which the server will
00124ad0406365d39f4b2d1011ef6a76706e9df0Mark Andrews listen for incoming queries sent using IPv6. If not specified,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server will listen on port 53 on all IPv6 interfaces.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as the <code class="varname">address_match_list</code> for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">listen-on-v6</strong></span> option,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server does not bind a separate socket to each IPv6 interface
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address as it does for IPv4 if the operating system has enough API
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein support for IPv6 (specifically if it conforms to RFC 3493 and RFC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Instead, it listens on the IPv6 wildcard address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the system only has incomplete API support for IPv6, however,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the behavior is the same as that for IPv4.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A list of particular IPv6 addresses can also be specified, in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server listens on a separate socket for each specified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein regardless of whether the desired API is supported by the system.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Multiple <span><strong class="command">listen-on-v6</strong></span> options can
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">listen-on-v6 { any; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinlisten-on-v6 port 1234 { !2001:db8::/32; any; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will enable the name server on port 53 for any IPv6 addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (with a single wildcard socket),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and on port 1234 of IPv6 addresses that is not in the prefix
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 2001:db8::/32 (with separate sockets for each matched address.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To make the server not listen on any IPv6 address, use
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">listen-on-v6 { none; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="query_address"></a>Query Address</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the server doesn't know the answer to a question, it will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein query other name servers. <span><strong class="command">query-source</strong></span> specifies
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the address and port used for such queries. For queries sent over
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6, there is a separate <span><strong class="command">query-source-v6</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">address</strong></span> is <span><strong class="command">*</strong></span> (asterisk) or is omitted,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a wildcard IP address (<span><strong class="command">INADDR_ANY</strong></span>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">port</strong></span> is <span><strong class="command">*</strong></span> or is omitted,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a random port number from a pre-configured
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein range is picked up and will be used for each query.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The port range(s) is that specified in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">use-v4-udp-ports</strong></span> (for IPv4)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <span><strong class="command">use-v6-udp-ports</strong></span> (for IPv6)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein options, excluding the ranges specified in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">avoid-v4-udp-ports</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <span><strong class="command">avoid-v6-udp-ports</strong></span> options, respectively.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The defaults of the <span><strong class="command">query-source</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">query-source-v6</strong></span> options
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">query-source address * port *;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinquery-source-v6 address * port *;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">use-v4-udp-ports</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-v6-udp-ports</strong></span> is unspecified,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will check if the operating
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein system provides a programming interface to retrieve the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein system's default range for ephemeral ports.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If such an interface is available,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will use the corresponding system
00124ad0406365d39f4b2d1011ef6a76706e9df0Mark Andrews default range; otherwise, it will use its own defaults:
00124ad0406365d39f4b2d1011ef6a76706e9df0Mark Andrews<pre class="programlisting">use-v4-udp-ports { range 1024 65535; };
00124ad0406365d39f4b2d1011ef6a76706e9df0Mark Andrewsuse-v6-udp-ports { range 1024 65535; };
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Note: make sure the ranges be sufficiently large for
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews security. A desirable size depends on various parameters,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews but we generally recommend it contain at least 16384 ports
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews (14 bits of entropy).
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Note also that the system's default range when used may be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein too small for this purpose, and that the range may even be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein changed while <span><strong class="command">named</strong></span> is running; the new
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein range will automatically be applied when <span><strong class="command">named</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is reloaded.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is encouraged to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configure <span><strong class="command">use-v4-udp-ports</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-v6-udp-ports</strong></span> explicitly so that the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ranges are sufficiently large and are reasonably
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein independent from the ranges used by other applications.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note: the operational configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein where <span><strong class="command">named</strong></span> runs may prohibit the use
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of some ports. For example, UNIX systems will not allow
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> running without a root privilege
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to use ports less than 1024.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If such ports are included in the specified (or detected)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set of query ports, the corresponding query attempts will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein fail, resulting in resolution failures or delay.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is therefore important to configure the set of ports
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that can be safely used in the expected operational environment.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The defaults of the <span><strong class="command">avoid-v4-udp-ports</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">avoid-v6-udp-ports</strong></span> options
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">avoid-v4-udp-ports {};
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinavoid-v6-udp-ports {};
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note: BIND 9.5.0 introduced
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">use-queryport-pool</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option to support a pool of such random ports, but this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option is now obsolete because reusing the same ports in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the pool may not be sufficiently secure.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For the same reason, it is generally strongly discouraged to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specify a particular port for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">query-source</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">query-source-v6</strong></span> options;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it implicitly disables the use of randomized port numbers.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">use-queryport-pool</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is obsolete.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">queryport-pool-ports</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is obsolete.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">queryport-pool-updateinterval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is obsolete.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
cedb0bd0c1e3c461b7e479a16d3adfd5b150f1f4Mark Andrews The address specified in the <span><strong class="command">query-source</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is used for both UDP and TCP queries, but the port applies only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to UDP queries. TCP queries always use a random
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein unprivileged port.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
cedb0bd0c1e3c461b7e479a16d3adfd5b150f1f4Mark Andrews Solaris 2.5.1 and earlier does not support setting the source
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address for TCP sockets.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See also <span><strong class="command">transfer-source</strong></span> and
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews <span><strong class="command">notify-source</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="zone_transfers"></a>Zone Transfers</h4></div></div></div>
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews <acronym class="acronym">BIND</acronym> has mechanisms in place to
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews facilitate zone transfers
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews and set limits on the amount of load that transfers place on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein system. The following options apply to zone transfers.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">also-notify</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Defines a global list of IP addresses of name servers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that are also sent NOTIFY messages whenever a fresh copy of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone is loaded, in addition to the servers listed in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone's NS records.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews This helps to ensure that copies of the zones will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein quickly converge on stealth servers.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Optionally, a port may be specified with each
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">also-notify</strong></span> address to send
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the notify messages to a port other than the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default of 53.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An optional TSIG key can also be specified with each
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce address to cause the notify messages to be signed; this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be useful when sending notifies to multiple views.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In place of explicit addresses, one or more named
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">masters</strong></span> lists can be used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If an <span><strong class="command">also-notify</strong></span> list
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is given in a <span><strong class="command">zone</strong></span> statement,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews it will override
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">options also-notify</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement. When a <span><strong class="command">zone notify</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is set to <span><strong class="command">no</strong></span>, the IP
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein addresses in the global <span><strong class="command">also-notify</strong></span> list will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not be sent NOTIFY messages for that zone. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein list (no global notification list).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-transfer-time-in</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Inbound zone transfers running longer than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this many minutes will be terminated. The default is 120
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (2 hours). The maximum value is 28 days (40320 minutes).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-transfer-idle-in</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Inbound zone transfers making no progress
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in this many minutes will be terminated. The default is 60
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (1 hour). The maximum value is 28 days (40320 minutes).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-transfer-time-out</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Outbound zone transfers running longer than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this many minutes will be terminated. The default is 120
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (2 hours). The maximum value is 28 days (40320 minutes).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-transfer-idle-out</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Outbound zone transfers making no progress
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in this many minutes will be terminated. The default is 60
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein hour). The maximum value is 28 days (40320 minutes).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">serial-query-rate</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Slave servers will periodically query master
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers to find out if zone serial numbers have
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein changed. Each such query uses a minute amount of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the slave server's network bandwidth. To limit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the amount of bandwidth used, BIND 9 limits the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rate at which queries are sent. The value of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">serial-query-rate</strong></span> option, an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein integer, is the maximum number of queries sent
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein per second. The default is 20.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In addition to controlling the rate SOA refresh
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein queries are issued at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">serial-query-rate</strong></span> also controls
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the rate at which NOTIFY messages are sent from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein both master and slave zones.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">serial-queries</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In BIND 8, the <span><strong class="command">serial-queries</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set the maximum number of concurrent serial number queries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allowed to be outstanding at any given time.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein BIND 9 does not limit the number of outstanding
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein serial queries and ignores the <span><strong class="command">serial-queries</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Instead, it limits the rate at which the queries are sent
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as defined using the <span><strong class="command">serial-query-rate</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">transfer-format</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Zone transfers can be sent using two different formats,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">one-answer</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">many-answers</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">transfer-format</strong></span> option is used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on the master server to determine which format it sends.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">one-answer</strong></span> uses one DNS message per
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resource record transferred.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">many-answers</strong></span> packs as many resource
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein records as possible into a message.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">many-answers</strong></span> is more efficient, but is
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson only supported by relatively new slave servers,
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce such as <acronym class="acronym">BIND</acronym> 9, <acronym class="acronym">BIND</acronym>
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson 8.x and <acronym class="acronym">BIND</acronym> 4.9.5 onwards.
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson The <span><strong class="command">many-answers</strong></span> format is also supported by
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce recent Microsoft Windows nameservers.
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson The default is <span><strong class="command">many-answers</strong></span>.
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson <span><strong class="command">transfer-format</strong></span> may be overridden on a
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson per-server basis by using the <span><strong class="command">server</strong></span>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term"><span><strong class="command">transfers-in</strong></span></span></dt>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce The maximum number of inbound zone transfers
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson that can be running concurrently. The default value is <code class="literal">10</code>.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Increasing <span><strong class="command">transfers-in</strong></span> may
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson speed up the convergence
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce of slave zones, but it also may increase the load on the
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term"><span><strong class="command">transfers-out</strong></span></span></dt>
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson The maximum number of outbound zone transfers
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson that can be running concurrently. Zone transfer requests in
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce of the limit will be refused. The default value is <code class="literal">10</code>.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term"><span><strong class="command">transfers-per-ns</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum number of inbound zone transfers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that can be concurrently transferring from a given remote
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein name server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default value is <code class="literal">2</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Increasing <span><strong class="command">transfers-per-ns</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews speed up the convergence of slave zones, but it also may
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews the load on the remote name server. <span><strong class="command">transfers-per-ns</strong></span> may
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews be overridden on a per-server basis by using the <span><strong class="command">transfers</strong></span> phrase
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews of the <span><strong class="command">server</strong></span> statement.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term"><span><strong class="command">transfer-source</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">transfer-source</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein determines which local address will be bound to IPv4
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews TCP connections used to fetch zones transferred
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein inbound by the server. It also determines the
a057e8e33baa5fa369be28a9680585200ce3ff73Mark Andrews source IPv4 address, and optionally the UDP port,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used for the refresh queries and forwarded dynamic
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein updates. If not set, it defaults to a system
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein controlled value which will usually be the address
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews of the interface "closest to" the remote end. This
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address must appear in the remote end's
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-transfer</strong></span> option for the
7326ba2f542b89196323867a1457f596f99e315dMark Andrews zone being transferred, if one is specified. This
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement sets the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfer-source</strong></span> for all zones,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but can be overridden on a per-view or per-zone
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews basis by including a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfer-source</strong></span> statement within
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">view</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">zone</strong></span> block in the configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Solaris 2.5.1 and earlier does not support setting the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein source address for TCP sockets.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">transfer-source-v6</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The same as <span><strong class="command">transfer-source</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein except zone transfers are performed using IPv6.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">alt-transfer-source</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An alternate transfer source if the one listed in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfer-source</strong></span> fails and
9090a36b61a90746738f66bce09ceaf8d8491d7eAndreas Gustafsson <span><strong class="command">use-alt-transfer-source</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If you do not wish the alternate transfer source
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews to be used, you should set
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-alt-transfer-source</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein appropriately and you should not depend upon
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews getting an answer back to the first refresh
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">alt-transfer-source-v6</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An alternate transfer source if the one listed in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfer-source-v6</strong></span> fails and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-alt-transfer-source</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">use-alt-transfer-source</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Use the alternate transfer sources or not. If views are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified this defaults to <span><strong class="command">no</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein otherwise it defaults to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">yes</strong></span> (for BIND 8
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein compatibility).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">notify-source</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">notify-source</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein determines which local source address, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein optionally UDP port, will be used to send NOTIFY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein messages. This address must appear in the slave
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server's <span><strong class="command">masters</strong></span> zone clause or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in an <span><strong class="command">allow-notify</strong></span> clause. This
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement sets the <span><strong class="command">notify-source</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for all zones, but can be overridden on a per-zone or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein per-view basis by including a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">notify-source</strong></span> statement within
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">zone</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">view</strong></span> block in the configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Solaris 2.5.1 and earlier does not support setting the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein source address for TCP sockets.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">notify-source-v6</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Like <span><strong class="command">notify-source</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but applies to notify messages sent to IPv6 addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2586833"></a>UDP Port Lists</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-v4-udp-ports</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">avoid-v4-udp-ports</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-v6-udp-ports</strong></span>, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">avoid-v6-udp-ports</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specify a list of IPv4 and IPv6 UDP ports that will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used or not used as source ports for UDP messages.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See <a href="Bv9ARM.ch06.html#query_address" title="Query Address">the section called “Query Address”</a> about how the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein available ports are determined.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, with the following configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinuse-v6-udp-ports { range 32768 65535; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinavoid-v6-udp-ports { 40000; range 50000 60000; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein UDP ports of IPv6 messages sent
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from <span><strong class="command">named</strong></span> will be in one
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the following ranges: 32768 to 39999, 40001 to 49999,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and 60001 to 65535.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">avoid-v4-udp-ports</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">avoid-v6-udp-ports</strong></span> can be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to prevent <span><strong class="command">named</strong></span> from choosing as its random source port a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein port that is blocked by your firewall or a port that is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used by other applications;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if a query went out with a source port blocked by a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein firewall, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein answer would not get by the firewall and the name server would
c60793c77f6b6b8b66ad57c73cd7eb67e8d7ff6fAndreas Gustafsson have to query again.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note: the desired range can also be represented only with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-v4-udp-ports</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">use-v6-udp-ports</strong></span>, and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">avoid-</strong></span> options are redundant in that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sense; they are provided for backward compatibility and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to possibly simplify the port specification.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2586892"></a>Operating System Resource Limits</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server's usage of many system resources can be limited.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Scaled values are allowed when specifying resource limits. For
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein example, <span><strong class="command">1G</strong></span> can be used instead of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">1073741824</strong></span> to specify a limit of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein gigabyte. <span><strong class="command">unlimited</strong></span> requests
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein unlimited use, or the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum available amount. <span><strong class="command">default</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein uses the limit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that was in force when the server was started. See the description
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of <span><strong class="command">size_spec</strong></span> in <a href="Bv9ARM.ch06.html#configuration_file_elements" title="Configuration File Elements">the section called “Configuration File Elements”</a>.
c60793c77f6b6b8b66ad57c73cd7eb67e8d7ff6fAndreas Gustafsson The following options set operating system resource limits for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the name server process. Some operating systems don't support
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein any of the limits. On such systems, a warning will be issued if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein unsupported limit is used.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term"><span><strong class="command">coresize</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum size of a core dump. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">datasize</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum amount of data memory the server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may use. The default is <code class="literal">default</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is a hard limit on server memory usage.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the server attempts to allocate memory in excess of this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein limit, the allocation will fail, which may in turn leave
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server unable to perform DNS service. Therefore,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein this option is rarely useful as a way of limiting the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein amount of memory used by the server, but it can be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to raise an operating system data size limit that is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein too small by default. If you wish to limit the amount
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of memory used by the server, use the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-cache-size</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">recursive-clients</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein options instead.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">files</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum number of files the server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may have open concurrently. The default is <code class="literal">unlimited</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">stacksize</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum amount of stack memory the server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may use. The default is <code class="literal">default</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="server_resource_limits"></a>Server Resource Limits</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The following options set limits on the server's
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resource consumption that are enforced internally by the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server rather than the operating system.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-ixfr-log-size</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option is obsolete; it is accepted
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and ignored for BIND 8 compatibility. The option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-journal-size</strong></span> performs a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein similar function in BIND 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-journal-size</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets a maximum size for each journal file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (see <a href="Bv9ARM.ch04.html#journal" title="The journal file">the section called “The journal file”</a>). When the journal file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the specified size, some of the oldest transactions in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be automatically removed. The largest permitted
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value is 2 gigabytes. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">unlimited</code>, which also
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein means 2 gigabytes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This may also be set on a per-zone basis.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">host-statistics-max</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In BIND 8, specifies the maximum number of host statistics
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein entries to be kept.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Not implemented in BIND 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">recursive-clients</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum number of simultaneous recursive lookups
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server will perform on behalf of clients. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">1000</code>. Because each recursing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein client uses a fair
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein bit of memory, on the order of 20 kilobytes, the value of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">recursive-clients</strong></span> option may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein have to be decreased
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on hosts with limited memory.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">tcp-clients</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum number of simultaneous client TCP
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein connections that the server will accept.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <code class="literal">100</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">reserved-sockets</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The number of file descriptors reserved for TCP, stdio,
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews etc. This needs to be big enough to cover the number of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interfaces <span><strong class="command">named</strong></span> listens on, <span><strong class="command">tcp-clients</strong></span> as well as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to provide room for outgoing TCP queries and incoming zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein transfers. The default is <code class="literal">512</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The minimum value is <code class="literal">128</code> and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum value is <code class="literal">128</code> less than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maxsockets (-S). This option may be removed in the future.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option has little effect on Windows.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-cache-size</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum amount of memory to use for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server's cache, in bytes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When the amount of data in the cache
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein reaches this limit, the server will cause records to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein expire prematurely based on an LRU based strategy so
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that the limit is not exceeded.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The keyword <strong class="userinput"><code>unlimited</code></strong>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or the value 0, will place no limit on cache size;
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews records will be purged from the cache only when their
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein TTLs expire.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Any positive values less than 2MB will be ignored
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and reset to 2MB.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In a server with multiple views, the limit applies
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein separately to the cache of each view.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <strong class="userinput"><code>unlimited</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">tcp-listen-queue</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The listen queue depth. The default and minimum is 10.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the kernel supports the accept filter "dataready" this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also controls how
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein many TCP connections that will be queued in kernel space
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein some data before being passed to accept. Nonzero values
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein less than 10 will be silently raised. A value of 0 may also
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be used; on most platforms this sets the listen queue
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein length to a system-defined default value.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2587454"></a>Periodic Task Intervals</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">cleaning-interval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This interval is effectively obsolete. Previously,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server would remove expired resource records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from the cache every <span><strong class="command">cleaning-interval</strong></span> minutes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 9 now manages cache
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein memory in a more sophisticated manner and does not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rely on the periodic cleaning any more.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifying this option therefore has no effect on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server's behavior.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">heartbeat-interval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server will perform zone maintenance tasks
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for all zones marked as <span><strong class="command">dialup</strong></span> whenever this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interval expires. The default is 60 minutes. Reasonable
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein values are up
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to 1 day (1440 minutes). The maximum value is 28 days
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (40320 minutes).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If set to 0, no zone maintenance for these zones will occur.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">interface-interval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server will scan the network interface list
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein every <span><strong class="command">interface-interval</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein minutes. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is 60 minutes. The maximum value is 28 days (40320 minutes).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If set to 0, interface scanning will only occur when
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the configuration file is loaded. After the scan, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein begin listening for queries on any newly discovered
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interfaces (provided they are allowed by the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">listen-on</strong></span> configuration), and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein stop listening on interfaces that have gone away.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">statistics-interval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Name server statistics will be logged
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein every <span><strong class="command">statistics-interval</strong></span>
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews minutes. The default is
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews 60. The maximum value is 28 days (40320 minutes).
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews If set to 0, no statistics will be logged.
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Not yet implemented in
a057e8e33baa5fa369be28a9680585200ce3ff73Mark Andrews<div class="titlepage"><div><div><h4 class="title">
3a3705ef7747327df182bf8d009333d2472253d5Mark Andrews<a name="topology"></a>Topology</h4></div></div></div>
a057e8e33baa5fa369be28a9680585200ce3ff73Mark Andrews All other things being equal, when the server chooses a name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to query from a list of name servers, it prefers the one that is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein topologically closest to itself. The <span><strong class="command">topology</strong></span> statement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein takes an <span><strong class="command">address_match_list</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interprets it
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in a special way. Each top-level list element is assigned a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Non-negated elements get a distance based on their position in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein list, where the closer the match is to the start of the list, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein shorter the distance is between it and the server. A negated match
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be assigned the maximum distance from the server. If there
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is no match, the address will get a distance which is further than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein any non-negated list element, and closer than any negated element.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will prefer servers on network 10 the most, followed by hosts
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on network 1.2.0.0 (netmask 255.255.0.0) and network 3, with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein exception of hosts on network 1.2.3 (netmask 255.255.255.0), which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is preferred least of all.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default topology is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"> topology { localhost; localnets; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">topology</strong></span> option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is not implemented in <acronym class="acronym">BIND</acronym> 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="the_sortlist_statement"></a>The <span><strong class="command">sortlist</strong></span> Statement</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The response to a DNS query may consist of multiple resource
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein records (RRs) forming a resource records set (RRset).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The name server will normally return the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RRs within the RRset in an indeterminate order
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (but see the <span><strong class="command">rrset-order</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement in <a href="Bv9ARM.ch06.html#rrset_ordering" title="RRset Ordering">the section called “RRset Ordering”</a>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The client resolver code should rearrange the RRs as appropriate,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that is, using any addresses on the local net in preference to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein other addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein However, not all resolvers can do this or are correctly
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When a client is using a local server, the sorting can be performed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the server, based on the client's address. This only requires
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuring the name servers, not all the clients.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">sortlist</strong></span> statement (see below)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an <span><strong class="command">address_match_list</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interprets it even
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein more specifically than the <span><strong class="command">topology</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein does (<a href="Bv9ARM.ch06.html#topology" title="Topology">the section called “Topology”</a>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each top level statement in the <span><strong class="command">sortlist</strong></span> must
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein itself be an explicit <span><strong class="command">address_match_list</strong></span> with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one or two elements. The first element (which may be an IP
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an IP prefix, an ACL name or a nested <span><strong class="command">address_match_list</strong></span>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of each top level list is checked against the source address of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the query until a match is found.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Once the source address of the query has been matched, if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the top level statement contains only one element, the actual
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein element that matched the source address is used to select the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the response to move to the beginning of the response. If the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement is a list of two elements, then the second element is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein treated the same as the <span><strong class="command">address_match_list</strong></span> in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a <span><strong class="command">topology</strong></span> statement. Each top
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein level element
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is assigned a distance and the address in the response with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein distance is moved to the beginning of the response.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In the following example, any queries received from any of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the addresses of the host itself will get responses preferring
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on any of the locally connected networks. Next most preferred are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on the 192.168.1/24 network, and after that either the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 192.168.3/24 network with no preference shown between these two
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein networks. Queries received from a host on the 192.168.1/24 network
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will prefer other addresses on that network to the 192.168.2/24
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 192.168.3/24 networks. Queries received from a host on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or the 192.168.5/24 network will only prefer other addresses on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein their directly connected networks.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // IF the local host
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // THEN first fit on the following nets
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein { localhost;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein { localnets;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // IF on class C 192.168.1 THEN use .1, or .2 or .3
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // IF on class C 192.168.2 THEN use .2, or .1 or .3
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // IF on class C 192.168.3 THEN use .3, or .1 or .2
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein // IF .4 or .5 THEN prefer that net
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The following example will give reasonable behavior for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein local host and hosts on directly connected networks. It is similar
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the behavior of the address sort in <acronym class="acronym">BIND</acronym> 4.9.x. Responses sent
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to queries from the local host will favor any of the directly
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein networks. Responses sent to queries from any other hosts on a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein connected network will prefer addresses on that same network.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to other queries will not be sorted.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein { localhost; localnets; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein { localnets; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="rrset_ordering"></a>RRset Ordering</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When multiple records are returned in an answer it may be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein useful to configure the order of the records placed into the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">rrset-order</strong></span> statement permits
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the ordering of the records in a multiple record response.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See also the <span><strong class="command">sortlist</strong></span> statement,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="Bv9ARM.ch06.html#the_sortlist_statement" title="The sortlist Statement">the section called “The <span><strong class="command">sortlist</strong></span> Statement”</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An <span><strong class="command">order_spec</strong></span> is defined as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional">class <em class="replaceable"><code>class_name</code></em></span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional">type <em class="replaceable"><code>type_name</code></em></span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional">name <em class="replaceable"><code>"domain_name"</code></em></span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein order <em class="replaceable"><code>ordering</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no class is specified, the default is <span><strong class="command">ANY</strong></span>.
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews If no type is specified, the default is <span><strong class="command">ANY</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If no name is specified, the default is "<span><strong class="command">*</strong></span>" (asterisk).
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews The legal values for <span><strong class="command">ordering</strong></span> are:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">fixed</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Records are returned in the order they
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are defined in the zone file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">random</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Records are returned in some random order.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <p><span><strong class="command">cyclic</strong></span></p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Records are returned in a cyclic round-robin order.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <acronym class="acronym">BIND</acronym> is configured with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "--enable-fixed-rrset" option at compile time, then
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the initial ordering of the RRset will match the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one specified in the zone file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein class IN type A name "host.example.com" order random;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein order cyclic;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will cause any responses for type A records in class IN that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein have "<code class="literal">host.example.com</code>" as a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein suffix, to always be returned
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in random order. All other records are returned in cyclic order.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If multiple <span><strong class="command">rrset-order</strong></span> statements
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein appear, they are not combined — the last one applies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein By default, all records are returned in random order.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In this release of <acronym class="acronym">BIND</acronym> 9, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">rrset-order</strong></span> statement does not support
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "fixed" ordering by default. Fixed ordering can be enabled
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein at compile time by specifying "--enable-fixed-rrset" on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the "configure" command line.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="tuning"></a>Tuning</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">lame-ttl</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the number of seconds to cache a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lame server indication. 0 disables caching. (This is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="bold"><strong>NOT</strong></span> recommended.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <code class="literal">600</code> (10 minutes) and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum value is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Lame-ttl also controls the amount of time DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein validation failures are cached. There is a minimum
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of 30 seconds applied to bad cache entries if the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lame-ttl is set to less than 30 seconds.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-ncache-ttl</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To reduce network traffic and increase performance,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the server stores negative answers. <span><strong class="command">max-ncache-ttl</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein used to set a maximum retention time for these answers in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in seconds. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-ncache-ttl</strong></span> is <code class="literal">10800</code> seconds (3 hours).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-ncache-ttl</strong></span> cannot exceed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 7 days and will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be silently truncated to 7 days if set to a greater value.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-cache-ttl</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the maximum time for which the server will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cache ordinary (positive) answers. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one week (7 days).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A value of zero may cause all queries to return
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein SERVFAIL, because of lost caches of intermediate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RRsets (such as NS and glue AAAA/A records) in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resolution process.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">min-roots</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The minimum number of root servers that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is required for a request for the root servers to be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein accepted. The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is <strong class="userinput"><code>2</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Not implemented in <acronym class="acronym">BIND</acronym> 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">sig-validity-interval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifies the number of days into the future when
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNSSEC signatures automatically generated as a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein result of dynamic updates (<a href="Bv9ARM.ch04.html#dynamic_update" title="Dynamic Update">the section called “Dynamic Update”</a>) will expire. There
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is an optional second field which specifies how
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein long before expiry that the signatures will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein regenerated. If not specified, the signatures will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be regenerated at 1/4 of base interval. The second
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein field is specified in days if the base interval is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein greater than 7 days otherwise it is specified in hours.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default base interval is <code class="literal">30</code> days
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein giving a re-signing interval of 7 1/2 days. The maximum
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein values are 10 years (3660 days).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The signature inception time is unconditionally
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set to one hour before the current time to allow
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for a limited amount of clock skew.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">sig-validity-interval</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein should be, at least, several multiples of the SOA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein expire interval to allow for reasonable interaction
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein between the various timer and expiry dates.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">sig-signing-nodes</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specify the maximum number of nodes to be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein examined in each quantum when signing a zone with
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews a new DNSKEY. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">sig-signing-signatures</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specify a threshold number of signatures that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will terminate processing a quantum when signing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a zone with a new DNSKEY. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">sig-signing-type</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specify a private RDATA type to be used when generating
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein key signing records. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is expected that this parameter may be removed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in a future version once there is a standard type.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These records can be removed from the zone once named
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein has completed signing the zone with the matching key
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein using <span><strong class="command">nsupdate</strong></span> or
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews <span><strong class="command">rndc signing -clear</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">rndc signing -clear</strong></span> is the only supported
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein way to remove these records from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">inline-signing</strong></span> zones.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span class="term"><span><strong class="command">min-refresh-time</strong></span>, </span><span class="term"><span><strong class="command">max-refresh-time</strong></span>, </span><span class="term"><span><strong class="command">min-retry-time</strong></span>, </span><span class="term"><span><strong class="command">max-retry-time</strong></span></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These options control the server's behavior on refreshing a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (querying for SOA changes) or retrying failed transfers.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Usually the SOA values for the zone are used, but these
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are set by the master, giving slave server administrators
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein control over their contents.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These options allow the administrator to set a minimum and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein refresh and retry time either per-zone, per-view, or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These options are valid for slave and stub zones,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and clamp the SOA refresh and retry times to the specified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The following defaults apply.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">min-refresh-time</strong></span> 300 seconds,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-refresh-time</strong></span> 2419200 seconds
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (4 weeks), <span><strong class="command">min-retry-time</strong></span> 500 seconds,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <span><strong class="command">max-retry-time</strong></span> 1209600 seconds
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">edns-udp-size</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the advertised EDNS UDP buffer size in bytes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to control the size of packets received.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Valid values are 512 to 4096 (values outside this range
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be silently adjusted). The default value
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is 4096. The usual reason for setting
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">edns-udp-size</strong></span> to a non-default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value is to get UDP answers to pass through broken
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein block UDP packets that are greater than 512 bytes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will fallback to using 512 bytes
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews if it get a series of timeout at the initial value. 512
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein bytes is not being offered to encourage sites to fix their
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein firewalls. Small EDNS UDP sizes will result in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein excessive use of TCP.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-udp-size</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sets the maximum EDNS UDP message size
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will send in bytes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Valid values are 512 to 4096 (values outside this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein range will be silently adjusted). The default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value is 4096. The usual reason for setting
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">max-udp-size</strong></span> to a non-default
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value is to get UDP answers to pass through broken
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews block UDP packets that are greater than 512 bytes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This is independent of the advertised receive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein buffer (<span><strong class="command">edns-udp-size</strong></span>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Setting this to a low value will encourage additional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein TCP traffic to the nameserver.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">masterfile-format</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the file format of zone files (see
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <a href="Bv9ARM.ch06.html#zonefile_format" title="Additional File Formats">the section called “Additional File Formats”</a>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default value is <code class="constant">text</code>, which is the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein standard textual representation, except for slave zones,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in which the default value is <code class="constant">raw</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Files in other formats than <code class="constant">text</code> are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein typically expected to be generated by the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named-compilezone</strong></span> tool, or dumped by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that when a zone file in a different format than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="constant">text</code> is loaded, <span><strong class="command">named</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein may omit some of the checks which would be performed for a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file in the <code class="constant">text</code> format. In particular,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">check-names</strong></span> checks do not apply
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for the <code class="constant">raw</code> format. This means
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a zone file in the <code class="constant">raw</code> format
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein must be generated with the same check level as that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified in the <span><strong class="command">named</strong></span> configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein file. Also, <code class="constant">map</code> format files are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein loaded directly into memory via memory mapping, with only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein minimal checking.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews This statement sets the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">masterfile-format</strong></span> for all zones,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but can be overridden on a per-zone or per-view basis
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by including a <span><strong class="command">masterfile-format</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement within the <span><strong class="command">zone</strong></span> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">view</strong></span> block in the configuration
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="clients-per-query"></a><span class="term"><span><strong class="command">clients-per-query</strong></span>, </span><span class="term"><span><strong class="command">max-clients-per-query</strong></span></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p>These set the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein initial value (minimum) and maximum number of recursive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein simultaneous clients for any given query
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (<qname,qtype,qclass>) that the server will accept
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein before dropping additional clients. <span><strong class="command">named</strong></span> will attempt to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein self tune this value and changes will be logged. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default values are 10 and 100.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This value should reflect how many queries come in for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a given name in the time it takes to resolve that name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the number of queries exceed this value, <span><strong class="command">named</strong></span> will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein assume that it is dealing with a non-responsive zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and will drop additional queries. If it gets a response
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein after dropping queries, it will raise the estimate. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein estimate will then be lowered in 20 minutes if it has
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein remained unchanged.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">clients-per-query</strong></span> is set to zero,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then there is no limit on the number of clients per query
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and no queries will be dropped.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">max-clients-per-query</strong></span> is set to zero,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then there is no upper bound other than imposed by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">recursive-clients</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">notify-delay</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The delay, in seconds, between sending sets of notify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein messages for a zone. The default is five (5) seconds.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The overall rate that NOTIFY messages are sent for all
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zones is controlled by <span><strong class="command">serial-query-rate</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-rsa-exponent-size</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum RSA exponent size, in bits, that will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be accepted when validating. Valid values are 35
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to 4096 bits. The default zero (0) is also accepted
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and is equivalent to 4096.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="builtin"></a>Built-in server information zones</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server provides some helpful diagnostic information
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews through a number of built-in zones under the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein pseudo-top-level-domain <code class="literal">bind</code> in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">CHAOS</strong></span> class. These zones are part
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein built-in view (see <a href="Bv9ARM.ch06.html#view_statement_grammar" title="view Statement Grammar">the section called “<span><strong class="command">view</strong></span> Statement Grammar”</a>) of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">CHAOS</strong></span> which is separate from the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default view of class <span><strong class="command">IN</strong></span>. Most global
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuration options (<span><strong class="command">allow-query</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein etc) will apply to this view, but some are locally
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein overridden: <span><strong class="command">notify</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">recursion</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-new-zones</strong></span> are
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews always set to <strong class="userinput"><code>no</code></strong>, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">rate-limit</strong></span> is set to allow
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein three responses per second.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If you need to disable these zones, use the options
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein below, or hide the built-in <span><strong class="command">CHAOS</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein defining an explicit view of class <span><strong class="command">CHAOS</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that matches all clients.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">version</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The version the server should report
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein via a query of the name <code class="literal">version.bind</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with type <span><strong class="command">TXT</strong></span>, class <span><strong class="command">CHAOS</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is the real version number of this server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifying <span><strong class="command">version none</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein disables processing of the queries.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">hostname</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The hostname the server should report via a query of
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews the name <code class="filename">hostname.bind</code>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews with type <span><strong class="command">TXT</strong></span>, class <span><strong class="command">CHAOS</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews This defaults to the hostname of the machine hosting the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews name server as
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews found by the gethostname() function. The primary purpose of such queries
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews identify which of a group of anycast servers is actually
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews answering your queries. Specifying <span><strong class="command">hostname none;</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews disables processing of the queries.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term"><span><strong class="command">server-id</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The ID the server should report when receiving a Name
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Server Identifier (NSID) query, or a query of the name
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <code class="filename">ID.SERVER</code> with type
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">TXT</strong></span>, class <span><strong class="command">CHAOS</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The primary purpose of such queries is to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews identify which of a group of anycast servers is actually
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews answering your queries. Specifying <span><strong class="command">server-id none;</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews disables processing of the queries.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Specifying <span><strong class="command">server-id hostname;</strong></span> will cause <span><strong class="command">named</strong></span> to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews use the hostname as found by the gethostname() function.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The default <span><strong class="command">server-id</strong></span> is <span><strong class="command">none</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="empty"></a>Built-in Empty Zones</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Named has some built-in empty zones (SOA and NS records only).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These are for zones that should normally be answered locally
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and which queries should not be sent to the Internet's root
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers. The official servers which cover these namespaces
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein return NXDOMAIN responses to these queries. In particular,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein these cover the reverse namespaces for addresses from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RFC 1918, RFC 4193, RFC 5737 and RFC 6598. They also include the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein reverse namespace for IPv6 local address (locally assigned),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6 link local addresses, the IPv6 loopback address and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6 unknown address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Named will attempt to determine if a built-in zone already exists
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or is active (covered by a forward-only forwarding declaration)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and will not create an empty zone in that case.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The current list of empty zones is:
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<li>0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA</li>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA</li>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Empty zones are settable at the view level and only apply to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews views of class IN. Disabled empty zones are only inherited
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from options if there are no disabled empty zones specified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein at the view level. To override the options list of disabled
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zones, you can disable the root zone at the view level, for example:
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews disable-empty-zone ".";
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If you are using the address ranges covered here, you should
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews already have reverse zones covering the addresses you use.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews In practice this appears to not be the case with many queries
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews being made to the infrastructure servers for names in these
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews spaces. So many in fact that sacrificial servers were needed
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews to be deployed to channel the query load away from the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews infrastructure servers.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The real parent servers for these zones should disable all
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews empty zone under the parent zone they serve. For the real
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein root servers, this is all built-in empty zones. This will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein enable them to return referrals to deeper in the tree.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">empty-server</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specify what server name will appear in the returned
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews SOA record for empty zones. If none is specified, then
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the zone's name will be used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">empty-contact</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Specify what contact name will appear in the returned
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews SOA record for empty zones. If none is specified, then
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "." will be used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">empty-zones-enable</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Enable or disable all empty zones. By default, they
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are enabled.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">disable-empty-zone</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Disable individual empty zones. By default, none are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein disabled. This option can be specified multiple times.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="acache"></a>Additional Section Caching</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The additional section cache, also called <span><strong class="command">acache</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is an internal cache to improve the response performance of BIND 9.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When additional section caching is enabled, BIND 9 will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cache an internal short-cut to the additional section content for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein each answer RR.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that <span><strong class="command">acache</strong></span> is an internal caching
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein mechanism of BIND 9, and is not related to the DNS caching
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews server function.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Additional section caching does not change the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein response content (except the RRsets ordering of the additional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein section, see below), but can improve the response performance
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein significantly.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is particularly effective when BIND 9 acts as an authoritative
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server for a zone that has many delegations with many glue RRs.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In order to obtain the maximum performance improvement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from additional section caching, setting
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">additional-from-cache</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to <span><strong class="command">no</strong></span> is recommended, since the current
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein implementation of <span><strong class="command">acache</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein does not short-cut of additional section information from the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS cache data.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews One obvious disadvantage of <span><strong class="command">acache</strong></span> is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews that it requires much more
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews memory for the internal cached data.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Thus, if the response performance does not matter and memory
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews consumption is much more critical, the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">acache</strong></span> mechanism can be
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews disabled by setting <span><strong class="command">acache-enable</strong></span> to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">no</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews It is also possible to specify the upper limit of memory
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews for acache by using <span><strong class="command">max-acache-size</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Additional section caching also has a minor effect on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RRset ordering in the additional section.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Without <span><strong class="command">acache</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">cyclic</strong></span> order is effective for the additional
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein section as well as the answer and authority sections.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein However, additional section caching fixes the ordering when it
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews first caches an RRset for the additional section, and the same
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ordering will be kept in succeeding responses, regardless of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein setting of <span><strong class="command">rrset-order</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The effect of this should be minor, however, since an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RRset in the additional section
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein typically only contains a small number of RRs (and in many cases
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it only contains a single RR), in which case the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ordering does not matter much.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The following is a summary of options related to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">acache</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">acache-enable</strong></span></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If <span><strong class="command">yes</strong></span>, additional section caching is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews enabled. The default value is <span><strong class="command">no</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">acache-cleaning-interval</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server will remove stale cache entries, based on an LRU
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein algorithm, every <span><strong class="command">acache-cleaning-interval</strong></span> minutes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is 60 minutes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If set to 0, no periodic cleaning will occur.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><span><strong class="command">max-acache-size</strong></span></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum amount of memory in bytes to use for the server's acache.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews When the amount of data in the acache reaches this limit,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will clean more aggressively so that the limit is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In a server with multiple views, the limit applies
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein separately to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein acache of each view.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is <code class="literal">16M</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<a name="id2589909"></a>Content Filtering</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 9 provides the ability to filter
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein out DNS responses from external DNS servers containing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein certain types of data in the answer section.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specifically, it can reject address (A or AAAA) records if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the corresponding IPv4 or IPv6 addresses match the given
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="varname">address_match_list</code> of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">deny-answer-addresses</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It can also reject CNAME or DNAME records if the "alias"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein name (i.e., the CNAME alias or the substituted query name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein due to DNAME) matches the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein given <code class="varname">namelist</code> of the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">deny-answer-aliases</strong></span> option, where
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein "match" means the alias name is a subdomain of one of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <code class="varname">name_list</code> elements.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the optional <code class="varname">namelist</code> is specified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with <span><strong class="command">except-from</strong></span>, records whose query name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein matches the list will be accepted regardless of the filter
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Likewise, if the alias name is a subdomain of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein corresponding zone, the <span><strong class="command">deny-answer-aliases</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein filter will not apply;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for example, even if "example.com" is specified for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">deny-answer-aliases</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">www.example.com. CNAME xxx.example.com.</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein returned by an "example.com" server will be accepted.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In the <code class="varname">address_match_list</code> of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">deny-answer-addresses</strong></span> option, only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are meaningful;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein any <code class="varname">key_id</code> will be silently ignored.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If a response message is rejected due to the filtering,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the entire message is discarded without being cached, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a SERVFAIL error will be returned to the client.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This filtering is intended to prevent "DNS rebinding attacks," in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which an attacker, in response to a query for a domain name the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein attacker controls, returns an IP address within your own network or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an alias name within your own domain.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A naive web browser or script could then serve as an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein unintended proxy, allowing the attacker
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to get access to an internal node of your local network
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that couldn't be externally accessed otherwise.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein See the paper available at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://portal.acm.org/citation.cfm?id=1315245.1315298" target="_top">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein http://portal.acm.org/citation.cfm?id=1315245.1315298
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for more details about the attacks.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, if you own a domain named "example.net" and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein your internal network uses an IPv4 prefix 192.0.2.0/24,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein you might specify the following rules:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">deny-answer-addresses { 192.0.2.0/24; } except-from { "example.net"; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeindeny-answer-aliases { "example.net"; };
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If an external attacker lets a web browser in your local
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein network look up an IPv4 address of "attacker.example.com",
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the attacker's DNS server would return a response like this:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">attacker.example.com. A 192.0.2.1</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the answer section.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Since the rdata of this record (the IPv4 address) matches
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the specified prefix 192.0.2.0/24, this response will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein On the other hand, if the browser looks up a legitimate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein internal web server "www.example.net" and the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein following response is returned to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <acronym class="acronym">BIND</acronym> 9 server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting">www.example.net. A 192.0.2.2</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it will be accepted since the owner name "www.example.net"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein matches the <span><strong class="command">except-from</strong></span> element,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Note that this is not really an attack on the DNS per se.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In fact, there is nothing wrong for an "external" name to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be mapped to your "internal" IP address or domain name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from the DNS point of view.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It might actually be provided for a legitimate purpose,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein such as for debugging.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein As long as the mapping is provided by the correct owner,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it is not possible or does not make sense to detect
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein whether the intent of the mapping is legitimate or not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein within the DNS.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The "rebinding" attack must primarily be protected at the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein application that uses the DNS.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For a large site, however, it may be difficult to protect
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all possible applications at once.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This filtering feature is provided only to help such an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein operational environment;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it is generally discouraged to turn it on unless you are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein very sure you have no other choice and the attack is a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein real threat for your applications.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Care should be particularly taken if you want to use this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option for addresses within 127.0.0.0/8.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein These addresses are obviously "internal", but many
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein applications conventionally rely on a DNS mapping from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein some name to such an address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Filtering out DNS records containing this address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein spuriously can break such applications.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2590035"></a>Response Policy Zone (RPZ) Rewriting</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 9 includes a limited
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein mechanism to modify DNS responses for requests
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein analogous to email anti-spam DNS blacklists.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses can be changed to deny the existence of domains(NXDOMAIN),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein deny the existence of IP addresses for domains (NODATA),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or contain other IP addresses or data.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Response policy zones are named in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">response-policy</strong></span> option for the view or among the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein global options if there is no response-policy option for the view.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Response policy zones are ordinary DNS zones containing RRsets
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that can be queried normally if allowed.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is usually best to restrict those queries with something like
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">allow-query { localhost; };</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Four policy triggers are encoded in RPZ records, QNAME, IP, NSIP,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and NSDNAME.
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews QNAME RPZ records triggered by query names of requests and targets
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of CNAME records resolved to generate the response.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The owner name of a QNAME RPZ record is the query name relativized
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The second kind of RPZ trigger is an IP address in an A and AAAA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein record in the ANSWER section of a response.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IP address triggers are encoded in records that have owner names
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that are subdomains of <strong class="userinput"><code>rpz-ip</code></strong> relativized
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the RPZ origin name and encode an IP address or address block.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 trigger addresses are represented as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>prefixlength.B4.B3.B2.B1.rpz-ip</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The prefix length must be between 1 and 32.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein All four bytes, B4, B3, B2, and B1, must be present.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein B4 is the decimal value of the least significant byte of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 address as in IN-ADDR.ARPA.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6 addresses are encoded in a format similar to the standard
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv6 text representation,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>prefixlength.W8.W7.W6.W5.W4.W3.W2.W1.rpz-ip</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each of W8,...,W1 is a one to four digit hexadecimal number
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein representing 16 bits of the IPv6 address as in the standard text
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein representation of IPv6 addresses, but reversed as in IN-ADDR.ARPA.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein All 8 words must be present except when consecutive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zero words are replaced with <strong class="userinput"><code>.zz.</code></strong>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein analogous to double colons (::) in standard IPv6 text encodings.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The prefix length must be between 1 and 128.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NSDNAME triggers match names of authoritative servers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for the query name, a parent of the query name, a CNAME for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein query name, or a parent of a CNAME.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein They are encoded as subdomains of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>rpz-nsdomain</code></strong> relativized
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to the RPZ origin name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NSIP triggers match IP addresses in A and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein AAAA RRsets for domains that can be checked against NSDNAME
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein policy records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NSIP triggers are encoded like IP triggers except as subdomains of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <strong class="userinput"><code>rpz-nsip</code></strong>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NSDNAME and NSIP triggers are checked only for names with at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein least <span><strong class="command">min-ns-dots</strong></span> dots.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default value of <span><strong class="command">min-ns-dots</strong></span> is 1 to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein exclude top level domains.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The query response is checked against all response policy zones, so
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein two or more policy records can be triggered by a response.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Because DNS responses can be rewritten according to at most one
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein policy record, a single record encoding an action (other than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">DISABLED</strong></span> actions) must be chosen.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Triggers or the records that encode them are chosen in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the following order:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>Choose the triggered record in the zone that appears
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein first in the response-policy option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>Prefer QNAME to IP to NSDNAME to NSIP triggers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in a single zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>Among NSDNAME triggers, prefer the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein trigger that matches the smallest name under the DNSSEC ordering.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>Among IP or NSIP triggers, prefer the trigger
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with the longest prefix.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>Among triggers with the same prefex length,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein prefer the IP or NSIP trigger that matches
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the smallest IP address.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When the processing of a response is restarted to resolve
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNAME or CNAME records and a policy record set has
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not been triggered,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all response policy zones are again consulted for the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNAME or CNAME names and addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RPZ record sets are sets of any types of DNS record except
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNAME or DNSSEC that encode actions or responses to queries.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>The <span><strong class="command">NXDOMAIN</strong></span> response is encoded
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by a CNAME whose target is the root domain (.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>A CNAME whose target is the wildcard top-level
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein domain (*.) specifies the <span><strong class="command">NODATA</strong></span> action,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which rewrites the response to NODATA or ANCOUNT=1.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>The <span><strong class="command">Local Data</strong></span> action is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein represented by a set ordinary DNS records that are used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to answer queries. Queries for record types not the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein set are answered with NODATA.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A special form of local data is a CNAME whose target is a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein wildcard such as *.example.com.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is used as if were an ordinary CNAME after the astrisk (*)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein has been replaced with the query name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The purpose for this special form is query logging in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein walled garden's authority DNS server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<li>The <span><strong class="command">PASSTHRU</strong></span> policy is specified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by a CNAME whose target is <span><strong class="command">rpz-passthru.</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It causes the response to not be rewritten
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and is most often used to "poke holes" in policies for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein CIDR blocks.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (A CNAME whose target is the variable part of its owner name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is an obsolete specification of the PASSTHRU policy.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The actions specified in a policy zone can be overridden with a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">policy</strong></span> clause in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">response-policy</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An organization using a policy zone provided by another
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein organization might use this mechanism to redirect domains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to its own walled garden.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span><strong class="command">GIVEN</strong></span> says "do not override but
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein perform the action specified in the zone."
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span><strong class="command">DISABLED</strong></span> causes policy records to do
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein nothing but log what they might have done.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The response to the DNS query will be written according to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein any triggered policy records that are not disabled.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Disabled policy zones should appear first,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein because they will often not be logged
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein if a higher precedence trigger is found first.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span><strong class="command">PASSTHRU</strong></span> causes all policy records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to act as if they were CNAME records with targets the variable
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein part of their owner name. They protect the response from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein being changed.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span><strong class="command">NXDOMAIN</strong></span> causes all RPZ records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to specify NXDOMAIN policies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span><strong class="command">NODATA</strong></span> overrides with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NODATA policy
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span><strong class="command">CNAME domain</strong></span> causes all RPZ
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein policy records to act as if they were "cname domain" records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein By default, the actions encoded in a response policy zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are applied only to queries that ask for recursion (RD=1).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein That default can be changed for a single policy zone or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all response policy zones in a view
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with a <span><strong class="command">recursive-only no</strong></span> clause.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This feature is useful for serving the same zone files
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews both inside and outside an RFC 1918 cloud and using RPZ to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein delete answers that would otherwise contain RFC 1918 values
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on the externally visible name server or view.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Also by default, RPZ actions are applied only to DNS requests
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that either do not request DNSSEC metadata (DO=0) or when no
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNSSEC records are available for request name in the original
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone (not the response policy zone). This default can be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein changed for all response policy zones in a view with a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">break-dnssec yes</strong></span> clause. In that case, RPZ
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein actions are applied regardless of DNSSEC. The name of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clause option reflects the fact that results rewritten by RPZ
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein actions cannot verify.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein No DNS records are needed to trigger a QNAME action. The name
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein itself is sufficient, so in principle the query name need not
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews be recursively resolved. However, not resolving the requested
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein name leaks the fact that response policy rewriting is in use
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and that the name is listed in a policy zone to operators of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers for listed names. To prevent that information leak, by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default any recursion needed for a request is done before any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein policy triggers are considered. Because listed domains often
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein have slow authoritative servers, this default behavior can cost
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein significant time. The <span><strong class="command">qname-wait-recurse no</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option overrides the default behavior when recursion cannot
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein change the response. <span><strong class="command">qname-wait-recurse no</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein does not affect QNAME triggers in policy zones listed after
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein other zones containing IP, NSIP and NSDNAME triggers, because
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews those may depend on the A, AAAA, and NS records that would be
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews found during recursive resolution. It also does not affect
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNSSEC requests (DO=1) unless <span><strong class="command">break-dnssec yes</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is in use, because the response would depend on whether or not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RRSIG records were found during resolution.
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews The TTL of a record modified by RPZ policies is set from the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein TTL of the relevant record in policy zone. It is then limited
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to a maximum value.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">max-policy-ttl</strong></span> clause changes that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum from its default of 5.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, you might use this option statement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"> response-policy { zone "badlist"; };</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and this zone statement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"> zone "badlist" {type master; file "master/badlist"; allow-query {none;}; };</pre>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with this zone file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein@ SOA LOCALHOST. named-mgr.example.com (1 1h 15m 30d 2h)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NS LOCALHOST.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein; QNAME policy records. There are no periods (.) after the owner names.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinnxdomain.domain.com CNAME . ; NXDOMAIN policy
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsnodata.domain.com CNAME *. ; NODATA policy
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsbad.domain.com A 10.0.0.1 ; redirect to a walled garden
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews AAAA 2001:2::1
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein; do not rewrite (PASSTHRU) OK.DOMAIN.COM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austeinok.domain.com CNAME rpz-passthru.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein; redirect x.bzone.domain.com to x.bzone.domain.com.garden.example.com
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews; IP policy records that rewrite all answers for 127/8 except 127.0.0.1
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein32.1.0.0.127.rpz-ip CNAME rpz-passthru.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein; NSDNAME and NSIP policy records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein RPZ can affect server performance.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each configured response policy zone requires the server to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein perform one to four additional database lookups before a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein query can be answered.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, a DNS server with four policy zones, each with all
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein four kinds of response triggers, QNAME, IP, NSIP, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NSDNAME, requires a total of 17 times as many database
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lookups as a similar DNS server with no response policy zones.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A <acronym class="acronym">BIND9</acronym> server with adequate memory and one
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein response policy zone with QNAME and IP triggers might achieve a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum queries-per-second rate about 20% lower.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A server with four response policy zones with QNAME and IP
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein triggers might have a maximum QPS rate about 50% lower.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses rewritten by RPZ are counted in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">RPZRewrites</strong></span> statistics.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h4 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2590614"></a>Response Rate Limiting</h4></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Excessive almost identical UDP <span class="emphasis"><em>responses</em></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be controlled by configuring a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">rate-limit</strong></span> clause in an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">options</strong></span> or <span><strong class="command">view</strong></span> statement.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This mechanism keeps authoritative BIND 9 from being used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in amplifying reflection denial of service (DoS) attacks.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Short truncated (TC=1) responses can be sent to provide
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rate-limited responses to legitimate clients within
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a range of forged, attacked IP addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Legitimate clients react to dropped or truncated response
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by retrying with UDP or with TCP respectively.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This mechanism is intended for authoritative DNS servers.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It can be used on recursive servers but can slow
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein applications such as SMTP servers (mail receivers) and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein HTTP clients (web browsers) that repeatedly request the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein same domains.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When possible, closing "open" recursive servers is better.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Response rate limiting uses a "credit" or "token bucket" scheme.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each combination of identical response and client
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein has a conceptual account that earns a specified number
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of credits every second.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A prospective response debits its account by one.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses are dropped or truncated
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein while the account is negative.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses are tracked within a rolling window of time
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which defaults to 15 seconds, but can be configured with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">window</strong></span> option to any value from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 1 to 3600 seconds (1 hour).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The account cannot become more positive than
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the per-second limit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or more negative than <span><strong class="command">window</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein times the per-second limit.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When the specified number of credits for a class of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein responses is set to 0, those responses are not rate limited.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The notions of "identical response" and "DNS client"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for rate limiting are not simplistic.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein All responses to an address block are counted as if to a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein single client.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The prefix lengths of addresses blocks are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified with <span><strong class="command">ipv4-prefix-length</strong></span> (default 24)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <span><strong class="command">ipv6-prefix-length</strong></span> (default 56).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein All non-empty responses for a valid domain name (qname)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and record type (qtype) are identical and have a limit specified
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with <span><strong class="command">responses-per-second</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (default 0 or no limit).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein All empty (NODATA) responses for a valid domain,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein regardless of query type, are identical.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses in the NODATA class are limited by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">nodata-per-second</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (default <span><strong class="command">responses-per-second</strong></span>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Requests for any and all undefined subdomains of a given
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein valid domain result in NXDOMAIN errors, and are identical
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein regardless of query type.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein They are limited by <span><strong class="command">nxdomain-per-second</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (default <span><strong class="command">responses-per-second</strong></span>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This controls some attacks using random names, but
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be relaxed or turned off (set to 0)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on servers that expect many legitimate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NXDOMAIN responses, such as from anti-spam blacklists.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Referrals or delegations to the server of a given
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein domain are identical and are limited by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">referrals-per-second</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (default <span><strong class="command">responses-per-second</strong></span>).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses generated from local wildcards are counted and limited
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as if they were for the parent domain name.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This controls flooding using random.wild.example.com.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein All requests that result in DNS errors other
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein than NXDOMAIN, such as SERVFAIL and FORMERR, are identical
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein regardless of requested name (qname) or record type (qtype).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This controls attacks using invalid requests or distant,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein broken authoritative servers.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein By default the limit on errors is the same as the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">responses-per-second</strong></span> value,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but it can be set separately with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">errors-per-second</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Many attacks using DNS involve UDP requests with forged source
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Rate limiting prevents the use of BIND 9 to flood a network
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with responses to requests with forged source addresses,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but could let a third party block responses to legitimate requests.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein There is a mechanism that can answer some legitimate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein requests from a client whose address is being forged in a flood.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Setting <span><strong class="command">slip</strong></span> to 2 (its default) causes every
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein other UDP request to be answered with a small truncated (TC=1)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The small size and reduced frequency, and so lack of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein amplification, of "slipped" responses make them unattractive
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for reflection DoS attacks.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">slip</strong></span> must be between 0 and 10.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A value of 0 does not "slip";
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein no truncated responses are sent due to rate limiting.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Some error responses including REFUSED and SERVFAIL
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cannot be replaced with truncated responses and are instead
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein leaked at the <span><strong class="command">slip</strong></span> rate.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When the approximate query per second rate exceeds
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span><strong class="command">qps-scale</strong></span> value,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then the <span><strong class="command">responses-per-second</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">errors-per-second</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">nxdomains-per-second</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">all-per-second</strong></span> values are reduced by the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ratio of the current rate to the <span><strong class="command">qps-scale</strong></span> value.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This feature can tighten defenses during attacks.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">qps-scale 250; responses-per-second 20;</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a total query rate of 1000 queries/second for all queries from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all DNS clients including via TCP,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein then the effective responses/second limit changes to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses sent via TCP are not limited
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but are counted to compute the query per second rate.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Communities of DNS clients can be given their own parameters or no
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rate limiting by putting
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">rate-limit</strong></span> statements in <span><strong class="command">view</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statements instead of the global <span><strong class="command">option</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A <span><strong class="command">rate-limit</strong></span> statement in a view replaces,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rather than supplementing, a <span><strong class="command">rate-limit</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statement among the main options.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS clients within a view can be exempted from rate limits
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with the <span><strong class="command">exempt-clients</strong></span> clause.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein UDP responses of all kinds can be limited with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">all-per-second</strong></span> phrase.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This rate limiting is unlike the rate limiting provided by
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">responses-per-second</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">errors-per-second</strong></span>, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">nxdomains-per-second</strong></span> on a DNS server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which are often invisible to the victim of a DNS reflection attack.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Unless the forged requests of the attack are the same as the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein legitimate requests of the victim, the victim's requests are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein not affected.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses affected by an <span><strong class="command">all-per-second</strong></span> limit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are always dropped; the <span><strong class="command">slip</strong></span> value has no
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An <span><strong class="command">all-per-second</strong></span> limit should be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein at least 4 times as large as the other limits,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein because single DNS clients often send bursts of legitimate
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For example, the receipt of a single mail message can prompt
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein requests from an SMTP server for NS, PTR, A, and AAAA records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as the incoming SMTP/TCP/IP connection is considered.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The SMTP server can need additional NS, A, AAAA, MX, TXT, and SPF
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein records as it considers the STMP <span><strong class="command">Mail From</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Web browsers often repeatedly resolve the same names that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are repeated in HTML <IMG> tags in a page.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">All-per-second</strong></span> is similar to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rate limiting offered by firewalls but often inferior.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Attacks that justify ignoring the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein contents of DNS responses are likely to be attacks on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS server itself.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein They usually should be discarded before the DNS server
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein spends resources make TCP connections or parsing DNS requesets,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but that rate limiting must be done before the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein DNS server sees the requests.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The maximum size of the table used to track requests and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein rate limit responses is set with <span><strong class="command">max-table-size</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each entry in the table is between 40 and 80 bytes.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The table needs approximately as many entries as the number
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of requests received per second.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default is 20,000.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To reduce the cold start of growing the table,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">min-table-size</strong></span> (default 500)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can set the minimum table size.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Enable <span><strong class="command">rate-limit</strong></span> category logging to monitor
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein expansions of the table and inform
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein choices for the initial and maximum table size.
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews Use <span><strong class="command">log-only yes</strong></span> to test rate limiting parameters
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein without actually dropping any requests.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses dropped by rate limits are included in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">RateDropped</strong></span> and <span><strong class="command">QryDropped</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Responses that truncated by rate limits are included in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">RateSlipped</strong></span> and <span><strong class="command">RespTruncated</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="server_statement_grammar"></a><span><strong class="command">server</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">server</strong></span> <em class="replaceable"><code>ip_addr[/prefixlen]</code></em> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> bogus <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> provide-ixfr <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> request-ixfr <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> edns <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> edns-udp-size <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> max-udp-size <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfers <em class="replaceable"><code>number</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfer-format <em class="replaceable"><code>( one-answer | many-answers )</code></em> ; ]</span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> keys <em class="replaceable"><code>{ string ; [<span class="optional"> string ; [<span class="optional">...</span>]</span>] }</code></em> ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfer-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> transfer-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> notify-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> notify-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> query-source [<span class="optional"> address ( <em class="replaceable"><code>ip_addr</code></em> | <em class="replaceable"><code>*</code></em> ) </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> port ( <em class="replaceable"><code>ip_port</code></em> | <em class="replaceable"><code>*</code></em> ) </span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> query-source-v6 [<span class="optional"> address ( <em class="replaceable"><code>ip_addr</code></em> | <em class="replaceable"><code>*</code></em> ) </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> port ( <em class="replaceable"><code>ip_port</code></em> | <em class="replaceable"><code>*</code></em> ) </span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> use-queryport-pool <em class="replaceable"><code>yes_or_no</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> queryport-pool-ports <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> queryport-pool-updateinterval <em class="replaceable"><code>number</code></em>; </span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="server_statement_definition_and_usage"></a><span><strong class="command">server</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">server</strong></span> statement defines
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein characteristics
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to be associated with a remote name server. If a prefix length is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified, then a range of servers is covered. Only the most
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein server clause applies regardless of the order in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">server</strong></span> statement can occur at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the top level of the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein configuration file or inside a <span><strong class="command">view</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If a <span><strong class="command">view</strong></span> statement contains
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one or more <span><strong class="command">server</strong></span> statements, only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein apply to the view and any top-level ones are ignored.
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews If a view contains no <span><strong class="command">server</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein any top-level <span><strong class="command">server</strong></span> statements are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If you discover that a remote server is giving out bad data,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein marking it as bogus will prevent further queries to it. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value of <span><strong class="command">bogus</strong></span> is <span><strong class="command">no</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">provide-ixfr</strong></span> clause determines
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews the local server, acting as master, will respond with an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zone transfer when the given remote server, a slave, requests it.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If set to <span><strong class="command">yes</strong></span>, incremental transfer
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be provided
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein whenever possible. If set to <span><strong class="command">no</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein all transfers
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews to the remote server will be non-incremental. If not set, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the <span><strong class="command">provide-ixfr</strong></span> option in the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein global options block is used as a default.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">request-ixfr</strong></span> clause determines
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the local server, acting as a slave, will request incremental zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein transfers from the given remote server, a master. If not set, the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value of the <span><strong class="command">request-ixfr</strong></span> option in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the view or global options block is used as a default. It may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein also be set in the zone block and, if set there, it will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein override the global or view setting for that zone.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IXFR requests to servers that do not support IXFR will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein automatically
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein fall back to AXFR. Therefore, there is no need to manually list
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein which servers support IXFR and which ones do not; the global
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of <span><strong class="command">yes</strong></span> should always work.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The purpose of the <span><strong class="command">provide-ixfr</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">request-ixfr</strong></span> clauses is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to make it possible to disable the use of IXFR even when both
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and slave claim to support it, for example if one of the servers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is buggy and crashes or corrupts data when IXFR is used.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">edns</strong></span> clause determines whether
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the local server will attempt to use EDNS when communicating
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with the remote server. The default is <span><strong class="command">yes</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">edns-udp-size</strong></span> option sets the EDNS UDP size
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that is advertised by <span><strong class="command">named</strong></span> when querying the remote server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Valid values are 512 to 4096 bytes (values outside this range will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein silently adjusted). This option is useful when you wish to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein advertises a different value to this server than the value you
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein advertise globally, for example, when there is a firewall at the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein remote site that is blocking large replies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">max-udp-size</strong></span> option sets the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein maximum EDNS UDP message size <span><strong class="command">named</strong></span> will send. Valid
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein values are 512 to 4096 bytes (values outside this range will
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be silently adjusted). This option is useful when you
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein know that there is a firewall that is blocking large
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein replies from <span><strong class="command">named</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The server supports two zone transfer methods. The first, <span><strong class="command">one-answer</strong></span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein uses one DNS message per resource record transferred. <span><strong class="command">many-answers</strong></span> packs
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein as many resource records as possible into a message. <span><strong class="command">many-answers</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein more efficient, but is only known to be understood by <acronym class="acronym">BIND</acronym> 9, <acronym class="acronym">BIND</acronym>
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews 8.x, and patched versions of <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein 4.9.5. You can specify which method
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to use for a server with the <span><strong class="command">transfer-format</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If <span><strong class="command">transfer-format</strong></span> is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified, the <span><strong class="command">transfer-format</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by the <span><strong class="command">options</strong></span> statement will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">transfers</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is used to limit the number of concurrent inbound zone
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein transfers from the specified server. If no
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfers</strong></span> clause is specified, the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews limit is set according to the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfers-per-ns</strong></span> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">keys</strong></span> clause identifies a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">key_id</strong></span> defined by the <span><strong class="command">key</strong></span> statement,
dcb551033f0b33eb5c113169750a61084d8250a1Mark Andrews to be used for transaction security (TSIG, <a href="Bv9ARM.ch04.html#tsig" title="TSIG">the section called “TSIG”</a>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when talking to the remote server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When a request is sent to the remote server, a request signature
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews will be generated using the key specified here and appended to the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews message. A request originating from the remote server is not
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to be signed by this key.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Although the grammar of the <span><strong class="command">keys</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein allows for multiple keys, only a single key per server is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">transfer-source</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfer-source-v6</strong></span> clauses specify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the IPv4 and IPv6 source
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address to be used for zone transfer with the remote server,
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce respectively.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For an IPv4 remote server, only <span><strong class="command">transfer-source</strong></span> can
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be specified.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Similarly, for an IPv6 remote server, only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">transfer-source-v6</strong></span> can be
3970098dcd2a7122541667b4b56cea8abce8ccf2Mark Andrews For more details, see the description of
3970098dcd2a7122541667b4b56cea8abce8ccf2Mark Andrews <span><strong class="command">transfer-source</strong></span> and
3970098dcd2a7122541667b4b56cea8abce8ccf2Mark Andrews <span><strong class="command">transfer-source-v6</strong></span> in
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">notify-source</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">notify-source-v6</strong></span> clauses specify the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 and IPv6 source address to be used for notify
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein messages sent to remote servers, respectively. For an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 remote server, only <span><strong class="command">notify-source</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be specified. Similarly, for an IPv6 remote server,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only <span><strong class="command">notify-source-v6</strong></span> can be specified.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">query-source</strong></span> and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">query-source-v6</strong></span> clauses specify the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IPv4 and IPv6 source address to be used for queries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sent to remote servers, respectively. For an IPv4
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein remote server, only <span><strong class="command">query-source</strong></span> can
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein be specified. Similarly, for an IPv6 remote server,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein only <span><strong class="command">query-source-v6</strong></span> can be specified.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="statschannels"></a><span><strong class="command">statistics-channels</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">statistics-channels</strong></span> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ inet ( ip_addr | * ) [ port ip_port ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ allow { <em class="replaceable"><code> address_match_list </code></em> } ]; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [ inet ...; ]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2591972"></a><span><strong class="command">statistics-channels</strong></span> Statement Definition and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">statistics-channels</strong></span> statement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein declares communication channels to be used by system
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein administrators to get access to statistics information of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the name server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This statement intends to be flexible to support multiple
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein communication protocols in the future, but currently only
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein HTTP access is supported.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It requires that BIND 9 be compiled with libxml2 and/or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein json-c (also known as libjson0); the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">statistics-channels</strong></span> statement is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein still accepted even if it is built without the library,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein but any HTTP access will fail with an error.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An <span><strong class="command">inet</strong></span> control channel is a TCP socket
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein listening at the specified <span><strong class="command">ip_port</strong></span> on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein specified <span><strong class="command">ip_addr</strong></span>, which can be an IPv4 or IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address. An <span><strong class="command">ip_addr</strong></span> of <code class="literal">*</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (asterisk) is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein interpreted as the IPv4 wildcard address; connections will be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein accepted on any of the system's IPv4 addresses.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To listen on the IPv6 wildcard address,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein use an <span><strong class="command">ip_addr</strong></span> of <code class="literal">::</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no port is specified, port 80 is used for HTTP channels.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The asterisk "<code class="literal">*</code>" cannot be used for
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">ip_port</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The attempt of opening a statistics channel is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein restricted by the optional <span><strong class="command">allow</strong></span> clause.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Connections to the statistics channel are permitted based on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">address_match_list</strong></span>.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews If no <span><strong class="command">allow</strong></span> clause is present,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> accepts connection
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein attempts from any address; since the statistics may
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein contain sensitive internal information, it is highly
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein recommended to restrict the source of connection requests
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews appropriately.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no <span><strong class="command">statistics-channels</strong></span> statement is present,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">named</strong></span> will not open any communication channels.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The statistics are available in various formats and views
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein depending on the URI used to access them. For example, if
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the statistics channel is configured to listen on 127.0.0.1
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein port 8888, then the statistics are accessible in XML format at
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <a href="http://127.0.0.1:8888/" target="_top">http://127.0.0.1:8888/</a> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/xml" target="_top">http://127.0.0.1:8888/xml</a>. A CSS file is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein included which can format the XML statistics into tables
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when viewed with a stylesheet-capable browser, and into
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein charts and graphs using the Google Charts API when using a
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews javascript-capable browser.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Applications that depend on a particular XML schema
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/xml/v2" target="_top">http://127.0.0.1:8888/xml/v2</a> for version 2
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of the statistics XML schema or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/xml/v3" target="_top">http://127.0.0.1:8888/xml/v3</a> for version 3.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If the requested schema is supported by the server, then
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein it will respond; if not, it will return a "page not found"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The full set of statistics can also be read in JSON format at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/json" target="_top">http://127.0.0.1:8888/json</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Broken-out subsets of the statistics can be viewed at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/json/server" target="_top">http://127.0.0.1:8888/json/server</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (server and resolver statistics),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/json/zones" target="_top">http://127.0.0.1:8888/json/zones</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (zone statistics),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/json/net" target="_top">http://127.0.0.1:8888/json/net</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (network status and socket statistics),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/json/mem" target="_top">http://127.0.0.1:8888/json/mem</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (memory manager statistics),
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a href="http://127.0.0.1:8888/json/tasks" target="_top">http://127.0.0.1:8888/json/tasks</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (task manager statistics).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="trusted-keys"></a><span><strong class="command">trusted-keys</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">trusted-keys</strong></span> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>string</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>string</code></em> ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> <em class="replaceable"><code>string</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>string</code></em> ; [<span class="optional">...</span>]</span>]
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews<div class="titlepage"><div><div><h3 class="title">
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews<a name="id2592254"></a><span><strong class="command">trusted-keys</strong></span> Statement Definition
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The <span><strong class="command">trusted-keys</strong></span> statement defines
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews DNSSEC security roots. DNSSEC is described in <a href="Bv9ARM.ch04.html#DNSSEC" title="DNSSEC">the section called “DNSSEC”</a>. A security root is defined when the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews public key for a non-authoritative zone is known, but
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews cannot be securely obtained through DNS, either because
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews it is the DNS root zone or because its parent zone is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews unsigned. Once a key has been configured as a trusted
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews key, it is treated as if it had been validated and
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews proven secure. The resolver attempts DNSSEC validation
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews on all DNS data in subdomains of a security root.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews All keys (and corresponding zones) listed in
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">trusted-keys</strong></span> are deemed to exist regardless
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews of what parent zones say. Similarly for all keys listed in
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">trusted-keys</strong></span> only those keys are
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews used to validate the DNSKEY RRset. The parent's DS RRset
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews will not be used.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews The <span><strong class="command">trusted-keys</strong></span> statement can contain
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews multiple key entries, each consisting of the key's
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews domain name, flags, protocol, algorithm, and the Base-64
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews representation of the key data.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Spaces, tabs, newlines and carriage returns are ignored
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews in the key data, so the configuration may be split up into
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews multiple lines.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">trusted-keys</strong></span> may be set at the top level
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews of <code class="filename">named.conf</code> or within a view. If it is
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews set in both places, they are additive: keys defined at the top
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews level are inherited by all views, but keys defined in a view
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews are only used within that view.
7208386cd37a2092c70eddf80cf29519b16c4c80Mark Andrews<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2592301"></a><span><strong class="command">managed-keys</strong></span> Statement Grammar</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"><span><strong class="command">managed-keys</strong></span> {
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="replaceable"><code>name</code></em> <code class="literal">initial-key</code> <em class="replaceable"><code>flags</code></em> <em class="replaceable"><code>protocol</code></em> <em class="replaceable"><code>algorithm</code></em> <em class="replaceable"><code>key-data</code></em> ;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein [<span class="optional"> <em class="replaceable"><code>name</code></em> <code class="literal">initial-key</code> <em class="replaceable"><code>flags</code></em> <em class="replaceable"><code>protocol</code></em> <em class="replaceable"><code>algorithm</code></em> <em class="replaceable"><code>key-data</code></em> ; [<span class="optional">...</span>]</span>]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="managed-keys"></a><span><strong class="command">managed-keys</strong></span> Statement Definition
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">managed-keys</strong></span> statement, like
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">trusted-keys</strong></span>, defines DNSSEC
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein security roots. The difference is that
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">managed-keys</strong></span> can be kept up to date
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein automatically, without intervention from the resolver
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Suppose, for example, that a zone's key-signing
set to <strong class="userinput"><code>auto</code></strong>, <span><strong class="command">named</strong></span>
<a name="view_statement_grammar"></a><span><strong class="command">view</strong></span> Statement Grammar</h3></div></div></div>
<pre class="programlisting"><span><strong class="command">view</strong></span> <em class="replaceable"><code>view_name</code></em>
<a name="id2592743"></a><span><strong class="command">view</strong></span> Statement Definition and Usage</h3></div></div></div>
<span><strong class="command">match-clients</strong></span> and <span><strong class="command">match-destinations</strong></span>
<span><strong class="command">match-clients</strong></span> and <span><strong class="command">match-destinations</strong></span>
// Provide a complete view of the example.com
zone "example.com" {
file "example-internal.db";
// Provide a restricted view of the example.com
zone "example.com" {
file "example-external.db";
<pre class="programlisting"><span><strong class="command">zone</strong></span> <em class="replaceable"><code>zone_name</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
[<span class="optional"> allow-query { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-query-on { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-transfer { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-update { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> update-check-ksk <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> dnssec-dnskey-kskonly <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> dnssec-loadkeys-interval <em class="replaceable"><code>number</code></em>; </span>]
[<span class="optional"> update-policy <em class="replaceable"><code>local</code></em> | { <em class="replaceable"><code>update_policy_rule</code></em> [<span class="optional">...</span>] }; </span>]
[<span class="optional"> also-notify { <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ;
[<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; ... </span>] }; </span>]
[<span class="optional"> check-names (<code class="constant">warn</code>|<code class="constant">fail</code>|<code class="constant">ignore</code>) ; </span>]
[<span class="optional"> check-mx (<code class="constant">warn</code>|<code class="constant">fail</code>|<code class="constant">ignore</code>) ; </span>]
[<span class="optional"> check-wildcard <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> check-spf ( <em class="replaceable"><code>warn</code></em> | <em class="replaceable"><code>fail</code></em> | <em class="replaceable"><code>ignore</code></em> ); </span>]
[<span class="optional"> check-integrity <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> masterfile-format (<code class="constant">text</code>|<code class="constant">raw</code>|<code class="constant">map</code>) ; </span>]
[<span class="optional"> max-journal-size <em class="replaceable"><code>size_spec</code></em>; </span>]
[<span class="optional"> forward (<code class="constant">only</code>|<code class="constant">first</code>) ; </span>]
[<span class="optional"> forwarders { [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; ... </span>] }; </span>]
[<span class="optional"> ixfr-from-differences <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> request-ixfr <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> maintain-ixfr-base <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> max-ixfr-log-size <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-transfer-idle-out <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-transfer-time-out <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> notify <em class="replaceable"><code>yes_or_no</code></em> | <em class="replaceable"><code>explicit</code></em> | <em class="replaceable"><code>master-only</code></em> ; </span>]
[<span class="optional"> notify-to-soa <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> pubkey <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>string</code></em> ; </span>]
[<span class="optional"> notify-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> notify-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> zone-statistics <em class="replaceable"><code>full</code></em> | <em class="replaceable"><code>terse</code></em> | <em class="replaceable"><code>none</code></em>; </span>]
[<span class="optional"> sig-validity-interval <em class="replaceable"><code>number</code></em> [<span class="optional"><em class="replaceable"><code>number</code></em></span>] ; </span>]
[<span class="optional"> sig-signing-nodes <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> sig-signing-signatures <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> sig-signing-type <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> min-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> key-directory <em class="replaceable"><code>path_name</code></em>; </span>]
[<span class="optional"> auto-dnssec <code class="constant">allow</code>|<code class="constant">maintain</code>|<code class="constant">off</code>; </span>]
[<span class="optional"> inline-signing <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> zero-no-soa-ttl <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> serial-update-method <code class="constant">increment</code>|<code class="constant">unixtime</code>; </span>]
zone <em class="replaceable"><code>zone_name</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
[<span class="optional"> allow-notify { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-query { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-query-on { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-transfer { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-update-forwarding { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> dnssec-update-mode ( <em class="replaceable"><code>maintain</code></em> | <em class="replaceable"><code>no-resign</code></em> ); </span>]
[<span class="optional"> update-check-ksk <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> dnssec-dnskey-kskonly <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> dnssec-loadkeys-interval <em class="replaceable"><code>number</code></em>; </span>]
[<span class="optional"> dnssec-secure-to-insecure <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> try-tcp-refresh <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> also-notify [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] { ( <em class="replaceable"><code>masters_list</code></em> | <em class="replaceable"><code>ip_addr</code></em>
[<span class="optional">key <em class="replaceable"><code>key</code></em></span>] ) ; [<span class="optional">...</span>] }; </span>]
[<span class="optional"> check-names (<code class="constant">warn</code>|<code class="constant">fail</code>|<code class="constant">ignore</code>) ; </span>]
[<span class="optional"> masterfile-format (<code class="constant">text</code>|<code class="constant">raw</code>|<code class="constant">map</code>) ; </span>]
[<span class="optional"> max-journal-size <em class="replaceable"><code>size_spec</code></em>; </span>]
[<span class="optional"> forward (<code class="constant">only</code>|<code class="constant">first</code>) ; </span>]
[<span class="optional"> forwarders { [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; ... </span>] }; </span>]
[<span class="optional"> ixfr-from-differences <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> maintain-ixfr-base <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> masters [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] { ( <em class="replaceable"><code>masters_list</code></em> | <em class="replaceable"><code>ip_addr</code></em>
[<span class="optional">key <em class="replaceable"><code>key</code></em></span>] ) ; [<span class="optional">...</span>] }; </span>]
[<span class="optional"> max-ixfr-log-size <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-transfer-idle-in <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-transfer-idle-out <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-transfer-time-in <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-transfer-time-out <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> notify <em class="replaceable"><code>yes_or_no</code></em> | <em class="replaceable"><code>explicit</code></em> | <em class="replaceable"><code>master-only</code></em> ; </span>]
[<span class="optional"> notify-to-soa <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> pubkey <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>string</code></em> ; </span>]
[<span class="optional"> transfer-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> transfer-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> alt-transfer-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> alt-transfer-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>)
[<span class="optional"> use-alt-transfer-source <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> notify-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> notify-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> zone-statistics <em class="replaceable"><code>full</code></em> | <em class="replaceable"><code>terse</code></em> | <em class="replaceable"><code>none</code></em>; </span>]
[<span class="optional"> sig-validity-interval <em class="replaceable"><code>number</code></em> [<span class="optional"><em class="replaceable"><code>number</code></em></span>] ; </span>]
[<span class="optional"> sig-signing-nodes <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> sig-signing-signatures <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> sig-signing-type <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> min-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> key-directory <em class="replaceable"><code>path_name</code></em>; </span>]
[<span class="optional"> auto-dnssec <code class="constant">allow</code>|<code class="constant">maintain</code>|<code class="constant">off</code>; </span>]
[<span class="optional"> inline-signing <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> multi-master <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> zero-no-soa-ttl <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
zone <em class="replaceable"><code>zone_name</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
[<span class="optional"> delegation-only <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> check-names (<code class="constant">warn</code>|<code class="constant">fail</code>|<code class="constant">ignore</code>) ; </span>] // Not Implemented.
zone <em class="replaceable"><code>zone_name</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
[<span class="optional"> allow-query { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> allow-query-on { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> check-names (<code class="constant">warn</code>|<code class="constant">fail</code>|<code class="constant">ignore</code>) ; </span>]
[<span class="optional"> delegation-only <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> masterfile-format (<code class="constant">text</code>|<code class="constant">raw</code>|<code class="constant">map</code>) ; </span>]
[<span class="optional"> forward (<code class="constant">only</code>|<code class="constant">first</code>) ; </span>]
[<span class="optional"> forwarders { [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; ... </span>] }; </span>]
[<span class="optional"> masters [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] { ( <em class="replaceable"><code>masters_list</code></em> | <em class="replaceable"><code>ip_addr</code></em>
[<span class="optional">key <em class="replaceable"><code>key</code></em></span>] ) ; [<span class="optional">...</span>] }; </span>]
[<span class="optional"> max-transfer-idle-in <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-transfer-time-in <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> pubkey <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>string</code></em> ; </span>]
[<span class="optional"> transfer-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> transfer-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>)
[<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> alt-transfer-source (<em class="replaceable"><code>ip4_addr</code></em> | <code class="constant">*</code>) [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> alt-transfer-source-v6 (<em class="replaceable"><code>ip6_addr</code></em> | <code class="constant">*</code>)
[<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; </span>]
[<span class="optional"> use-alt-transfer-source <em class="replaceable"><code>yes_or_no</code></em>; </span>]
[<span class="optional"> zone-statistics <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
[<span class="optional"> min-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> max-refresh-time <em class="replaceable"><code>number</code></em> ; </span>]
[<span class="optional"> multi-master <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
zone <em class="replaceable"><code>zone_name</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
[<span class="optional"> allow-query { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
[<span class="optional"> server-addresses { [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> ; ... </span>] }; </span>]
[<span class="optional"> server-names { [<span class="optional"> <em class="replaceable"><code>namelist</code></em> </span>] }; </span>]
[<span class="optional"> zone-statistics <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
zone <em class="replaceable"><code>zone_name</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
[<span class="optional"> forward (<code class="constant">only</code>|<code class="constant">first</code>) ; </span>]
[<span class="optional"> forwarders { [<span class="optional"> <em class="replaceable"><code>ip_addr</code></em> [<span class="optional">port <em class="replaceable"><code>ip_port</code></em></span>] [<span class="optional">dscp <em class="replaceable"><code>ip_dscp</code></em></span>] ; ... </span>] }; </span>]
[<span class="optional"> delegation-only <em class="replaceable"><code>yes_or_no</code></em> ; </span>]
zone <em class="replaceable"><code>"."</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
[<span class="optional"> masterfile-format (<code class="constant">text</code>|<code class="constant">raw</code>|<code class="constant">map</code>) ; </span>]
[<span class="optional"> allow-query { <em class="replaceable"><code>address_match_list</code></em> }; </span>]
zone <em class="replaceable"><code>zone_name</code></em> [<span class="optional"><em class="replaceable"><code>class</code></em></span>] {
<a name="id2594732"></a><span><strong class="command">zone</strong></span> Statement Definition and Usage</h3></div></div></div>
Non recursive queries (i.e., those with the RD
commercial Spanish names (under COM.ES) one
would use wildcard entries called "*.COM.ES.".
status of infrastructure zones (e.g. COM,
See caveats in <a href="Bv9ARM.ch06.html#root_delegation_only"><span><strong class="command">root-delegation-only</strong></span></a>.
a class is not specified, class <code class="literal">IN</code> (for <code class="varname">Internet</code>),
in the mid-1970s. Zone data for it can be specified with the <code class="literal">CHAOS</code> class.
<span><strong class="command">allow-notify</strong></span> in <a href="Bv9ARM.ch06.html#access_control" title="Access Control">the section called “Access Control”</a>.
<span><strong class="command">allow-query</strong></span> in <a href="Bv9ARM.ch06.html#access_control" title="Access Control">the section called “Access Control”</a>.
<span><strong class="command">allow-query-on</strong></span> in <a href="Bv9ARM.ch06.html#access_control" title="Access Control">the section called “Access Control”</a>.
in <a href="Bv9ARM.ch06.html#access_control" title="Access Control">the section called “Access Control”</a>.
in <a href="Bv9ARM.ch06.html#access_control" title="Access Control">the section called “Access Control”</a>.
<a href="Bv9ARM.ch06.html#dynamic_update_policies" title="Dynamic Update Policies">the section called “Dynamic Update Policies”</a>.
<dt><span class="term"><span><strong class="command">allow-update-forwarding</strong></span></span></dt>
in <a href="Bv9ARM.ch06.html#access_control" title="Access Control">the section called “Access Control”</a>.
network. The default varies according to zone type. For <span><strong class="command">master</strong></span> zones the default is <span><strong class="command">fail</strong></span>. For <span><strong class="command">slave</strong></span>
<span><strong class="command">check-mx</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">check-spf</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">check-wildcard</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">check-integrity</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">check-sibling</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">zero-no-soa-ttl</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">update-check-ksk</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">dnssec-update-mode</strong></span> in <a href="Bv9ARM.ch06.html#options" title="options Statement Definition and
Usage">the section called “<span><strong class="command">options</strong></span> Statement Definition and
<dt><span class="term"><span><strong class="command">dnssec-dnskey-kskonly</strong></span></span></dt>
<span><strong class="command">dnssec-dnskey-kskonly</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">try-tcp-refresh</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">dialup</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
See caveats in <a href="Bv9ARM.ch06.html#root_delegation_only"><span><strong class="command">root-delegation-only</strong></span></a>.
after trying the forwarders and getting no answer, while <span><strong class="command">first</strong></span> would
This is applicable to <span><strong class="command">master</strong></span> and <span><strong class="command">slave</strong></span> zones.
<span><strong class="command">max-journal-size</strong></span> in <a href="Bv9ARM.ch06.html#server_resource_limits" title="Server Resource Limits">the section called “Server Resource Limits”</a>.
<dt><span class="term"><span><strong class="command">max-transfer-time-in</strong></span></span></dt>
<span><strong class="command">max-transfer-time-in</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<dt><span class="term"><span><strong class="command">max-transfer-idle-in</strong></span></span></dt>
<span><strong class="command">max-transfer-idle-in</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<dt><span class="term"><span><strong class="command">max-transfer-time-out</strong></span></span></dt>
<span><strong class="command">max-transfer-time-out</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<dt><span class="term"><span><strong class="command">max-transfer-idle-out</strong></span></span></dt>
<span><strong class="command">max-transfer-idle-out</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<span><strong class="command">notify</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">notify-delay</strong></span> in <a href="Bv9ARM.ch06.html#tuning" title="Tuning">the section called “Tuning”</a>.
<a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
zones when they are loaded from disk. <acronym class="acronym">BIND</acronym> 9 does not verify signatures
For example, if "example.com" is configured as a
example.com. A 192.0.2.1
"www.example.com" with the RD bit on, the server
That is, when "example.net" is the origin of a
static-stub zone, "ns.example" and
"master.example.com" can be specified in the
"ns.example.net" cannot, and will be rejected by
For example, if "example.com" is configured as a
static-stub zone with "ns1.example.net" and
"www.example.com" with the RD bit on, the server
"ns2.example.net" to IP addresses, and then send
<dt><span class="term"><span><strong class="command">sig-validity-interval</strong></span></span></dt>
<span><strong class="command">sig-validity-interval</strong></span> in <a href="Bv9ARM.ch06.html#tuning" title="Tuning">the section called “Tuning”</a>.
<span><strong class="command">sig-signing-nodes</strong></span> in <a href="Bv9ARM.ch06.html#tuning" title="Tuning">the section called “Tuning”</a>.
<dt><span class="term"><span><strong class="command">sig-signing-signatures</strong></span></span></dt>
<span><strong class="command">sig-signing-signatures</strong></span> in <a href="Bv9ARM.ch06.html#tuning" title="Tuning">the section called “Tuning”</a>.
<span><strong class="command">sig-signing-type</strong></span> in <a href="Bv9ARM.ch06.html#tuning" title="Tuning">the section called “Tuning”</a>.
<span><strong class="command">transfer-source</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<span><strong class="command">transfer-source-v6</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<dt><span class="term"><span><strong class="command">alt-transfer-source</strong></span></span></dt>
<span><strong class="command">alt-transfer-source</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<dt><span class="term"><span><strong class="command">alt-transfer-source-v6</strong></span></span></dt>
<span><strong class="command">alt-transfer-source-v6</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<dt><span class="term"><span><strong class="command">use-alt-transfer-source</strong></span></span></dt>
<span><strong class="command">use-alt-transfer-source</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<span><strong class="command">notify-source</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<span><strong class="command">notify-source-v6</strong></span> in <a href="Bv9ARM.ch06.html#zone_transfers" title="Zone Transfers">the section called “Zone Transfers”</a>.
<span class="term"><span><strong class="command">min-refresh-time</strong></span>, </span><span class="term"><span><strong class="command">max-refresh-time</strong></span>, </span><span class="term"><span><strong class="command">min-retry-time</strong></span>, </span><span class="term"><span><strong class="command">max-retry-time</strong></span></span>
See the description in <a href="Bv9ARM.ch06.html#tuning" title="Tuning">the section called “Tuning”</a>.
<dt><span class="term"><span><strong class="command">ixfr-from-differences</strong></span></span></dt>
<span><strong class="command">ixfr-from-differences</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<span><strong class="command">key-directory</strong></span> in <a href="Bv9ARM.ch06.html#options" title="options Statement Definition and
Usage">the section called “<span><strong class="command">options</strong></span> Statement Definition and
(see <a href="man.dnssec-keygen.html" title="dnssec-keygen"><span class="refentrytitle"><span class="application">dnssec-keygen</span></span>(8)</a> and
<a href="man.dnssec-settime.html" title="dnssec-settime"><span class="refentrytitle"><span class="application">dnssec-settime</span></span>(8)</a>). The command
<dt><span class="term"><span><strong class="command">serial-update-method</strong></span></span></dt>
<a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
<dt><span class="term"><span><strong class="command">dnssec-secure-to-insecure</strong></span></span></dt>
<span><strong class="command">dnssec-secure-to-insecure</strong></span> in <a href="Bv9ARM.ch06.html#boolean_options" title="Boolean Options">the section called “Boolean Options”</a>.
( <span><strong class="command">grant</strong></span> | <span><strong class="command">deny</strong></span> ) <em class="replaceable"><code>identity</code></em> <em class="replaceable"><code>nametype</code></em> [<span class="optional"> <em class="replaceable"><code>name</code></em> </span>] [<span class="optional"> <em class="replaceable"><code>types</code></em> </span>]
and converts it machine.realm allowing the machine
to update machine.realm. The REALM to be matched
converts it to machine.realm allowing the machine
to update subdomains of machine.realm. The REALM
and converts it machine.realm allowing the machine
to update machine.realm. The REALM to be matched
converts it to machine.realm allowing the machine
to update subdomains of machine.realm. The REALM
<a name="types_of_resource_records_and_when_to_use_them"></a>Types of Resource Records and When to Use Them</h3></div></div></div>
that a particular nearby server be tried first. See <a href="Bv9ARM.ch06.html#the_sortlist_statement" title="The sortlist Statement">the section called “The <span><strong class="command">sortlist</strong></span> Statement”</a> and <a href="Bv9ARM.ch06.html#rrset_ordering" title="RRset Ordering">the section called “RRset Ordering”</a>.
built-in server information zones, e.g.,
any order), and if neither of those succeed, delivery to <code class="literal">mail.backup.org</code> will
and PTR records. Entries in the in-addr.arpa domain are made in
in-addr.arpa name of
3.2.1.10.in-addr.arpa. This name should have a PTR resource record
Master File Directives include <span><strong class="command">$ORIGIN</strong></span>, <span><strong class="command">$INCLUDE</strong></span>,
<a name="id2601346"></a>The <span><strong class="command">@</strong></span> (at-sign)</h4></div></div></div>
<a name="id2601362"></a>The <span><strong class="command">$ORIGIN</strong></span> Directive</h4></div></div></div>
$ORIGIN example.com.
<a name="id2601422"></a>The <span><strong class="command">$INCLUDE</strong></span> Directive</h4></div></div></div>
if it were included into the file at this point. If <span><strong class="command">origin</strong></span> is
revert to the values they had prior to the <span><strong class="command">$INCLUDE</strong></span> once
<a name="id2601492"></a>The <span><strong class="command">$TTL</strong></span> Directive</h4></div></div></div>
<a name="id2601528"></a><acronym class="acronym">BIND</acronym> Master File Extension: the <span><strong class="command">$GENERATE</strong></span> Directive</h3></div></div></div>
Classless IN-ADDR.ARPA delegation.
HOST-1.EXAMPLE. MX 0 .
HOST-2.EXAMPLE. A 1.2.3.2
HOST-2.EXAMPLE. MX 0 .
HOST-3.EXAMPLE. A 1.2.3.3
HOST-3.EXAMPLE. MX 0 .
HOST-127.EXAMPLE. A 1.2.3.127
HOST-127.EXAMPLE. MX 0 .
(<span><strong class="command">n</strong></span> or <span><strong class="command">N</strong></span>\
The <span><strong class="command">$GENERATE</strong></span> directive is a <acronym class="acronym">BIND</acronym> extension
(see <a href="Bv9ARM.ch06.html#statschannels" title="statistics-channels Statement Grammar">the section called “<span><strong class="command">statistics-channels</strong></span> Statement Grammar”</a>.)
<a href="Bv9ARM.ch06.html#clients-per-query"><span><strong class="command">clients-per-query</strong></span></a>.)
<a name="id2606142"></a>Compatibility with <span class="emphasis"><em>BIND</em></span> 8 Counters</h4></div></div></div>
<td width="40%" align="left" valign="top">Chapter�5.�The <acronym class="acronym">BIND</acronym> 9 Lightweight Resolver�</td>