man.dig.html revision 0da3028ccf1172617852a46382146f1e5cabd246
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - Copyright (C) 2000-2003 Internet Software Consortium.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - Permission to use, copy, modify, and/or distribute this software for any
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - purpose with or without fee is hereby granted, provided that the above
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - copyright notice and this permission notice appear in all copies.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki - PERFORMANCE OF THIS SOFTWARE.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<link rel="prev" href="Bv9ARM.ch13.html" title="Manual pages">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<link rel="next" href="man.host.html" title="host">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<table width="100%" summary="Navigation header">
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<tr><th colspan="3" align="center">dig</th></tr>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<a accesskey="p" href="Bv9ARM.ch13.html">Prev</a>�</td>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<th width="60%" align="center">Manual pages</th>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<td width="20%" align="right">�<a accesskey="n" href="man.host.html">Next</a>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<a name="man.dig"></a><div class="titlepage"></div>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<div class="cmdsynopsis"><p><code class="command">dig</code> [@server] [<code class="option">-b <em class="replaceable"><code>address</code></em></code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-f <em class="replaceable"><code>filename</code></em></code>] [<code class="option">-k <em class="replaceable"><code>filename</code></em></code>] [<code class="option">-m</code>] [<code class="option">-p <em class="replaceable"><code>port#</code></em></code>] [<code class="option">-q <em class="replaceable"><code>name</code></em></code>] [<code class="option">-t <em class="replaceable"><code>type</code></em></code>] [<code class="option">-v</code>] [<code class="option">-x <em class="replaceable"><code>addr</code></em></code>] [<code class="option">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]name:key</code></em></code>] [<code class="option">-4</code>] [<code class="option">-6</code>] [name] [type] [class] [queryopt...]</p></div>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<div class="cmdsynopsis"><p><code class="command">dig</code> [<code class="option">-h</code>]</p></div>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<div class="cmdsynopsis"><p><code class="command">dig</code> [global-queryopt...] [query...]</p></div>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<p><span><strong class="command">dig</strong></span>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki (domain information groper) is a flexible tool
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki for interrogating DNS name servers. It performs DNS lookups and
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki displays the answers that are returned from the name server(s) that
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki were queried. Most DNS administrators use <span><strong class="command">dig</strong></span> to
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki troubleshoot DNS problems because of its flexibility, ease of use and
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki clarity of output. Other lookup tools tend to have less functionality
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki than <span><strong class="command">dig</strong></span>.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Although <span><strong class="command">dig</strong></span> is normally used with
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki arguments, it also has a batch mode of operation for reading lookup
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki requests from a file. A brief summary of its command-line arguments
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki and options is printed when the <code class="option">-h</code> option is given.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Unlike earlier versions, the BIND 9 implementation of
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span><strong class="command">dig</strong></span> allows multiple lookups to be issued
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki command line.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Unless it is told to query a specific name server,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span><strong class="command">dig</strong></span> will try each of the servers listed in
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="filename">/etc/resolv.conf</code>. If no usable server addresses
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki are found, <span><strong class="command">dig</strong></span> will send the query to the local
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki When no command line arguments or options are given,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span><strong class="command">dig</strong></span> will perform an NS query for "." (the root).
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki It is possible to set per-user defaults for <span><strong class="command">dig</strong></span> via
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="filename">${HOME}/.digrc</code>. This file is read and
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki any options in it
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki are applied before the command line arguments.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki The IN and CH class names overlap with the IN and CH top level
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki domain names. Either use the <code class="option">-t</code> and
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="option">-c</code> options to specify the type and class,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki use the <code class="option">-q</code> the specify the domain name, or
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki use "IN." and "CH." when looking up these top level domains.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<a name="id2616146"></a><h2>SIMPLE USAGE</h2>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki A typical invocation of <span><strong class="command">dig</strong></span> looks like:
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<pre class="programlisting"> dig @server name type </pre>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term"><code class="constant">server</code></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki is the name or IP address of the name server to query. This
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki can be an IPv4 address in dotted-decimal notation or an IPv6
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki address in colon-delimited notation. When the supplied
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <em class="parameter"><code>server</code></em> argument is a hostname,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span><strong class="command">dig</strong></span> resolves that name before querying
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki that name server.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki If no <em class="parameter"><code>server</code></em> argument is
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki provided, <span><strong class="command">dig</strong></span> consults
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="filename">/etc/resolv.conf</code>; if an
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki address is found there, it queries the name server at
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki that address. If either of the <code class="option">-4</code> or
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="option">-6</code> options are in use, then
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki only addresses for the corresponding transport
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki will be tried. If no usable addresses are found,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span><strong class="command">dig</strong></span> will send the query to the
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki local host. The reply from the name server that
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki responds is displayed.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term"><code class="constant">name</code></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki is the name of the resource record that is to be looked up.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term"><code class="constant">type</code></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki indicates what type of query is required —
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki ANY, A, MX, SIG, etc.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <em class="parameter"><code>type</code></em> can be any valid query
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <em class="parameter"><code>type</code></em> argument is supplied,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span><strong class="command">dig</strong></span> will perform a lookup for an
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Use IPv4 only.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Use IPv6 only.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-b <em class="replaceable"><code>address[<span class="optional">#port</span>]</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Set the source IP address of the query.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki The <em class="parameter"><code>address</code></em> must be a valid address on
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki one of the host's network interfaces, or "0.0.0.0" or "::". An
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki optional port may be specified by appending "#<port>"
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Set the query class. The
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki default <em class="parameter"><code>class</code></em> is IN; other classes
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki are HS for Hesiod records or CH for Chaosnet records.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Batch mode: <span><strong class="command">dig</strong></span> reads a list of lookup
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki requests to process from the
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki given <em class="parameter"><code>file</code></em>. Each line in the file
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki should be organized in the same way they would be
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki presented as queries to
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span><strong class="command">dig</strong></span> using the command-line interface.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Do reverse IPv6 lookups using the obsolete RFC1886 IP6.INT
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki domain, which is no longer in use. Obsolete bit string
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki label queries (RFC2874) are not attempted.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-k <em class="replaceable"><code>keyfile</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Sign queries using TSIG using a key read from the given file.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Key files can be generated using
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span class="citerefentry"><span class="refentrytitle">tsig-keygen</span>(8)</span>.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki When using TSIG authentication with <span><strong class="command">dig</strong></span>,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki the name server that is queried needs to know the key and
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki algorithm that is being used. In BIND, this is done by
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki providing appropriate <span><strong class="command">key</strong></span>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki and <span><strong class="command">server</strong></span> statements in
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Enable memory usage debugging.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-p <em class="replaceable"><code>port</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Send the query to a non-standard port on the server,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki instead of the defaut port 53. This option would be used
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki to test a name server that has been configured to listen
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki for queries on a non-standard port number.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-q <em class="replaceable"><code>name</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki The domain name to query. This is useful to distinguish
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki the <em class="parameter"><code>name</code></em> from other arguments.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-t <em class="replaceable"><code>type</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki The resource record type to query. It can be any valid query type
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki supported in BIND 9. The default query type is "A", unless the
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="option">-x</code> option is supplied to indicate a reverse lookup.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki A zone transfer can be requested by specifying a type of AXFR. When
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki an incremental zone transfer (IXFR) is required, set the
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <em class="parameter"><code>type</code></em> to <code class="literal">ixfr=N</code>.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki The incremental zone transfer will contain the changes
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki made to the zone since the serial number in the zone's SOA
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Print the version number and exit.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-x <em class="replaceable"><code>addr</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Simplified reverse lookups, for mapping addresses to
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki names. The <em class="parameter"><code>addr</code></em> is an IPv4 address
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki in dotted-decimal notation, or a colon-delimited IPv6
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki address. When the <code class="option">-x</code> is used, there is no
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki need to provide
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki the <em class="parameter"><code>name</code></em>, <em class="parameter"><code>class</code></em>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki and <em class="parameter"><code>type</code></em>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki arguments. <span><strong class="command">dig</strong></span> automatically performs a
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki lookup for a name like
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="literal">94.2.0.192.in-addr.arpa</code> and sets the
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki query type and class to PTR and IN respectively. IPv6
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki addresses are looked up using nibble format under the
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki IP6.ARPA domain (but see also the <code class="option">-i</code>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]keyname:secret</code></em></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Sign queries using TSIG with the given authentication key.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <em class="parameter"><code>keyname</code></em> is the name of the key, and
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <em class="parameter"><code>secret</code></em> is the base64 encoded shared secret.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <em class="parameter"><code>hmac</code></em> is the name of the key algorithm;
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki valid choices are <code class="literal">hmac-md5</code>,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="literal">hmac-sha1</code>, <code class="literal">hmac-sha224</code>,
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="literal">hmac-sha256</code>, <code class="literal">hmac-sha384</code>, or
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <code class="literal">hmac-sha512</code>. If <em class="parameter"><code>hmac</code></em>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki is not specified, the default is <code class="literal">hmac-md5</code>.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki NOTE: You should use the <code class="option">-k</code> option and
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki avoid the <code class="option">-y</code> option, because
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki with <code class="option">-y</code> the shared secret is supplied as
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki a command line argument in clear text. This may be visible
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki in the output from
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki <span class="citerefentry"><span class="refentrytitle">ps</span>(1)</span>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki or in a history file maintained by the user's shell.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<a name="id2667645"></a><h2>QUERY OPTIONS</h2>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<p><span><strong class="command">dig</strong></span>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki provides a number of query options which affect
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki the way in which lookups are made and the results displayed. Some of
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki these set or reset flag bits in the query header, some determine which
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki sections of the answer get printed, and others determine the timeout
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki and retry strategies.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Each query option is identified by a keyword preceded by a plus sign
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki (<code class="literal">+</code>). Some keywords set or reset an
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki option. These may be preceded
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki by the string <code class="literal">no</code> to negate the meaning of
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki that keyword. Other
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki keywords assign values to options like the timeout interval. They
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki have the form <code class="option">+keyword=value</code>.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Keywords may be abbreviated, provided the abbreviation is
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki unambiguous; for example, <code class="literal">+cd</code> is equivalent
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki The query options are:
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term"><code class="option">+[no]aaflag</code></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki A synonym for <em class="parameter"><code>+[no]aaonly</code></em>.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term"><code class="option">+[no]aaonly</code></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Sets the "aa" flag in the query.
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki<dt><span class="term"><code class="option">+[no]additional</code></span></dt>
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki Display [do not display] the additional section of a
cc51cd2d2076e33117c60c9effcb8caccde4983bWitold Krecicki reply. The default is to display it.
e.g. "[ key id = value ]".
accepted. Setting a named flag (e.g. DO) will silently be
<dt><span class="term"><code class="option">+[no]sit[<span class="optional">=####</span>]</code></span></dt>