man.dig.html revision 199045f81d2c312411fc0d6a6f8dc56968daa679
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - Copyright (C) 2000-2003 Internet Software Consortium.
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - Permission to use, copy, modify, and/or distribute this software for any
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - purpose with or without fee is hereby granted, provided that the above
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - copyright notice and this permission notice appear in all copies.
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
3e14f97f673e8a630f076077de35afdd43dc1587Roger A. Faulkner - PERFORMANCE OF THIS SOFTWARE.
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<!-- $Id$ -->
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<link rel="prev" href="Bv9ARM.ch13.html" title="Manual pages">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<link rel="next" href="man.host.html" title="host">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<table width="100%" summary="Navigation header">
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<tr><th colspan="3" align="center">dig</th></tr>
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<a accesskey="p" href="Bv9ARM.ch13.html">Prev</a>�</td>
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<th width="60%" align="center">Manual pages</th>
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<td width="20%" align="right">�<a accesskey="n" href="man.host.html">Next</a>
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz<a name="man.dig"></a><div class="titlepage"></div>
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin<div class="cmdsynopsis"><p><code class="command">dig</code> [@server] [<code class="option">-b <em class="replaceable"><code>address</code></em></code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-f <em class="replaceable"><code>filename</code></em></code>] [<code class="option">-k <em class="replaceable"><code>filename</code></em></code>] [<code class="option">-m</code>] [<code class="option">-p <em class="replaceable"><code>port#</code></em></code>] [<code class="option">-q <em class="replaceable"><code>name</code></em></code>] [<code class="option">-t <em class="replaceable"><code>type</code></em></code>] [<code class="option">-v</code>] [<code class="option">-x <em class="replaceable"><code>addr</code></em></code>] [<code class="option">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]name:key</code></em></code>] [<code class="option">-4</code>] [<code class="option">-6</code>] [name] [type] [class] [queryopt...]</p></div>
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin<div class="cmdsynopsis"><p><code class="command">dig</code> [<code class="option">-h</code>]</p></div>
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin<div class="cmdsynopsis"><p><code class="command">dig</code> [global-queryopt...] [query...]</p></div>
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin<p><span><strong class="command">dig</strong></span>
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin (domain information groper) is a flexible tool
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin for interrogating DNS name servers. It performs DNS lookups and
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin displays the answers that are returned from the name server(s) that
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin were queried. Most DNS administrators use <span><strong class="command">dig</strong></span> to
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin troubleshoot DNS problems because of its flexibility, ease of use and
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin clarity of output. Other lookup tools tend to have less functionality
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin than <span><strong class="command">dig</strong></span>.
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin Although <span><strong class="command">dig</strong></span> is normally used with
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin command-line
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin arguments, it also has a batch mode of operation for reading lookup
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin requests from a file. A brief summary of its command-line arguments
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin and options is printed when the <code class="option">-h</code> option is given.
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin Unlike earlier versions, the BIND 9 implementation of
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin <span><strong class="command">dig</strong></span> allows multiple lookups to be issued
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin command line.
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin Unless it is told to query a specific name server,
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin <span><strong class="command">dig</strong></span> will try each of the servers listed in
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin <code class="filename">/etc/resolv.conf</code>. If no usable server addresses
7c2fbfb345896881c631598ee3852ce9ce33fb07April Chin are found, <span><strong class="command">dig</strong></span> will send the query to the local
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin When no command line arguments or options are given,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <span><strong class="command">dig</strong></span> will perform an NS query for "." (the root).
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin It is possible to set per-user defaults for <span><strong class="command">dig</strong></span> via
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="filename">${HOME}/.digrc</code>. This file is read and
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin any options in it
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin are applied before the command line arguments.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin The IN and CH class names overlap with the IN and CH top level
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin domain names. Either use the <code class="option">-t</code> and
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="option">-c</code> options to specify the type and class,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin use the <code class="option">-q</code> the specify the domain name, or
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin use "IN." and "CH." when looking up these top level domains.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin A typical invocation of <span><strong class="command">dig</strong></span> looks like:
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<pre class="programlisting"> dig @server name type </pre>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term"><code class="constant">server</code></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin is the name or IP address of the name server to query. This
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin can be an IPv4 address in dotted-decimal notation or an IPv6
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin address in colon-delimited notation. When the supplied
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <em class="parameter"><code>server</code></em> argument is a hostname,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <span><strong class="command">dig</strong></span> resolves that name before querying
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin that name server.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin If no <em class="parameter"><code>server</code></em> argument is
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin provided, <span><strong class="command">dig</strong></span> consults
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin address is found there, it queries the name server at
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin that address. If either of the <code class="option">-4</code> or
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="option">-6</code> options are in use, then
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin only addresses for the corresponding transport
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin will be tried. If no usable addresses are found,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <span><strong class="command">dig</strong></span> will send the query to the
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin local host. The reply from the name server that
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin responds is displayed.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term"><code class="constant">name</code></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin is the name of the resource record that is to be looked up.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term"><code class="constant">type</code></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin indicates what type of query is required —
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin ANY, A, MX, SIG, etc.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <em class="parameter"><code>type</code></em> can be any valid query
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin type. If no
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <em class="parameter"><code>type</code></em> argument is supplied,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <span><strong class="command">dig</strong></span> will perform a lookup for an
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Use IPv4 only.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Use IPv6 only.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-b <em class="replaceable"><code>address[<span class="optional">#port</span>]</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Set the source IP address of the query.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin The <em class="parameter"><code>address</code></em> must be a valid address on
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin one of the host's network interfaces, or "0.0.0.0" or "::". An
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin optional port may be specified by appending "#<port>"
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Set the query class. The
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin default <em class="parameter"><code>class</code></em> is IN; other classes
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin are HS for Hesiod records or CH for Chaosnet records.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Batch mode: <span><strong class="command">dig</strong></span> reads a list of lookup
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin requests to process from the
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin given <em class="parameter"><code>file</code></em>. Each line in the file
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin should be organized in the same way they would be
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin presented as queries to
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <span><strong class="command">dig</strong></span> using the command-line interface.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Do reverse IPv6 lookups using the obsolete RFC1886 IP6.INT
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin domain, which is no longer in use. Obsolete bit string
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin label queries (RFC2874) are not attempted.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-k <em class="replaceable"><code>keyfile</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Sign queries using TSIG using a key read from the given file.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Key files can be generated using
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <span class="citerefentry"><span class="refentrytitle">tsig-keygen</span>(8)</span>.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin When using TSIG authentication with <span><strong class="command">dig</strong></span>,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin the name server that is queried needs to know the key and
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin algorithm that is being used. In BIND, this is done by
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin providing appropriate <span><strong class="command">key</strong></span>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin and <span><strong class="command">server</strong></span> statements in
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Enable memory usage debugging.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-p <em class="replaceable"><code>port</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Send the query to a non-standard port on the server,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin instead of the defaut port 53. This option would be used
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin to test a name server that has been configured to listen
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin for queries on a non-standard port number.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-q <em class="replaceable"><code>name</code></em></span></dt>
34f9b3eef6fdadbda0a846aa4d68691ac40eace5Roland Mainz The domain name to query. This is useful to distinguish
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin the <em class="parameter"><code>name</code></em> from other arguments.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-t <em class="replaceable"><code>type</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin The resource record type to query. It can be any valid query type
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin supported in BIND 9. The default query type is "A", unless the
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="option">-x</code> option is supplied to indicate a reverse lookup.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin A zone transfer can be requested by specifying a type of AXFR. When
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin an incremental zone transfer (IXFR) is required, set the
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <em class="parameter"><code>type</code></em> to <code class="literal">ixfr=N</code>.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin The incremental zone transfer will contain the changes
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin made to the zone since the serial number in the zone's SOA
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin record was
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Print the version number and exit.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-x <em class="replaceable"><code>addr</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Simplified reverse lookups, for mapping addresses to
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin names. The <em class="parameter"><code>addr</code></em> is an IPv4 address
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin in dotted-decimal notation, or a colon-delimited IPv6
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin address. When the <code class="option">-x</code> is used, there is no
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin need to provide
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin the <em class="parameter"><code>name</code></em>, <em class="parameter"><code>class</code></em>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin arguments. <span><strong class="command">dig</strong></span> automatically performs a
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin lookup for a name like
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="literal">94.2.0.192.in-addr.arpa</code> and sets the
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin query type and class to PTR and IN respectively. IPv6
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin addresses are looked up using nibble format under the
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin IP6.ARPA domain (but see also the <code class="option">-i</code>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin<dt><span class="term">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]keyname:secret</code></em></span></dt>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Sign queries using TSIG with the given authentication key.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <em class="parameter"><code>keyname</code></em> is the name of the key, and
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <em class="parameter"><code>secret</code></em> is the base64 encoded shared secret.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <em class="parameter"><code>hmac</code></em> is the name of the key algorithm;
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin valid choices are <code class="literal">hmac-md5</code>,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="literal">hmac-sha1</code>, <code class="literal">hmac-sha224</code>,
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="literal">hmac-sha256</code>, <code class="literal">hmac-sha384</code>, or
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <code class="literal">hmac-sha512</code>. If <em class="parameter"><code>hmac</code></em>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin is not specified, the default is <code class="literal">hmac-md5</code>.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin NOTE: You should use the <code class="option">-k</code> option and
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin avoid the <code class="option">-y</code> option, because
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin with <code class="option">-y</code> the shared secret is supplied as
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin a command line argument in clear text. This may be visible
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin in the output from
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin <span class="citerefentry"><span class="refentrytitle">ps</span>(1)</span>
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin or in a history file maintained by the user's shell.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin provides a number of query options which affect
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin the way in which lookups are made and the results displayed. Some of
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin these set or reset flag bits in the query header, some determine which
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin sections of the answer get printed, and others determine the timeout
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin and retry strategies.
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin Each query option is identified by a keyword preceded by a plus sign
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin (<code class="literal">+</code>). Some keywords set or reset an
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin option. These may be preceded
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin by the string <code class="literal">no</code> to negate the meaning of
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin that keyword. Other
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin keywords assign values to options like the timeout interval. They
da2e3ebdc1edfbc5028edf1354e7dd2fa69a7968chin have the form <code class="option">+keyword=value</code>.
<dt><span class="term"><code class="option">+[no]cookie[<span class="optional">=####</span>]</code></span></dt>
e.g. "[ key id = value ]".
accepted. Setting a named flag (e.g. DO) will silently be