man.dig.html revision e285c11870c6263cd79b418e104c7eb3e2d96952
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User - Copyright (C) 2000-2003 Internet Software Consortium.
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User - Permission to use, copy, modify, and/or distribute this software for any
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User - purpose with or without fee is hereby granted, provided that the above
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User - copyright notice and this permission notice appear in all copies.
d6fa26d0adaec6c910115be34fe7a5a5f402c14fMark Andrews - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User - PERFORMANCE OF THIS SOFTWARE.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<link rel="home" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<link rel="prev" href="Bv9ARM.ch13.html" title="Manual pages">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="next" href="man.host.html" title="host">
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<table width="100%" summary="Navigation header">
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<tr><th colspan="3" align="center">dig</th></tr>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<a accesskey="p" href="Bv9ARM.ch13.html">Prev</a>�</td>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<th width="60%" align="center">Manual pages</th>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="right">�<a accesskey="n" href="man.host.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="man.dig"></a><div class="titlepage"></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">dig</code> [@server] [<code class="option">-b <em class="replaceable"><code>address</code></em></code>] [<code class="option">-c <em class="replaceable"><code>class</code></em></code>] [<code class="option">-f <em class="replaceable"><code>filename</code></em></code>] [<code class="option">-k <em class="replaceable"><code>filename</code></em></code>] [<code class="option">-m</code>] [<code class="option">-p <em class="replaceable"><code>port#</code></em></code>] [<code class="option">-q <em class="replaceable"><code>name</code></em></code>] [<code class="option">-t <em class="replaceable"><code>type</code></em></code>] [<code class="option">-v</code>] [<code class="option">-x <em class="replaceable"><code>addr</code></em></code>] [<code class="option">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]name:key</code></em></code>] [<code class="option">-4</code>] [<code class="option">-6</code>] [name] [type] [class] [queryopt...]</p></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">dig</code> [<code class="option">-h</code>]</p></div>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<div class="cmdsynopsis"><p><code class="command">dig</code> [global-queryopt...] [query...]</p></div>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<p><span class="command"><strong>dig</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (domain information groper) is a flexible tool
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for interrogating DNS name servers. It performs DNS lookups and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein displays the answers that are returned from the name server(s) that
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User were queried. Most DNS administrators use <span class="command"><strong>dig</strong></span> to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein troubleshoot DNS problems because of its flexibility, ease of use and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein clarity of output. Other lookup tools tend to have less functionality
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein than <span class="command"><strong>dig</strong></span>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Although <span class="command"><strong>dig</strong></span> is normally used with
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User arguments, it also has a batch mode of operation for reading lookup
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User requests from a file. A brief summary of its command-line arguments
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and options is printed when the <code class="option">-h</code> option is given.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Unlike earlier versions, the BIND 9 implementation of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>dig</strong></span> allows multiple lookups to be issued
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein command line.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Unless it is told to query a specific name server,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>dig</strong></span> will try each of the servers listed in
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <code class="filename">/etc/resolv.conf</code>. If no usable server addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are found, <span class="command"><strong>dig</strong></span> will send the query to the local
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When no command line arguments or options are given,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>dig</strong></span> will perform an NS query for "." (the root).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein It is possible to set per-user defaults for <span class="command"><strong>dig</strong></span> via
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">${HOME}/.digrc</code>. This file is read and
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User any options in it
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User are applied before the command line arguments.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The IN and CH class names overlap with the IN and CH top level
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein domain names. Either use the <code class="option">-t</code> and
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <code class="option">-c</code> options to specify the type and class,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein use the <code class="option">-q</code> the specify the domain name, or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein use "IN." and "CH." when looking up these top level domains.
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User A typical invocation of <span class="command"><strong>dig</strong></span> looks like:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<pre class="programlisting"> dig @server name type </pre>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<div class="variablelist"><dl class="variablelist">
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User<dt><span class="term"><code class="constant">server</code></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is the name or IP address of the name server to query. This
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein can be an IPv4 address in dotted-decimal notation or an IPv6
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User address in colon-delimited notation. When the supplied
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="parameter"><code>server</code></em> argument is a hostname,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>dig</strong></span> resolves that name before querying
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that name server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein If no <em class="parameter"><code>server</code></em> argument is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein provided, <span class="command"><strong>dig</strong></span> consults
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <code class="filename">/etc/resolv.conf</code>; if an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein address is found there, it queries the name server at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein that address. If either of the <code class="option">-4</code> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">-6</code> options are in use, then
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User only addresses for the corresponding transport
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein will be tried. If no usable addresses are found,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>dig</strong></span> will send the query to the
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User local host. The reply from the name server that
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User responds is displayed.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><code class="constant">name</code></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is the name of the resource record that is to be looked up.
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="term"><code class="constant">type</code></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein indicates what type of query is required —
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ANY, A, MX, SIG, etc.
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <em class="parameter"><code>type</code></em> can be any valid query
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="parameter"><code>type</code></em> argument is supplied,
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <span class="command"><strong>dig</strong></span> will perform a lookup for an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="variablelist"><dl class="variablelist">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Use IPv4 only.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User Use IPv6 only.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<dt><span class="term">-b <em class="replaceable"><code>address[<span class="optional">#port</span>]</code></em></span></dt>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User Set the source IP address of the query.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User The <em class="parameter"><code>address</code></em> must be a valid address on
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein one of the host's network interfaces, or "0.0.0.0" or "::". An
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein optional port may be specified by appending "#<port>"
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-c <em class="replaceable"><code>class</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Set the query class. The
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein default <em class="parameter"><code>class</code></em> is IN; other classes
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein are HS for Hesiod records or CH for Chaosnet records.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-f <em class="replaceable"><code>file</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Batch mode: <span class="command"><strong>dig</strong></span> reads a list of lookup
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein requests to process from the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein given <em class="parameter"><code>file</code></em>. Each line in the file
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein should be organized in the same way they would be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein presented as queries to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>dig</strong></span> using the command-line interface.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Do reverse IPv6 lookups using the obsolete RFC1886 IP6.INT
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein domain, which is no longer in use. Obsolete bit string
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein label queries (RFC2874) are not attempted.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-k <em class="replaceable"><code>keyfile</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Sign queries using TSIG using a key read from the given file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Key files can be generated using
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User <span class="citerefentry"><span class="refentrytitle">tsig-keygen</span>(8)</span>.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson When using TSIG authentication with <span class="command"><strong>dig</strong></span>,
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson the name server that is queried needs to know the key and
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson algorithm that is being used. In BIND, this is done by
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson providing appropriate <span class="command"><strong>key</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <span class="command"><strong>server</strong></span> statements in
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson Enable memory usage debugging.
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson<dt><span class="term">-p <em class="replaceable"><code>port</code></em></span></dt>
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson Send the query to a non-standard port on the server,
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson instead of the default port 53. This option would be used
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson to test a name server that has been configured to listen
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein for queries on a non-standard port number.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-q <em class="replaceable"><code>name</code></em></span></dt>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User The domain name to query. This is useful to distinguish
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User the <em class="parameter"><code>name</code></em> from other arguments.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-t <em class="replaceable"><code>type</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The resource record type to query. It can be any valid query type
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein supported in BIND 9. The default query type is "A", unless the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">-x</code> option is supplied to indicate a reverse lookup.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A zone transfer can be requested by specifying a type of AXFR. When
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein an incremental zone transfer (IXFR) is required, set the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="parameter"><code>type</code></em> to <code class="literal">ixfr=N</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The incremental zone transfer will contain the changes
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User made to the zone since the serial number in the zone's SOA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Print the version number and exit.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-x <em class="replaceable"><code>addr</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Simplified reverse lookups, for mapping addresses to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein names. The <em class="parameter"><code>addr</code></em> is an IPv4 address
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in dotted-decimal notation, or a colon-delimited IPv6
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User address. When the <code class="option">-x</code> is used, there is no
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User need to provide
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <em class="parameter"><code>name</code></em>, <em class="parameter"><code>class</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and <em class="parameter"><code>type</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein arguments. <span class="command"><strong>dig</strong></span> automatically performs a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lookup for a name like
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">94.2.0.192.in-addr.arpa</code> and sets the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein query type and class to PTR and IN respectively. IPv6
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein addresses are looked up using nibble format under the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein IP6.ARPA domain (but see also the <code class="option">-i</code>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<dt><span class="term">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]keyname:secret</code></em></span></dt>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User Sign queries using TSIG with the given authentication key.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="parameter"><code>keyname</code></em> is the name of the key, and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="parameter"><code>secret</code></em> is the base64 encoded shared secret.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="parameter"><code>hmac</code></em> is the name of the key algorithm;
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein valid choices are <code class="literal">hmac-md5</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">hmac-sha1</code>, <code class="literal">hmac-sha224</code>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">hmac-sha256</code>, <code class="literal">hmac-sha384</code>, or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="literal">hmac-sha512</code>. If <em class="parameter"><code>hmac</code></em>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is not specified, the default is <code class="literal">hmac-md5</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein NOTE: You should use the <code class="option">-k</code> option and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein avoid the <code class="option">-y</code> option, because
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein with <code class="option">-y</code> the shared secret is supplied as
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a command line argument in clear text. This may be visible
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in the output from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">ps</span>(1)</span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or in a history file maintained by the user's shell.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id-1.14.2.10"></a><h2>QUERY OPTIONS</h2>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="command"><strong>dig</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein provides a number of query options which affect
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the way in which lookups are made and the results displayed. Some of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein these set or reset flag bits in the query header, some determine which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sections of the answer get printed, and others determine the timeout
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and retry strategies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Each query option is identified by a keyword preceded by a plus sign
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (<code class="literal">+</code>). Some keywords set or reset an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option. These may be preceded
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User by the string <code class="literal">no</code> to negate the meaning of
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User that keyword. Other
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User keywords assign values to options like the timeout interval. They
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User have the form <code class="option">+keyword=value</code>.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User Keywords may be abbreviated, provided the abbreviation is
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User unambiguous; for example, <code class="literal">+cd</code> is equivalent
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The query options are:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="variablelist"><dl class="variablelist">
<dt><span class="term"><code class="option">+[no]cookie[<span class="optional">=####</span>]</code></span></dt>
e.g. "[ key id = value ]".
accepted. Setting a named flag (e.g. DO) will silently be