man.named.html revision 5347c0fcb04eaea19d9f39795646239f487c6207
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt - Copyright (C) 2000-2015 Internet Systems Consortium, Inc. ("ISC")
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt - This Source Code Form is subject to the terms of the Mozilla Public
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt - License, v. 2.0. If a copy of the MPL was not distributed with this
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt - file, You can obtain one at http://mozilla.org/MPL/2.0/.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<link rel="home" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<link rel="prev" href="man.lwresd.html" title="lwresd">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<link rel="next" href="man.named.conf.html" title="named.conf">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<tr><th colspan="3" align="center"><span class="application">named</span></th></tr>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<a accesskey="p" href="man.lwresd.html">Prev</a>�</td>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<td width="20%" align="right">�<a accesskey="n" href="man.named.conf.html">Next</a>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<a name="man.named"></a><div class="titlepage"></div>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<p><span class="application">named</span> — Internet domain name server</p>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="cmdsynopsis"><p><code class="command">named</code> [<code class="option">-4</code>] [<code class="option">-6</code>] [<code class="option">-c <em class="replaceable"><code>config-file</code></em></code>] [<code class="option">-d <em class="replaceable"><code>debug-level</code></em></code>] [<code class="option">-D <em class="replaceable"><code>string</code></em></code>] [<code class="option">-E <em class="replaceable"><code>engine-name</code></em></code>] [<code class="option">-f</code>] [<code class="option">-g</code>] [<code class="option">-L <em class="replaceable"><code>logfile</code></em></code>] [<code class="option">-M <em class="replaceable"><code>option</code></em></code>] [<code class="option">-m <em class="replaceable"><code>flag</code></em></code>] [<code class="option">-n <em class="replaceable"><code>#cpus</code></em></code>] [<code class="option">-p <em class="replaceable"><code>port</code></em></code>] [<code class="option">-s</code>] [<code class="option">-S <em class="replaceable"><code>#max-socks</code></em></code>] [<code class="option">-t <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-U <em class="replaceable"><code>#listeners</code></em></code>] [<code class="option">-u <em class="replaceable"><code>user</code></em></code>] [<code class="option">-v</code>] [<code class="option">-V</code>] [<code class="option">-X <em class="replaceable"><code>lock-file</code></em></code>] [<code class="option">-x <em class="replaceable"><code>cache-file</code></em></code>]</p></div>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<p><span class="command"><strong>named</strong></span>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt is a Domain Name System (DNS) server,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt part of the BIND 9 distribution from ISC. For more
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt information on the DNS, see RFCs 1033, 1034, and 1035.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt When invoked without arguments, <span class="command"><strong>named</strong></span>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt read the default configuration file
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <code class="filename">/etc/named.conf</code>, read any initial
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt data, and listen for queries.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="variablelist"><dl class="variablelist">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Use IPv4 only even if the host machine is capable of IPv6.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <code class="option">-4</code> and <code class="option">-6</code> are mutually
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Use IPv6 only even if the host machine is capable of IPv4.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <code class="option">-4</code> and <code class="option">-6</code> are mutually
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-c <em class="replaceable"><code>config-file</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Use <em class="replaceable"><code>config-file</code></em> as the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt configuration file instead of the default,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt ensure that reloading the configuration file continues
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to work after the server has changed its working
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt directory due to to a possible
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <code class="option">directory</code> option in the configuration
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt file, <em class="replaceable"><code>config-file</code></em> should be
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt an absolute pathname.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-d <em class="replaceable"><code>debug-level</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Set the daemon's debug level to <em class="replaceable"><code>debug-level</code></em>.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Debugging traces from <span class="command"><strong>named</strong></span> become
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt more verbose as the debug level increases.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-D <em class="replaceable"><code>string</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Specifies a string that is used to identify a instance of
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="command"><strong>named</strong></span> in a process listing. The contents
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt of <em class="replaceable"><code>string</code></em> are
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt not examined.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-E <em class="replaceable"><code>engine-name</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt When applicable, specifies the hardware to use for
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt cryptographic operations, such as a secure key store used
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt for signing.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt When BIND is built with OpenSSL PKCS#11 support, this defaults
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to the string "pkcs11", which identifies an OpenSSL engine
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt that can drive a cryptographic accelerator or hardware service
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt module. When BIND is built with native PKCS#11 cryptography
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt (--enable-native-pkcs11), it defaults to the path of the PKCS#11
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt provider library specified via "--with-pkcs11".
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Run the server in the foreground (i.e. do not daemonize).
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Run the server in the foreground and force all logging
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-L <em class="replaceable"><code>logfile</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Log to the file <code class="option">logfile</code> by default
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt instead of the system log.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-M <em class="replaceable"><code>option</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Sets the default memory context options. Currently
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt the only supported option is
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <em class="replaceable"><code>external</code></em>,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt which causes the internal memory manager to be bypassed
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt in favor of system-provided memory allocation functions.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-m <em class="replaceable"><code>flag</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Turn on memory usage debugging flags. Possible flags are
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <em class="replaceable"><code>size</code></em>, and
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt These correspond to the ISC_MEM_DEBUGXXXX flags described in
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-n <em class="replaceable"><code>#cpus</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Create <em class="replaceable"><code>#cpus</code></em> worker threads
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to take advantage of multiple CPUs. If not specified,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="command"><strong>named</strong></span> will try to determine the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt number of CPUs present and create one thread per CPU.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt If it is unable to determine the number of CPUs, a
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt single worker thread will be created.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-p <em class="replaceable"><code>port</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Listen for queries on port <em class="replaceable"><code>port</code></em>. If not
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt specified, the default is port 53.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Write memory usage statistics to <code class="filename">stdout</code> on exit.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt This option is mainly of interest to BIND 9 developers
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt and may be removed or changed in a future release.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-S <em class="replaceable"><code>#max-socks</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Allow <span class="command"><strong>named</strong></span> to use up to
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <em class="replaceable"><code>#max-socks</code></em> sockets.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt The default value is 4096 on systems built with default
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt configuration options, and 21000 on systems built with
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt "configure --with-tuning=large".
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt This option should be unnecessary for the vast majority
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt The use of this option could even be harmful because the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt specified value may exceed the limitation of the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt underlying system API.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt It is therefore set only when the default configuration
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt causes exhaustion of file descriptors and the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt operational environment is known to support the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt specified number of sockets.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Note also that the actual maximum number is normally a little
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt fewer than the specified value because
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="command"><strong>named</strong></span> reserves some file descriptors
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt for its internal use.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-t <em class="replaceable"><code>directory</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to <em class="replaceable"><code>directory</code></em> after
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt processing the command line arguments, but before
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt reading the configuration file.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt This option should be used in conjunction with the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <code class="option">-u</code> option, as chrooting a process
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt running as root doesn't enhance security on most
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt systems; the way <code class="function">chroot(2)</code> is
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt defined allows a process with root privileges to
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt escape a chroot jail.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-U <em class="replaceable"><code>#listeners</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Use <em class="replaceable"><code>#listeners</code></em>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt worker threads to listen for incoming UDP packets on each
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt address. If not specified, <span class="command"><strong>named</strong></span> will
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt calculate a default value based on the number of detected
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt CPUs: 1 for 1 CPU, and the number of detected CPUs
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt minus one for machines with more than 1 CPU. This cannot
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt be increased to a value higher than the number of CPUs.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt If <code class="option">-n</code> has been set to a higher value than
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt the number of detected CPUs, then <code class="option">-U</code> may
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt be increased as high as that value, but no higher.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt On Windows, the number of UDP listeners is hardwired to 1
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt and this option has no effect.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-u <em class="replaceable"><code>user</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to <em class="replaceable"><code>user</code></em> after completing
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt privileged operations, such as creating sockets that
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt listen on privileged ports.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt On Linux, <span class="command"><strong>named</strong></span> uses the kernel's
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt capability mechanism to drop all root privileges
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt except the ability to <code class="function">bind(2)</code> to
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt privileged port and set process resource limits.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Unfortunately, this means that the <code class="option">-u</code>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt option only works when <span class="command"><strong>named</strong></span> is
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt later, since previous kernels did not allow privileges
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to be retained after <code class="function">setuid(2)</code>.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Report the version number and exit.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Report the version number and build options, and exit.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-X <em class="replaceable"><code>lock-file</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Acquire a lock on the specified file at runtime; this
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt helps to prevent duplicate <span class="command"><strong>named</strong></span> instances
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt from running simultaneously.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Use of this option overrides the <span class="command"><strong>lock-file</strong></span>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt option in <code class="filename">named.conf</code>.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt If set to <code class="literal">none</code>, the lock file check
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt is disabled.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term">-x <em class="replaceable"><code>cache-file</code></em></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Load data from <em class="replaceable"><code>cache-file</code></em> into the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt cache of the default view.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt This option must not be used. It is only of interest
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to BIND 9 developers and may be removed or changed in a
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt future release.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt In routine operation, signals should not be used to control
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt the nameserver; <span class="command"><strong>rndc</strong></span> should be used
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="variablelist"><dl class="variablelist">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Force a reload of the server.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt Shut down the server.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt The result of sending any other signals to the server is undefined.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt The <span class="command"><strong>named</strong></span> configuration file is too complex
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt to describe in detail here. A complete description is provided
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <em class="citetitle">BIND 9 Administrator Reference Manual</em>.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="command"><strong>named</strong></span> inherits the <code class="function">umask</code>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt (file creation mode mask) from the parent process. If files
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt created by <span class="command"><strong>named</strong></span>, such as journal files,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt need to have custom permissions, the <code class="function">umask</code>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt should be set explicitly in the script used to start the
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="command"><strong>named</strong></span> process.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<div class="variablelist"><dl class="variablelist">
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term"><code class="filename">/etc/named.conf</code></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt The default configuration file.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<dt><span class="term"><code class="filename">/var/run/named/named.pid</code></span></dt>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt The default process-id file.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="citerefentry"><span class="refentrytitle">named-checkconf</span>(8)</span>,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="citerefentry"><span class="refentrytitle">named-checkzone</span>(8)</span>,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="citerefentry"><span class="refentrytitle">rndc</span>(8)</span>,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="citerefentry"><span class="refentrytitle">lwresd</span>(8)</span>,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <span class="citerefentry"><span class="refentrytitle">named.conf</span>(5)</span>,
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt <em class="citetitle">BIND 9 Administrator Reference Manual</em>.
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<a accesskey="p" href="man.lwresd.html">Prev</a>�</td>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<td width="20%" align="center"><a accesskey="u" href="Bv9ARM.ch13.html">Up</a></td>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<td width="40%" align="right">�<a accesskey="n" href="man.named.conf.html">Next</a>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<td width="40%" align="right" valign="top">�<code class="filename">named.conf</code>
f2ea8c2f965be7ff4c59f805712c12d469226b7bEvan Hunt<p xmlns:db="http://docbook.org/ns/docbook" style="text-align: center;">BIND 9.11.0b2</p>