man.named.html revision c115370fcb34be129ad93fd61c4a4767a214eea2
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - Copyright (C) 2004-2007 Internet Systems Consortium, Inc. ("ISC")
f0aad5341752aefe5059832f6cf3abc3283c6e16Tinderbox User - Copyright (C) 2000-2003 Internet Software Consortium.
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User - Permission to use, copy, modify, and distribute this software for any
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User - purpose with or without fee is hereby granted, provided that the above
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User - copyright notice and this permission notice appear in all copies.
d6fa26d0adaec6c910115be34fe7a5a5f402c14fMark Andrews - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - PERFORMANCE OF THIS SOFTWARE.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<!-- $Id: man.named.html,v 1.53 2007/06/14 03:33:13 marka Exp $ -->
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="up" href="Bv9ARM.ch10.html" title="Manual pages">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="prev" href="man.named-checkzone.html" title="named-checkzone">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="next" href="man.rndc.html" title="rndc">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<tr><th colspan="3" align="center"><span class="application">named</span></th></tr>
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User<a accesskey="p" href="man.named-checkzone.html">Prev</a>�</td>
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User<th width="60%" align="center">Manual pages</th>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="right">�<a accesskey="n" href="man.rndc.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="man.named"></a><div class="titlepage"></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="application">named</span> — Internet domain name server</p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">named</code> [<code class="option">-4</code>] [<code class="option">-6</code>] [<code class="option">-c <em class="replaceable"><code>config-file</code></em></code>] [<code class="option">-d <em class="replaceable"><code>debug-level</code></em></code>] [<code class="option">-f</code>] [<code class="option">-g</code>] [<code class="option">-m <em class="replaceable"><code>flag</code></em></code>] [<code class="option">-n <em class="replaceable"><code>#cpus</code></em></code>] [<code class="option">-p <em class="replaceable"><code>port</code></em></code>] [<code class="option">-s</code>] [<code class="option">-t <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-u <em class="replaceable"><code>user</code></em></code>] [<code class="option">-v</code>] [<code class="option">-x <em class="replaceable"><code>cache-file</code></em></code>]</p></div>
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater<p><span><strong class="command">named</strong></span>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews is a Domain Name System (DNS) server,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews part of the BIND 9 distribution from ISC. For more
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein information on the DNS, see RFCs 1033, 1034, and 1035.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When invoked without arguments, <span><strong class="command">named</strong></span>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User read the default configuration file
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User <code class="filename">/etc/named.conf</code>, read any initial
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein data, and listen for queries.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Use IPv4 only even if the host machine is capable of IPv6.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">-4</code> and <code class="option">-6</code> are mutually
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Use IPv6 only even if the host machine is capable of IPv4.
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson <code class="option">-4</code> and <code class="option">-6</code> are mutually
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater<dt><span class="term">-c <em class="replaceable"><code>config-file</code></em></span></dt>
727f5b8846457a33d06f515a10a7e1aa849ddf18Andreas Gustafsson Use <em class="replaceable"><code>config-file</code></em> as the
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce configuration file instead of the default,
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater <code class="filename">/etc/named.conf</code>. To
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater ensure that reloading the configuration file continues
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce to work after the server has changed its working
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce directory due to to a possible
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <code class="option">directory</code> option in the configuration
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce file, <em class="replaceable"><code>config-file</code></em> should be
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce an absolute pathname.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<dt><span class="term">-d <em class="replaceable"><code>debug-level</code></em></span></dt>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User Set the daemon's debug level to <em class="replaceable"><code>debug-level</code></em>.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User Debugging traces from <span><strong class="command">named</strong></span> become
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein more verbose as the debug level increases.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Run the server in the foreground (i.e. do not daemonize).
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User Run the server in the foreground and force all logging
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater<dt><span class="term">-m <em class="replaceable"><code>flag</code></em></span></dt>
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater Turn on memory usage debugging flags. Possible flags are
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater <em class="replaceable"><code>usage</code></em>,
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater <em class="replaceable"><code>trace</code></em>,
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater <em class="replaceable"><code>record</code></em>,
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater <em class="replaceable"><code>size</code></em>, and
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater <em class="replaceable"><code>mctx</code></em>.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce These correspond to the ISC_MEM_DEBUGXXXX flags described in
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater<dt><span class="term">-n <em class="replaceable"><code>#cpus</code></em></span></dt>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Create <em class="replaceable"><code>#cpus</code></em> worker threads
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce to take advantage of multiple CPUs. If not specified,
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <span><strong class="command">named</strong></span> will try to determine the
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce number of CPUs present and create one thread per CPU.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce If it is unable to determine the number of CPUs, a
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce single worker thread will be created.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term">-p <em class="replaceable"><code>port</code></em></span></dt>
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater Listen for queries on port <em class="replaceable"><code>port</code></em>. If not
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce specified, the default is port 53.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Write memory usage statistics to <code class="filename">stdout</code> on exit.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce This option is mainly of interest to BIND 9 developers
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce and may be removed or changed in a future release.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<dt><span class="term">-t <em class="replaceable"><code>directory</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to <em class="replaceable"><code>directory</code></em> after
af40ebed6257e4ac1996144530b3de317cf4da11Tinderbox User processing the command line arguments, but before
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User reading the configuration file.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
1224c3b69b3d18f7127aa042644936af25a2d679Mark Andrews This option should be used in conjunction with the
1224c3b69b3d18f7127aa042644936af25a2d679Mark Andrews <code class="option">-u</code> option, as chrooting a process
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein running as root doesn't enhance security on most
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User systems; the way <code class="function">chroot(2)</code> is
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User defined allows a process with root privileges to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein escape a chroot jail.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-u <em class="replaceable"><code>user</code></em></span></dt>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User to <em class="replaceable"><code>user</code></em> after completing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein privileged operations, such as creating sockets that
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt listen on privileged ports.
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein On Linux, <span><strong class="command">named</strong></span> uses the kernel's
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein capability mechanism to drop all root privileges
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein except the ability to <code class="function">bind(2)</code> to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein privileged port and set process resource limits.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Unfortunately, this means that the <code class="option">-u</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein option only works when <span><strong class="command">named</strong></span> is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein later, since previous kernels did not allow privileges
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to be retained after <code class="function">setuid(2)</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Report the version number and exit.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-x <em class="replaceable"><code>cache-file</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Load data from <em class="replaceable"><code>cache-file</code></em> into the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cache of the default view.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This option must not be used. It is only of interest
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to BIND 9 developers and may be removed or changed in a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein future release.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In routine operation, signals should not be used to control
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the nameserver; <span><strong class="command">rndc</strong></span> should be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Force a reload of the server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">SIGINT, SIGTERM</span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Shut down the server.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The result of sending any other signals to the server is undefined.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The <span><strong class="command">named</strong></span> configuration file is too complex
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to describe in detail here. A complete description is provided
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="citetitle">BIND 9 Administrator Reference Manual</em>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><code class="filename">/etc/named.conf</code></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default configuration file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><code class="filename">/var/run/named.pid</code></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default process-id file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">rndc</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">lwresd</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">named.conf</span>(5)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <em class="citetitle">BIND 9 Administrator Reference Manual</em>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="corpauthor">Internet Systems Consortium</span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="man.named-checkzone.html">Prev</a>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="center"><a accesskey="u" href="Bv9ARM.ch10.html">Up</a></td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="40%" align="right">�<a accesskey="n" href="man.rndc.html">Next</a>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<span class="application">named-checkzone</span>�</td>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User<td width="40%" align="right" valign="top">�<span class="application">rndc</span>