man.named.html revision c60ee6edf129596fa04db86c6865d75b5a412598
11e9368a226272085c337e9e74b79808c16fbdbaTinderbox User - Copyright (C) 2004-2014 Internet Systems Consortium, Inc. ("ISC")
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews - Copyright (C) 2000-2003 Internet Software Consortium.
4a14ce5ba00ab7bc55c99ffdcf59c7a4ab902721Automatic Updater - Permission to use, copy, modify, and/or distribute this software for any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - purpose with or without fee is hereby granted, provided that the above
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - copyright notice and this permission notice appear in all copies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - PERFORMANCE OF THIS SOFTWARE.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<!-- $Id$ -->
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="up" href="Bv9ARM.ch10.html" title="Manual pages">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="prev" href="man.named-checkzone.html" title="named-checkzone">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<link rel="next" href="man.named-journalprint.html" title="named-journalprint">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews<table width="100%" summary="Navigation header">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<tr><th colspan="3" align="center"><span class="application">named</span></th></tr>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="man.named-checkzone.html">Prev</a>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="right">�<a accesskey="n" href="man.named-journalprint.html">Next</a>
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User<a name="man.named"></a><div class="titlepage"></div>
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User<p><span class="application">named</span> — Internet domain name server</p>
af40ebed6257e4ac1996144530b3de317cf4da11Tinderbox User<div class="cmdsynopsis"><p><code class="command">named</code> [<code class="option">-4</code>] [<code class="option">-6</code>] [<code class="option">-c <em class="replaceable"><code>config-file</code></em></code>] [<code class="option">-d <em class="replaceable"><code>debug-level</code></em></code>] [<code class="option">-D <em class="replaceable"><code>string</code></em></code>] [<code class="option">-E <em class="replaceable"><code>engine-name</code></em></code>] [<code class="option">-f</code>] [<code class="option">-g</code>] [<code class="option">-L <em class="replaceable"><code>logfile</code></em></code>] [<code class="option">-m <em class="replaceable"><code>flag</code></em></code>] [<code class="option">-n <em class="replaceable"><code>#cpus</code></em></code>] [<code class="option">-p <em class="replaceable"><code>port</code></em></code>] [<code class="option">-s</code>] [<code class="option">-S <em class="replaceable"><code>#max-socks</code></em></code>] [<code class="option">-t <em class="replaceable"><code>directory</code></em></code>] [<code class="option">-U <em class="replaceable"><code>#listeners</code></em></code>] [<code class="option">-u <em class="replaceable"><code>user</code></em></code>] [<code class="option">-v</code>] [<code class="option">-V</code>] [<code class="option">-x <em class="replaceable"><code>cache-file</code></em></code>]</p></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span><strong class="command">named</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is a Domain Name System (DNS) server,
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User part of the BIND 9 distribution from ISC. For more
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein information on the DNS, see RFCs 1033, 1034, and 1035.
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater When invoked without arguments, <span><strong class="command">named</strong></span>
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt read the default configuration file
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <code class="filename">/etc/named.conf</code>, read any initial
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt data, and listen for queries.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User Use IPv4 only even if the host machine is capable of IPv6.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">-4</code> and <code class="option">-6</code> are mutually
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User Use IPv6 only even if the host machine is capable of IPv4.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <code class="option">-4</code> and <code class="option">-6</code> are mutually
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<dt><span class="term">-c <em class="replaceable"><code>config-file</code></em></span></dt>
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User Use <em class="replaceable"><code>config-file</code></em> as the
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User configuration file instead of the default,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="filename">/etc/named.conf</code>. To
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ensure that reloading the configuration file continues
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater to work after the server has changed its working
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater directory due to to a possible
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater <code class="option">directory</code> option in the configuration
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews file, <em class="replaceable"><code>config-file</code></em> should be
77dccf2a5d9327d16b4374a135cdb99bdd48620eAutomatic Updater an absolute pathname.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<dt><span class="term">-d <em class="replaceable"><code>debug-level</code></em></span></dt>
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater Set the daemon's debug level to <em class="replaceable"><code>debug-level</code></em>.
ac93437301f55ed69bf85883a497a75598c628f9Automatic Updater Debugging traces from <span><strong class="command">named</strong></span> become
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews more verbose as the debug level increases.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term">-D <em class="replaceable"><code>string</code></em></span></dt>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce Specifies a string that is used to identify a instance of
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce <span><strong class="command">named</strong></span> in a process listing. The contents
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce of <em class="replaceable"><code>string</code></em> are
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce not examined.
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce<dt><span class="term">-E <em class="replaceable"><code>engine-name</code></em></span></dt>
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce When applicable, specifies the hardware to use for
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce cryptographic operations, such as a secure key store used
f293a69bcd1c1dd7bdac8f4102fc2398b9e475c8Eric Luce for signing.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User When BIND is built with OpenSSL PKCS#11 support, this defaults
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User to the string "pkcs11", which identifies an OpenSSL engine
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User that can drive a cryptographic accelerator or hardware service
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User module. When BIND is built with native PKCS#11 cryptography
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User (--enable-native-pkcs11), it defaults to the path of the PKCS#11
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User provider library specified via "--with-pkcs11".
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Run the server in the foreground (i.e. do not daemonize).
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Run the server in the foreground and force all logging
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<dt><span class="term">-L <em class="replaceable"><code>logfile</code></em></span></dt>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Log to the file <code class="option">logfile</code> by default
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User instead of the system log.
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt<dt><span class="term">-m <em class="replaceable"><code>flag</code></em></span></dt>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Turn on memory usage debugging flags. Possible flags are
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <em class="replaceable"><code>usage</code></em>,
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <em class="replaceable"><code>trace</code></em>,
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <em class="replaceable"><code>record</code></em>,
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <em class="replaceable"><code>size</code></em>, and
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User <em class="replaceable"><code>mctx</code></em>.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User These correspond to the ISC_MEM_DEBUGXXXX flags described in
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <code class="filename"><isc/mem.h></code>.
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt<dt><span class="term">-n <em class="replaceable"><code>#cpus</code></em></span></dt>
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User Create <em class="replaceable"><code>#cpus</code></em> worker threads
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User to take advantage of multiple CPUs. If not specified,
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <span><strong class="command">named</strong></span> will try to determine the
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User number of CPUs present and create one thread per CPU.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User If it is unable to determine the number of CPUs, a
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User single worker thread will be created.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User<dt><span class="term">-p <em class="replaceable"><code>port</code></em></span></dt>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Listen for queries on port <em class="replaceable"><code>port</code></em>. If not
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User specified, the default is port 53.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Write memory usage statistics to <code class="filename">stdout</code> on exit.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User This option is mainly of interest to BIND 9 developers
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User and may be removed or changed in a future release.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<dt><span class="term">-S <em class="replaceable"><code>#max-socks</code></em></span></dt>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Allow <span><strong class="command">named</strong></span> to use up to
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <em class="replaceable"><code>#max-socks</code></em> sockets.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User The default value is 4096 on systems built with default
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User configuration options, and 21000 on systems built with
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User "configure --with-tuning=large".
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User This option should be unnecessary for the vast majority
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User The use of this option could even be harmful because the
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User specified value may exceed the limitation of the
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User underlying system API.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User It is therefore set only when the default configuration
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User causes exhaustion of file descriptors and the
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt operational environment is known to support the
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User specified number of sockets.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User Note also that the actual maximum number is normally a little
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User fewer than the specified value because
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User <span><strong class="command">named</strong></span> reserves some file descriptors
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User for its internal use.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<dt><span class="term">-t <em class="replaceable"><code>directory</code></em></span></dt>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User to <em class="replaceable"><code>directory</code></em> after
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User processing the command line arguments, but before
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User reading the configuration file.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User This option should be used in conjunction with the
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt <code class="option">-u</code> option, as chrooting a process
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User running as root doesn't enhance security on most
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User systems; the way <code class="function">chroot(2)</code> is
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User defined allows a process with root privileges to
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User escape a chroot jail.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<dt><span class="term">-U <em class="replaceable"><code>#listeners</code></em></span></dt>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User Use <em class="replaceable"><code>#listeners</code></em>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User worker threads to listen for incoming UDP packets on each
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User address. If not specified, <span><strong class="command">named</strong></span> will
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User calculate a default value based on the number of detected
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User CPUs: 1 for 1 CPU, 2 for 2-4 CPUs, and the number of
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User detected CPUs divided by 2 for values higher than 4.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User If <code class="option">-n</code> has been set to a higher value than
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User the number of detected CPUs, then <code class="option">-U</code> may
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User be increased as high as that value, but no higher.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<dt><span class="term">-u <em class="replaceable"><code>user</code></em></span></dt>
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User to <em class="replaceable"><code>user</code></em> after completing
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User privileged operations, such as creating sockets that
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User listen on privileged ports.
aa1905addf2f33d90aa020080e4e77a8651e829aTinderbox User<div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User On Linux, <span><strong class="command">named</strong></span> uses the kernel's
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User capability mechanism to drop all root privileges
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein except the ability to <code class="function">bind(2)</code> to
4abdfc917e6635a7c81d1f931a0c79227e72d025Mark Andrews privileged port and set process resource limits.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User Unfortunately, this means that the <code class="option">-u</code>
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater option only works when <span><strong class="command">named</strong></span> is
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt later, since previous kernels did not allow privileges
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater to be retained after <code class="function">setuid(2)</code>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Report the version number and exit.
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt Report the version number and build options, and exit.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-x <em class="replaceable"><code>cache-file</code></em></span></dt>
9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdffAutomatic Updater Load data from <em class="replaceable"><code>cache-file</code></em> into the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cache of the default view.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="warning" style="margin-left: 0.5in; margin-right: 0.5in;">
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt This option must not be used. It is only of interest
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to BIND 9 developers and may be removed or changed in a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein future release.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein In routine operation, signals should not be used to control
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User the nameserver; <span><strong class="command">rndc</strong></span> should be used
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Force a reload of the server.
47012ae6dbf18a2503d7b33c1c9583dc38625cb7Mark Andrews<dt><span class="term">SIGINT, SIGTERM</span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Shut down the server.
af40ebed6257e4ac1996144530b3de317cf4da11Tinderbox User The result of sending any other signals to the server is undefined.
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt The <span><strong class="command">named</strong></span> configuration file is too complex
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to describe in detail here. A complete description is provided
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrews <em class="citetitle">BIND 9 Administrator Reference Manual</em>.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User <span><strong class="command">named</strong></span> inherits the <code class="function">umask</code>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews (file creation mode mask) from the parent process. If files
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt created by <span><strong class="command">named</strong></span>, such as journal files,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews need to have custom permissions, the <code class="function">umask</code>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews should be set explicitly in the script used to start the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews <span><strong class="command">named</strong></span> process.
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User<dt><span class="term"><code class="filename">/etc/named.conf</code></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default configuration file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term"><code class="filename">/var/run/named/named.pid</code></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The default process-id file.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">named-checkconf</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">named-checkzone</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">rndc</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">lwresd</span>(8)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">named.conf</span>(5)</span>,
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User <em class="citetitle">BIND 9 Administrator Reference Manual</em>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="corpauthor">Internet Systems Consortium</span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a accesskey="p" href="man.named-checkzone.html">Prev</a>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="center"><a accesskey="u" href="Bv9ARM.ch10.html">Up</a></td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="40%" align="right">�<a accesskey="n" href="man.named-journalprint.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span class="application">named-checkzone</span>�</td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<td width="40%" align="right" valign="top">�<span class="application">named-journalprint</span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p style="text-align: center;">BIND 9.11.0pre-alpha</p>