man.nsupdate.html revision 4cfb5ea3a5dd28477df37004d6345992d5f41a3f
fa9e4066f08beec538e775443c5be79dd423fcabahrens - Copyright (C) 2004-2012 Internet Systems Consortium, Inc. ("ISC")
fa9e4066f08beec538e775443c5be79dd423fcabahrens - Copyright (C) 2000-2003 Internet Software Consortium.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw - Permission to use, copy, modify, and/or distribute this software for any
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw - purpose with or without fee is hereby granted, provided that the above
fa9e4066f08beec538e775443c5be79dd423fcabahrens - copyright notice and this permission notice appear in all copies.
fa9e4066f08beec538e775443c5be79dd423fcabahrens - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
fa9e4066f08beec538e775443c5be79dd423fcabahrens - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
fa9e4066f08beec538e775443c5be79dd423fcabahrens - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
fa9e4066f08beec538e775443c5be79dd423fcabahrens - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
fa9e4066f08beec538e775443c5be79dd423fcabahrens - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
fa9e4066f08beec538e775443c5be79dd423fcabahrens - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
fa9e4066f08beec538e775443c5be79dd423fcabahrens - PERFORMANCE OF THIS SOFTWARE.
fa9e4066f08beec538e775443c5be79dd423fcabahrens<!-- $Id$ -->
fa9e4066f08beec538e775443c5be79dd423fcabahrens<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
fa9e4066f08beec538e775443c5be79dd423fcabahrens<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
fa9e4066f08beec538e775443c5be79dd423fcabahrens<link rel="up" href="Bv9ARM.ch10.html" title="Manual pages">
fa9e4066f08beec538e775443c5be79dd423fcabahrens<link rel="prev" href="man.named-journalprint.html" title="named-journalprint">
fa9e4066f08beec538e775443c5be79dd423fcabahrens<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
fa9e4066f08beec538e775443c5be79dd423fcabahrens<tr><th colspan="3" align="center"><span class="application">nsupdate</span></th></tr>
fa9e4066f08beec538e775443c5be79dd423fcabahrens<a accesskey="p" href="man.named-journalprint.html">Prev</a>�</td>
fa9e4066f08beec538e775443c5be79dd423fcabahrens<td width="20%" align="right">�<a accesskey="n" href="man.rndc.html">Next</a>
fa9e4066f08beec538e775443c5be79dd423fcabahrens<a name="man.nsupdate"></a><div class="titlepage"></div>
fa9e4066f08beec538e775443c5be79dd423fcabahrens<p><span class="application">nsupdate</span> — Dynamic DNS update utility</p>
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw<div class="cmdsynopsis"><p><code class="command">nsupdate</code> [<code class="option">-d</code>] [<code class="option">-D</code>] [[<code class="option">-g</code>] | [<code class="option">-o</code>] | [<code class="option">-l</code>] | [<code class="option">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]keyname:secret</code></em></code>] | [<code class="option">-k <em class="replaceable"><code>keyfile</code></em></code>]] [<code class="option">-t <em class="replaceable"><code>timeout</code></em></code>] [<code class="option">-u <em class="replaceable"><code>udptimeout</code></em></code>] [<code class="option">-r <em class="replaceable"><code>udpretries</code></em></code>] [<code class="option">-R <em class="replaceable"><code>randomdev</code></em></code>] [<code class="option">-v</code>] [<code class="option">-T</code>] [<code class="option">-P</code>] [filename]</p></div>
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw<p><span><strong class="command">nsupdate</strong></span>
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw is used to submit Dynamic DNS Update requests as defined in RFC 2136
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw to a name server.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw This allows resource records to be added or removed from a zone
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw without manually editing the zone file.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw A single update request can contain requests to add or remove more than
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw resource record.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw Zones that are under dynamic control via
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw or a DHCP server should not be edited by hand.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw Manual edits could
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw conflict with dynamic updates and cause data to be lost.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw The resource records that are dynamically added or removed with
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw have to be in the same zone.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw Requests are sent to the zone's master server.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw This is identified by the MNAME field of the zone's SOA record.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw option makes
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw operate in debug mode.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw This provides tracing information about the update requests that are
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw made and the replies received from the name server.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw The <code class="option">-D</code> option makes <span><strong class="command">nsupdate</strong></span>
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw report additional debugging information to <code class="option">-d</code>.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw The <code class="option">-L</code> option with an integer argument of zero or
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw higher sets the logging debug level. If zero, logging is disabled.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw Transaction signatures can be used to authenticate the Dynamic
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw DNS updates. These use the TSIG resource record type described
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw in RFC 2845 or the SIG(0) record described in RFC 2535 and
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw RFC 2931 or GSS-TSIG as described in RFC 3645. TSIG relies on
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw a shared secret that should only be known to
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw <span><strong class="command">nsupdate</strong></span> and the name server. Currently,
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw the only supported encryption algorithm for TSIG is HMAC-MD5,
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw which is defined in RFC 2104. Once other algorithms are
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw defined for TSIG, applications will need to ensure they select
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw the appropriate algorithm as well as the key when authenticating
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw each other. For instance, suitable <span class="type">key</span> and
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw <span class="type">server</span> statements would be added to
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw <code class="filename">/etc/named.conf</code> so that the name server
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw can associate the appropriate secret key and algorithm with
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw the IP address of the client application that will be using
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw TSIG authentication. SIG(0) uses public key cryptography.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw To use a SIG(0) key, the public key must be stored in a KEY
fa9e4066f08beec538e775443c5be79dd423fcabahrens record in a zone served by the name server.
fa9e4066f08beec538e775443c5be79dd423fcabahrens <span><strong class="command">nsupdate</strong></span> does not read
fa9e4066f08beec538e775443c5be79dd423fcabahrens GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode
fa9e4066f08beec538e775443c5be79dd423fcabahrens is switched on with the <code class="option">-g</code> flag. A
fa9e4066f08beec538e775443c5be79dd423fcabahrens non-standards-compliant variant of GSS-TSIG used by Windows
fa9e4066f08beec538e775443c5be79dd423fcabahrens 2000 can be switched on with the <code class="option">-o</code> flag.
fa9e4066f08beec538e775443c5be79dd423fcabahrens<p><span><strong class="command">nsupdate</strong></span>
fa9e4066f08beec538e775443c5be79dd423fcabahrens uses the <code class="option">-y</code> or <code class="option">-k</code> option
fa9e4066f08beec538e775443c5be79dd423fcabahrens to provide the shared secret needed to generate a TSIG record
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw for authenticating Dynamic DNS update requests, default type
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw HMAC-MD5. These options are mutually exclusive.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw When the <code class="option">-y</code> option is used, a signature is
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw generated from
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw [<span class="optional"><em class="parameter"><code>hmac:</code></em></span>]<em class="parameter"><code>keyname:secret.</code></em>
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw <em class="parameter"><code>keyname</code></em> is the name of the key, and
fa9e4066f08beec538e775443c5be79dd423fcabahrens <em class="parameter"><code>secret</code></em> is the base64 encoded shared secret.
fa9e4066f08beec538e775443c5be79dd423fcabahrens Use of the <code class="option">-y</code> option is discouraged because the
fa9e4066f08beec538e775443c5be79dd423fcabahrens shared secret is supplied as a command line argument in clear text.
fa9e4066f08beec538e775443c5be79dd423fcabahrens This may be visible in the output from
fa9e4066f08beec538e775443c5be79dd423fcabahrens <span class="citerefentry"><span class="refentrytitle">ps</span>(1)</span>
fa9e4066f08beec538e775443c5be79dd423fcabahrens or in a history file maintained by the user's shell.
fa9e4066f08beec538e775443c5be79dd423fcabahrens <code class="option">-k</code> option, <span><strong class="command">nsupdate</strong></span> reads
fa9e4066f08beec538e775443c5be79dd423fcabahrens the shared secret from the file <em class="parameter"><code>keyfile</code></em>.
fa9e4066f08beec538e775443c5be79dd423fcabahrens Keyfiles may be in two formats: a single file containing
fa9e4066f08beec538e775443c5be79dd423fcabahrens a <code class="filename">named.conf</code>-format <span><strong class="command">key</strong></span>
fa9e4066f08beec538e775443c5be79dd423fcabahrens statement, which may be generated automatically by
fa9e4066f08beec538e775443c5be79dd423fcabahrens <span><strong class="command">ddns-confgen</strong></span>, or a pair of files whose names are
fa9e4066f08beec538e775443c5be79dd423fcabahrens of the format <code class="filename">K{name}.+157.+{random}.key</code> and
fa9e4066f08beec538e775443c5be79dd423fcabahrens <code class="filename">K{name}.+157.+{random}.private</code>, which can be
fa9e4066f08beec538e775443c5be79dd423fcabahrens generated by <span><strong class="command">dnssec-keygen</strong></span>.
fa9e4066f08beec538e775443c5be79dd423fcabahrens The <code class="option">-k</code> may also be used to specify a SIG(0) key used
fa9e4066f08beec538e775443c5be79dd423fcabahrens to authenticate Dynamic DNS update requests. In this case, the key
fa9e4066f08beec538e775443c5be79dd423fcabahrens specified is not an HMAC-MD5 key.
fa9e4066f08beec538e775443c5be79dd423fcabahrens <span><strong class="command">nsupdate</strong></span> can be run in a local-host only mode
fa9e4066f08beec538e775443c5be79dd423fcabahrens using the <code class="option">-l</code> flag. This sets the server address to
fa9e4066f08beec538e775443c5be79dd423fcabahrens localhost (disabling the <span><strong class="command">server</strong></span> so that the server
fa9e4066f08beec538e775443c5be79dd423fcabahrens address cannot be overridden). Connections to the local server will
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw use a TSIG key found in <code class="filename">/var/run/named/session.key</code>,
fa9e4066f08beec538e775443c5be79dd423fcabahrens which is automatically generated by <span><strong class="command">named</strong></span> if any
fa9e4066f08beec538e775443c5be79dd423fcabahrens local master zone has set <span><strong class="command">update-policy</strong></span> to
fa9e4066f08beec538e775443c5be79dd423fcabahrens <span><strong class="command">local</strong></span>. The location of this key file can be
fa9e4066f08beec538e775443c5be79dd423fcabahrens overridden with the <code class="option">-k</code> option.
fa9e4066f08beec538e775443c5be79dd423fcabahrens By default, <span><strong class="command">nsupdate</strong></span>
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw uses UDP to send update requests to the name server unless they are too
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw large to fit in a UDP request in which case TCP will be used.
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw option makes
da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0amw use a TCP connection.
fa9e4066f08beec538e775443c5be79dd423fcabahrens This may be preferable when a batch of update requests is made.
<em class="parameter"><code>keyname</code></em> <em class="parameter"><code>keysecret</code></em> pair.
<span><strong class="command">[<span class="optional">update</span>] del[<span class="optional">ete</span>]</strong></span>
> update delete oldhost.example.com A
> update add newhost.example.com 86400 A 172.16.1.1
> prereq nxdomain nickname.example.com