man.nsupdate.html revision b4556ecdbc3cad55e1c85ce32b73b7bcd39e43dc
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - Copyright (C) 2000-2003 Internet Software Consortium.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - Permission to use, copy, modify, and/or distribute this software for any
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - purpose with or without fee is hereby granted, provided that the above
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - copyright notice and this permission notice appear in all copies.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington - PERFORMANCE OF THIS SOFTWARE.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<link rel="up" href="Bv9ARM.ch13.html" title="Manual pages">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<link rel="prev" href="man.named-rrchecker.html" title="named-rrchecker">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<link rel="next" href="man.rndc.html" title="rndc">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<table width="100%" summary="Navigation header">
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<tr><th colspan="3" align="center"><span class="application">nsupdate</span></th></tr>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<a accesskey="p" href="man.named-rrchecker.html">Prev</a>�</td>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<th width="60%" align="center">Manual pages</th>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<td width="20%" align="right">�<a accesskey="n" href="man.rndc.html">Next</a>
5db031755ab3a8762e266f96f5d74832548d330bPhill Cunnington<a name="man.nsupdate"></a><div class="titlepage"></div>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<p><span class="application">nsupdate</span> — Dynamic DNS update utility</p>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<div class="cmdsynopsis"><p><code class="command">nsupdate</code> [<code class="option">-d</code>] [<code class="option">-D</code>] [<code class="option">-L <em class="replaceable"><code>level</code></em></code>] [[<code class="option">-g</code>] | [<code class="option">-o</code>] | [<code class="option">-l</code>] | [<code class="option">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]keyname:secret</code></em></code>] | [<code class="option">-k <em class="replaceable"><code>keyfile</code></em></code>]] [<code class="option">-t <em class="replaceable"><code>timeout</code></em></code>] [<code class="option">-u <em class="replaceable"><code>udptimeout</code></em></code>] [<code class="option">-r <em class="replaceable"><code>udpretries</code></em></code>] [<code class="option">-R <em class="replaceable"><code>randomdev</code></em></code>] [<code class="option">-v</code>] [<code class="option">-T</code>] [<code class="option">-P</code>] [<code class="option">-V</code>] [filename]</p></div>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<a name="id2655537"></a><h2>DESCRIPTION</h2>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<p><span><strong class="command">nsupdate</strong></span>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington is used to submit Dynamic DNS Update requests as defined in RFC 2136
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington to a name server.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington This allows resource records to be added or removed from a zone
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington without manually editing the zone file.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington A single update request can contain requests to add or remove more than
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington resource record.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Zones that are under dynamic control via
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington <span><strong class="command">nsupdate</strong></span>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington or a DHCP server should not be edited by hand.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Manual edits could
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington conflict with dynamic updates and cause data to be lost.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington The resource records that are dynamically added or removed with
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington <span><strong class="command">nsupdate</strong></span>
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington have to be in the same zone.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington Requests are sent to the zone's master server.
0b159dcb466aaea46a0d9b20aae6d19fc308ac6cPhill Cunnington This is identified by the MNAME field of the zone's SOA record.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington Transaction signatures can be used to authenticate the Dynamic
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington DNS updates. These use the TSIG resource record type described
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington in RFC 2845 or the SIG(0) record described in RFC 2535 and
0b159dcb466aaea46a0d9b20aae6d19fc308ac6cPhill Cunnington RFC 2931 or GSS-TSIG as described in RFC 3645.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington TSIG relies on
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington a shared secret that should only be known to
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington <span><strong class="command">nsupdate</strong></span> and the name server.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington For instance, suitable <span class="type">key</span> and
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington <span class="type">server</span> statements would be added to
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington <code class="filename">/etc/named.conf</code> so that the name server
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington can associate the appropriate secret key and algorithm with
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington the IP address of the client application that will be using
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington TSIG authentication. You can use <span><strong class="command">ddns-confgen</strong></span>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington to generate suitable configuration fragments.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington <span><strong class="command">nsupdate</strong></span>
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington uses the <code class="option">-y</code> or <code class="option">-k</code> options
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington to provide the TSIG shared secret. These options are mutually exclusive.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington SIG(0) uses public key cryptography.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington To use a SIG(0) key, the public key must be stored in a KEY
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington record in a zone served by the name server.
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington GSS-TSIG uses Kerberos credentials. Standard GSS-TSIG mode
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington is switched on with the <code class="option">-g</code> flag. A
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington non-standards-compliant variant of GSS-TSIG used by Windows
4aa2bc2779a92691d5c66593fdbdaa96ed663e6fPhill Cunnington 2000 can be switched on with the <code class="option">-o</code> flag.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Debug mode. This provides tracing information about the
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington update requests that are made and the replies received
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington from the name server.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Extra debug mode.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<dt><span class="term">-k <em class="replaceable"><code>keyfile</code></em></span></dt>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington The file containing the TSIG authentication key.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Keyfiles may be in two formats: a single file containing
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington a <code class="filename">named.conf</code>-format <span><strong class="command">key</strong></span>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington statement, which may be generated automatically by
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington <span><strong class="command">ddns-confgen</strong></span>, or a pair of files whose names are
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington of the format <code class="filename">K{name}.+157.+{random}.key</code> and
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington <code class="filename">K{name}.+157.+{random}.private</code>, which can be
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington generated by <span><strong class="command">dnssec-keygen</strong></span>.
5db031755ab3a8762e266f96f5d74832548d330bPhill Cunnington The <code class="option">-k</code> may also be used to specify a SIG(0) key used
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington to authenticate Dynamic DNS update requests. In this case, the key
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington specified is not an HMAC-MD5 key.
5073b0cc5b527bee3ef575a3414074d4b8093cc0Phill Cunnington Local-host only mode. This sets the server address to
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington localhost (disabling the <span><strong class="command">server</strong></span> so that the server
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington address cannot be overridden). Connections to the local server will
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington use a TSIG key found in <code class="filename">/var/run/named/session.key</code>,
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington which is automatically generated by <span><strong class="command">named</strong></span> if any
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington local master zone has set <span><strong class="command">update-policy</strong></span> to
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington <span><strong class="command">local</strong></span>. The location of this key file can be
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington overridden with the <code class="option">-k</code> option.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<dt><span class="term">-L <em class="replaceable"><code>level</code></em></span></dt>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Set the logging debug level. If zero, logging is disabled.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<dt><span class="term">-p <em class="replaceable"><code>port</code></em></span></dt>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Set the port to use for connections to a name server. The
310700e5800f2c38b03d42e7dcaa4a7b0a16af26James Phillpotts default is 53.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington Print the list of private BIND-specific resource record
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington types whose format is understood
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington by <span><strong class="command">nsupdate</strong></span>. See also
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<dt><span class="term">-r <em class="replaceable"><code>udpretries</code></em></span></dt>
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington The number of UDP retries. The default is 3. If zero, only
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington one update request will be made.
a6bf4d9e39eae70c6b74d0d91d35704662c84ff7Phill Cunnington<dt><span class="term">-R <em class="replaceable"><code>randomdev</code></em></span></dt>
<dt><span class="term">-y <em class="replaceable"><code>[<span class="optional">hmac:</span>]keyname:secret</code></em></span></dt>
<em class="parameter"><code>keyname</code></em> <em class="parameter"><code>secret</code></em> pair.
<span><strong class="command">[<span class="optional">update</span>] del[<span class="optional">ete</span>]</strong></span>
> update delete oldhost.example.com A
> update add newhost.example.com 86400 A 172.16.1.1
> prereq nxdomain nickname.example.com