]> git.ipfire.org Git - thirdparty/systemd.git/blame - man/resolvectl.xml
Merge pull request #18007 from fw-strlen/ipv6_masq_and_dnat
[thirdparty/systemd.git] / man / resolvectl.xml
CommitLineData
624993ac 1<?xml version='1.0'?>
3a54a157
ZJS
2<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
db9ecf05 4<!-- SPDX-License-Identifier: LGPL-2.1-or-later -->
624993ac 5
b69f810c 6<refentry id="resolvectl" conditional='ENABLE_RESOLVE'
624993ac
LP
7 xmlns:xi="http://www.w3.org/2001/XInclude">
8
9 <refentryinfo>
b69f810c 10 <title>resolvectl</title>
624993ac 11 <productname>systemd</productname>
624993ac
LP
12 </refentryinfo>
13
14 <refmeta>
b69f810c 15 <refentrytitle>resolvectl</refentrytitle>
624993ac
LP
16 <manvolnum>1</manvolnum>
17 </refmeta>
18
19 <refnamediv>
b69f810c 20 <refname>resolvectl</refname>
2eee2088
LP
21 <refname>resolvconf</refname>
22 <refpurpose>Resolve domain names, IPV4 and IPv6 addresses, DNS resource records, and services; introspect and reconfigure the DNS resolver</refpurpose>
624993ac
LP
23 </refnamediv>
24
25 <refsynopsisdiv>
26 <cmdsynopsis>
b69f810c 27 <command>resolvectl</command>
624993ac 28 <arg choice="opt" rep="repeat">OPTIONS</arg>
b69f810c
YW
29 <arg choice="req">COMMAND</arg>
30 <arg choice="opt" rep="repeat">NAME</arg>
624993ac 31 </cmdsynopsis>
624993ac
LP
32 </refsynopsisdiv>
33
34 <refsect1>
35 <title>Description</title>
36
b69f810c 37 <para><command>resolvectl</command> may be used to resolve domain names, IPv4 and IPv6 addresses, DNS resource
624993ac
LP
38 records and services with the
39 <citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>
40 resolver service. By default, the specified list of parameters will be resolved as hostnames, retrieving their IPv4
41 and IPv6 addresses. If the parameters specified are formatted as IPv4 or IPv6 operation the reverse operation is
42 done, and a hostname is retrieved for the specified addresses.</para>
43
cdfe156a
LP
44 <para>The program's output contains information about the protocol used for the look-up and on which network
45 interface the data was discovered. It also contains information on whether the information could be
46 authenticated. All data for which local DNSSEC validation succeeds is considered authenticated. Moreover all data
47 originating from local, trusted sources is also reported authenticated, including resolution of the local host
38b38500 48 name, the <literal>localhost</literal> hostname or all data from <filename>/etc/hosts</filename>.</para>
624993ac
LP
49 </refsect1>
50
b69f810c
YW
51 <refsect1>
52 <title>Commands</title>
53 <variablelist>
54
55 <varlistentry>
8eb6e6ed 56 <term><command>query</command> <replaceable>HOSTNAME|ADDRESS</replaceable>…</term>
b69f810c 57
018b642a
LP
58 <listitem><para>Resolve domain names, as well as IPv4 and IPv6 addresses. When used in conjuntion
59 with <option>--type=</option> or <option>--class=</option> (see below), resolves low-level DNS
60 resource records.</para>
61
62 <para>If a single-label domain name is specified it is searched for according to the configured
63 search domains — unless <option>--search=no</option> or
64 <option>--type=</option>/<option>--class=</option> are specified, both of which turn this logic
65 off.</para>
66
67 <para>If an international domain name is specified, it is automatically translated according to IDNA
68 rules when resolved via classic DNS — but not for look-ups via MulticastDNS or LLMNR. If
69 <option>--type=</option>/<option>--class=</option> is used IDNA translation is turned off and domain
70 names are processed as specified.</para></listitem>
b69f810c
YW
71 </varlistentry>
72
73 <varlistentry>
8eb6e6ed
ZJS
74 <term><command>service</command>
75 [[<replaceable>NAME</replaceable>] <replaceable>TYPE</replaceable>]
76 <replaceable>DOMAIN</replaceable></term>
b69f810c
YW
77
78 <listitem><para>Resolve <ulink url="https://tools.ietf.org/html/rfc6763">DNS-SD</ulink> and
79 <ulink url="https://tools.ietf.org/html/rfc2782">SRV</ulink> services, depending on the specified list of parameters.
80 If three parameters are passed the first is assumed to be the DNS-SD service name, the second the SRV service type,
81 and the third the domain to search in. In this case a full DNS-SD style SRV and TXT lookup is executed. If only two
82 parameters are specified, the first is assumed to be the SRV service type, and the second the domain to look in. In
83 this case no TXT RR is requested. Finally, if only one parameter is specified, it is assumed to be a domain name,
84 that is already prefixed with an SRV type, and an SRV lookup is done (no TXT).</para></listitem>
85 </varlistentry>
86
87 <varlistentry>
8eb6e6ed 88 <term><command>openpgp</command> <replaceable>EMAIL@DOMAIN</replaceable>…</term>
b69f810c
YW
89
90 <listitem><para>Query PGP keys stored as <ulink url="https://tools.ietf.org/html/rfc7929">OPENPGPKEY</ulink>
91 resource records. Specified e-mail addresses are converted to the corresponding DNS domain name, and any
92 OPENPGPKEY keys are printed.</para></listitem>
93 </varlistentry>
94
624993ac 95 <varlistentry>
8eb6e6ed
ZJS
96 <term><command>tlsa</command>
97 [<replaceable>FAMILY</replaceable>]
98 <replaceable>DOMAIN</replaceable>[:<replaceable>PORT</replaceable>]…</term>
624993ac 99
b69f810c
YW
100 <listitem><para>Query TLS public keys stored as <ulink url="https://tools.ietf.org/html/rfc6698">TLSA</ulink>
101 resource records. A query will be performed for each of the specified names prefixed with the port and family
102 (<literal>_<replaceable>port</replaceable>._<replaceable>family</replaceable>.<replaceable>domain</replaceable></literal>).
103 The port number may be specified after a colon (<literal>:</literal>), otherwise <constant>443</constant> will be used
104 by default. The family may be specified as the first argument, otherwise <constant>tcp</constant> will be used.</para></listitem>
105 </varlistentry>
106
107 <varlistentry>
8eb6e6ed 108 <term><command>status</command> [<replaceable>LINK</replaceable>…]</term>
b69f810c 109
2c520df4 110 <listitem><para>Shows the global and per-link DNS settings currently in effect. If no command is specified,
b69f810c
YW
111 this is the implied default.</para></listitem>
112 </varlistentry>
113
114 <varlistentry>
8eb6e6ed 115 <term><command>statistics</command></term>
b69f810c
YW
116
117 <listitem><para>Shows general resolver statistics, including information whether DNSSEC is
624993ac
LP
118 enabled and available, as well as resolution and validation statistics.</para></listitem>
119 </varlistentry>
120
121 <varlistentry>
8eb6e6ed 122 <term><command>reset-statistics</command></term>
624993ac 123
8eb6e6ed 124 <listitem><para>Resets the statistics counters shown in <command>statistics</command> to zero.
b69f810c 125 This operation requires root privileges.</para></listitem>
624993ac
LP
126 </varlistentry>
127
ba35662f 128 <varlistentry>
8eb6e6ed 129 <term><command>flush-caches</command></term>
ba35662f 130
d55b0463
LP
131 <listitem><para>Flushes all DNS resource record caches the service maintains locally. This is mostly equivalent
132 to sending the <constant>SIGUSR2</constant> to the <command>systemd-resolved</command>
133 service.</para></listitem>
134 </varlistentry>
135
136 <varlistentry>
8eb6e6ed 137 <term><command>reset-server-features</command></term>
d55b0463
LP
138
139 <listitem><para>Flushes all feature level information the resolver learnt about specific servers, and ensures
140 that the server feature probing logic is started from the beginning with the next look-up request. This is
141 mostly equivalent to sending the <constant>SIGRTMIN+1</constant> to the <command>systemd-resolved</command>
142 service.</para></listitem>
ba35662f
LP
143 </varlistentry>
144
be371fe0 145 <varlistentry>
8eb6e6ed
ZJS
146 <term><command>dns</command> [<replaceable>LINK</replaceable> [<replaceable>SERVER</replaceable>…]]</term>
147 <term><command>domain</command> [<replaceable>LINK</replaceable> [<replaceable>DOMAIN</replaceable>…]]</term>
148 <term><command>default-route</command> [<replaceable>LINK</replaceable> [<replaceable>BOOL</replaceable>…]]</term>
149 <term><command>llmnr</command> [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</term>
150 <term><command>mdns</command> [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</term>
151 <term><command>dnssec</command> [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</term>
152 <term><command>dnsovertls</command> [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</term>
153 <term><command>nta</command> [<replaceable>LINK</replaceable> [<replaceable>DOMAIN</replaceable>…]]</term>
b69f810c 154
74053ff2 155 <listitem>
8eb6e6ed
ZJS
156 <para>Get/set per-interface DNS configuration. These commands may be used to configure various DNS
157 settings for network interfaces. These commands may be used to inform
158 <command>systemd-resolved</command> or <command>systemd-networkd</command> about per-interface DNS
159 configuration determined through external means. The <command>dns</command> command expects IPv4 or
711dd5db
YW
160 IPv6 address specifications of DNS servers to use. Each address can optionally take a port number
161 separated with <literal>:</literal>, a network interface name or index separated with
162 <literal>%</literal>, and a Server Name Indication (SNI) separated with <literal>#</literal>. When
163 IPv6 address is specified with a port number, then the address must be in the square brackets. That
164 is, the acceptable full formats are <literal>111.222.333.444:9953%ifname#example.com</literal> for
165 IPv4 and <literal>[1111:2222::3333]:9953%ifname#example.com</literal> for IPv6. The
166 <command>domain</command> command expects valid DNS domains, possibly prefixed with
167 <literal>~</literal>, and configures a per-interface search or route-only domain. The
168 <command>default-route</command> command expects a boolean parameter, and configures whether the
169 link may be used as default route for DNS lookups, i.e. if it is suitable for lookups on domains no
170 other link explicitly is configured for. The <command>llmnr</command>, <command>mdns</command>,
171 <command>dnssec</command> and <command>dnsovertls</command> commands may be used to configure the
172 per-interface LLMNR, MulticastDNS, DNSSEC and DNSOverTLS settings. Finally, <command>nta</command>
173 command may be used to configure additional per-interface DNSSEC NTA domains.</para>
8eb6e6ed
ZJS
174
175 <para>Commands <command>dns</command>, <command>domain</command> and <command>nta</command> can take
74053ff2
DKG
176 a single empty string argument to clear their respective value lists.</para>
177
8eb6e6ed
ZJS
178 <para>For details about these settings, their possible values and their effect, see the
179 corresponding settings in
74053ff2 180 <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry>.</para>
14965b94
LP
181 </listitem>
182 </varlistentry>
183
184 <varlistentry>
8eb6e6ed 185 <term><command>revert <replaceable>LINK</replaceable></command></term>
b69f810c
YW
186
187 <listitem><para>Revert the per-interface DNS configuration. If the DNS configuration is reverted all
8eb6e6ed
ZJS
188 per-interface DNS setting are reset to their defaults, undoing all effects of <command>dns</command>,
189 <command>domain</command>, <command>default-route</command>, <command>llmnr</command>,
190 <command>mdns</command>, <command>dnssec</command>, <command>dnsovertls</command>,
191 <command>nta</command>. Note that when a network interface disappears all configuration is lost
192 automatically, an explicit reverting is not necessary in that case.</para></listitem>
14965b94
LP
193 </varlistentry>
194
df957849 195 <xi:include href="systemctl.xml" xpointer="log-level" />
624993ac
LP
196 </variablelist>
197 </refsect1>
198
e1fac8a6
ZJS
199 <refsect1>
200 <title>Options</title>
201 <variablelist>
202 <varlistentry>
203 <term><option>-4</option></term>
204 <term><option>-6</option></term>
205
206 <listitem><para>By default, when resolving a hostname, both IPv4 and IPv6
207 addresses are acquired. By specifying <option>-4</option> only IPv4 addresses are requested, by specifying
208 <option>-6</option> only IPv6 addresses are requested.</para>
209 </listitem>
210 </varlistentry>
211
212 <varlistentry>
213 <term><option>-i</option> <replaceable>INTERFACE</replaceable></term>
214 <term><option>--interface=</option><replaceable>INTERFACE</replaceable></term>
215
216 <listitem><para>Specifies the network interface to execute the query on. This may either be specified as numeric
217 interface index or as network interface string (e.g. <literal>en0</literal>). Note that this option has no
218 effect if system-wide DNS configuration (as configured in <filename>/etc/resolv.conf</filename> or
219 <filename>/etc/systemd/resolve.conf</filename>) in place of per-link configuration is used.</para></listitem>
220 </varlistentry>
221
222 <varlistentry>
223 <term><option>-p</option> <replaceable>PROTOCOL</replaceable></term>
224 <term><option>--protocol=</option><replaceable>PROTOCOL</replaceable></term>
225
226 <listitem><para>Specifies the network protocol for the query. May be one of <literal>dns</literal>
227 (i.e. classic unicast DNS), <literal>llmnr</literal> (<ulink
228 url="https://tools.ietf.org/html/rfc4795">Link-Local Multicast Name Resolution</ulink>),
229 <literal>llmnr-ipv4</literal>, <literal>llmnr-ipv6</literal> (LLMNR via the indicated underlying IP
230 protocols), <literal>mdns</literal> (<ulink url="https://www.ietf.org/rfc/rfc6762.txt">Multicast DNS</ulink>),
231 <literal>mdns-ipv4</literal>, <literal>mdns-ipv6</literal> (MDNS via the indicated underlying IP protocols).
232 By default the lookup is done via all protocols suitable for the lookup. If used, limits the set of
233 protocols that may be used. Use this option multiple times to enable resolving via multiple protocols at the
234 same time. The setting <literal>llmnr</literal> is identical to specifying this switch once with
235 <literal>llmnr-ipv4</literal> and once via <literal>llmnr-ipv6</literal>. Note that this option does not force
236 the service to resolve the operation with the specified protocol, as that might require a suitable network
237 interface and configuration.
238 The special value <literal>help</literal> may be used to list known values.
239 </para></listitem>
240 </varlistentry>
241
242 <varlistentry>
243 <term><option>-t</option> <replaceable>TYPE</replaceable></term>
244 <term><option>--type=</option><replaceable>TYPE</replaceable></term>
245 <term><option>-c</option> <replaceable>CLASS</replaceable></term>
246 <term><option>--class=</option><replaceable>CLASS</replaceable></term>
247
018b642a
LP
248 <listitem><para>When used in conjunction with the <command>query</command> command, specifies the DNS
249 resource record type (e.g. A, AAAA, MX, …) and class (e.g. IN, ANY, …) to look up. If these options
250 are used a DNS resource record set matching the specified class and type is requested. The class
251 defaults to IN if only a type is specified. The special value <literal>help</literal> may be used to
252 list known values.</para>
253
254 <para>Without these options <command>resolvectl query</command> provides high-level domain name to
255 address and address to domain name resolution. With these options it provides low-level DNS resource
256 record resolution. The search domain logic is automatically turned off when these options are used,
257 i.e. specified domain names need to be fully qualified domain names. Moreover, IDNA internal domain
258 name translation is turned off as well, i.e. international domain names should be specified in
259 <literal>xn--…</literal> notation, unless look-up in MulticastDNS/LLMNR is desired, in which case
260 UTF-8 characters should be used.</para></listitem>
e1fac8a6
ZJS
261 </varlistentry>
262
263 <varlistentry>
264 <term><option>--service-address=</option><replaceable>BOOL</replaceable></term>
265
266 <listitem><para>Takes a boolean parameter. If true (the default), when doing a service lookup with
267 <option>--service</option> the hostnames contained in the SRV resource records are resolved as well.</para></listitem>
268 </varlistentry>
269
270 <varlistentry>
271 <term><option>--service-txt=</option><replaceable>BOOL</replaceable></term>
272
273 <listitem><para>Takes a boolean parameter. If true (the default), when doing a DNS-SD service lookup with
274 <option>--service</option> the TXT service metadata record is resolved as well.</para></listitem>
275 </varlistentry>
276
277 <varlistentry>
278 <term><option>--cname=</option><replaceable>BOOL</replaceable></term>
279
280 <listitem><para>Takes a boolean parameter. If true (the default), DNS CNAME or DNAME redirections are
281 followed. Otherwise, if a CNAME or DNAME record is encountered while resolving, an error is
282 returned.</para></listitem>
283 </varlistentry>
284
d711322c
LP
285 <varlistentry>
286 <term><option>--validate=</option><replaceable>BOOL</replaceable></term>
287
288 <listitem><para>Takes a boolean parameter; used in conjunction with <command>query</command>. If true
289 (the default), DNSSEC validation is applied as usual — under the condition that it is enabled for the
290 network and for <filename>systemd-resolved.service</filename> as a whole. If false, DNSSEC validation
291 is disabled for the specific query, regardless of whether it is enabled for the network or in the
292 service. Note that setting this option to true does not force DNSSEC validation on systems/networks
293 where DNSSEC is turned off. This option is only suitable to turn off such validation where otherwise
294 enabled, not enable validation where otherwise disabled.</para></listitem>
295 </varlistentry>
296
297 <varlistentry>
298 <term><option>--synthesize=</option><replaceable>BOOL</replaceable></term>
299
300 <listitem><para>Takes a boolean parameter; used in conjunction with <command>query</command>. If true
301 (the default), select domains are resolved on the local system, among them
302 <literal>localhost</literal> and <literal>_gateway</literal> or entries from
303 <filename>/etc/hosts</filename>. If false these domains are not resolved locally, and either fail (in
304 case of <literal>localhost</literal> or <literal>_gateway</literal> and suchlike) or go to the
305 network via regular DNS/mDNS/LLMNR lookups (in case of <filename>/etc/hosts</filename>
306 entries).</para></listitem>
307 </varlistentry>
308
309 <varlistentry>
310 <term><option>--cache=</option><replaceable>BOOL</replaceable></term>
311
312 <listitem><para>Takes a boolean parameter; used in conjunction with <command>query</command>. If true
313 (the default), lookups use the local DNS resource record cache. If false, lookups are routed to the
314 network instead, regardless if already available in the local cache.</para></listitem>
315 </varlistentry>
316
317 <varlistentry>
318 <term><option>--zone=</option><replaceable>BOOL</replaceable></term>
319
320 <listitem><para>Takes a boolean parameter; used in conjunction with <command>query</command>. If true
321 (the default), lookups are answered from locally registered LLMNR or mDNS resource records, if
322 defined. If false, locally registered LLMNR/mDNS records are not considered for the lookup
323 request.</para></listitem>
324 </varlistentry>
325
326 <varlistentry>
327 <term><option>--trust-anchor=</option><replaceable>BOOL</replaceable></term>
328
329 <listitem><para>Takes a boolean parameter; used in conjunction with <command>query</command>. If true
330 (the default), lookups for DS and DNSKEY are answered from the local DNSSEC trust anchors if
331 possible. If false, the local trust store is not considered for the lookup request.</para></listitem>
332 </varlistentry>
333
334 <varlistentry>
335 <term><option>--network=</option><replaceable>BOOL</replaceable></term>
336
337 <listitem><para>Takes a boolean parameter; used in conjunction with <command>query</command>. If true
338 (the default), lookups are answered via DNS, LLMNR or mDNS network requests if they cannot be
339 synthesized locally, or be answered from the local cache, zone or trust anchors (see above). If false,
340 the request is not answered from the network and will thus fail if none of the indicated sources can
341 answer them.</para></listitem>
342 </varlistentry>
343
e1fac8a6
ZJS
344 <varlistentry>
345 <term><option>--search=</option><replaceable>BOOL</replaceable></term>
346
018b642a
LP
347 <listitem><para>Takes a boolean parameter. If true (the default), any specified single-label
348 hostnames will be searched in the domains configured in the search domain list, if it is
349 non-empty. Otherwise, the search domain logic is disabled. Note that this option has no effect if
350 <option>--type=</option> is used (see above), in which case the search domain logic is
351 unconditionally turned off.</para></listitem>
e1fac8a6
ZJS
352 </varlistentry>
353
354 <varlistentry>
355 <term><option>--raw</option><optional>=payload|packet</optional></term>
356
357 <listitem><para>Dump the answer as binary data. If there is no argument or if the argument is
358 <literal>payload</literal>, the payload of the packet is exported. If the argument is
359 <literal>packet</literal>, the whole packet is dumped in wire format, prefixed by
360 length specified as a little-endian 64-bit number. This format allows multiple packets
361 to be dumped and unambiguously parsed.</para></listitem>
362 </varlistentry>
363
364 <varlistentry>
365 <term><option>--legend=</option><replaceable>BOOL</replaceable></term>
366
367 <listitem><para>Takes a boolean parameter. If true (the default), column headers and meta information about the
368 query response are shown. Otherwise, this output is suppressed.</para></listitem>
369 </varlistentry>
370
371 <xi:include href="standard-options.xml" xpointer="help" />
372 <xi:include href="standard-options.xml" xpointer="version" />
373 <xi:include href="standard-options.xml" xpointer="no-pager" />
374 </variablelist>
375 </refsect1>
376
2eee2088 377 <refsect1>
42ecca2e
ZJS
378 <title>Compatibility with
379 <citerefentry project="debian"><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry></title>
2eee2088 380
b69f810c
YW
381 <para><command>resolvectl</command> is a multi-call binary. When invoked as <literal>resolvconf</literal>
382 (generally achieved by means of a symbolic link of this name to the <command>resolvectl</command> binary) it
42ecca2e
ZJS
383 is run in a limited
384 <citerefentry project="debian"><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry>
2eee2088
LP
385 compatibility mode. It accepts mostly the same arguments and pushes all data into
386 <citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
b69f810c 387 similar to how <option>dns</option> and <option>domain</option> commands operate. Note that
2eee2088 388 <command>systemd-resolved.service</command> is the only supported backend, which is different from other
924ccc35
ZJS
389 implementations of this command.</para>
390
391 <para><filename>/etc/resolv.conf</filename> will only be updated with servers added with this command
392 when <filename>/etc/resolv.conf</filename> is a symlink to
393 <filename>/run/systemd/resolve/resolv.conf</filename>, and not a static file. See the discussion of
394 <filename>/etc/resolv.conf</filename> handling in
395 <citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>.
396 </para>
397
398 <para>Not all operations supported by other implementations are supported natively. Specifically:</para>
2eee2088
LP
399
400 <variablelist>
401 <varlistentry>
402 <term><option>-a</option></term>
403 <listitem><para>Registers per-interface DNS configuration data with
404 <command>systemd-resolved</command>. Expects a network interface name as only command line argument. Reads
b7a47345
ZJS
405 <citerefentry project='man-pages'><refentrytitle>resolv.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>-compatible
406 DNS configuration data from its standard input. Relevant fields are <literal>nameserver</literal> and
2eee2088 407 <literal>domain</literal>/<literal>search</literal>. This command is mostly identical to invoking
b7a47345
ZJS
408 <command>resolvectl</command> with a combination of <option>dns</option> and <option>domain</option>
409 commands.</para></listitem>
2eee2088
LP
410 </varlistentry>
411
412 <varlistentry>
413 <term><option>-d</option></term>
414 <listitem><para>Unregisters per-interface DNS configuration data with <command>systemd-resolved</command>. This
b69f810c 415 command is mostly identical to invoking <command>resolvectl revert</command>.</para></listitem>
2eee2088
LP
416 </varlistentry>
417
418 <varlistentry>
419 <term><option>-f</option></term>
420
421 <listitem><para>When specified <option>-a</option> and <option>-d</option> will not complain about missing
422 network interfaces and will silently execute no operation in that case.</para></listitem>
423 </varlistentry>
424
425 <varlistentry>
426 <term><option>-x</option></term>
427
428 <listitem><para>This switch for "exclusive" operation is supported only partially. It is mapped to an
429 additional configured search domain of <literal>~.</literal> — i.e. ensures that DNS traffic is preferably
430 routed to the DNS servers on this interface, unless there are other, more specific domains configured on other
431 interfaces.</para></listitem>
432 </varlistentry>
433
434 <varlistentry>
435 <term><option>-m</option></term>
436 <term><option>-p</option></term>
437
438 <listitem><para>These switches are not supported and are silently ignored.</para></listitem>
439 </varlistentry>
440
441 <varlistentry>
442 <term><option>-u</option></term>
443 <term><option>-I</option></term>
444 <term><option>-i</option></term>
445 <term><option>-l</option></term>
446 <term><option>-R</option></term>
447 <term><option>-r</option></term>
448 <term><option>-v</option></term>
449 <term><option>-V</option></term>
450 <term><option>--enable-updates</option></term>
451 <term><option>--disable-updates</option></term>
452 <term><option>--are-updates-enabled</option></term>
453
454 <listitem><para>These switches are not supported and the command will fail if used.</para></listitem>
455 </varlistentry>
456
457 </variablelist>
458
42ecca2e
ZJS
459 <para>See
460 <citerefentry project="debian"><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry>
461 for details on those command line options.</para>
2eee2088
LP
462 </refsect1>
463
624993ac
LP
464 <refsect1>
465 <title>Examples</title>
466
467 <example>
468 <title>Retrieve the addresses of the <literal>www.0pointer.net</literal> domain</title>
469
b088e905 470 <programlisting>$ resolvectl query www.0pointer.net
edb4843f
ZJS
471www.0pointer.net: 2a01:238:43ed:c300:10c3:bcf3:3266:da74
472 85.214.157.71
473
474-- Information acquired via protocol DNS in 611.6ms.
475-- Data is authenticated: no
476</programlisting>
624993ac
LP
477 </example>
478
479 <example>
480 <title>Retrieve the domain of the <literal>85.214.157.71</literal> IP address</title>
481
b088e905 482 <programlisting>$ resolvectl query 85.214.157.71
edb4843f
ZJS
48385.214.157.71: gardel.0pointer.net
484
485-- Information acquired via protocol DNS in 1.2997s.
486-- Data is authenticated: no
487</programlisting>
624993ac
LP
488 </example>
489
490 <example>
c49b5011 491 <title>Retrieve the MX record of the <literal>yahoo.com</literal> domain</title>
624993ac 492
b088e905 493 <programlisting>$ resolvectl --legend=no -t MX query yahoo.com
edb4843f
ZJS
494yahoo.com. IN MX 1 mta7.am0.yahoodns.net
495yahoo.com. IN MX 1 mta6.am0.yahoodns.net
496yahoo.com. IN MX 1 mta5.am0.yahoodns.net
497</programlisting>
624993ac
LP
498 </example>
499
500 <example>
501 <title>Resolve an SRV service</title>
502
b69f810c 503 <programlisting>$ resolvectl service _xmpp-server._tcp gmail.com
edb4843f
ZJS
504_xmpp-server._tcp/gmail.com: alt1.xmpp-server.l.google.com:5269 [priority=20, weight=0]
505 173.194.210.125
506 alt4.xmpp-server.l.google.com:5269 [priority=20, weight=0]
507 173.194.65.125
1eecafb8 508
edb4843f 509</programlisting>
624993ac
LP
510 </example>
511
edb4843f
ZJS
512 <example>
513 <title>Retrieve a PGP key</title>
514
b69f810c 515 <programlisting>$ resolvectl openpgp zbyszek@fedoraproject.org
edb4843f
ZJS
516d08ee310438ca124a6149ea5cc21b6313b390dce485576eff96f8722._openpgpkey.fedoraproject.org. IN OPENPGPKEY
517 mQINBFBHPMsBEACeInGYJCb+7TurKfb6wGyTottCDtiSJB310i37/6ZYoeIay/5soJjlMyf
518 MFQ9T2XNT/0LM6gTa0MpC1st9LnzYTMsT6tzRly1D1UbVI6xw0g0vE5y2Cjk3xUwAynCsSs
1eecafb8 519
82d1d240
ZJS
520</programlisting>
521 </example>
522
523 <example>
b69f810c 524 <title>Retrieve a TLS key (<literal>tcp</literal> and
82d1d240
ZJS
525 <literal>:443</literal> could be skipped)</title>
526
b69f810c 527 <programlisting>$ resolvectl tlsa tcp fedoraproject.org:443
236d312b 528_443._tcp.fedoraproject.org IN TLSA 0 0 1 19400be5b7a31fb733917700789d2f0a2471c0c9d506c0e504c06c16d7cb17c0
82d1d240
ZJS
529 -- Cert. usage: CA constraint
530 -- Selector: Full Certificate
531 -- Matching type: SHA-256
edb4843f
ZJS
532</programlisting>
533 </example>
624993ac
LP
534 </refsect1>
535
536 <refsect1>
537 <title>See Also</title>
538 <para>
539 <citerefentry><refentrytitle>systemd</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
14965b94
LP
540 <citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
541 <citerefentry><refentrytitle>systemd.dnssd</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
2eee2088
LP
542 <citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
543 <citerefentry><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry>
624993ac
LP
544 </para>
545 </refsect1>
546</refentry>