]> git.ipfire.org Git - thirdparty/systemd.git/blame - man/resolvectl.xml
Merge pull request #11827 from keszybz/pkgconfig-variables
[thirdparty/systemd.git] / man / resolvectl.xml
CommitLineData
624993ac
LP
1<?xml version='1.0'?>
2<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
3"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
4
5<!--
572eb058 6 SPDX-License-Identifier: LGPL-2.1+
624993ac
LP
7-->
8
b69f810c 9<refentry id="resolvectl" conditional='ENABLE_RESOLVE'
624993ac
LP
10 xmlns:xi="http://www.w3.org/2001/XInclude">
11
12 <refentryinfo>
b69f810c 13 <title>resolvectl</title>
624993ac 14 <productname>systemd</productname>
624993ac
LP
15 </refentryinfo>
16
17 <refmeta>
b69f810c 18 <refentrytitle>resolvectl</refentrytitle>
624993ac
LP
19 <manvolnum>1</manvolnum>
20 </refmeta>
21
22 <refnamediv>
b69f810c 23 <refname>resolvectl</refname>
2eee2088
LP
24 <refname>resolvconf</refname>
25 <refpurpose>Resolve domain names, IPV4 and IPv6 addresses, DNS resource records, and services; introspect and reconfigure the DNS resolver</refpurpose>
624993ac
LP
26 </refnamediv>
27
28 <refsynopsisdiv>
29 <cmdsynopsis>
b69f810c 30 <command>resolvectl</command>
624993ac 31 <arg choice="opt" rep="repeat">OPTIONS</arg>
b69f810c
YW
32 <arg choice="req">COMMAND</arg>
33 <arg choice="opt" rep="repeat">NAME</arg>
624993ac 34 </cmdsynopsis>
624993ac
LP
35 </refsynopsisdiv>
36
37 <refsect1>
38 <title>Description</title>
39
b69f810c 40 <para><command>resolvectl</command> may be used to resolve domain names, IPv4 and IPv6 addresses, DNS resource
624993ac
LP
41 records and services with the
42 <citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>
43 resolver service. By default, the specified list of parameters will be resolved as hostnames, retrieving their IPv4
44 and IPv6 addresses. If the parameters specified are formatted as IPv4 or IPv6 operation the reverse operation is
45 done, and a hostname is retrieved for the specified addresses.</para>
46
cdfe156a
LP
47 <para>The program's output contains information about the protocol used for the look-up and on which network
48 interface the data was discovered. It also contains information on whether the information could be
49 authenticated. All data for which local DNSSEC validation succeeds is considered authenticated. Moreover all data
50 originating from local, trusted sources is also reported authenticated, including resolution of the local host
51 name, the <literal>localhost</literal> host name or all data from <filename>/etc/hosts</filename>.</para>
624993ac
LP
52 </refsect1>
53
54 <refsect1>
55 <title>Options</title>
56 <variablelist>
57 <varlistentry>
58 <term><option>-4</option></term>
59 <term><option>-6</option></term>
60
61 <listitem><para>By default, when resolving a hostname, both IPv4 and IPv6
62 addresses are acquired. By specifying <option>-4</option> only IPv4 addresses are requested, by specifying
63 <option>-6</option> only IPv6 addresses are requested.</para>
64 </listitem>
65 </varlistentry>
66
67 <varlistentry>
68 <term><option>-i</option> <replaceable>INTERFACE</replaceable></term>
69 <term><option>--interface=</option><replaceable>INTERFACE</replaceable></term>
70
71 <listitem><para>Specifies the network interface to execute the query on. This may either be specified as numeric
72 interface index or as network interface string (e.g. <literal>en0</literal>). Note that this option has no
73 effect if system-wide DNS configuration (as configured in <filename>/etc/resolv.conf</filename> or
74 <filename>/etc/systemd/resolve.conf</filename>) in place of per-link configuration is used.</para></listitem>
75 </varlistentry>
76
77 <varlistentry>
78 <term><option>-p</option> <replaceable>PROTOCOL</replaceable></term>
79 <term><option>--protocol=</option><replaceable>PROTOCOL</replaceable></term>
80
81 <listitem><para>Specifies the network protocol for the query. May be one of <literal>dns</literal>
82 (i.e. classic unicast DNS), <literal>llmnr</literal> (<ulink
83 url="https://tools.ietf.org/html/rfc4795">Link-Local Multicast Name Resolution</ulink>),
de2645af 84 <literal>llmnr-ipv4</literal>, <literal>llmnr-ipv6</literal> (LLMNR via the indicated underlying IP
062aabb9
DR
85 protocols), <literal>mdns</literal> (<ulink url="https://www.ietf.org/rfc/rfc6762.txt">Multicast DNS</ulink>),
86 <literal>mdns-ipv4</literal>, <literal>mdns-ipv6</literal> (MDNS via the indicated underlying IP protocols).
87 By default the lookup is done via all protocols suitable for the lookup. If used, limits the set of
624993ac
LP
88 protocols that may be used. Use this option multiple times to enable resolving via multiple protocols at the
89 same time. The setting <literal>llmnr</literal> is identical to specifying this switch once with
90 <literal>llmnr-ipv4</literal> and once via <literal>llmnr-ipv6</literal>. Note that this option does not force
91 the service to resolve the operation with the specified protocol, as that might require a suitable network
ba82da3b
ZJS
92 interface and configuration.
93 The special value <literal>help</literal> may be used to list known values.
94 </para></listitem>
624993ac
LP
95 </varlistentry>
96
97 <varlistentry>
98 <term><option>-t</option> <replaceable>TYPE</replaceable></term>
99 <term><option>--type=</option><replaceable>TYPE</replaceable></term>
100 <term><option>-c</option> <replaceable>CLASS</replaceable></term>
101 <term><option>--class=</option><replaceable>CLASS</replaceable></term>
102
103 <listitem><para>Specifies the DNS resource record type (e.g. A, AAAA, MX, …) and class (e.g. IN, ANY, …) to
104 look up. If these options are used a DNS resource record set matching the specified class and type is
ba82da3b
ZJS
105 requested. The class defaults to IN if only a type is specified.
106 The special value <literal>help</literal> may be used to list known values.
107 </para></listitem>
624993ac
LP
108 </varlistentry>
109
624993ac
LP
110 <varlistentry>
111 <term><option>--service-address=</option><replaceable>BOOL</replaceable></term>
112
113 <listitem><para>Takes a boolean parameter. If true (the default), when doing a service lookup with
114 <option>--service</option> the hostnames contained in the SRV resource records are resolved as well.</para></listitem>
115 </varlistentry>
116
117 <varlistentry>
118 <term><option>--service-txt=</option><replaceable>BOOL</replaceable></term>
119
120 <listitem><para>Takes a boolean parameter. If true (the default), when doing a DNS-SD service lookup with
121 <option>--service</option> the TXT service metadata record is resolved as well.</para></listitem>
122 </varlistentry>
123
124 <varlistentry>
125 <term><option>--cname=</option><replaceable>BOOL</replaceable></term>
126
127 <listitem><para>Takes a boolean parameter. If true (the default), DNS CNAME or DNAME redirections are
128 followed. Otherwise, if a CNAME or DNAME record is encountered while resolving, an error is
129 returned.</para></listitem>
130 </varlistentry>
131
132 <varlistentry>
133 <term><option>--search=</option><replaceable>BOOL</replaceable></term>
134
135 <listitem><para>Takes a boolean parameter. If true (the default), any specified single-label hostnames will be
136 searched in the domains configured in the search domain list, if it is non-empty. Otherwise, the search domain
137 logic is disabled.</para></listitem>
138 </varlistentry>
139
dab48ea6
ZJS
140 <varlistentry>
141 <term><option>--raw</option><optional>=payload|packet</optional></term>
142
143 <listitem><para>Dump the answer as binary data. If there is no argument or if the argument is
144 <literal>payload</literal>, the payload of the packet is exported. If the argument is
145 <literal>packet</literal>, the whole packet is dumped in wire format, prefixed by
146 length specified as a little-endian 64-bit number. This format allows multiple packets
301a21a8 147 to be dumped and unambiguously parsed.</para></listitem>
dab48ea6
ZJS
148 </varlistentry>
149
624993ac
LP
150 <varlistentry>
151 <term><option>--legend=</option><replaceable>BOOL</replaceable></term>
152
153 <listitem><para>Takes a boolean parameter. If true (the default), column headers and meta information about the
154 query response are shown. Otherwise, this output is suppressed.</para></listitem>
155 </varlistentry>
156
b69f810c
YW
157 <xi:include href="standard-options.xml" xpointer="help" />
158 <xi:include href="standard-options.xml" xpointer="version" />
159 <xi:include href="standard-options.xml" xpointer="no-pager" />
160 </variablelist>
161 </refsect1>
162
163 <refsect1>
164 <title>Commands</title>
165 <variablelist>
166
167 <varlistentry>
168 <term><option>query <replaceable>HOSTNAME|ADDRESS</replaceable>…</option></term>
169
170 <listitem><para>Resolve domain names, IPv4 and IPv6 addresses.</para></listitem>
171 </varlistentry>
172
173 <varlistentry>
174 <term><option>service [[<replaceable>NAME</replaceable>] <replaceable>TYPE</replaceable>] <replaceable>DOMAIN</replaceable></option></term>
175
176 <listitem><para>Resolve <ulink url="https://tools.ietf.org/html/rfc6763">DNS-SD</ulink> and
177 <ulink url="https://tools.ietf.org/html/rfc2782">SRV</ulink> services, depending on the specified list of parameters.
178 If three parameters are passed the first is assumed to be the DNS-SD service name, the second the SRV service type,
179 and the third the domain to search in. In this case a full DNS-SD style SRV and TXT lookup is executed. If only two
180 parameters are specified, the first is assumed to be the SRV service type, and the second the domain to look in. In
181 this case no TXT RR is requested. Finally, if only one parameter is specified, it is assumed to be a domain name,
182 that is already prefixed with an SRV type, and an SRV lookup is done (no TXT).</para></listitem>
183 </varlistentry>
184
185 <varlistentry>
186 <term><option>openpgp <replaceable>EMAIL@DOMAIN</replaceable>…</option></term>
187
188 <listitem><para>Query PGP keys stored as <ulink url="https://tools.ietf.org/html/rfc7929">OPENPGPKEY</ulink>
189 resource records. Specified e-mail addresses are converted to the corresponding DNS domain name, and any
190 OPENPGPKEY keys are printed.</para></listitem>
191 </varlistentry>
192
624993ac 193 <varlistentry>
b69f810c 194 <term><option>tlsa [<replaceable>FAMILY</replaceable>] <replaceable>DOMAIN</replaceable>[:<replaceable>PORT</replaceable>]…</option></term>
624993ac 195
b69f810c
YW
196 <listitem><para>Query TLS public keys stored as <ulink url="https://tools.ietf.org/html/rfc6698">TLSA</ulink>
197 resource records. A query will be performed for each of the specified names prefixed with the port and family
198 (<literal>_<replaceable>port</replaceable>._<replaceable>family</replaceable>.<replaceable>domain</replaceable></literal>).
199 The port number may be specified after a colon (<literal>:</literal>), otherwise <constant>443</constant> will be used
200 by default. The family may be specified as the first argument, otherwise <constant>tcp</constant> will be used.</para></listitem>
201 </varlistentry>
202
203 <varlistentry>
204 <term><option>status [<replaceable>LINK</replaceable>…]</option></term>
205
206 <listitem><para>Shows the global and per-link DNS settings in currently in effect. If no command is specified,
207 this is the implied default.</para></listitem>
208 </varlistentry>
209
210 <varlistentry>
211 <term><option>statistics</option></term>
212
213 <listitem><para>Shows general resolver statistics, including information whether DNSSEC is
624993ac
LP
214 enabled and available, as well as resolution and validation statistics.</para></listitem>
215 </varlistentry>
216
217 <varlistentry>
b69f810c 218 <term><option>reset-statistics</option></term>
624993ac 219
b69f810c
YW
220 <listitem><para>Resets the statistics counters shown in <option>statistics</option> to zero.
221 This operation requires root privileges.</para></listitem>
624993ac
LP
222 </varlistentry>
223
ba35662f 224 <varlistentry>
b69f810c 225 <term><option>flush-caches</option></term>
ba35662f 226
d55b0463
LP
227 <listitem><para>Flushes all DNS resource record caches the service maintains locally. This is mostly equivalent
228 to sending the <constant>SIGUSR2</constant> to the <command>systemd-resolved</command>
229 service.</para></listitem>
230 </varlistentry>
231
232 <varlistentry>
b69f810c 233 <term><option>reset-server-features</option></term>
d55b0463
LP
234
235 <listitem><para>Flushes all feature level information the resolver learnt about specific servers, and ensures
236 that the server feature probing logic is started from the beginning with the next look-up request. This is
237 mostly equivalent to sending the <constant>SIGRTMIN+1</constant> to the <command>systemd-resolved</command>
238 service.</para></listitem>
ba35662f
LP
239 </varlistentry>
240
be371fe0 241 <varlistentry>
b69f810c
YW
242 <term><option>dns [<replaceable>LINK</replaceable> [<replaceable>SERVER</replaceable>…]]</option></term>
243 <term><option>domain [<replaceable>LINK</replaceable> [<replaceable>DOMAIN</replaceable>…]]</option></term>
f2fd3cdb 244 <term><option>default-route [<replaceable>LINK</replaceable> [<replaceable>BOOL</replaceable>…]]</option></term>
b69f810c
YW
245 <term><option>llmnr [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</option></term>
246 <term><option>mdns [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</option></term>
247 <term><option>dnssec [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</option></term>
c9299be2 248 <term><option>dnsovertls [<replaceable>LINK</replaceable> [<replaceable>MODE</replaceable>]]</option></term>
b69f810c
YW
249 <term><option>nta [<replaceable>LINK</replaceable> [<replaceable>DOMAIN</replaceable>…]]</option></term>
250
74053ff2 251 <listitem>
f2fd3cdb
LP
252 <para>Get/set per-interface DNS configuration. These commands may be used to configure various DNS settings
253 for network interfaces that aren't managed by
74053ff2
DKG
254 <citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>. (These
255 commands will fail when used on interfaces that are managed by <command>systemd-networkd</command>, please
256 configure their DNS settings directly inside the <filename>.network</filename> files instead.) These commands
257 may be used to inform <command>systemd-resolved</command> about per-interface DNS configuration determined
258 through external means. The <option>dns</option> command expects IPv4 or IPv6 address specifications of DNS
259 servers to use. The <option>domain</option> command expects valid DNS domains, possibly prefixed with
f2fd3cdb
LP
260 <literal>~</literal>, and configures a per-interface search or route-only domain. The
261 <option>default-route</option> command expects a boolean paremeter, and configures whether the link may be
262 used as default route for DNS lookups, i.e. if it is suitable for lookups on domains no other link explicitly
263 is configured for. The <option>llmnr</option>, <option>mdns</option>, <option>dnssec</option> and
264 <option>dnsovertls</option> commands may be used to configure the per-interface LLMNR, MulticastDNS, DNSSEC
265 and DNSOverTLS settings. Finally, <option>nta</option> command may be used to configure additional
266 per-interface DNSSEC NTA domains.</para>
74053ff2
DKG
267
268 <para>Options <option>dns</option>, <option>domain</option> and <option>nta</option> can take
269 a single empty string argument to clear their respective value lists.</para>
270
271 <para>For details about these settings, their possible values and their effect, see the corresponding options in
272 <citerefentry><refentrytitle>systemd.network</refentrytitle><manvolnum>5</manvolnum></citerefentry>.</para>
14965b94
LP
273 </listitem>
274 </varlistentry>
275
276 <varlistentry>
b69f810c
YW
277 <term><option>revert <replaceable>LINK</replaceable></option></term>
278
279 <listitem><para>Revert the per-interface DNS configuration. If the DNS configuration is reverted all
280 per-interface DNS setting are reset to their defaults, undoing all effects of <option>dns</option>,
f2fd3cdb
LP
281 <option>domain</option>, <option>default-route</option>, <option>llmnr</option>, <option>mdns</option>,
282 <option>dnssec</option>, <option>dnsovertls</option>, <option>nta</option>. Note that when a network interface
283 disappears all configuration is lost automatically, an explicit reverting is not necessary in that
284 case.</para></listitem>
14965b94
LP
285 </varlistentry>
286
624993ac
LP
287 </variablelist>
288 </refsect1>
289
2eee2088
LP
290 <refsect1>
291 <title>Compatibility with <citerefentry><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry></title>
292
b69f810c
YW
293 <para><command>resolvectl</command> is a multi-call binary. When invoked as <literal>resolvconf</literal>
294 (generally achieved by means of a symbolic link of this name to the <command>resolvectl</command> binary) it
2eee2088
LP
295 is run in a limited <citerefentry><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry>
296 compatibility mode. It accepts mostly the same arguments and pushes all data into
297 <citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
b69f810c 298 similar to how <option>dns</option> and <option>domain</option> commands operate. Note that
2eee2088
LP
299 <command>systemd-resolved.service</command> is the only supported backend, which is different from other
300 implementations of this command. Note that not all operations supported by other implementations are supported
301 natively. Specifically:</para>
302
303 <variablelist>
304 <varlistentry>
305 <term><option>-a</option></term>
306 <listitem><para>Registers per-interface DNS configuration data with
307 <command>systemd-resolved</command>. Expects a network interface name as only command line argument. Reads
308 <citerefentry><refentrytitle>resolv.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry> compatible DNS
309 configuration data from its standard input. Relevant fields are <literal>nameserver</literal> and
310 <literal>domain</literal>/<literal>search</literal>. This command is mostly identical to invoking
b69f810c
YW
311 <command>resolvectl</command> with a combination of <option>dns</option> and
312 <option>domain</option> commands.</para></listitem>
2eee2088
LP
313 </varlistentry>
314
315 <varlistentry>
316 <term><option>-d</option></term>
317 <listitem><para>Unregisters per-interface DNS configuration data with <command>systemd-resolved</command>. This
b69f810c 318 command is mostly identical to invoking <command>resolvectl revert</command>.</para></listitem>
2eee2088
LP
319 </varlistentry>
320
321 <varlistentry>
322 <term><option>-f</option></term>
323
324 <listitem><para>When specified <option>-a</option> and <option>-d</option> will not complain about missing
325 network interfaces and will silently execute no operation in that case.</para></listitem>
326 </varlistentry>
327
328 <varlistentry>
329 <term><option>-x</option></term>
330
331 <listitem><para>This switch for "exclusive" operation is supported only partially. It is mapped to an
332 additional configured search domain of <literal>~.</literal> — i.e. ensures that DNS traffic is preferably
333 routed to the DNS servers on this interface, unless there are other, more specific domains configured on other
334 interfaces.</para></listitem>
335 </varlistentry>
336
337 <varlistentry>
338 <term><option>-m</option></term>
339 <term><option>-p</option></term>
340
341 <listitem><para>These switches are not supported and are silently ignored.</para></listitem>
342 </varlistentry>
343
344 <varlistentry>
345 <term><option>-u</option></term>
346 <term><option>-I</option></term>
347 <term><option>-i</option></term>
348 <term><option>-l</option></term>
349 <term><option>-R</option></term>
350 <term><option>-r</option></term>
351 <term><option>-v</option></term>
352 <term><option>-V</option></term>
353 <term><option>--enable-updates</option></term>
354 <term><option>--disable-updates</option></term>
355 <term><option>--are-updates-enabled</option></term>
356
357 <listitem><para>These switches are not supported and the command will fail if used.</para></listitem>
358 </varlistentry>
359
360 </variablelist>
361
362 <para>See <citerefentry><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry> for details on this command line options.</para>
363 </refsect1>
364
624993ac
LP
365 <refsect1>
366 <title>Examples</title>
367
368 <example>
369 <title>Retrieve the addresses of the <literal>www.0pointer.net</literal> domain</title>
370
b088e905 371 <programlisting>$ resolvectl query www.0pointer.net
edb4843f
ZJS
372www.0pointer.net: 2a01:238:43ed:c300:10c3:bcf3:3266:da74
373 85.214.157.71
374
375-- Information acquired via protocol DNS in 611.6ms.
376-- Data is authenticated: no
377</programlisting>
624993ac
LP
378 </example>
379
380 <example>
381 <title>Retrieve the domain of the <literal>85.214.157.71</literal> IP address</title>
382
b088e905 383 <programlisting>$ resolvectl query 85.214.157.71
edb4843f
ZJS
38485.214.157.71: gardel.0pointer.net
385
386-- Information acquired via protocol DNS in 1.2997s.
387-- Data is authenticated: no
388</programlisting>
624993ac
LP
389 </example>
390
391 <example>
c49b5011 392 <title>Retrieve the MX record of the <literal>yahoo.com</literal> domain</title>
624993ac 393
b088e905 394 <programlisting>$ resolvectl --legend=no -t MX query yahoo.com
edb4843f
ZJS
395yahoo.com. IN MX 1 mta7.am0.yahoodns.net
396yahoo.com. IN MX 1 mta6.am0.yahoodns.net
397yahoo.com. IN MX 1 mta5.am0.yahoodns.net
398</programlisting>
624993ac
LP
399 </example>
400
401 <example>
402 <title>Resolve an SRV service</title>
403
b69f810c 404 <programlisting>$ resolvectl service _xmpp-server._tcp gmail.com
edb4843f
ZJS
405_xmpp-server._tcp/gmail.com: alt1.xmpp-server.l.google.com:5269 [priority=20, weight=0]
406 173.194.210.125
407 alt4.xmpp-server.l.google.com:5269 [priority=20, weight=0]
408 173.194.65.125
1eecafb8 409
edb4843f 410</programlisting>
624993ac
LP
411 </example>
412
edb4843f
ZJS
413 <example>
414 <title>Retrieve a PGP key</title>
415
b69f810c 416 <programlisting>$ resolvectl openpgp zbyszek@fedoraproject.org
edb4843f
ZJS
417d08ee310438ca124a6149ea5cc21b6313b390dce485576eff96f8722._openpgpkey.fedoraproject.org. IN OPENPGPKEY
418 mQINBFBHPMsBEACeInGYJCb+7TurKfb6wGyTottCDtiSJB310i37/6ZYoeIay/5soJjlMyf
419 MFQ9T2XNT/0LM6gTa0MpC1st9LnzYTMsT6tzRly1D1UbVI6xw0g0vE5y2Cjk3xUwAynCsSs
1eecafb8 420
82d1d240
ZJS
421</programlisting>
422 </example>
423
424 <example>
b69f810c 425 <title>Retrieve a TLS key (<literal>tcp</literal> and
82d1d240
ZJS
426 <literal>:443</literal> could be skipped)</title>
427
b69f810c 428 <programlisting>$ resolvectl tlsa tcp fedoraproject.org:443
236d312b 429_443._tcp.fedoraproject.org IN TLSA 0 0 1 19400be5b7a31fb733917700789d2f0a2471c0c9d506c0e504c06c16d7cb17c0
82d1d240
ZJS
430 -- Cert. usage: CA constraint
431 -- Selector: Full Certificate
432 -- Matching type: SHA-256
edb4843f
ZJS
433</programlisting>
434 </example>
624993ac
LP
435 </refsect1>
436
437 <refsect1>
438 <title>See Also</title>
439 <para>
440 <citerefentry><refentrytitle>systemd</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
14965b94
LP
441 <citerefentry><refentrytitle>systemd-resolved.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
442 <citerefentry><refentrytitle>systemd.dnssd</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
2eee2088
LP
443 <citerefentry><refentrytitle>systemd-networkd.service</refentrytitle><manvolnum>8</manvolnum></citerefentry>,
444 <citerefentry><refentrytitle>resolvconf</refentrytitle><manvolnum>8</manvolnum></citerefentry>
624993ac
LP
445 </para>
446 </refsect1>
447</refentry>