-MANPAGES_TARGET = dnsdist.1 \
+MANPAGES_TARGET = dnsbulktest.1 \
+ dnsdist.1 \
+ dnsgram.1 \
dnsreplay.1 \
+ dnsscan.1 \
dnsscope.1 \
dnstcpbench.1 \
dnswasher.1 \
+ nsec3dig.1 \
pdns_control.1 \
+ pdns_recursor.1 \
pdnssec.1 \
pdns_server.1 \
+ rec_control.1 \
+ saxfr.1 \
zone2ldap.1 \
zone2sql.1
--- /dev/null
+% DNSBULKTEST(1)
+% PowerDNS.com BV
+% April 2015
+
+# NAME
+**dnsbulktest** - A debugging tool for intermittent resolver failures
+
+# SYNOPSIS
+**dnsbulktest** [*OPTION*]... *IPADDRESS* *PORT* [*LIMIT*]
+
+# DESCRIPTION
+**dnsbulktest** sends a large amount of different queries (for up to *LIMIT*
+different domains) to the nameserver at *IPADDRESS* on port *PORT*. It reads the
+domain names from STDIN in the alexa topX format and outputs statistics on STDOUT.
+
+# OPTIONS
+--help, -h
+: Show a summary of options.
+
+--quiet, -q
+: Don't show information on individual queries.
+
+--type, -t *TYPE*
+: Query the nameserver for *TYPE*, A by default.
+
+--envoutput, -e
+: Write results on STDOUT as shell environment variables
--- /dev/null
+% DNSGRAM(1)
+% PowerDNS.com BV
+% April 2015
+
+# NAME
+**dnsgram** - A debugging tool for intermittent resolver failures
+
+# SYNOPSIS
+**dnsgram** *INFILE*...
+
+# DESCRIPTION
+**dnsgram** takes one or more *INFILE*s in PCAP format and generates statistics
+on 5 second segments allowing the study of intermittent resolver issues.
+
+# OPTIONS
+None
+
+# SEE ALSO
+pcap(3PCAP), tcpdump(8)
--- /dev/null
+% DNSSCAN(1)
+% PowerDNS.com BV
+% April 2015
+
+# NAME
+**dnsscan** - List the amount of queries per qtype in a pcap
+
+# SYNOPSIS
+**dnsscan** *INFILE*...
+
+# DESCRIPTION
+**dnsscan** takes one or more *INFILE*s in PCAP format and generates a list of
+the number of queries per qtype.
+
+# OPTIONS
+None
+
+# SEE ALSO
+pcap(3PCAP), tcpdump(8)
+
--- /dev/null
+% NSEC3DIG(1)
+% PowerDNS.com BV
+% April 2015
+
+# NAME
+**nsec3dig** - Show and validate NSEC3 proofs
+
+# SYNOPSIS
+**nsec3dig** *IPADDRESS* *PORT* *QNAME* *QTYPE* [recurse]
+
+# DESCRIPTION
+**nsec3dig** sends a query for *QNAME* and *QTYPE* to the nameserver at *IPADDRESS*
+on port *PORT* and prints whether and why the NSEC3 proofs are correct. Using the
+'recurse' option sets the Recursion Desired (RD) bit in the query.
+
+# EXAMPLE
+`nsec3dig 8.8.8.8 53 doesntexist.isoc.nl TXT recurse`
--- /dev/null
+% SAXFR(1)
+% PowerDNS.com BV
+% April 2015
+
+# NAME
+**saxfr** - Perform AXFRs and show information about it
+
+# SYNOPSIS
+**saxfr** *IPADDRESS* *PORT* *ZONE* [*OPTIONS*]
+
+# DESCRIPTION
+**saxfr** does a zone-transfer (AXFR) of *ZONE* from the nameserver at *IPADDRESS*
+on port *PORT* and displays the transferred zone with NSEC3 information truncated.
+See below how to show this information.
+
+# OPTIONS
+showdetails
+: Show all the data in the NSEC3 and DNSKEY RDATA.
+
+showflags
+: Show the NSEC3 flags in the RDATA.
+
+unhash
+: Unhash the NSEC3 names to the normal names.