From: Tinderbox User Date: Wed, 23 Apr 2014 18:22:22 +0000 (+0000) Subject: regen v9_10 X-Git-Tag: v9.10.0rc2~2 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=62b806f872dfb5c3135ffa68ce1891a67a29b25c;p=thirdparty%2Fbind9.git regen v9_10 --- diff --git a/bin/delv/delv.1 b/bin/delv/delv.1 index 7068cb0f230..58505391b07 100644 --- a/bin/delv/delv.1 +++ b/bin/delv/delv.1 @@ -16,63 +16,63 @@ .\" .hy 0 .ad l -.\" Title: delve +.\" Title: delv .\" Author: .\" Generator: DocBook XSL Stylesheets v1.71.1 -.\" Date: February 21, 2014 +.\" Date: April 23, 2014 .\" Manual: BIND9 .\" Source: BIND9 .\" -.TH "DELVE" "1" "February 21, 2014" "BIND9" "BIND9" +.TH "DELV" "1" "April 23, 2014" "BIND9" "BIND9" .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .SH "NAME" -delve \- DNS lookup and validation utility +delv \- DNS lookup and validation utility .SH "SYNOPSIS" -.HP 6 -\fBdelve\fR [@server] [\fB\-4\fR] [\fB\-6\fR] [\fB\-a\ \fR\fB\fIanchor\-file\fR\fR] [\fB\-b\ \fR\fB\fIaddress\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-d\ \fR\fB\fIlevel\fR\fR] [\fB\-i\fR] [\fB\-m\fR] [\fB\-p\ \fR\fB\fIport#\fR\fR] [\fB\-q\ \fR\fB\fIname\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-x\ \fR\fB\fIaddr\fR\fR] [name] [type] [class] [queryopt...] -.HP 6 -\fBdelve\fR [\fB\-h\fR] -.HP 6 -\fBdelve\fR [\fB\-v\fR] -.HP 6 -\fBdelve\fR [queryopt...] [query...] +.HP 5 +\fBdelv\fR [@server] [\fB\-4\fR] [\fB\-6\fR] [\fB\-a\ \fR\fB\fIanchor\-file\fR\fR] [\fB\-b\ \fR\fB\fIaddress\fR\fR] [\fB\-c\ \fR\fB\fIclass\fR\fR] [\fB\-d\ \fR\fB\fIlevel\fR\fR] [\fB\-i\fR] [\fB\-m\fR] [\fB\-p\ \fR\fB\fIport#\fR\fR] [\fB\-q\ \fR\fB\fIname\fR\fR] [\fB\-t\ \fR\fB\fItype\fR\fR] [\fB\-x\ \fR\fB\fIaddr\fR\fR] [name] [type] [class] [queryopt...] +.HP 5 +\fBdelv\fR [\fB\-h\fR] +.HP 5 +\fBdelv\fR [\fB\-v\fR] +.HP 5 +\fBdelv\fR [queryopt...] [query...] .SH "DESCRIPTION" .PP -\fBdelve\fR -(Domain Entity Lookup & Validation Engine) is a tool for sending DNS queries and validating the results, using the the same internal resolver and validator logic as +\fBdelv\fR +(Domain Entity Lookup & Validation) is a tool for sending DNS queries and validating the results, using the the same internal resolver and validator logic as \fBnamed\fR. .PP -\fBdelve\fR +\fBdelv\fR will send to a specified name server all queries needed to fetch and validate the requested data; this includes the original requested query, subsequent queries to follow CNAME or DNAME chains, and queries for DNSKEY, DS and DLV records to establish a chain of trust for DNSSEC validation. It does not perform iterative resolution, but simulates the behavior of a name server configured for DNSSEC validating and forwarding. .PP By default, responses are validated using built\-in DNSSEC trust anchors for the root zone (".") and for the ISC DNSSEC lookaside validation zone ("dlv.isc.org"). Records returned by -\fBdelve\fR +\fBdelv\fR are either fully validated or were not signed. If validation fails, an explanation of the failure is included in the output; the validation process can be traced in detail. Because -\fBdelve\fR +\fBdelv\fR does not rely on an external server to carry out validation, it can be used to check the validity of DNS responses in environments where local name servers may not be trustworthy. .PP Unless it is told to query a specific name server, -\fBdelve\fR +\fBdelv\fR will try each of the servers listed in \fI/etc/resolv.conf\fR. If no usable server addresses are found, -\fBdelve\fR +\fBdelv\fR will send queries to the localhost addresses (127.0.0.1 for IPv4, ::1 for IPv6). .PP When no command line arguments or options are given, -\fBdelve\fR +\fBdelv\fR will perform an NS query for "." (the root zone). .SH "SIMPLE USAGE" .PP A typical invocation of -\fBdelve\fR +\fBdelv\fR looks like: .sp .RS 4 .nf - delve @server name type + delv @server name type .fi .RE .sp @@ -83,7 +83,7 @@ where: is the name or IP address of the name server to query. This can be an IPv4 address in dotted\-decimal notation or an IPv6 address in colon\-delimited notation. When the supplied \fIserver\fR argument is a hostname, -\fBdelve\fR +\fBdelv\fR resolves that name before querying that name server (note, however, that this initial lookup is \fInot\fR validated by DNSSEC). @@ -91,14 +91,14 @@ validated by DNSSEC). If no \fIserver\fR argument is provided, -\fBdelve\fR +\fBdelv\fR consults \fI/etc/resolv.conf\fR; if an address is found there, it queries the name server at that address. If either of the \fB\-4\fR or \fB\-6\fR options are in use, then only addresses for the corresponding transport will be tried. If no usable addresses are found, -\fBdelve\fR +\fBdelv\fR will send queries to the localhost addresses (127.0.0.1 for IPv4, ::1 for IPv6). .RE .PP @@ -114,7 +114,7 @@ indicates what type of query is required \(em ANY, A, MX, etc. can be any valid query type. If no \fItype\fR argument is supplied, -\fBdelve\fR +\fBdelv\fR will perform a lookup for an A record. .RE .SH "OPTIONS" @@ -133,7 +133,7 @@ or options. .sp Note: When reading the trust anchor file, -\fBdelve\fR +\fBdelv\fR treats \fBmanaged\-keys\fR statements and @@ -141,14 +141,14 @@ statements and statements identically. That is, for a managed key, it is the \fIinitial\fR key that is trusted; RFC 5011 key management is not supported. -\fBdelve\fR +\fBdelv\fR will not consult the managed\-keys database maintained by \fBnamed\fR. This means that if either of the keys in \fI/etc/bind.keys\fR is revoked and rolled over, it will be necessary to update \fI/etc/bind.keys\fR to use DNSSEC validation in -\fBdelve\fR. +\fBdelv\fR. .RE .PP \-b \fIaddress\fR @@ -160,7 +160,7 @@ Sets the source IP address of the query to \-c \fIclass\fR .RS 4 Sets the query class for the requested data. Currently, only class "IN" is supported in -\fBdelve\fR +\fBdelv\fR and any other value is ignored. .RE .PP @@ -168,7 +168,7 @@ and any other value is ignored. .RS 4 Set the systemwide debug level to \fBlevel\fR. The allowed range is from 0 to 99. The default is 0 (no debugging). Debugging traces from -\fBdelve\fR +\fBdelv\fR become more verbose as the debug level increases. See the \fB+mtrace\fR, \fB+rtrace\fR, and @@ -179,14 +179,14 @@ options below for additional debugging details. \-h .RS 4 Display the -\fBdelve\fR +\fBdelv\fR help usage output and exit. .RE .PP \-i .RS 4 Insecure mode. This disables internal DNSSEC validation. (Note, however, this does not set the CD bit on upstream queries. If the server being queried is performing DNSSEC validation, then it will not return invalid data; this can cause -\fBdelve\fR +\fBdelv\fR to time out. When it is necessary to examine invalid data to debug a DNSSEC problem, use \fBdig +cd\fR.) .RE @@ -222,7 +222,7 @@ option is supplied to indicate a reverse lookup, in which case it is "PTR". \-v .RS 4 Print the -\fBdelve\fR +\fBdelv\fR version and exit. .RE .PP @@ -237,7 +237,7 @@ is used, there is no need to provide the or \fItype\fR arguments. -\fBdelve\fR +\fBdelv\fR automatically performs a lookup for a name like 11.12.13.10.in\-addr.arpa and sets the query type to PTR. IPv6 addresses are looked up using nibble format under the IP6.ARPA domain. @@ -246,19 +246,19 @@ and sets the query type to PTR. IPv6 addresses are looked up using nibble format \-4 .RS 4 Forces -\fBdelve\fR +\fBdelv\fR to only use IPv4. .RE .PP \-6 .RS 4 Forces -\fBdelve\fR +\fBdelv\fR to only use IPv6. .RE .SH "QUERY OPTIONS" .PP -\fBdelve\fR +\fBdelv\fR provides a number of query options which affect the way results are displayed, and in some cases the way lookups are performed. .PP Each query option is identified by a keyword preceded by a plus sign (+). Some keywords set or reset an option. These may be preceded by the string @@ -269,8 +269,8 @@ to negate the meaning of that keyword. Other keywords assign values to options l \fB+[no]cdflag\fR .RS 4 Controls whether to set the CD (checking disabled) bit in queries sent by -\fBdelve\fR. This may be useful when troubleshooting DNSSEC problems from behind a validating resolver. A validating resolver will block invalid responses, making it difficult to retrieve them for analysis. Setting the CD flag on queries will cause the resolver to return invalid responses, which -\fBdelve\fR +\fBdelv\fR. This may be useful when troubleshooting DNSSEC problems from behind a validating resolver. A validating resolver will block invalid responses, making it difficult to retrieve them for analysis. Setting the CD flag on queries will cause the resolver to return invalid responses, which +\fBdelv\fR can then validate internally and report the errors in detail. .RE .PP @@ -287,7 +287,7 @@ Controls whether to display the TTL when printing a record. The default is to di \fB+[no]rtrace\fR .RS 4 Toggle resolver fetch logging. This reports the name and type of each query sent by -\fBdelve\fR +\fBdelv\fR in the process of carrying out the resolution and validation process: this includes including the original query and all subsequent queries to follow CNAMEs and to establish a chain of trust for DNSSEC validation. .sp This is equivalent to setting the debug level to 1 in the "resolver" logging category. Setting the systemwide debug level to 1 using the @@ -298,7 +298,7 @@ option will product the same output (but will affect other logging categories as \fB+[no]mtrace\fR .RS 4 Toggle message logging. This produces a detailed dump of the responses received by -\fBdelve\fR +\fBdelv\fR in the process of carrying out the resolution and validation process. .sp This is equivalent to setting the debug level to 10 for the the "packets" module of the "resolver" logging category. Setting the systemwide debug level to 10 using the @@ -365,14 +365,14 @@ as a group. \fB+[no]multiline\fR .RS 4 Print long records (such as RRSIG, DNSKEY, and SOA records) in a verbose multi\-line format with human\-readable comments. The default is to print each record on a single line, to facilitate machine parsing of the -\fBdelve\fR +\fBdelv\fR output. .RE .PP \fB+[no]dnssec\fR .RS 4 Indicates whether to display RRSIG records in the -\fBdelve\fR +\fBdelv\fR output. The default is to do so. Note that (unlike in \fBdig\fR) this does \fInot\fR diff --git a/bin/delv/delv.html b/bin/delv/delv.html index f4a4ff260b9..99072b84fd2 100644 --- a/bin/delv/delv.html +++ b/bin/delv/delv.html @@ -18,31 +18,31 @@ -delve +delv
-
+

Name

-

delve — DNS lookup and validation utility

+

delv — DNS lookup and validation utility

Synopsis

-

delve [@server] [-4] [-6] [-a anchor-file] [-b address] [-c class] [-d level] [-i] [-m] [-p port#] [-q name] [-t type] [-x addr] [name] [type] [class] [queryopt...]

-

delve [-h]

-

delve [-v]

-

delve [queryopt...] [query...]

+

delv [@server] [-4] [-6] [-a anchor-file] [-b address] [-c class] [-d level] [-i] [-m] [-p port#] [-q name] [-t type] [-x addr] [name] [type] [class] [queryopt...]

+

delv [-h]

+

delv [-v]

+

delv [queryopt...] [query...]

DESCRIPTION

-

delve - (Domain Entity Lookup & Validation Engine) is a tool for sending +

delv + (Domain Entity Lookup & Validation) is a tool for sending DNS queries and validating the results, using the the same internal resolver and validator logic as named.

- delve will send to a specified name server all + delv will send to a specified name server all queries needed to fetch and validate the requested data; this includes the original requested query, subsequent queries to follow CNAME or DNAME chains, and queries for DNSKEY, DS and DLV records @@ -55,34 +55,34 @@ By default, responses are validated using built-in DNSSEC trust anchors for the root zone (".") and for the ISC DNSSEC lookaside validation zone ("dlv.isc.org"). Records returned by - delve are either fully validated or + delv are either fully validated or were not signed. If validation fails, an explanation of the failure is included in the output; the validation process - can be traced in detail. Because delve does + can be traced in detail. Because delv does not rely on an external server to carry out validation, it can be used to check the validity of DNS responses in environments where local name servers may not be trustworthy.

Unless it is told to query a specific name server, - delve will try each of the servers listed in + delv will try each of the servers listed in /etc/resolv.conf. If no usable server - addresses are found, delve will send + addresses are found, delv will send queries to the localhost addresses (127.0.0.1 for IPv4, ::1 for IPv6).

When no command line arguments or options are given, - delve will perform an NS query for "." + delv will perform an NS query for "." (the root zone).

SIMPLE USAGE

- A typical invocation of delve looks like: + A typical invocation of delv looks like:

-
 delve @server name type 
+
 delv @server name type 

where: @@ -95,21 +95,21 @@ can be an IPv4 address in dotted-decimal notation or an IPv6 address in colon-delimited notation. When the supplied server argument is a hostname, - delve resolves that name before + delv resolves that name before querying that name server (note, however, that this initial lookup is not validated by DNSSEC).

If no server argument is - provided, delve consults + provided, delv consults /etc/resolv.conf; if an address is found there, it queries the name server at that address. If either of the -4 or -6 options are in use, then only addresses for the corresponding transport will be tried. If no usable addresses are found, - delve will send queries to + delv will send queries to the localhost addresses (127.0.0.1 for IPv4, ::1 for IPv6).

@@ -125,7 +125,7 @@ type can be any valid query type. If no type argument is supplied, - delve will perform a lookup for an + delv will perform a lookup for an A record.

@@ -152,17 +152,17 @@

Note: When reading the trust anchor file, - delve treats managed-keys + delv treats managed-keys statements and trusted-keys statements identically. That is, for a managed key, it is the initial key that is trusted; RFC 5011 - key management is not supported. delve + key management is not supported. delv will not consult the managed-keys database maintained by named. This means that if either of the keys in /etc/bind.keys is revoked and rolled over, it will be necessary to update /etc/bind.keys to use DNSSEC - validation in delve. + validation in delv.

-b address
@@ -176,7 +176,7 @@
-c class

Sets the query class for the requested data. Currently, - only class "IN" is supported in delve + only class "IN" is supported in delv and any other value is ignored.

-d level
@@ -184,7 +184,7 @@ Set the systemwide debug level to level. The allowed range is from 0 to 99. The default is 0 (no debugging). - Debugging traces from delve become + Debugging traces from delv become more verbose as the debug level increases. See the +mtrace, +rtrace, and +vtrace options below for additional @@ -192,7 +192,7 @@

-h

- Display the delve help usage output and exit. + Display the delv help usage output and exit.

-i

@@ -200,7 +200,7 @@ (Note, however, this does not set the CD bit on upstream queries. If the server being queried is performing DNSSEC validation, then it will not return invalid data; this - can cause delve to time out. When it + can cause delv to time out. When it is necessary to examine invalid data to debug a DNSSEC problem, use dig +cd.)

@@ -242,7 +242,7 @@
-v

- Print the delve version and exit. + Print the delv version and exit.

-x addr

@@ -251,24 +251,24 @@ dotted-decimal notation, or a colon-delimited IPv6 address. When -x is used, there is no need to provide the name or type - arguments. delve automatically performs a + arguments. delv automatically performs a lookup for a name like 11.12.13.10.in-addr.arpa and sets the query type to PTR. IPv6 addresses are looked up using nibble format under the IP6.ARPA domain.

-4

- Forces delve to only use IPv4. + Forces delv to only use IPv4.

-6

- Forces delve to only use IPv6. + Forces delv to only use IPv6.

QUERY OPTIONS

-

delve +

delv provides a number of query options which affect the way results are displayed, and in some cases the way lookups are performed.

@@ -286,12 +286,12 @@
+[no]cdflag

Controls whether to set the CD (checking disabled) bit in - queries sent by delve. This may be useful + queries sent by delv. This may be useful when troubleshooting DNSSEC problems from behind a validating resolver. A validating resolver will block invalid responses, making it difficult to retrieve them for analysis. Setting the CD flag on queries will cause the resolver to return - invalid responses, which delve can then + invalid responses, which delv can then validate internally and report the errors in detail.

+[no]class
@@ -308,7 +308,7 @@

Toggle resolver fetch logging. This reports the - name and type of each query sent by delve + name and type of each query sent by delv in the process of carrying out the resolution and validation process: this includes including the original query and all subsequent queries to follow CNAMEs and to establish a @@ -326,7 +326,7 @@

Toggle message logging. This produces a detailed dump of - the responses received by delve in the + the responses received by delv in the process of carrying out the resolution and validation process.

@@ -406,13 +406,13 @@ Print long records (such as RRSIG, DNSKEY, and SOA records) in a verbose multi-line format with human-readable comments. The default is to print each record on a single line, to - facilitate machine parsing of the delve + facilitate machine parsing of the delv output.

+[no]dnssec

Indicates whether to display RRSIG records in the - delve output. The default is to + delv output. The default is to do so. Note that (unlike in dig) this does not control whether to request DNSSEC records or whether to validate them. diff --git a/doc/arm/Bv9ARM.ch10.html b/doc/arm/Bv9ARM.ch10.html index 57a8a13c770..f56b663526c 100644 --- a/doc/arm/Bv9ARM.ch10.html +++ b/doc/arm/Bv9ARM.ch10.html @@ -55,7 +55,7 @@ host — DNS lookup utility

-delve — DNS lookup and validation utility +delv — DNS lookup and validation utility
dnssec-checkds — A DNSSEC delegation consistency checking tool. diff --git a/doc/arm/Bv9ARM.html b/doc/arm/Bv9ARM.html index 3c35a5a7b75..2af56cc1fcb 100644 --- a/doc/arm/Bv9ARM.html +++ b/doc/arm/Bv9ARM.html @@ -269,7 +269,7 @@ host — DNS lookup utility
-delve — DNS lookup and validation utility +delv — DNS lookup and validation utility
dnssec-checkds — A DNSSEC delegation consistency checking tool. diff --git a/doc/arm/man.arpaname.html b/doc/arm/man.arpaname.html index f790c9967b4..813ae107f10 100644 --- a/doc/arm/man.arpaname.html +++ b/doc/arm/man.arpaname.html @@ -50,20 +50,20 @@

arpaname {ipaddress ...}

-

DESCRIPTION

+

DESCRIPTION

arpaname translates IP addresses (IPv4 and IPv6) to the corresponding IN-ADDR.ARPA or IP6.ARPA names.

-

SEE ALSO

+

SEE ALSO

BIND 9 Administrator Reference Manual.

-

AUTHOR

+

AUTHOR

Internet Systems Consortium

diff --git a/doc/arm/man.ddns-confgen.html b/doc/arm/man.ddns-confgen.html index 9d29e8e6ee3..1b0b193175b 100644 --- a/doc/arm/man.ddns-confgen.html +++ b/doc/arm/man.ddns-confgen.html @@ -51,7 +51,7 @@

ddns-confgen [-a algorithm] [-h] [-k keyname] [-q] [-r randomfile] [ -s name | -z zone ]

-

DESCRIPTION

+

DESCRIPTION

tsig-keygen and ddns-confgen are invokation methods for a utility that generates keys for use @@ -87,7 +87,7 @@

-

OPTIONS

+

OPTIONS

-a algorithm

@@ -159,7 +159,7 @@

-

SEE ALSO

+

SEE ALSO

nsupdate(1), named.conf(5), named(8), @@ -167,7 +167,7 @@

-

AUTHOR

+

AUTHOR

Internet Systems Consortium

diff --git a/doc/arm/man.delv.html b/doc/arm/man.delv.html index 187b4171c25..65ae75e4b69 100644 --- a/doc/arm/man.delv.html +++ b/doc/arm/man.delv.html @@ -18,7 +18,7 @@ -delve +delv @@ -28,7 +28,7 @@ diff --git a/doc/arm/man.isc-hmac-fixup.html b/doc/arm/man.isc-hmac-fixup.html index e61b2530dcc..bc770e4f54c 100644 --- a/doc/arm/man.isc-hmac-fixup.html +++ b/doc/arm/man.isc-hmac-fixup.html @@ -50,7 +50,7 @@

isc-hmac-fixup {algorithm} {secret}

-

DESCRIPTION

+

DESCRIPTION

Versions of BIND 9 up to and including BIND 9.6 had a bug causing HMAC-SHA* TSIG keys which were longer than the digest length of the @@ -76,7 +76,7 @@

-

SECURITY CONSIDERATIONS

+

SECURITY CONSIDERATIONS

Secrets that have been converted by isc-hmac-fixup are shortened, but as this is how the HMAC protocol works in @@ -87,14 +87,14 @@

-

SEE ALSO

+

SEE ALSO

BIND 9 Administrator Reference Manual, RFC 2104.

-

AUTHOR

+

AUTHOR

Internet Systems Consortium

diff --git a/doc/arm/man.named-checkconf.html b/doc/arm/man.named-checkconf.html index 9e4ba28a1f7..5b33acd2fc4 100644 --- a/doc/arm/man.named-checkconf.html +++ b/doc/arm/man.named-checkconf.html @@ -119,21 +119,21 @@
-

RETURN VALUES

+

RETURN VALUES

named-checkconf returns an exit status of 1 if errors were detected and 0 otherwise.

-

SEE ALSO

+

SEE ALSO

named(8), named-checkzone(8), BIND 9 Administrator Reference Manual.

-

AUTHOR

+

AUTHOR

Internet Systems Consortium

diff --git a/doc/arm/man.nsec3hash.html b/doc/arm/man.nsec3hash.html index 6429195c5f9..b57e7723d7f 100644 --- a/doc/arm/man.nsec3hash.html +++ b/doc/arm/man.nsec3hash.html @@ -48,7 +48,7 @@

nsec3hash {salt} {algorithm} {iterations} {domain}

-

DESCRIPTION

+

DESCRIPTION

nsec3hash generates an NSEC3 hash based on a set of NSEC3 parameters. This can be used to check the validity @@ -56,7 +56,7 @@

-

ARGUMENTS

+

ARGUMENTS

salt

@@ -80,14 +80,14 @@

-

SEE ALSO

+

SEE ALSO

BIND 9 Administrator Reference Manual, RFC 5155.

-

AUTHOR

+

AUTHOR

Internet Systems Consortium

diff --git a/doc/arm/man.rndc-confgen.html b/doc/arm/man.rndc-confgen.html index 84b221a62ed..65988620de6 100644 --- a/doc/arm/man.rndc-confgen.html +++ b/doc/arm/man.rndc-confgen.html @@ -197,7 +197,7 @@

-

SEE ALSO

+

SEE ALSO

rndc(8), rndc.conf(5), named(8), @@ -205,7 +205,7 @@

-

AUTHOR

+

AUTHOR

Internet Systems Consortium

diff --git a/doc/arm/man.rndc.conf.html b/doc/arm/man.rndc.conf.html index 8d505481cd7..57cfdff6049 100644 --- a/doc/arm/man.rndc.conf.html +++ b/doc/arm/man.rndc.conf.html @@ -210,7 +210,7 @@

-

NAME SERVER CONFIGURATION

+

NAME SERVER CONFIGURATION

The name server must be configured to accept rndc connections and to recognize the key specified in the rndc.conf @@ -220,7 +220,7 @@

-

SEE ALSO

+

SEE ALSO

rndc(8), rndc-confgen(8), mmencode(1), @@ -228,7 +228,7 @@

-

AUTHOR

+

AUTHOR

Internet Systems Consortium