summaryrefslogtreecommitdiff
path: root/usr.sbin
diff options
context:
space:
mode:
authorJakob Schlyter <jakob@cvs.openbsd.org>2007-12-19 09:48:01 +0000
committerJakob Schlyter <jakob@cvs.openbsd.org>2007-12-19 09:48:01 +0000
commit3f04960ab42edd7b3363a861bdbaf5e52206addc (patch)
tree649d817608915019ee917d5c62361e7f59d4ca60 /usr.sbin
parent36a379484c755eccc145a03ee2babe4e19c97da6 (diff)
regen
Diffstat (limited to 'usr.sbin')
-rw-r--r--usr.sbin/bind/bin/rndc/rndc.8151
1 files changed, 61 insertions, 90 deletions
diff --git a/usr.sbin/bind/bin/rndc/rndc.8 b/usr.sbin/bind/bin/rndc/rndc.8
index 4840dd71a76..946d73fa267 100644
--- a/usr.sbin/bind/bin/rndc/rndc.8
+++ b/usr.sbin/bind/bin/rndc/rndc.8
@@ -1,117 +1,88 @@
-.\"
-.\" Copyright (C) 2000, 2001 Internet Software Consortium.
-.\"
+.\" Copyright (C) 2004, 2005, 2007 Internet Systems Consortium, Inc. ("ISC")
+.\" Copyright (C) 2000, 2001 Internet Software Consortium.
+.\"
.\" Permission to use, copy, modify, and distribute this software for any
.\" purpose with or without fee is hereby granted, provided that the above
.\" copyright notice and this permission notice appear in all copies.
+.\"
+.\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
+.\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
+.\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
+.\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
+.\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
+.\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
+.\" PERFORMANCE OF THIS SOFTWARE.
.\"
-.\" THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM
-.\" DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
-.\" INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
-.\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
-.\" FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
-.\" NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
-.\" WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
+.\" $Id: rndc.8,v 1.2 2007/12/19 09:48:00 jakob Exp $
.\"
-.TH "RNDC" "8" "June 30, 2000" "BIND9" ""
+.hy 0
+.ad l
+.\"Generated by db2man.xsl. Don't modify this, modify the source.
+.de Sh \" Subsection
+.br
+.if t .Sp
+.ne 5
+.PP
+\fB\\$1\fR
+.PP
+..
+.de Sp \" Vertical space (when we can't use .PP)
+.if t .sp .5v
+.if n .sp
+..
+.de Ip \" List item
+.br
+.ie \\n(.$>=3 .ne \\$3
+.el .ne 3
+.IP "\\$1" \\$2
+..
+.TH "RNDC" 8 "June 30, 2000" "" ""
.SH NAME
rndc \- name server control utility
-.SH SYNOPSIS
-.sp
-\fBrndc\fR [ \fB-c \fIconfig-file\fB\fR ] [ \fB-k \fIkey-file\fB\fR ] [ \fB-s \fIserver\fB\fR ] [ \fB-p \fIport\fB\fR ] [ \fB-V\fR ] [ \fB-y \fIkey_id\fB\fR ] \fBcommand\fR
+.SH "SYNOPSIS"
+.HP 5
+\fBrndc\fR [\fB\-b\ \fIsource\-address\fR\fR] [\fB\-c\ \fIconfig\-file\fR\fR] [\fB\-k\ \fIkey\-file\fR\fR] [\fB\-s\ \fIserver\fR\fR] [\fB\-p\ \fIport\fR\fR] [\fB\-V\fR] [\fB\-y\ \fIkey_id\fR\fR] {command}
.SH "DESCRIPTION"
.PP
-\fBrndc\fR controls the operation of a name
-server. It supersedes the \fBndc\fR utility
-that was provided in old BIND releases. If
-\fBrndc\fR is invoked with no command line
-options or arguments, it prints a short summary of the
-supported commands and the available options and their
-arguments.
+\fBrndc\fR controls the operation of a name server\&. It supersedes the \fBndc\fR utility that was provided in old BIND releases\&. If \fBrndc\fR is invoked with no command line options or arguments, it prints a short summary of the supported commands and the available options and their arguments\&.
.PP
-\fBrndc\fR communicates with the name server
-over a TCP connection, sending commands authenticated with
-digital signatures. In the current versions of
-\fBrndc\fR and \fBnamed\fR named
-the only supported authentication algorithm is HMAC-MD5,
-which uses a shared secret on each end of the connection.
-This provides TSIG-style authentication for the command
-request and the name server's response. All commands sent
-over the channel must be signed by a key_id known to the
-server.
+\fBrndc\fR communicates with the name server over a TCP connection, sending commands authenticated with digital signatures\&. In the current versions of \fBrndc\fR and \fBnamed\fR, the only supported authentication algorithm is HMAC\-MD5, which uses a shared secret on each end of the connection\&. This provides TSIG\-style authentication for the command request and the name server's response\&. All commands sent over the channel must be signed by a key_id known to the server\&.
.PP
-\fBrndc\fR reads a configuration file to
-determine how to contact the name server and decide what
-algorithm and key it should use.
+\fBrndc\fR reads a configuration file to determine how to contact the name server and decide what algorithm and key it should use\&.
.SH "OPTIONS"
.TP
-\fB-c \fIconfig-file\fB\fR
-Use \fIconfig-file\fR
-as the configuration file instead of the default,
-\fI/etc/rndc.conf\fR.
+\-b \fIsource\-address\fR
+Use \fIsource\-address\fR as the source address for the connection to the server\&. Multiple instances are permitted to allow setting of both the IPv4 and IPv6 source addresses\&.
.TP
-\fB-k \fIkey-file\fB\fR
-Use \fIkey-file\fR
-as the key file instead of the default,
-\fI/etc/rndc.key\fR. The key in
-\fI/etc/rndc.key\fR will be used to authenticate
-commands sent to the server if the \fIconfig-file\fR
-does not exist.
+\-c \fIconfig\-file\fR
+Use \fIconfig\-file\fR as the configuration file instead of the default, \fI/etc/rndc\&.conf\fR\&.
.TP
-\fB-s \fIserver\fB\fR
-\fIserver\fR is
-the name or address of the server which matches a
-server statement in the configuration file for
-\fBrndc\fR. If no server is supplied on the
-command line, the host named by the default-server clause
-in the option statement of the configuration file will be
-used.
+\-k \fIkey\-file\fR
+Use \fIkey\-file\fR as the key file instead of the default, \fI/etc/rndc\&.key\fR\&. The key in \fI/etc/rndc\&.key\fR will be used to authenticate commands sent to the server if the \fIconfig\-file\fR does not exist\&.
.TP
-\fB-p \fIport\fB\fR
-Send commands to TCP port
-\fIport\fR instead
-of BIND 9's default control channel port, 953.
+\-s \fIserver\fR
+\fIserver\fR is the name or address of the server which matches a server statement in the configuration file for \fBrndc\fR\&. If no server is supplied on the command line, the host named by the default\-server clause in the options statement of the \fBrndc\fR configuration file will be used\&.
.TP
-\fB-V\fR
-Enable verbose logging.
+\-p \fIport\fR
+Send commands to TCP port \fIport\fR instead of BIND 9's default control channel port, 953\&.
.TP
-\fB-y \fIkeyid\fB\fR
-Use the key \fIkeyid\fR
-from the configuration file.
-\fIkeyid\fR must be
-known by named with the same algorithm and secret string
-in order for control message validation to succeed.
-If no \fIkeyid\fR
-is specified, \fBrndc\fR will first look
-for a key clause in the server statement of the server
-being used, or if no server statement is present for that
-host, then the default-key clause of the options statement.
-Note that the configuration file contains shared secrets
-which are used to send authenticated control commands
-to name servers. It should therefore not have general read
-or write access.
-.PP
-For the complete set of commands supported by \fBrndc\fR,
-see the BIND 9 Administrator Reference Manual or run
-\fBrndc\fR without arguments to see its help message.
+\-V
+Enable verbose logging\&.
+.TP
+\-y \fIkey_id\fR
+Use the key \fIkey_id\fR from the configuration file\&. \fIkey_id\fR must be known by named with the same algorithm and secret string in order for control message validation to succeed\&. If no \fIkey_id\fR is specified, \fBrndc\fR will first look for a key clause in the server statement of the server being used, or if no server statement is present for that host, then the default\-key clause of the options statement\&. Note that the configuration file contains shared secrets which are used to send authenticated control commands to name servers\&. It should therefore not have general read or write access\&.
.PP
+For the complete set of commands supported by \fBrndc\fR, see the BIND 9 Administrator Reference Manual or run \fBrndc\fR without arguments to see its help message\&.
.SH "LIMITATIONS"
.PP
-\fBrndc\fR does not yet support all the commands of
-the BIND 8 \fBndc\fR utility.
+\fBrndc\fR does not yet support all the commands of the BIND 8 \fBndc\fR utility\&.
.PP
-There is currently no way to provide the shared secret for a
-\fBkey_id\fR without using the configuration file.
+There is currently no way to provide the shared secret for a \fBkey_id\fR without using the configuration file\&.
.PP
-Several error messages could be clearer.
+Several error messages could be clearer\&.
.SH "SEE ALSO"
.PP
-\fBrndc.conf\fR(5),
-\fBnamed\fR(8),
-\fBnamed.conf\fR(5)
-\fBndc\fR(8),
-\fIBIND 9 Administrator Reference Manual\fR.
+\fBrndc\&.conf\fR(5), \fBrndc\-confgen\fR(8), \fBnamed\fR(8), \fBnamed\&.conf\fR(5), \fBndc\fR(8), BIND 9 Administrator Reference Manual\&.
.SH "AUTHOR"
.PP
-Internet Software Consortium
+Internet Systems Consortium