1RNDC(8)                              BIND9                             RNDC(8)
2
3
4

NAME

6       rndc - name server control utility
7

SYNOPSIS

9       rndc [-b source-address] [-c config-file] [-k key-file] [-s server]
10            [-p port] [-V] [-y key_id] {command}
11

DESCRIPTION

13       rndc controls the operation of a name server. It supersedes the ndc
14       utility that was provided in old BIND releases. If rndc is invoked with
15       no command line options or arguments, it prints a short summary of the
16       supported commands and the available options and their arguments.
17
18       rndc communicates with the name server over a TCP connection, sending
19       commands authenticated with digital signatures. In the current versions
20       of rndc and named, the only supported authentication algorithm is
21       HMAC-MD5, which uses a shared secret on each end of the connection.
22       This provides TSIG-style authentication for the command request and the
23       name server's response. All commands sent over the channel must be
24       signed by a key_id known to the server.
25
26       rndc reads a configuration file to determine how to contact the name
27       server and decide what algorithm and key it should use.
28

OPTIONS

30       -b source-address
31           Use source-address as the source address for the connection to the
32           server. Multiple instances are permitted to allow setting of both
33           the IPv4 and IPv6 source addresses.
34
35       -c config-file
36           Use config-file as the configuration file instead of the default,
37           /etc/rndc.conf.
38
39       -k key-file
40           Use key-file as the key file instead of the default, /etc/rndc.key.
41           The key in /etc/rndc.key will be used to authenticate commands sent
42           to the server if the config-file does not exist.
43
44       -s server
45           server is the name or address of the server which matches a server
46           statement in the configuration file for rndc. If no server is
47           supplied on the command line, the host named by the default-server
48           clause in the options statement of the rndc configuration file will
49           be used.
50
51       -p port
52           Send commands to TCP port port instead of BIND 9's default control
53           channel port, 953.
54
55       -V
56           Enable verbose logging.
57
58       -y key_id
59           Use the key key_id from the configuration file.  key_id must be
60           known by named with the same algorithm and secret string in order
61           for control message validation to succeed. If no key_id is
62           specified, rndc will first look for a key clause in the server
63           statement of the server being used, or if no server statement is
64           present for that host, then the default-key clause of the options
65           statement. Note that the configuration file contains shared secrets
66           which are used to send authenticated control commands to name
67           servers. It should therefore not have general read or write access.
68

COMMANDS

70       A list of commands supported by rndc can be seen by running rndc
71       without arguments.
72
73       Currently supported commands are:
74
75       reload
76           Reload configuration file and zones.
77
78       reload zone [class [view]]
79           Reload the given zone.
80
81       refresh zone [class [view]]
82           Schedule zone maintenance for the given zone.
83
84       retransfer zone [class [view]]
85           Retransfer the given zone from the master.
86
87       sign zone [class [view]]
88           Fetch all DNSSEC keys for the given zone from the key directory
89           (see the key-directory option in the BIND 9 Administrator Reference
90           Manual). If they are within their publication period, merge them
91           into the zone's DNSKEY RRset. If the DNSKEY RRset is changed, then
92           the zone is automatically re-signed with the new key set.
93
94           This command requires that the auto-dnssec zone option be set to
95           allow or maintain, and also requires the zone to be configured to
96           allow dynamic DNS. (See "Dynamic Update Policies" in the
97           Administrator Reference Manual for more details.)
98
99       loadkeys zone [class [view]]
100           Fetch all DNSSEC keys for the given zone from the key directory. If
101           they are within their publication period, merge them into the
102           zone's DNSKEY RRset. Unlike rndc sign, however, the zone is not
103           immediately re-signed by the new keys, but is allowed to
104           incrementally re-sign over time.
105
106           This command requires that the auto-dnssec zone option be set to
107           maintain, and also requires the zone to be configured to allow
108           dynamic DNS. (See "Dynamic Update Policies" in the Administrator
109           Reference Manual for more details.)
110
111       freeze [zone [class [view]]]
112           Suspend updates to a dynamic zone. If no zone is specified, then
113           all zones are suspended. This allows manual edits to be made to a
114           zone normally updated by dynamic update. It also causes changes in
115           the journal file to be synced into the master file. All dynamic
116           update attempts will be refused while the zone is frozen.
117
118       thaw [zone [class [view]]]
119           Enable updates to a frozen dynamic zone. If no zone is specified,
120           then all frozen zones are enabled. This causes the server to reload
121           the zone from disk, and re-enables dynamic updates after the load
122           has completed. After a zone is thawed, dynamic updates will no
123           longer be refused. If the zone has changed and the
124           ixfr-from-differences option is in use, then the journal file will
125           be updated to reflect changes in the zone. Otherwise, if the zone
126           has changed, any existing journal file will be removed.
127
128       sync [-clean] [zone [class [view]]]
129           Sync changes in the journal file for a dynamic zone to the master
130           file. If the "-clean" option is specified, the journal file is also
131           removed. If no zone is specified, then all zones are synced.
132
133       notify zone [class [view]]
134           Resend NOTIFY messages for the zone.
135
136       reconfig
137           Reload the configuration file and load new zones, but do not reload
138           existing zone files even if they have changed. This is faster than
139           a full reload when there is a large number of zones because it
140           avoids the need to examine the modification times of the zones
141           files.
142
143       stats
144           Write server statistics to the statistics file.
145
146       querylog [on|off]
147           Enable or disable query logging. (For backward compatibility, this
148           command can also be used without an argument to toggle query
149           logging on and off.)
150
151           Query logging can also be enabled by explicitly directing the
152           queries category to a channel in the logging section of named.conf
153           or by specifying querylog yes; in the options section of
154           named.conf.
155
156       dumpdb [-all|-cache|-zone] [view ...]
157           Dump the server's caches (default) and/or zones to the dump file
158           for the specified views. If no view is specified, all views are
159           dumped.
160
161       secroots [view ...]
162           Dump the server's security roots to the secroots file for the
163           specified views. If no view is specified, security roots for all
164           views are dumped.
165
166       stop [-p]
167           Stop the server, making sure any recent changes made through
168           dynamic update or IXFR are first saved to the master files of the
169           updated zones. If -p is specified named's process id is returned.
170           This allows an external process to determine when named had
171           completed stopping.
172
173       halt [-p]
174           Stop the server immediately. Recent changes made through dynamic
175           update or IXFR are not saved to the master files, but will be
176           rolled forward from the journal files when the server is restarted.
177           If -p is specified named's process id is returned. This allows an
178           external process to determine when named had completed halting.
179
180       trace
181           Increment the servers debugging level by one.
182
183       trace level
184           Sets the server's debugging level to an explicit value.
185
186       notrace
187           Sets the server's debugging level to 0.
188
189       flush
190           Flushes the server's cache.
191
192       flushname name [view]
193           Flushes the given name from the server's DNS cache and, if
194           applicable, from the server's nameserver address database or
195           bad-server cache.
196
197       flushtree name [view]
198           Flushes the given name, and all of its subdomains, from the
199           server's DNS cache. Note that this does not affect he server's
200           address database or bad-server cache.
201
202       status
203           Display status of the server. Note that the number of zones
204           includes the internal bind/CH zone and the default ./IN hint zone
205           if there is not an explicit root zone configured.
206
207       recursing
208           Dump the list of queries named is currently recursing on.
209
210       validation ( on | off | check ) [view ...]
211           Enable, disable, or check the current status of DNSSEC validation.
212           Note dnssec-enable also needs to be set to yes or auto to be
213           effective. It defaults to enabled.
214
215       tsig-list
216           List the names of all TSIG keys currently configured for use by
217           named in each view. The list both statically configured keys and
218           dynamic TKEY-negotiated keys.
219
220       tsig-delete keyname [view]
221           Delete a given TKEY-negotiated key from the server. (This does not
222           apply to statically configured TSIG keys.)
223
224       addzone zone [class [view]] configuration
225           Add a zone while the server is running. This command requires the
226           allow-new-zones option to be set to yes. The configuration string
227           specified on the command line is the zone configuration text that
228           would ordinarily be placed in named.conf.
229
230           The configuration is saved in a file called hash.nzf, where hash is
231           a cryptographic hash generated from the name of the view. When
232           named is restarted, the file will be loaded into the view
233           configuration, so that zones that were added can persist after a
234           restart.
235
236           This sample addzone command would add the zone example.com to the
237           default view:
238
239           $rndc addzone example.com '{ type master; file "example.com.db";
240           };'
241
242           (Note the brackets and semi-colon around the zone configuration
243           text.)
244
245       delzone zone [class [view]]
246           Delete a zone while the server is running. Only zones that were
247           originally added via rndc addzone can be deleted in this manner.
248
249       signing [( -list | -clear keyid/algorithm | -clear all | -nsec3param (
250       parameters | none ) ) ] zone [class [view]]
251           List, edit, or remove the DNSSEC signing state for the specified
252           zone. The status of ongoing DNSSEC operations (such as signing or
253           generating NSEC3 chains) is stored in the zone in the form of DNS
254           resource records of type sig-signing-type.  rndc signing -list
255           converts these records into a human-readable form, indicating which
256           keys are currently signing or have finished signing the zone, and
257           which NSEC3 chains are being created or removed.
258
259           rndc signing -clear can remove a single key (specified in the same
260           format that rndc signing -list uses to display it), or all keys. In
261           either case, only completed keys are removed; any record indicating
262           that a key has not yet finished signing the zone will be retained.
263
264           rndc signing -nsec3param sets the NSEC3 parameters for a zone. This
265           is the only supported mechanism for using NSEC3 with inline-signing
266           zones. Parameters are specified in the same format as an NSEC3PARAM
267           resource record: hash algorithm, flags, iterations, and salt, in
268           that order.
269
270           Currently, the only defined value for hash algorithm is 1,
271           representing SHA-1. The flags may be set to 0 or 1, depending on
272           whether you wish to set the opt-out bit in the NSEC3 chain.
273           iterations defines the number of additional times to apply the
274           algorithm when generating an NSEC3 hash. The salt is a string of
275           data expressed in hexidecimal, or a hyphen (`-') if no salt is to
276           be used.
277
278           So, for example, to create an NSEC3 chain using the SHA-1 hash
279           algorithm, no opt-out flag, 10 iterations, and a salt value of
280           "FFFF", use: rndc signing -nsec3param 1 0 10 FFFF zone. To set the
281           opt-out flag, 15 iterations, and no salt, use: rndc signing
282           -nsec3param 1 1 15 - zone.
283
284           rndc signing -nsec3param none removes an existing NSEC3 chain and
285           replaces it with NSEC.
286

LIMITATIONS

288       There is currently no way to provide the shared secret for a key_id
289       without using the configuration file.
290
291       Several error messages could be clearer.
292

SEE ALSO

294       rndc.conf(5), rndc-confgen(8), named(8), named.conf(5), ndc(8), BIND 9
295       Administrator Reference Manual.
296

AUTHOR

298       Internet Systems Consortium
299
301       Copyright © 2004, 2005, 2007, 2013 Internet Systems Consortium, Inc.
302       ("ISC")
303       Copyright © 2000, 2001 Internet Software Consortium.
304
305
306
307BIND9                            June 7, 2013                          RNDC(8)
Impressum