1unbound-host(1) unbound 1.17.1 unbound-host(1)
2
3
4
6 unbound-host - unbound DNS lookup utility
7
9 unbound-host [-C configfile] [-vdhr46D] [-c class] [-t type] [-y key]
10 [-f keyfile] [-F namedkeyfile] hostname
11
13 Unbound-host uses the Unbound validating resolver to query for the
14 hostname and display results. With the -v option it displays validation
15 status: secure, insecure, bogus (security failure).
16
17 By default it reads no configuration file whatsoever. It attempts to
18 reach the internet root servers. With -C an Unbound config file and
19 with -r resolv.conf can be read.
20
21 The available options are:
22
23 hostname
24 This name is resolved (looked up in the DNS). If a IPv4 or IPv6
25 address is given, a reverse lookup is performed.
26
27 -h Show the version and commandline option help.
28
29 -v Enable verbose output and it shows validation results, on every
30 line. Secure means that the NXDOMAIN (no such domain name), no‐
31 data (no such data) or positive data response validated cor‐
32 rectly with one of the keys. Insecure means that that domain
33 name has no security set up for it. Bogus (security failure)
34 means that the response failed one or more checks, it is likely
35 wrong, outdated, tampered with, or broken.
36
37 -d Enable debug output to stderr. One -d shows what the resolver
38 and validator are doing and may tell you what is going on. More
39 times, -d -d, gives a lot of output, with every packet sent and
40 received.
41
42 -c class
43 Specify the class to lookup for, the default is IN the internet
44 class.
45
46 -t type
47 Specify the type of data to lookup. The default looks for IPv4,
48 IPv6 and mail handler data, or domain name pointers for reverse
49 queries.
50
51 -y key Specify a public key to use as trust anchor. This is the base
52 for a chain of trust that is built up from the trust anchor to
53 the response, in order to validate the response message. Can be
54 given as a DS or DNSKEY record. For example -y "example.com DS
55 31560 5 1 1CFED84787E6E19CCF9372C1187325972FE546CD".
56
57 -D Enables DNSSEC validation. Reads the root anchor from the de‐
58 fault configured root anchor at the default location,
59 /var/lib/unbound/root.key.
60
61 -f keyfile
62 Reads keys from a file. Every line has a DS or DNSKEY record, in
63 the format as for -y. The zone file format, the same as dig and
64 drill produce.
65
66 -F namedkeyfile
67 Reads keys from a BIND-style named.conf file. Only the
68 trusted-key {}; entries are read.
69
70 -C configfile
71 Uses the specified unbound.conf to prime libunbound(3). Pass it
72 as first argument if you want to override some options from the
73 config file with further arguments on the commandline.
74
75 -r Read /etc/resolv.conf, and use the forward DNS servers from
76 there (those could have been set by DHCP). More info in re‐
77 solv.conf(5). Breaks validation if those servers do not support
78 DNSSEC.
79
80 -4 Use solely the IPv4 network for sending packets.
81
82 -6 Use solely the IPv6 network for sending packets.
83
85 Some examples of use. The keys shown below are fakes, thus a security
86 failure is encountered.
87
88 $ unbound-host www.example.com
89
90 $ unbound-host -v -y "example.com DS 31560 5 1
91 1CFED84787E6E19CCF9372C1187325972FE546CD" www.example.com
92
93 $ unbound-host -v -y "example.com DS 31560 5 1
94 1CFED84787E6E19CCF9372C1187325972FE546CD" 192.0.2.153
95
97 The unbound-host program exits with status code 1 on error, 0 on no er‐
98 ror. The data may not be available on exit code 0, exit code 1 means
99 the lookup encountered a fatal error.
100
102 unbound.conf(5), unbound(8).
103
104
105
106NLnet Labs Jan 12, 2023 unbound-host(1)