1NAMED(8) BIND 9 NAMED(8)
2
3
4
6 named - Internet domain name server
7
9 named [ [-4] | [-6] ] [-c config-file] [-C] [-d debug-level] [-D
10 string] [-E engine-name] [-f] [-g] [-L logfile] [-M option] [-m flag]
11 [-n #cpus] [-p port] [-s] [-t directory] [-U #listeners] [-u user] [-v]
12 [-V] [-X lock-file]
13
15 named is a Domain Name System (DNS) server, part of the BIND 9 distri‐
16 bution from ISC. For more information on the DNS, see RFC 1033, RFC
17 1034, and RFC 1035.
18
19 When invoked without arguments, named reads the default configuration
20 file /etc/named.conf, reads any initial data, and listens for queries.
21
23 -4 This option tells named to use only IPv4, even if the host ma‐
24 chine is capable of IPv6. -4 and -6 are mutually exclusive.
25
26 -6 This option tells named to use only IPv6, even if the host ma‐
27 chine is capable of IPv4. -4 and -6 are mutually exclusive.
28
29 -c config-file
30 This option tells named to use config-file as its configuration
31 file instead of the default, /etc/named.conf. To ensure that the
32 configuration file can be reloaded after the server has changed
33 its working directory due to to a possible directory option in
34 the configuration file, config-file should be an absolute path‐
35 name.
36
37 -C This option prints out the default built-in configuration and
38 exits.
39
40 NOTE: This is for debugging purposes only and is not an accurate
41 representation of the actual configuration used by named at run‐
42 time.
43
44 -d debug-level
45 This option sets the daemon's debug level to debug-level. Debug‐
46 ging traces from named become more verbose as the debug level
47 increases.
48
49 -D string
50 This option specifies a string that is used to identify a in‐
51 stance of named in a process listing. The contents of string are
52 not examined.
53
54 -E engine-name
55 When applicable, this option specifies the hardware to use for
56 cryptographic operations, such as a secure key store used for
57 signing.
58
59 When BIND 9 is built with OpenSSL, this needs to be set to the
60 OpenSSL engine identifier that drives the cryptographic acceler‐
61 ator or hardware service module (usually pkcs11).
62
63 -f This option runs the server in the foreground (i.e., do not dae‐
64 monize).
65
66 -g This option runs the server in the foreground and forces all
67 logging to stderr.
68
69 -L logfile
70 This option sets the log to the file logfile by default, instead
71 of the system log.
72
73 -M option
74 This option sets the default (comma-separated) memory context
75 options. The possible flags are:
76
77 • fill: fill blocks of memory with tag values when they are al‐
78 located or freed, to assist debugging of memory problems; this
79 is the implicit default if named has been compiled with --en‐
80 able-developer.
81
82 • nofill: disable the behavior enabled by fill; this is the im‐
83 plicit default unless named has been compiled with --en‐
84 able-developer.
85
86 -m flag
87 This option turns on memory usage debugging flags. Possible
88 flags are usage, trace, record, size, and mctx. These correspond
89 to the ISC_MEM_DEBUGXXXX flags described in <isc/mem.h>.
90
91 -n #cpus
92 This option creates #cpus worker threads to take advantage of
93 multiple CPUs. If not specified, named tries to determine the
94 number of CPUs present and creates one thread per CPU. If it is
95 unable to determine the number of CPUs, a single worker thread
96 is created.
97
98 -p value
99 This option specifies the port(s) on which the server will lis‐
100 ten for queries. If value is of the form <portnum> or dns=<port‐
101 num>, the server will listen for DNS queries on portnum; if not
102 not specified, the default is port 53. If value is of the form
103 tls=<portnum>, the server will listen for TLS queries on port‐
104 num; the default is 853. If value is of the form https=<port‐
105 num>, the server will listen for HTTPS queries on portnum; the
106 default is 443. If value is of the form http=<portnum>, the
107 server will listen for HTTP queries on portnum; the default is
108 80.
109
110 -s This option writes memory usage statistics to stdout on exit.
111
112 NOTE:
113 This option is mainly of interest to BIND 9 developers and may be
114 removed or changed in a future release.
115
116 -S #max-socks
117 This option is deprecated and no longer has any function.
118
119 WARNING:
120 This option should be unnecessary for the vast majority of users.
121 The use of this option could even be harmful, because the specified
122 value may exceed the limitation of the underlying system API. It is
123 therefore set only when the default configuration causes exhaustion
124 of file descriptors and the operational environment is known to sup‐
125 port the specified number of sockets. Note also that the actual max‐
126 imum number is normally slightly fewer than the specified value, be‐
127 cause named reserves some file descriptors for its internal use.
128
129 -t directory
130 This option tells named to chroot to directory after processing
131 the command-line arguments, but before reading the configuration
132 file.
133
134 WARNING:
135 This option should be used in conjunction with the -u option, as ch‐
136 rooting a process running as root doesn't enhance security on most
137 systems; the way chroot is defined allows a process with root privi‐
138 leges to escape a chroot jail.
139
140 -U #listeners
141 This option tells named the number of #listeners worker threads
142 to listen on, for incoming UDP packets on each address. If not
143 specified, named calculates a default value based on the number
144 of detected CPUs: 1 for 1 CPU, and the number of detected CPUs
145 minus one for machines with more than 1 CPU. This cannot be in‐
146 creased to a value higher than the number of CPUs. If -n has
147 been set to a higher value than the number of detected CPUs,
148 then -U may be increased as high as that value, but no higher.
149
150 -u user
151 This option sets the setuid to user after completing privileged
152 operations, such as creating sockets that listen on privileged
153 ports.
154
155 NOTE:
156 On Linux, named uses the kernel's capability mechanism to drop all
157 root privileges except the ability to bind to a privileged port and
158 set process resource limits. Unfortunately, this means that the -u
159 option only works when named is run on kernel 2.2.18 or later, or
160 kernel 2.3.99-pre3 or later, since previous kernels did not allow
161 privileges to be retained after setuid.
162
163 -v This option reports the version number and exits.
164
165 -V This option reports the version number, build options, supported
166 cryptographics algorithms, and exits.
167
168 -X lock-file
169 This option acquires a lock on the specified file at runtime;
170 this helps to prevent duplicate named instances from running si‐
171 multaneously. Use of this option overrides the lock-file option
172 in named.conf. If set to none, the lock file check is disabled.
173
175 In routine operation, signals should not be used to control the name‐
176 server; rndc should be used instead.
177
178 SIGHUP This signal forces a reload of the server.
179
180 SIGINT, SIGTERM
181 These signals shut down the server.
182
183 The result of sending any other signals to the server is undefined.
184
186 The named configuration file is too complex to describe in detail here.
187 A complete description is provided in the BIND 9 Administrator Refer‐
188 ence Manual.
189
190 named inherits the umask (file creation mode mask) from the parent
191 process. If files created by named, such as journal files, need to have
192 custom permissions, the umask should be set explicitly in the script
193 used to start the named process.
194
196 /etc/named.conf
197 The default configuration file.
198
199 /run/named.pid
200 The default process-id file.
201
203 Red Hat SELinux BIND Security Profile:
204
205 By default, Red Hat ships BIND with the most secure SELinux policy that
206 will not prevent normal BIND operation and will prevent exploitation of
207 all known BIND security vulnerabilities . See the selinux(8) man page
208 for information about SElinux.
209
210 It is not necessary to run named in a chroot environment if the Red Hat
211 SELinux policy for named is enabled. When enabled, this policy is far
212 more secure than a chroot environment. Users are recommended to enable
213 SELinux and remove the bind-chroot package.
214
215 With this extra security comes some restrictions:
216
217 By default, the SELinux policy does not allow named to write any master
218 zone database files. Only the root user may create files in the $ROOT‐
219 DIR/var/named zone database file directory (the options { "directory" }
220 option), where $ROOTDIR is set in /etc/sysconfig/named.
221
222 The "named" group must be granted read privelege to these files in or‐
223 der for named to be enabled to read them.
224
225 Any file created in the zone database file directory is automatically
226 assigned the SELinux file context named_zone_t .
227
228 By default, SELinux prevents any role from modifying named_zone_t
229 files; this means that files in the zone database directory cannot be
230 modified by dynamic DNS (DDNS) updates or zone transfers.
231
232 The Red Hat BIND distribution and SELinux policy creates three directo‐
233 ries where named is allowed to create and modify files:
234 /var/named/slaves, /var/named/dynamic /var/named/data. By placing files
235 you want named to modify, such as slave or DDNS updateable zone files
236 and database / statistics dump files in these directories, named will
237 work normally and no further operator action is required. Files in
238 these directories are automatically assigned the 'named_cache_t' file
239 context, which SELinux allows named to write.
240
242 RFC 1033, RFC 1034, RFC 1035, named-checkconf(8), named-checkzone(8),
243 rndc(8), named.conf(5), BIND 9 Administrator Reference Manual.
244
246 Internet Systems Consortium
247
249 2023, Internet Systems Consortium
250
251
252
253
2549.18.20 NAMED(8)