1 .\" Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
3 .\" Permission to use, copy, modify, and/or distribute this software for any
4 .\" purpose with or without fee is hereby granted, provided that the above
5 .\" copyright notice and this permission notice appear in all copies.
7 .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
8 .\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
9 .\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
10 .\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
11 .\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
12 .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
13 .\" PERFORMANCE OF THIS SOFTWARE.
15 .\" $Id: ddns-confgen.8,v 1.10 2009-09-19 01:14:52 tbox Exp $
19 .\" Title: ddns\-confgen
21 .\" Generator: DocBook XSL Stylesheets v1.71.1 <http://docbook.sf.net/>
22 .\" Date: Jan 29, 2009
26 .TH "DDNS\-CONFGEN" "8" "Jan 29, 2009" "BIND9" "BIND9"
27 .\" disable hyphenation
29 .\" disable justification (adjust text to left margin only)
32 ddns\-confgen \- ddns key generation tool
35 \fBddns\-confgen\fR [\fB\-a\ \fR\fB\fIalgorithm\fR\fR] [\fB\-h\fR] [\fB\-k\ \fR\fB\fIkeyname\fR\fR] [\fB\-r\ \fR\fB\fIrandomfile\fR\fR] [\-s\ \fIname\fR | \-z\ \fIzone\fR] [\fB\-q\fR] [name]
39 generates a key for use by
42 \fBnamed\fR. It simplifies configuration of dynamic zones by generating a key and providing the
46 syntax that will be needed to use it, including an example
50 If a domain name is specified on the command line, it will be used in the name of the generated key and in the sample
53 \fBddns\-confgen example.com\fR
54 would generate a key called "ddns\-key.example.com", and sample
56 command that could be used in the zone definition for "example.com".
60 itself can configure a local DDNS key for use with
63 is only needed when a more elaborate configuration is required: for instance, if
65 is to be used from a remote system.
70 Specifies the algorithm to use for the TSIG key. Available choices are: hmac\-md5, hmac\-sha1, hmac\-sha224, hmac\-sha256, hmac\-sha384 and hmac\-sha512. The default is hmac\-sha256.
75 Prints a short summary of the options and arguments to
81 Specifies the key name of the DDNS authentication key. The default is
87 option is specified; otherwise, the default is
89 as a separate label followed by the argument of the option, e.g.,
90 \fBddns\-key.example.com.\fR
91 The key name must have the format of a valid domain name, consisting of letters, digits, hyphens and periods.
96 Quiet mode: Print only the key, with no explanatory text or usage examples.
101 Specifies a source of random data for generating the authorization. If the operating system does not provide a
103 or equivalent device, the default source of randomness is keyboard input.
105 specifies the name of a character device or file containing random data to be used instead of the default. The special value
107 indicates that keyboard input should be used.
112 Single host mode: The example
114 text shows how to set an update policy for the specified
116 using the "name" nametype. The default key name is ddns\-key.\fIname\fR. Note that the "self" nametype cannot be used, since the name to be updated may differ from the key name. This option cannot be used with the
123 zone mode: The example
125 text shows how to set an update policy for the specified
127 using the "zonesub" nametype, allowing updates to all subdomain names within that
128 \fIzone\fR. This option cannot be used with the
137 BIND 9 Administrator Reference Manual.
140 Internet Systems Consortium
142 Copyright \(co 2009 Internet Systems Consortium, Inc. ("ISC")