1 .\" Copyright (C) 2004-2009 Internet Systems Consortium, Inc. ("ISC")
2 .\" Copyright (C) 2000, 2001, 2003 Internet Software Consortium.
4 .\" Permission to use, copy, modify, and/or distribute this software for any
5 .\" purpose with or without fee is hereby granted, provided that the above
6 .\" copyright notice and this permission notice appear in all copies.
8 .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
9 .\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
10 .\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
11 .\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
12 .\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
13 .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
14 .\" PERFORMANCE OF THIS SOFTWARE.
16 .\" $Id: named.8,v 1.38.14.2 2009/12/03 05:06:38 tbox Exp $
22 .\" Generator: DocBook XSL Stylesheets v1.71.1 <http://docbook.sf.net/>
23 .\" Date: May 21, 2009
27 .TH "NAMED" "8" "May 21, 2009" "BIND9" "BIND9"
28 .\" disable hyphenation
30 .\" disable justification (adjust text to left margin only)
33 named \- Internet domain name server
36 \fBnamed\fR [\fB\-4\fR] [\fB\-6\fR] [\fB\-c\ \fR\fB\fIconfig\-file\fR\fR] [\fB\-d\ \fR\fB\fIdebug\-level\fR\fR] [\fB\-f\fR] [\fB\-g\fR] [\fB\-m\ \fR\fB\fIflag\fR\fR] [\fB\-n\ \fR\fB\fI#cpus\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-s\fR] [\fB\-S\ \fR\fB\fI#max\-socks\fR\fR] [\fB\-t\ \fR\fB\fIdirectory\fR\fR] [\fB\-u\ \fR\fB\fIuser\fR\fR] [\fB\-v\fR] [\fB\-V\fR] [\fB\-x\ \fR\fB\fIcache\-file\fR\fR]
40 is a Domain Name System (DNS) server, part of the BIND 9 distribution from ISC. For more information on the DNS, see RFCs 1033, 1034, and 1035.
42 When invoked without arguments,
44 will read the default configuration file
45 \fI/etc/named.conf\fR, read any initial data, and listen for queries.
50 Use IPv4 only even if the host machine is capable of IPv6.
54 are mutually exclusive.
59 Use IPv6 only even if the host machine is capable of IPv4.
63 are mutually exclusive.
66 \-c \fIconfig\-file\fR
70 as the configuration file instead of the default,
71 \fI/etc/named.conf\fR. To ensure that reloading the configuration file continues to work after the server has changed its working directory due to to a possible
73 option in the configuration file,
75 should be an absolute pathname.
78 \-d \fIdebug\-level\fR
80 Set the daemon's debug level to
81 \fIdebug\-level\fR. Debugging traces from
83 become more verbose as the debug level increases.
88 Run the server in the foreground (i.e. do not daemonize).
93 Run the server in the foreground and force all logging to
99 Turn on memory usage debugging flags. Possible flags are
104 \fImctx\fR. These correspond to the ISC_MEM_DEBUGXXXX flags described in
112 worker threads to take advantage of multiple CPUs. If not specified,
114 will try to determine the number of CPUs present and create one thread per CPU. If it is unable to determine the number of CPUs, a single worker thread will be created.
119 Listen for queries on port
120 \fIport\fR. If not specified, the default is port 53.
125 Write memory usage statistics to
130 This option is mainly of interest to BIND 9 developers and may be removed or changed in a future release.
134 \-S \fI#max\-socks\fR
143 This option should be unnecessary for the vast majority of users. The use of this option could even be harmful because the specified value may exceed the limitation of the underlying system API. It is therefore set only when the default configuration causes exhaustion of file descriptors and the operational environment is known to support the specified number of sockets. Note also that the actual maximum number is normally a little fewer than the specified value because
145 reserves some file descriptors for its internal use.
153 after processing the command line arguments, but before reading the configuration file.
156 This option should be used in conjunction with the
158 option, as chrooting a process running as root doesn't enhance security on most systems; the way
160 is defined allows a process with root privileges to escape a chroot jail.
168 after completing privileged operations, such as creating sockets that listen on privileged ports.
173 uses the kernel's capability mechanism to drop all root privileges except the ability to
175 to a privileged port and set process resource limits. Unfortunately, this means that the
177 option only works when
179 is run on kernel 2.2.18 or later, or kernel 2.3.99\-pre3 or later, since previous kernels did not allow privileges to be retained after
186 Report the version number and exit.
191 Report the version number and build options, and exit.
194 \-x \fIcache\-file\fR
198 into the cache of the default view.
201 This option must not be used. It is only of interest to BIND 9 developers and may be removed or changed in a future release.
206 In routine operation, signals should not be used to control the nameserver;
208 should be used instead.
212 Force a reload of the server.
217 Shut down the server.
220 The result of sending any other signals to the server is undefined.
225 configuration file is too complex to describe in detail here. A complete description is provided in the
226 BIND 9 Administrator Reference Manual.
231 (file creation mode mask) from the parent process. If files created by
232 \fBnamed\fR, such as journal files, need to have custom permissions, the
234 should be set explicitly in the script used to start the
239 \fI/etc/named.conf\fR
241 The default configuration file.
244 \fI/var/run/named/named.pid\fR
246 The default process\-id file.
253 \fBnamed\-checkconf\fR(8),
254 \fBnamed\-checkzone\fR(8),
258 BIND 9 Administrator Reference Manual.
261 Internet Systems Consortium
263 Copyright \(co 2004\-2009 Internet Systems Consortium, Inc. ("ISC")
265 Copyright \(co 2000, 2001, 2003 Internet Software Consortium.