1 .\" Copyright (C) 2004, 2005 Internet Systems Consortium, Inc. ("ISC")
2 .\" Copyright (C) 2001, 2003 Internet Software Consortium.
4 .\" Permission to use, copy, modify, and distribute this software for any
5 .\" purpose with or without fee is hereby granted, provided that the above
6 .\" copyright notice and this permission notice appear in all copies.
8 .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
9 .\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
10 .\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
11 .\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
12 .\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
13 .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
14 .\" PERFORMANCE OF THIS SOFTWARE.
16 .\" $Id: rndc-confgen.8,v 1.3.2.5.2.8 2006/06/29 13:02:31 marka Exp $
20 .\" Title: rndc\-confgen
22 .\" Generator: DocBook XSL Stylesheets v1.70.1 <http://docbook.sf.net/>
23 .\" Date: Aug 27, 2001
27 .TH "RNDC\-CONFGEN" "8" "Aug 27, 2001" "BIND9" "BIND9"
28 .\" disable hyphenation
30 .\" disable justification (adjust text to left margin only)
33 rndc\-confgen \- rndc key generation tool
36 \fBrndc\-confgen\fR [\fB\-a\fR] [\fB\-b\ \fR\fB\fIkeysize\fR\fR] [\fB\-c\ \fR\fB\fIkeyfile\fR\fR] [\fB\-h\fR] [\fB\-k\ \fR\fB\fIkeyname\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-r\ \fR\fB\fIrandomfile\fR\fR] [\fB\-s\ \fR\fB\fIaddress\fR\fR] [\fB\-t\ \fR\fB\fIchrootdir\fR\fR] [\fB\-u\ \fR\fB\fIuser\fR\fR]
40 generates configuration files for
41 \fBrndc\fR. It can be used as a convenient alternative to writing the
43 file and the corresponding
49 by hand. Alternatively, it can be run with the
53 file and avoid the need for a
63 configuration. This creates a file
71 was built) that is read by both
77 file defines a default command channel and authentication key allowing
81 on the local host with no further configuration.
84 \fBrndc\-confgen \-a\fR
87 to be used as drop\-in replacements for BIND 8 and
88 \fBndc\fR, with no changes to the existing BIND 8
92 If a more elaborate configuration than that generated by
93 \fBrndc\-confgen \-a\fR
94 is required, for example if rndc is to be used remotely, you should run
105 Specifies the size of the authentication key in bits. Must be between 1 and 512 bits; the default is 128.
110 option to specify an alternate location for
114 Prints a short summary of the options and arguments to
118 Specifies the key name of the rndc authentication key. This must be a valid domain name. The default is
122 Specifies the command channel port where
124 listens for connections from
125 \fBrndc\fR. The default is 953.
128 Specifies a source of random data for generating the authorization. If the operating system does not provide a
130 or equivalent device, the default source of randomness is keyboard input.
132 specifies the name of a character device or file containing random data to be used instead of the default. The special value
134 indicates that keyboard input should be used.
137 Specifies the IP address where
139 listens for command channel connections from
140 \fBrndc\fR. The default is the loopback address 127.0.0.1.
145 option to specify a directory where
147 will run chrooted. An additional copy of the
149 will be written relative to this directory so that it will be found by the chrooted
155 option to set the owner of the
159 is also specified only the file in the chroot area has its owner changed.
164 to be used with no manual configuration, run
166 \fBrndc\-confgen \-a\fR
170 file and corresponding
174 statements to be manually inserted into
175 \fInamed.conf\fR, run
183 BIND 9 Administrator Reference Manual.
186 Internet Systems Consortium
188 Copyright \(co 2004, 2005 Internet Systems Consortium, Inc. ("ISC")