1 # Buildsheet autogenerated by ravenadm tool -- Do not edit.
7 SDESC[standard]= Berkeley Internet Name Domain (Domain Name Server)
8 HOMEPAGE= https://www.isc.org/downloads/bind/
12 SITES[main]= ISC/bind9/9.18.10
13 DISTFILE[1]= bind-9.18.10.tar.xz:main
15 SPKGS[standard]= complete
20 OPTIONS_AVAILABLE= FIXED_RRSET GEOIP LARGE_FILE QUERYTRACE
21 OPTIONS_STANDARD= FIXED_RRSET GEOIP LARGE_FILE QUERYTRACE
23 BUILD_DEPENDS= idnkit:single:standard
24 BUILDRUN_DEPENDS= libxml2:single:standard
25 json-c:primary:standard
28 libnghttp2:single:standard
29 EXRUN[tools]= idnkit:single:standard
31 USES= cclibs:server,tools cpe iconv pkgconfig ssl readline
34 DISTNAME= bind-9.18.10
37 LICENSE_FILE= MPL:{{WRKSRC}}/COPYRIGHT
41 FPC_EQUIVALENT= dns/bind916
44 CONFIGURE_ARGS= --localstatedir=/var
45 --sysconfdir={{ETCDIR}}
50 --with-openssl={{OPENSSLBASE}}
52 STD_CDEFINES="-DDIG_SIGCHASE=1"
56 INSTALL_REQ_TOOLCHAIN= yes
57 PLIST_SUB= ETCDIR={{BIND_ETCDIR}}
60 SUB_FILES= pkg-message-server
63 [FIXED_RRSET].DESCRIPTION= Enable fixed rrset ordering
64 [FIXED_RRSET].CONFIGURE_ENABLE_BOTH= fixed-rrset
66 [QUERYTRACE].DESCRIPTION= Enable the very verbose query tracelogging
67 [QUERYTRACE].CONFIGURE_ENABLE_BOTH= querytrace
69 [GEOIP].DESCRIPTION= Allow geographically based ACL
70 [GEOIP].BUILDRUN_DEPENDS_ON= GeoIP:single:standard
71 [GEOIP].CONFIGURE_ENABLE_BOTH= geoip
73 [LARGE_FILE].DESCRIPTION= 64-bit file support
74 [LARGE_FILE].CONFIGURE_ENABLE_BOTH= largefile
77 ${REINPLACE_CMD} -e "s|/opt/local|${PREFIX}|g" \
81 ${MKDIR} ${STAGEDIR}${ETCDIR} ${STAGEDIR}${STD_DOCDIR}/arm
82 . for i in dynamic master slave working
83 ${MKDIR} ${STAGEDIR}${ETCDIR}/$i
85 ${INSTALL_DATA} ${WRKDIR}/named.conf \
86 ${STAGEDIR}${ETCDIR}/named.conf.sample
87 ${INSTALL_DATA} ${FILESDIR}/named.root \
89 ${INSTALL_DATA} ${FILESDIR}/empty.db \
90 ${STAGEDIR}${ETCDIR}/master
91 ${INSTALL_DATA} ${FILESDIR}/localhost-forward.db \
92 ${STAGEDIR}${ETCDIR}/master
93 ${INSTALL_DATA} ${FILESDIR}/localhost-reverse.db \
94 ${STAGEDIR}${ETCDIR}/master
95 ${RM} -r ${STAGEDIR}/var
97 ${INSTALL_DATA} ${WRKSRC}/doc/arm/*.rst ${STAGEDIR}${STD_DOCDIR}/arm
98 ${INSTALL_DATA} ${WRKSRC}/CHANGES ${WRKSRC}/README* ${STAGEDIR}${STD_DOCDIR}
100 [FILE:743:descriptions/desc.server]
101 BIND is open source software that enables you to publish your Domain Name
102 System (DNS) information on the Internet, and to resolve DNS queries for
103 your users. The name BIND stands for "Berkeley Internet Name Domain",
104 because the software originated in the early 1980s at the University of
105 California at Berkeley.
107 BIND is by far the most widely used DNS software on the Internet,
108 providing a robust and stable platform on top of which organizations can
109 build distributed computing systems with the knowledge that those systems
110 are fully compliant with published DNS standards.
112 The BIND software distribution has three parts:
113 1. Domain Name Resolver
114 2. Domain Name Authority server
117 This package contains parts 1 and 2.
120 [FILE:357:descriptions/desc.tools]
121 BIND is open source software that enables you to publish your Domain Name
122 System (DNS) information on the Internet, and to resolve DNS queries for
123 your users. The name BIND stands for "Berkeley Internet Name Domain",
124 because the software originated in the early 1980s at the University of
125 California at Berkeley.
127 This package contains the BIND tools.
131 f415a92feb62568b50854a063cb231e257351f8672186d0ab031a49b3de2cac6 5261572 bind-9.18.10.tar.xz
134 [FILE:3151:manifests/plist.server]
135 @sample %%ETCDIR%%/named.conf.sample
246 include/irs/resconf.h
379 libbind9-%%LIBVER%%.so
387 libisccc-%%LIBVER%%.so
389 libisccfg-%%LIBVER%%.so
413 @dir(bind,bind,) %%ETCDIR%%/dynamic
414 @dir(bind,bind,) %%ETCDIR%%/slave
415 @dir(bind,bind,) %%ETCDIR%%/working
418 [FILE:768:manifests/plist.tools]
448 dnssec-dsfromkey.1.gz
449 dnssec-importkey.1.gz
450 dnssec-keyfromlabel.1.gz
460 named-compilezone.1.gz
461 named-journalprint.1.gz
469 [FILE:148:files/empty.db]
471 @ SOA @ nobody.localhost. 42 1d 12h 1w 3h
472 ; Serial, Refresh, Retry, Expire, Neg. cache TTL
476 ; Silence a BIND warning
480 [FILE:158:files/localhost-forward.db]
482 localhost. SOA localhost. nobody.localhost. 42 1d 12h 1w 3h
483 ; Serial, Refresh, Retry, Expire, Neg. cache TTL
491 [FILE:226:files/localhost-reverse.db]
493 @ SOA localhost. nobody.localhost. 42 1d 12h 1w 3h
494 ; Serial, Refresh, Retry, Expire, Neg. cache TTL
500 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 PTR localhost.
504 [FILE:19802:files/named.conf.in]
505 // Refer to the named.conf(5) and named(8) man pages, and the documentation
506 // in /usr/local/share/doc/bind for more details.
508 // If you are going to set up an authoritative server, make sure you
509 // understand the hairy details of how DNS works. Even with
510 // simple mistakes, you can break connectivity for affected parties,
511 // or cause huge amounts of useless Internet traffic.
514 // All file and path names are relative to the chroot directory,
515 // if any, and should be fully qualified.
516 directory "%%ETCDIR%%/working";
517 pid-file "/var/run/named/pid";
518 dump-file "/var/dump/named_dump.db";
519 statistics-file "/var/stats/named.stats";
521 // If named is being used only as a local resolver, this is a safe default.
522 // For named to be accessible to the network, comment this option, specify
523 // the proper IP address, or delete this option.
524 listen-on { 127.0.0.1; };
526 // If you have IPv6 enabled on this system, uncomment this option for
527 // use as a local resolver. To give access to the network, specify
528 // an IPv6 address, or the keyword "any".
529 // listen-on-v6 { ::1; };
531 // These zones are already covered by the empty zones listed below.
532 // If you remove the related empty zones below, comment these lines out.
533 disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
534 disable-empty-zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
535 disable-empty-zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
537 // If you've got a DNS server around at your upstream provider, enter
538 // its IP address here, and enable the line below. This will make you
539 // benefit from its cache, thus reduce overall DNS traffic in the Internet.
546 // If the 'forwarders' clause is not empty the default is to 'forward first'
547 // which will fall back to sending a query from your local server if the name
548 // servers in 'forwarders' do not have the answer. Alternatively you can
549 // force your name server to never initiate queries of its own by enabling the
553 // If you wish to have forwarding configured automatically based on
554 // the entries in /etc/resolv.conf, uncomment the following line and
555 // set named_auto_forward=yes in /etc/rc.conf. You can also enable
556 // named_auto_forward_only (the effect of which is described above).
557 // include "%%ETCDIR%%/auto_forward.conf";
560 Modern versions of BIND use a random UDP port for each outgoing
561 query by default in order to dramatically reduce the possibility
562 of cache poisoning. All users are strongly encouraged to utilize
563 this feature, and to configure their firewalls to accommodate it.
565 AS A LAST RESORT in order to get around a restrictive firewall
566 policy you can try enabling the option below. Use of this option
567 will significantly reduce your ability to withstand cache poisoning
568 attacks, and should be avoided if at all possible.
570 Replace NNNNN in the example with a number between 49160 and 65530.
572 // query-source address * port NNNNN;
575 // If you enable a local name server, don't forget to enter 127.0.0.1
576 // first in your /etc/resolv.conf so this server will be queried.
577 // Also, make sure to enable it in /etc/rc.conf.
579 // The traditional root hints mechanism. Use this, OR the slave zones below.
580 zone "." { type hint; file "%%ETCDIR%%/named.root"; };
582 /* Slaving the following zones from the root name servers has some
583 significant advantages:
584 1. Faster local resolution for your users
585 2. No spurious traffic will be sent from your network to the roots
586 3. Greater resilience to any potential root server failure/DDoS
588 On the other hand, this method requires more monitoring than the
589 hints file to be sure that an unexpected failure mode has not
590 incapacitated your server. Name servers that are serving a lot
591 of clients will benefit more from this approach than individual
592 hosts. Use with caution.
594 To use this mechanism, uncomment the entries below, and comment
597 As documented at http://dns.icann.org/services/axfr/ these zones:
598 "." (the root), ARPA, IN-ADDR.ARPA, IP6.ARPA, and a few others
599 are available for AXFR from these servers on IPv4 and IPv6:
600 xfr.lax.dns.icann.org, xfr.cjr.dns.icann.org
605 file "%%ETCDIR%%/slave/root.slave";
607 192.0.32.132; // lax.xfr.dns.icann.org
608 2620:0:2d0:202::132; // lax.xfr.dns.icann.org
609 192.0.47.132; // iad.xfr.dns.icann.org
610 2620:0:2830:202::132; // iad.xfr.dns.icann.org
616 file "%%ETCDIR%%/slave/arpa.slave";
618 192.0.32.132; // lax.xfr.dns.icann.org
619 2620:0:2d0:202::132; // lax.xfr.dns.icann.org
620 192.0.47.132; // iad.xfr.dns.icann.org
621 2620:0:2830:202::132; // iad.xfr.dns.icann.org
625 zone "in-addr.arpa" {
627 file "%%ETCDIR%%/slave/in-addr.arpa.slave";
629 192.0.32.132; // lax.xfr.dns.icann.org
630 2620:0:2d0:202::132; // lax.xfr.dns.icann.org
631 192.0.47.132; // iad.xfr.dns.icann.org
632 2620:0:2830:202::132; // iad.xfr.dns.icann.org
638 file "%%ETCDIR%%/slave/ip6.arpa.slave";
640 192.0.32.132; // lax.xfr.dns.icann.org
641 2620:0:2d0:202::132; // lax.xfr.dns.icann.org
642 192.0.47.132; // iad.xfr.dns.icann.org
643 2620:0:2830:202::132; // iad.xfr.dns.icann.org
649 /* Serving the following zones locally will prevent any queries
650 for these zones leaving your network and going to the root
651 name servers. This has two significant advantages:
652 1. Faster local resolution for your users
653 2. No spurious traffic will be sent from your network to the roots
655 // RFCs 1912, 5735 and 6303 (and BCP 32 for localhost)
656 zone "localhost" { type master; file "%%ETCDIR%%/master/localhost-forward.db"; };
657 zone "127.in-addr.arpa" { type master; file "%%ETCDIR%%/master/localhost-reverse.db"; };
658 zone "255.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
660 // RFC 1912-style zone for IPv6 localhost address (RFC 6303)
661 zone "0.ip6.arpa" { type master; file "%%ETCDIR%%/master/localhost-reverse.db"; };
663 // "This" Network (RFCs 1912, 5735 and 6303)
664 zone "0.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
666 // Private Use Networks (RFCs 1918, 5735 and 6303)
667 zone "10.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
668 zone "16.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
669 zone "17.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
670 zone "18.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
671 zone "19.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
672 zone "20.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
673 zone "21.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
674 zone "22.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
675 zone "23.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
676 zone "24.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
677 zone "25.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
678 zone "26.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
679 zone "27.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
680 zone "28.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
681 zone "29.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
682 zone "30.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
683 zone "31.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
684 zone "168.192.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
686 // Shared Address Space (RFC 6598)
687 zone "64.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
688 zone "65.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
689 zone "66.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
690 zone "67.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
691 zone "68.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
692 zone "69.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
693 zone "70.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
694 zone "71.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
695 zone "72.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
696 zone "73.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
697 zone "74.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
698 zone "75.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
699 zone "76.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
700 zone "77.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
701 zone "78.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
702 zone "79.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
703 zone "80.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
704 zone "81.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
705 zone "82.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
706 zone "83.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
707 zone "84.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
708 zone "85.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
709 zone "86.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
710 zone "87.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
711 zone "88.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
712 zone "89.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
713 zone "90.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
714 zone "91.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
715 zone "92.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
716 zone "93.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
717 zone "94.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
718 zone "95.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
719 zone "96.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
720 zone "97.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
721 zone "98.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
722 zone "99.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
723 zone "100.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
724 zone "101.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
725 zone "102.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
726 zone "103.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
727 zone "104.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
728 zone "105.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
729 zone "106.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
730 zone "107.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
731 zone "108.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
732 zone "109.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
733 zone "110.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
734 zone "111.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
735 zone "112.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
736 zone "113.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
737 zone "114.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
738 zone "115.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
739 zone "116.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
740 zone "117.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
741 zone "118.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
742 zone "119.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
743 zone "120.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
744 zone "121.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
745 zone "122.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
746 zone "123.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
747 zone "124.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
748 zone "125.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
749 zone "126.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
750 zone "127.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
752 // Link-local/APIPA (RFCs 3927, 5735 and 6303)
753 zone "254.169.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
755 // IETF protocol assignments (RFCs 5735 and 5736)
756 zone "0.0.192.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
758 // TEST-NET-[1-3] for Documentation (RFCs 5735, 5737 and 6303)
759 zone "2.0.192.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
760 zone "100.51.198.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
761 zone "113.0.203.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
763 // IPv6 Example Range for Documentation (RFCs 3849 and 6303)
764 zone "8.b.d.0.1.0.0.2.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
766 // Router Benchmark Testing (RFCs 2544 and 5735)
767 zone "18.198.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
768 zone "19.198.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
770 // IANA Reserved - Old Class E Space (RFC 5735)
771 zone "240.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
772 zone "241.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
773 zone "242.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
774 zone "243.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
775 zone "244.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
776 zone "245.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
777 zone "246.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
778 zone "247.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
779 zone "248.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
780 zone "249.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
781 zone "250.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
782 zone "251.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
783 zone "252.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
784 zone "253.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
785 zone "254.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
787 // IPv6 Unassigned Addresses (RFC 4291)
788 zone "1.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
789 zone "3.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
790 zone "4.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
791 zone "5.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
792 zone "6.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
793 zone "7.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
794 zone "8.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
795 zone "9.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
796 zone "a.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
797 zone "b.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
798 zone "c.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
799 zone "d.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
800 zone "e.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
801 zone "0.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
802 zone "1.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
803 zone "2.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
804 zone "3.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
805 zone "4.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
806 zone "5.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
807 zone "6.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
808 zone "7.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
809 zone "8.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
810 zone "9.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
811 zone "a.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
812 zone "b.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
813 zone "0.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
814 zone "1.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
815 zone "2.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
816 zone "3.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
817 zone "4.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
818 zone "5.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
819 zone "6.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
820 zone "7.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
822 // IPv6 ULA (RFCs 4193 and 6303)
823 zone "c.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
824 zone "d.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
826 // IPv6 Link Local (RFCs 4291 and 6303)
827 zone "8.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
828 zone "9.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
829 zone "a.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
830 zone "b.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
832 // IPv6 Deprecated Site-Local Addresses (RFCs 3879 and 6303)
833 zone "c.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
834 zone "d.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
835 zone "e.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
836 zone "f.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; };
838 // IP6.INT is Deprecated (RFC 4159)
839 zone "ip6.int" { type master; file "%%ETCDIR%%/master/empty.db"; };
841 // NB: Do not use the IP addresses below, they are faked, and only
842 // serve demonstration/documentation purposes!
844 // Example slave zone config entries. It can be convenient to become
845 // a slave at least for the zone your own domain is in. Ask
846 // your network administrator for the IP address of the responsible
847 // master name server.
849 // Do not forget to include the reverse lookup zone!
850 // This is named after the first bytes of the IP address, in reverse
851 // order, with ".IN-ADDR.ARPA" appended, or ".IP6.ARPA" for IPv6.
853 // Before starting to set up a master zone, make sure you fully
854 // understand how DNS and BIND work. There are sometimes
855 // non-obvious pitfalls. Setting up a slave zone is usually simpler.
857 // NB: Don't blindly enable the examples below. :-) Use actual names
858 // and addresses instead.
860 /* An example dynamic zone
861 key "exampleorgkey" {
863 secret "sf87HJqjkqh8ac87a02lla==";
870 file "%%ETCDIR%%/dynamic/example.org";
874 /* Example of a slave reverse zone
875 zone "1.168.192.in-addr.arpa" {
877 file "%%ETCDIR%%/slave/1.168.192.in-addr.arpa";
885 [FILE:11623:files/named.in]
890 # REQUIRE: %%NAMED_REQUIRE%%
891 # BEFORE: %%NAMED_BEFORE%%
895 # Add the following lines to /etc/rc.conf to enable BIND:
896 # named_enable (bool): Run named, the DNS server (or NO).
897 # named_program (str): Path to named, if you want a different one.
898 # named_conf (str): Path to the configuration file
899 # named_flags (str): Use this for flags OTHER than -u and -c
900 # named_uid (str): User to run named as
901 # named_chrootdir (str): Chroot directory (or "" not to auto-chroot it)
902 # Historically, was /var/named
903 # named_chroot_autoupdate (bool): Automatically install/update chrooted
904 # components of named.
905 # named_symlink_enable (bool): Symlink the chrooted pid file
906 # named_wait (bool): Wait for working name service before exiting
907 # named_wait_host (str): Hostname to check if named_wait is enabled
908 # named_auto_forward (str): Set up forwarders from /etc/resolv.conf
909 # named_auto_forward_only (str): Do "forward only" instead of "forward first"
915 desc="named BIND startup script"
918 load_rc_config ${name}
920 extra_commands=reload
922 start_precmd=named_prestart
923 start_postcmd=named_poststart
924 reload_cmd=named_reload
926 stop_postcmd=named_poststop
928 named_enable=${named_enable:-"NO"}
929 named_program=${named_program:-"%%PREFIX%%/sbin/named"}
930 named_conf=${named_conf:-"%%ETCDIR%%/named.conf"}
931 named_flags=${named_flags:-""}
932 named_uid=${named_uid:-"bind"}
933 named_chrootdir=${named_chrootdir:-""}
934 named_chroot_autoupdate=${named_chroot_autoupdate:-"YES"}
935 named_symlink_enable=${named_symlink_enable:-"YES"}
936 named_wait=${named_wait:-"NO"}
937 named_wait_host=${named_wait_host:-"localhost"}
938 named_auto_forward=${named_auto_forward:-"NO"}
939 named_auto_forward_only=${named_auto_forward_only:-"NO"}
941 # Not configuration variables but having them here keeps rclint happy
942 required_dirs="${named_chrootdir}"
943 _named_confdirroot="${named_conf%/*}"
944 _named_confdir="${named_chrootdir}${_named_confdirroot}"
945 _named_program_root="${named_program%/sbin/named}"
946 _openssl_engines="%%LOCALBASE%%/lib/engines"
948 # Needed if named.conf and rndc.conf are moved or if rndc.conf is used
949 rndc_conf=${rndc_conf:-"$_named_confdir/rndc.conf"}
950 rndc_key=${rndc_key:-"$_named_confdir/rndc.key"}
952 # If running in a chroot cage, ensure that the appropriate files
953 # exist inside the cage, as well as helper symlinks into the cage
956 # As this is called after the is_running and required_dir checks
957 # are made in run_rc_command(), we can safely assume ${named_chrootdir}
958 # exists and named isn't running at this point (unless forcestart
965 # If it's the first time around, fiddle with things and move the
966 # current configuration to the chroot.
967 if [ -d ${_named_confdirroot} -a ! -d ${_named_confdir} ]; then
968 warn "named chroot: Moving current configuration in the chroot!"
969 install -d ${_named_confdir%/*}
970 mv ${_named_confdirroot} ${_named_confdir}
973 # Create (or update) the chroot directory structure
975 if [ -r %%PREFIX%%/etc/mtree/BIND.chroot.dist ]; then
976 mtree -deU -f %%PREFIX%%/etc/mtree/BIND.chroot.dist \
977 -p ${named_chrootdir}
979 warn "%%PREFIX%%/etc/mtree/BIND.chroot.dist missing,"
980 warn "${named_chrootdir} directory structure not updated"
982 if [ -r %%PREFIX%%/etc/mtree/BIND.chroot.local.dist ]; then
983 mkdir -p ${named_chrootdir}%%PREFIX%%
984 mtree -deU -f %%PREFIX%%/etc/mtree/BIND.chroot.local.dist \
985 -p ${named_chrootdir}%%PREFIX%%
987 warn "%%PREFIX%%/etc/mtree/BIND.chroot.local.dist missing,"
988 warn "${named_chrootdir}%%PREFIX%% directory structure not updated"
991 # Create (or update) the configuration directory symlink
993 if [ ! -L "${_named_confdirroot}" ]; then
994 if [ -d "${_named_confdirroot}" ]; then
995 warn "named chroot: ${_named_confdirroot} is a directory!"
996 elif [ -e "${_named_confdirroot}" ]; then
997 warn "named chroot: ${_named_confdirroot} exists!"
999 ln -s ${_named_confdir} ${_named_confdirroot}
1002 # Make sure it points to the right place.
1003 ln -shf ${_named_confdir} ${_named_confdirroot}
1006 # Mount a devfs in the chroot directory if needed
1008 if [ `${SYSCTL_N} security.jail.jailed` -eq 0 ]; then
1009 umount ${named_chrootdir}/dev 2>/dev/null
1010 devfs_domount ${named_chrootdir}/dev devfsrules_hide_all
1011 devfs -m ${named_chrootdir}/dev rule apply path null unhide
1012 devfs -m ${named_chrootdir}/dev rule apply path random unhide
1014 if [ -c ${named_chrootdir}/dev/null -a \
1015 -c ${named_chrootdir}/dev/random ]; then
1016 info "named chroot: using pre-mounted devfs."
1018 err 1 "named chroot: devfs cannot be mounted from " \
1019 "within a jail. Thus a chrooted named cannot " \
1020 "be run from within a jail. Either mount the " \
1021 "devfs with null and random from the host, or " \
1022 "run named without chrooting it, set " \
1023 "named_chrootdir=\"\" in /etc/rc.conf."
1027 # If OpenSSL from ports, then the engines should be present in the
1028 # chroot, named loads them after chrooting.
1029 if [ -d ${_openssl_engines} ]; then
1030 # FIXME when 8.4 is gone see if
1031 # security.jail.param.allow.mount.nullfs can be used.
1032 if [ `${SYSCTL_N} security.jail.jailed` -eq 0 -o `${SYSCTL_N} security.jail.mount_allowed` -eq 1 ]; then
1033 mkdir -p ${named_chrootdir}${_openssl_engines}
1034 mount -t nullfs ${_openssl_engines} ${named_chrootdir}${_openssl_engines}
1036 warn "named chroot: cannot nullfs mount OpenSSL" \
1037 "engines into the chroot, will copy the shared" \
1038 "libraries instead."
1039 mkdir -p ${named_chrootdir}${_openssl_engines}
1040 cp -f ${_openssl_engines}/*.so ${named_chrootdir}${_openssl_engines}
1044 # Copy and/or update key files to the chroot /etc
1046 for file in localtime protocols services; do
1047 if [ -r /etc/${file} ] && \
1048 ! cmp -s /etc/${file} "${named_chrootdir}/etc/${file}"; then
1049 cp -p /etc/${file} "${named_chrootdir}/etc/${file}"
1054 # Make symlinks to the correct pid file
1058 checkyesno named_symlink_enable &&
1059 ln -fs "${named_chrootdir}${pidfile}" ${pidfile}
1066 if checkyesno named_wait; then
1067 until ${_named_program_root}/bin/host ${named_wait_host} >/dev/null 2>&1; do
1068 echo " Waiting for nameserver to resolve ${named_wait_host}"
1076 # This is a one line function, but ${named_program} is not defined early
1077 # enough to be there when the reload_cmd variable is defined up there.
1083 if get_pidfile_from_conf pid-file ${named_conf}; then
1084 pidfile="${_pidfile_from_conf}"
1086 pidfile="/var/run/named/pid"
1094 # This duplicates an undesirably large amount of code from the stop
1095 # routine in rc.subr in order to use rndc to shut down the process,
1096 # and to give it a second chance in case rndc fails.
1097 rc_pid=$(check_pidfile ${pidfile} ${command})
1098 if [ -z "${rc_pid}" ]; then
1099 [ -n "${rc_fast}" ] && return 0
1103 echo 'Stopping named.'
1105 wait_for_pids ${rc_pid}
1107 echo -n 'rndc failed, trying kill: '
1108 kill -TERM ${rc_pid}
1109 wait_for_pids ${rc_pid}
1115 if [ -n "${named_chrootdir}" -a -c ${named_chrootdir}/dev/null ]; then
1116 # if using OpenSSL from ports, unmount OpenSSL engines, if they
1117 # were not mounted but only copied, do nothing.
1118 if [ -d ${_openssl_engines} -a \( `${SYSCTL_N} security.jail.jailed` -eq 0 -o `${SYSCTL_N} security.jail.mount_allowed` -eq 1 \) ]; then
1119 umount ${named_chrootdir}${_openssl_engines}
1122 if [ `${SYSCTL_N} security.jail.jailed` -eq 0 ]; then
1123 umount ${named_chrootdir}/dev 2>/dev/null || true
1125 warn "named chroot:" \
1126 "cannot unmount devfs from inside jail!"
1133 if [ -e "$1" ]; then
1136 install -o root -g wheel -m 0644 /dev/null $1
1141 if [ -z "${rndc_flags}" ]; then
1142 if [ -s "${rndc_conf}" ] ; then
1143 rndc_flags="-c ${rndc_conf}"
1144 elif [ -s "${rndc_key}" ] ; then
1145 rndc_flags="-k ${rndc_key}"
1151 ${_named_program_root}/sbin/rndc ${rndc_flags} "$@"
1158 if [ -n "${named_pidfile}" ]; then
1159 warn 'named_pidfile: now determined from the conf file'
1162 piddir=`/usr/bin/dirname ${pidfile}`
1163 if [ ! -d ${piddir} ]; then
1164 install -d -o ${named_uid} -g ${named_uid} ${piddir}
1167 command_args="-u ${named_uid:=root} -c ${named_conf} ${command_args}"
1169 local line nsip firstns
1171 # Is the user using a sandbox?
1173 if [ -n "${named_chrootdir}" ]; then
1174 rc_flags="${rc_flags} -t ${named_chrootdir}"
1175 checkyesno named_chroot_autoupdate && chroot_autoupdate
1177 named_symlink_enable=NO
1180 # Create an rndc.key file for the user if none exists
1182 confgen_command="${_named_program_root}/sbin/rndc-confgen -a -b256 -u ${named_uid} \
1183 -c ${_named_confdir}/rndc.key"
1184 if [ -s "${_named_confdir}/rndc.conf" ]; then
1185 unset confgen_command
1187 if [ -s "${_named_confdir}/rndc.key" ]; then
1188 case `stat -f%Su ${_named_confdir}/rndc.key` in
1189 root|${named_uid}) ;;
1190 *) ${confgen_command} ;;
1198 checkconf="${_named_program_root}/sbin/named-checkconf"
1199 if ! checkyesno named_chroot_autoupdate && [ -n "${named_chrootdir}" ]; then
1200 checkconf="${checkconf} -t ${named_chrootdir}"
1203 # Create a forwarder configuration based on /etc/resolv.conf
1204 if checkyesno named_auto_forward; then
1205 if [ ! -s /etc/resolv.conf ]; then
1206 warn "named_auto_forward enabled, but no /etc/resolv.conf"
1208 # Empty the file in case it is included in named.conf
1209 [ -s "${_named_confdir}/auto_forward.conf" ] &&
1210 create_file ${_named_confdir}/auto_forward.conf
1212 ${checkconf} ${named_conf} ||
1213 err 3 'named-checkconf for ${named_conf} failed'
1217 create_file /var/run/naf-resolv.conf
1218 create_file /var/run/auto_forward.conf
1220 echo ' forwarders {' > /var/run/auto_forward.conf
1224 'nameserver '*|'nameserver '*)
1225 nsip=${line##nameserver[ ]}
1227 if [ -z "${firstns}" ]; then
1228 if [ ! "${nsip}" = '127.0.0.1' ]; then
1229 echo 'nameserver 127.0.0.1'
1230 echo " ${nsip};" >> /var/run/auto_forward.conf
1235 [ "${nsip}" = '127.0.0.1' ] && continue
1236 echo " ${nsip};" >> /var/run/auto_forward.conf
1242 done < /etc/resolv.conf > /var/run/naf-resolv.conf
1244 echo ' };' >> /var/run/auto_forward.conf
1245 echo '' >> /var/run/auto_forward.conf
1246 if checkyesno named_auto_forward_only; then
1247 echo " forward only;" >> /var/run/auto_forward.conf
1249 echo " forward first;" >> /var/run/auto_forward.conf
1252 if cmp -s /etc/resolv.conf /var/run/naf-resolv.conf; then
1253 unlink /var/run/naf-resolv.conf
1255 [ -e /etc/resolv.conf ] && unlink /etc/resolv.conf
1256 mv /var/run/naf-resolv.conf /etc/resolv.conf
1259 if cmp -s ${_named_confdir}/auto_forward.conf \
1260 /var/run/auto_forward.conf; then
1261 unlink /var/run/auto_forward.conf
1263 [ -e "${_named_confdir}/auto_forward.conf" ] &&
1264 unlink ${_named_confdir}/auto_forward.conf
1265 mv /var/run/auto_forward.conf \
1266 ${_named_confdir}/auto_forward.conf
1269 # Empty the file in case it is included in named.conf
1270 [ -s "${_named_confdir}/auto_forward.conf" ] &&
1271 create_file ${_named_confdir}/auto_forward.conf
1274 ${checkconf} ${named_conf} || err 3 "named-checkconf for ${named_conf} failed"
1280 [FILE:3289:files/named.root]
1281 ; This file holds the information on root name servers needed to
1282 ; initialize cache of Internet domain name servers
1283 ; (e.g. reference this file in the "cache . <file>"
1284 ; configuration file of BIND domain name servers).
1286 ; This file is made available by InterNIC
1287 ; under anonymous FTP as
1288 ; file /domain/named.cache
1289 ; on server FTP.INTERNIC.NET
1290 ; -OR- RS.INTERNIC.NET
1292 ; last update: April 11, 2017
1293 ; related version of root zone: 2017041101
1295 ; formerly NS.INTERNIC.NET
1297 . 3600000 NS A.ROOT-SERVERS.NET.
1298 A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4
1299 A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30
1301 ; FORMERLY NS1.ISI.EDU
1303 . 3600000 NS B.ROOT-SERVERS.NET.
1304 B.ROOT-SERVERS.NET. 3600000 A 192.228.79.201
1305 B.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:84::b
1307 ; FORMERLY C.PSI.NET
1309 . 3600000 NS C.ROOT-SERVERS.NET.
1310 C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12
1311 C.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2::c
1313 ; FORMERLY TERP.UMD.EDU
1315 . 3600000 NS D.ROOT-SERVERS.NET.
1316 D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13
1317 D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2d::d
1319 ; FORMERLY NS.NASA.GOV
1321 . 3600000 NS E.ROOT-SERVERS.NET.
1322 E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10
1323 E.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:a8::e
1325 ; FORMERLY NS.ISC.ORG
1327 . 3600000 NS F.ROOT-SERVERS.NET.
1328 F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241
1329 F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2f::f
1331 ; FORMERLY NS.NIC.DDN.MIL
1333 . 3600000 NS G.ROOT-SERVERS.NET.
1334 G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4
1335 G.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:12::d0d
1337 ; FORMERLY AOS.ARL.ARMY.MIL
1339 . 3600000 NS H.ROOT-SERVERS.NET.
1340 H.ROOT-SERVERS.NET. 3600000 A 198.97.190.53
1341 H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::53
1343 ; FORMERLY NIC.NORDU.NET
1345 . 3600000 NS I.ROOT-SERVERS.NET.
1346 I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17
1347 I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fe::53
1349 ; OPERATED BY VERISIGN, INC.
1351 . 3600000 NS J.ROOT-SERVERS.NET.
1352 J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30
1353 J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:c27::2:30
1355 ; OPERATED BY RIPE NCC
1357 . 3600000 NS K.ROOT-SERVERS.NET.
1358 K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129
1359 K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fd::1
1363 . 3600000 NS L.ROOT-SERVERS.NET.
1364 L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42
1365 L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:9f::42
1369 . 3600000 NS M.ROOT-SERVERS.NET.
1370 M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33
1371 M.ROOT-SERVERS.NET. 3600000 AAAA 2001:dc3::35
1375 [FILE:1637:files/pkg-message-server.in]
1376 **********************************************************************
1377 * _ _____ _____ _____ _ _ _____ ___ ___ _ _ *
1378 * / \|_ _|_ _| ____| \ | |_ _|_ _/ _ \| \ | | *
1379 * / _ \ | | | | | _| | \| | | | | | | | | \| | *
1380 * / ___ \| | | | | |___| |\ | | | | | |_| | |\ | *
1381 * /_/ \_\_| |_| |_____|_| \_| |_| |___\___/|_| \_| *
1383 * BIND requires configuration of rndc, including a "secret" key. *
1384 * The easiest, and most secure way to configure rndc is to run *
1385 * 'rndc-confgen -a' to generate the proper conf file, with a new *
1386 * random key, and appropriate file permissions. *
1388 * The %%PREFIX%%/etc/rc.d/named script will do that for you. *
1390 * If using syslog to log the BIND9 activity, and using a *
1391 * chroot'ed installation, you will need to tell syslog to *
1392 * install a log socket in the BIND9 chroot by running: *
1394 * # sysrc altlog_proglist+=named *
1396 * And then restarting syslogd with: service syslogd restart *
1398 **********************************************************************
1401 [FILE:59:files/special.mk]
1402 BIND_ETCDIR?= etc/namedb
1403 ETCDIR= ${PREFIX}/${BIND_ETCDIR}