1 .\" Copyright (C) 2004, 2005, 2007 Internet Systems Consortium, Inc. ("ISC")
2 .\" Copyright (C) 2001, 2003 Internet Software Consortium.
4 .\" Permission to use, copy, modify, and distribute this software for any
5 .\" purpose with or without fee is hereby granted, provided that the above
6 .\" copyright notice and this permission notice appear in all copies.
8 .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
9 .\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
10 .\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
11 .\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
12 .\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
13 .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
14 .\" PERFORMANCE OF THIS SOFTWARE.
16 .\" $Id: rndc-confgen.8,v 1.9.18.11 2007/01/30 00:23:44 marka Exp $
20 .\" Title: rndc\-confgen
22 .\" Generator: DocBook XSL Stylesheets v1.71.1 <http://docbook.sf.net/>
23 .\" Date: Aug 27, 2001
27 .TH "RNDC\-CONFGEN" "8" "Aug 27, 2001" "BIND9" "BIND9"
28 .\" disable hyphenation
30 .\" disable justification (adjust text to left margin only)
33 rndc\-confgen \- rndc key generation tool
36 \fBrndc\-confgen\fR [\fB\-a\fR] [\fB\-b\ \fR\fB\fIkeysize\fR\fR] [\fB\-c\ \fR\fB\fIkeyfile\fR\fR] [\fB\-h\fR] [\fB\-k\ \fR\fB\fIkeyname\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-r\ \fR\fB\fIrandomfile\fR\fR] [\fB\-s\ \fR\fB\fIaddress\fR\fR] [\fB\-t\ \fR\fB\fIchrootdir\fR\fR] [\fB\-u\ \fR\fB\fIuser\fR\fR]
40 generates configuration files for
41 \fBrndc\fR. It can be used as a convenient alternative to writing the
43 file and the corresponding
49 by hand. Alternatively, it can be run with the
53 file and avoid the need for a
64 configuration. This creates a file
72 was built) that is read by both
78 file defines a default command channel and authentication key allowing
82 on the local host with no further configuration.
85 \fBrndc\-confgen \-a\fR
88 to be used as drop\-in replacements for BIND 8 and
89 \fBndc\fR, with no changes to the existing BIND 8
93 If a more elaborate configuration than that generated by
94 \fBrndc\-confgen \-a\fR
95 is required, for example if rndc is to be used remotely, you should run
108 Specifies the size of the authentication key in bits. Must be between 1 and 512 bits; the default is 128.
115 option to specify an alternate location for
121 Prints a short summary of the options and arguments to
127 Specifies the key name of the rndc authentication key. This must be a valid domain name. The default is
133 Specifies the command channel port where
135 listens for connections from
136 \fBrndc\fR. The default is 953.
141 Specifies a source of random data for generating the authorization. If the operating system does not provide a
143 or equivalent device, the default source of randomness is keyboard input.
145 specifies the name of a character device or file containing random data to be used instead of the default. The special value
147 indicates that keyboard input should be used.
152 Specifies the IP address where
154 listens for command channel connections from
155 \fBrndc\fR. The default is the loopback address 127.0.0.1.
162 option to specify a directory where
164 will run chrooted. An additional copy of the
166 will be written relative to this directory so that it will be found by the chrooted
174 option to set the owner of the
178 is also specified only the file in the chroot area has its owner changed.
184 to be used with no manual configuration, run
186 \fBrndc\-confgen \-a\fR
190 file and corresponding
194 statements to be manually inserted into
195 \fInamed.conf\fR, run
203 BIND 9 Administrator Reference Manual.
206 Internet Systems Consortium
208 Copyright \(co 2004, 2005, 2007 Internet Systems Consortium, Inc. ("ISC")
210 Copyright \(co 2001, 2003 Internet Software Consortium.