1 <!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
2 "http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd"
3 [<!ENTITY mdash "—">]>
5 - Copyright (C) 2004, 2005, 2007 Internet Systems Consortium, Inc. ("ISC")
6 - Copyright (C) 2001, 2003 Internet Software Consortium.
8 - Permission to use, copy, modify, and/or distribute this software for any
9 - purpose with or without fee is hereby granted, provided that the above
10 - copyright notice and this permission notice appear in all copies.
12 - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
13 - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
14 - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
15 - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
16 - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
17 - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
18 - PERFORMANCE OF THIS SOFTWARE.
21 <!-- $Id: rndc-confgen.docbook,v 1.6.18.7 2007/08/28 07:20:01 tbox Exp $ -->
22 <refentry id="man.rndc-confgen">
24 <date>Aug 27, 2001</date>
28 <refentrytitle><application>rndc-confgen</application></refentrytitle>
29 <manvolnum>8</manvolnum>
30 <refmiscinfo>BIND9</refmiscinfo>
34 <refname><application>rndc-confgen</application></refname>
35 <refpurpose>rndc key generation tool</refpurpose>
43 <holder>Internet Systems Consortium, Inc. ("ISC")</holder>
48 <holder>Internet Software Consortium.</holder>
54 <command>rndc-confgen</command>
55 <arg><option>-a</option></arg>
56 <arg><option>-b <replaceable class="parameter">keysize</replaceable></option></arg>
57 <arg><option>-c <replaceable class="parameter">keyfile</replaceable></option></arg>
58 <arg><option>-h</option></arg>
59 <arg><option>-k <replaceable class="parameter">keyname</replaceable></option></arg>
60 <arg><option>-p <replaceable class="parameter">port</replaceable></option></arg>
61 <arg><option>-r <replaceable class="parameter">randomfile</replaceable></option></arg>
62 <arg><option>-s <replaceable class="parameter">address</replaceable></option></arg>
63 <arg><option>-t <replaceable class="parameter">chrootdir</replaceable></option></arg>
64 <arg><option>-u <replaceable class="parameter">user</replaceable></option></arg>
69 <title>DESCRIPTION</title>
70 <para><command>rndc-confgen</command>
71 generates configuration files
72 for <command>rndc</command>. It can be used as a
73 convenient alternative to writing the
74 <filename>rndc.conf</filename> file
75 and the corresponding <command>controls</command>
76 and <command>key</command>
77 statements in <filename>named.conf</filename> by hand.
78 Alternatively, it can be run with the <command>-a</command>
79 option to set up a <filename>rndc.key</filename> file and
80 avoid the need for a <filename>rndc.conf</filename> file
81 and a <command>controls</command> statement altogether.
87 <title>OPTIONS</title>
94 Do automatic <command>rndc</command> configuration.
95 This creates a file <filename>rndc.key</filename>
96 in <filename>/etc</filename> (or whatever
97 <varname>sysconfdir</varname>
98 was specified as when <acronym>BIND</acronym> was
100 that is read by both <command>rndc</command>
101 and <command>named</command> on startup. The
102 <filename>rndc.key</filename> file defines a default
103 command channel and authentication key allowing
104 <command>rndc</command> to communicate with
105 <command>named</command> on the local host
106 with no further configuration.
109 Running <command>rndc-confgen -a</command> allows
110 BIND 9 and <command>rndc</command> to be used as
112 replacements for BIND 8 and <command>ndc</command>,
113 with no changes to the existing BIND 8
114 <filename>named.conf</filename> file.
117 If a more elaborate configuration than that
118 generated by <command>rndc-confgen -a</command>
119 is required, for example if rndc is to be used remotely,
120 you should run <command>rndc-confgen</command> without
122 <command>-a</command> option and set up a
123 <filename>rndc.conf</filename> and
124 <filename>named.conf</filename>
131 <term>-b <replaceable class="parameter">keysize</replaceable></term>
134 Specifies the size of the authentication key in bits.
135 Must be between 1 and 512 bits; the default is 128.
141 <term>-c <replaceable class="parameter">keyfile</replaceable></term>
144 Used with the <command>-a</command> option to specify
145 an alternate location for <filename>rndc.key</filename>.
154 Prints a short summary of the options and arguments to
155 <command>rndc-confgen</command>.
161 <term>-k <replaceable class="parameter">keyname</replaceable></term>
164 Specifies the key name of the rndc authentication key.
165 This must be a valid domain name.
166 The default is <constant>rndc-key</constant>.
172 <term>-p <replaceable class="parameter">port</replaceable></term>
175 Specifies the command channel port where <command>named</command>
176 listens for connections from <command>rndc</command>.
183 <term>-r <replaceable class="parameter">randomfile</replaceable></term>
186 Specifies a source of random data for generating the
187 authorization. If the operating
188 system does not provide a <filename>/dev/random</filename>
189 or equivalent device, the default source of randomness
190 is keyboard input. <filename>randomdev</filename>
192 the name of a character device or file containing random
193 data to be used instead of the default. The special value
194 <filename>keyboard</filename> indicates that keyboard
195 input should be used.
201 <term>-s <replaceable class="parameter">address</replaceable></term>
204 Specifies the IP address where <command>named</command>
205 listens for command channel connections from
206 <command>rndc</command>. The default is the loopback
213 <term>-t <replaceable class="parameter">chrootdir</replaceable></term>
216 Used with the <command>-a</command> option to specify
217 a directory where <command>named</command> will run
218 chrooted. An additional copy of the <filename>rndc.key</filename>
219 will be written relative to this directory so that
220 it will be found by the chrooted <command>named</command>.
226 <term>-u <replaceable class="parameter">user</replaceable></term>
229 Used with the <command>-a</command> option to set the
231 of the <filename>rndc.key</filename> file generated.
233 <command>-t</command> is also specified only the file
235 the chroot area has its owner changed.
244 <title>EXAMPLES</title>
246 To allow <command>rndc</command> to be used with
247 no manual configuration, run
249 <para><userinput>rndc-confgen -a</userinput>
252 To print a sample <filename>rndc.conf</filename> file and
253 corresponding <command>controls</command> and <command>key</command>
254 statements to be manually inserted into <filename>named.conf</filename>,
257 <para><userinput>rndc-confgen</userinput>
262 <title>SEE ALSO</title>
264 <refentrytitle>rndc</refentrytitle><manvolnum>8</manvolnum>
267 <refentrytitle>rndc.conf</refentrytitle><manvolnum>5</manvolnum>
270 <refentrytitle>named</refentrytitle><manvolnum>8</manvolnum>
272 <citetitle>BIND 9 Administrator Reference Manual</citetitle>.
277 <title>AUTHOR</title>
278 <para><corpauthor>Internet Systems Consortium</corpauthor>