etc/services - sync with NetBSD-8
[minix.git] / external / bsd / bind / dist / doc / arm / Bv9ARM.ch12.html
blob30ec1f0a8033236d03f10765f60178bef92702ac
1 <!--
2 - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
3 - Copyright (C) 2000-2003 Internet Software Consortium.
4 -
5 - Permission to use, copy, modify, and/or distribute this software for any
6 - purpose with or without fee is hereby granted, provided that the above
7 - copyright notice and this permission notice appear in all copies.
8 -
9 - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 - PERFORMANCE OF THIS SOFTWARE.
16 -->
17 <!-- Id -->
18 <html>
19 <head>
20 <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
21 <title>Appendix D. BIND 9 DNS Library Support</title>
22 <meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
23 <link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
24 <link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
25 <link rel="prev" href="Bv9ARM.ch11.html" title="Appendix C. General DNS Reference Information">
26 <link rel="next" href="Bv9ARM.ch13.html" title="Manual pages">
27 </head>
28 <body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
29 <div class="navheader">
30 <table width="100%" summary="Navigation header">
31 <tr><th colspan="3" align="center">Appendix D. BIND 9 DNS Library Support</th></tr>
32 <tr>
33 <td width="20%" align="left">
34 <a accesskey="p" href="Bv9ARM.ch11.html">Prev</a> </td>
35 <th width="60%" align="center"> </th>
36 <td width="20%" align="right"> <a accesskey="n" href="Bv9ARM.ch13.html">Next</a>
37 </td>
38 </tr>
39 </table>
40 <hr>
41 </div>
42 <div class="appendix" lang="en">
43 <div class="titlepage"><div><div><h2 class="title">
44 <a name="Bv9ARM.ch12"></a>Appendix D. BIND 9 DNS Library Support</h2></div></div></div>
45 <div class="toc">
46 <p><b>Table of Contents</b></p>
47 <dl>
48 <dt><span class="sect1"><a href="Bv9ARM.ch12.html#bind9.library">BIND 9 DNS Library Support</a></span></dt>
49 <dd><dl>
50 <dt><span class="sect2"><a href="Bv9ARM.ch12.html#id2612253">Prerequisite</a></span></dt>
51 <dt><span class="sect2"><a href="Bv9ARM.ch12.html#id2612263">Compilation</a></span></dt>
52 <dt><span class="sect2"><a href="Bv9ARM.ch12.html#id2612288">Installation</a></span></dt>
53 <dt><span class="sect2"><a href="Bv9ARM.ch12.html#id2612455">Known Defects/Restrictions</a></span></dt>
54 <dt><span class="sect2"><a href="Bv9ARM.ch12.html#id2612532">The dns.conf File</a></span></dt>
55 <dt><span class="sect2"><a href="Bv9ARM.ch12.html#id2612558">Sample Applications</a></span></dt>
56 <dt><span class="sect2"><a href="Bv9ARM.ch12.html#id2613600">Library References</a></span></dt>
57 </dl></dd>
58 </dl>
59 </div>
60 <div class="sect1" lang="en">
61 <div class="titlepage"><div><div><h2 class="title" style="clear: both">
62 <a name="bind9.library"></a>BIND 9 DNS Library Support</h2></div></div></div>
63 <p>This version of BIND 9 "exports" its internal libraries so
64 that they can be used by third-party applications more easily (we
65 call them "export" libraries in this document). In addition to
66 all major DNS-related APIs BIND 9 is currently using, the export
67 libraries provide the following features:</p>
68 <div class="itemizedlist"><ul type="disc">
69 <li><p>The newly created "DNS client" module. This is a higher
70 level API that provides an interface to name resolution,
71 single DNS transaction with a particular server, and dynamic
72 update. Regarding name resolution, it supports advanced
73 features such as DNSSEC validation and caching. This module
74 supports both synchronous and asynchronous mode.</p></li>
75 <li><p>The new "IRS" (Information Retrieval System) library.
76 It provides an interface to parse the traditional resolv.conf
77 file and more advanced, DNS-specific configuration file for
78 the rest of this package (see the description for the
79 dns.conf file below).</p></li>
80 <li><p>As part of the IRS library, newly implemented standard
81 address-name mapping functions, getaddrinfo() and
82 getnameinfo(), are provided. They use the DNSSEC-aware
83 validating resolver backend, and could use other advanced
84 features of the BIND 9 libraries such as caching. The
85 getaddrinfo() function resolves both A and AAAA RRs
86 concurrently (when the address family is unspecified).</p></li>
87 <li><p>An experimental framework to support other event
88 libraries than BIND 9's internal event task system.</p></li>
89 </ul></div>
90 <div class="sect2" lang="en">
91 <div class="titlepage"><div><div><h3 class="title">
92 <a name="id2612253"></a>Prerequisite</h3></div></div></div>
93 <p>GNU make is required to build the export libraries (other
94 part of BIND 9 can still be built with other types of make). In
95 the reminder of this document, "make" means GNU make. Note that
96 in some platforms you may need to invoke a different command name
97 than "make" (e.g. "gmake") to indicate it's GNU make.</p>
98 </div>
99 <div class="sect2" lang="en">
100 <div class="titlepage"><div><div><h3 class="title">
101 <a name="id2612263"></a>Compilation</h3></div></div></div>
102 <pre class="screen">
103 $ <strong class="userinput"><code>./configure --enable-exportlib <em class="replaceable"><code>[other flags]</code></em></code></strong>
104 $ <strong class="userinput"><code>make</code></strong>
105 </pre>
107 This will create (in addition to usual BIND 9 programs) and a
108 separate set of libraries under the lib/export directory. For
109 example, <code class="filename">lib/export/dns/libdns.a</code> is the archive file of the
110 export version of the BIND 9 DNS library. Sample application
111 programs using the libraries will also be built under the
112 lib/export/samples directory (see below).</p>
113 </div>
114 <div class="sect2" lang="en">
115 <div class="titlepage"><div><div><h3 class="title">
116 <a name="id2612288"></a>Installation</h3></div></div></div>
117 <pre class="screen">
118 $ <strong class="userinput"><code>cd lib/export</code></strong>
119 $ <strong class="userinput"><code>make install</code></strong>
120 </pre>
122 This will install library object files under the directory
123 specified by the --with-export-libdir configure option (default:
124 EPREFIX/lib/bind9), and header files under the directory
125 specified by the --with-export-includedir configure option
126 (default: PREFIX/include/bind9).
127 Root privilege is normally required.
128 "<span><strong class="command">make install</strong></span>" at the top directory will do the
129 same.
130 </p>
132 To see how to build your own
133 application after the installation, see
134 <code class="filename">lib/export/samples/Makefile-postinstall.in</code>.</p>
135 </div>
136 <div class="sect2" lang="en">
137 <div class="titlepage"><div><div><h3 class="title">
138 <a name="id2612455"></a>Known Defects/Restrictions</h3></div></div></div>
139 <div class="itemizedlist"><ul type="disc">
140 <li><p>Currently, win32 is not supported for the export
141 library. (Normal BIND 9 application can be built as
142 before).</p></li>
143 <li>
144 <p>The "fixed" RRset order is not (currently) supported in
145 the export library. If you want to use "fixed" RRset order
146 for, e.g. <span><strong class="command">named</strong></span> while still building the
147 export library even without the fixed order support, build
148 them separately:
149 </p>
150 <pre class="screen">
151 $ <strong class="userinput"><code>./configure --enable-fixed-rrset <em class="replaceable"><code>[other flags, but not --enable-exportlib]</code></em></code></strong>
152 $ <strong class="userinput"><code>make</code></strong>
153 $ <strong class="userinput"><code>./configure --enable-exportlib <em class="replaceable"><code>[other flags, but not --enable-fixed-rrset]</code></em></code></strong>
154 $ <strong class="userinput"><code>cd lib/export</code></strong>
155 $ <strong class="userinput"><code>make</code></strong>
156 </pre>
158 </p>
159 </li>
160 <li><p>The client module and the IRS library currently do not
161 support DNSSEC validation using DLV (the underlying modules
162 can handle it, but there is no tunable interface to enable
163 the feature).</p></li>
164 <li><p>RFC 5011 is not supported in the validating stub
165 resolver of the export library. In fact, it is not clear
166 whether it should: trust anchors would be a system-wide
167 configuration which would be managed by an administrator,
168 while the stub resolver will be used by ordinary applications
169 run by a normal user.</p></li>
170 <li><p>Not all common <code class="filename">/etc/resolv.conf</code>
171 options are supported
172 in the IRS library. The only available options in this
173 version are "debug" and "ndots".</p></li>
174 </ul></div>
175 </div>
176 <div class="sect2" lang="en">
177 <div class="titlepage"><div><div><h3 class="title">
178 <a name="id2612532"></a>The dns.conf File</h3></div></div></div>
179 <p>The IRS library supports an "advanced" configuration file
180 related to the DNS library for configuration parameters that
181 would be beyond the capability of the
182 <code class="filename">resolv.conf</code> file.
183 Specifically, it is intended to provide DNSSEC related
184 configuration parameters. By default the path to this
185 configuration file is <code class="filename">/etc/dns.conf</code>.
186 This module is very
187 experimental and the configuration syntax or library interfaces
188 may change in future versions. Currently, only the
189 <span><strong class="command">trusted-keys</strong></span>
190 statement is supported, whose syntax is the same as the same name
191 of statement for <code class="filename">named.conf</code>. (See
192 <a href="Bv9ARM.ch06.html#trusted-keys" title="trusted-keys Statement Grammar">the section called &#8220;<span><strong class="command">trusted-keys</strong></span> Statement Grammar&#8221;</a> for details.)</p>
193 </div>
194 <div class="sect2" lang="en">
195 <div class="titlepage"><div><div><h3 class="title">
196 <a name="id2612558"></a>Sample Applications</h3></div></div></div>
197 <p>Some sample application programs using this API are
198 provided for reference. The following is a brief description of
199 these applications.
200 </p>
201 <div class="sect3" lang="en">
202 <div class="titlepage"><div><div><h4 class="title">
203 <a name="id2612567"></a>sample: a simple stub resolver utility</h4></div></div></div>
205 It sends a query of a given name (of a given optional RR type) to a
206 specified recursive server, and prints the result as a list of
207 RRs. It can also act as a validating stub resolver if a trust
208 anchor is given via a set of command line options.</p>
210 Usage: sample [options] server_address hostname
211 </p>
213 Options and Arguments:
214 </p>
215 <div class="variablelist"><dl>
216 <dt><span class="term">
217 -t RRtype
218 </span></dt>
219 <dd><p>
220 specify the RR type of the query. The default is the A RR.
221 </p></dd>
222 <dt><span class="term">
223 [-a algorithm] [-e] -k keyname -K keystring
224 </span></dt>
225 <dd>
227 specify a command-line DNS key to validate the answer. For
228 example, to specify the following DNSKEY of example.com:
229 </p>
230 <div class="literallayout"><p><br>
231                 example.com. 3600 IN DNSKEY 257 3 5 xxx<br>
232 </p></div>
234 specify the options as follows:
235 </p>
236 <pre class="screen">
237 <strong class="userinput"><code>
238 -e -k example.com -K "xxx"
239 </code></strong>
240 </pre>
242 -e means that this key is a zone's "key signing key" (as known
243 as "secure Entry point").
244 When -a is omitted rsasha1 will be used by default.
245 </p>
246 </dd>
247 <dt><span class="term">
248 -s domain:alt_server_address
249 </span></dt>
250 <dd><p>
251 specify a separate recursive server address for the specific
252 "domain". Example: -s example.com:2001:db8::1234
253 </p></dd>
254 <dt><span class="term">server_address</span></dt>
255 <dd><p>
256 an IP(v4/v6) address of the recursive server to which queries
257 are sent.
258 </p></dd>
259 <dt><span class="term">hostname</span></dt>
260 <dd><p>
261 the domain name for the query
262 </p></dd>
263 </dl></div>
264 </div>
265 <div class="sect3" lang="en">
266 <div class="titlepage"><div><div><h4 class="title">
267 <a name="id2612658"></a>sample-async: a simple stub resolver, working asynchronously</h4></div></div></div>
269 Similar to "sample", but accepts a list
270 of (query) domain names as a separate file and resolves the names
271 asynchronously.</p>
273 Usage: sample-async [-s server_address] [-t RR_type] input_file</p>
275 Options and Arguments:
276 </p>
277 <div class="variablelist"><dl>
278 <dt><span class="term">
279 -s server_address
280 </span></dt>
281 <dd>
282 an IPv4 address of the recursive server to which queries are sent.
283 (IPv6 addresses are not supported in this implementation)
284 </dd>
285 <dt><span class="term">
286 -t RR_type
287 </span></dt>
288 <dd>
289 specify the RR type of the queries. The default is the A
291 </dd>
292 <dt><span class="term">
293 input_file
294 </span></dt>
295 <dd>
296 a list of domain names to be resolved. each line
297 consists of a single domain name. Example:
298 <div class="literallayout"><p><br>
299   www.example.com<br>
300   mx.example.net<br>
301   ns.xxx.example<br>
302 </p></div>
303 </dd>
304 </dl></div>
305 </div>
306 <div class="sect3" lang="en">
307 <div class="titlepage"><div><div><h4 class="title">
308 <a name="id2612711"></a>sample-request: a simple DNS transaction client</h4></div></div></div>
310 It sends a query to a specified server, and
311 prints the response with minimal processing. It doesn't act as a
312 "stub resolver": it stops the processing once it gets any
313 response from the server, whether it's a referral or an alias
314 (CNAME or DNAME) that would require further queries to get the
315 ultimate answer. In other words, this utility acts as a very
316 simplified <span><strong class="command">dig</strong></span>.
317 </p>
319 Usage: sample-request [-t RRtype] server_address hostname
320 </p>
322 Options and Arguments:
323 </p>
324 <div class="variablelist"><dl>
325 <dt><span class="term">
326 -t RRtype
327 </span></dt>
328 <dd><p>
329 specify the RR type of
330 the queries. The default is the A RR.
331 </p></dd>
332 <dt><span class="term">
333 server_address
334 </span></dt>
335 <dd><p>
336 an IP(v4/v6)
337 address of the recursive server to which the query is sent.
338 </p></dd>
339 <dt><span class="term">
340 hostname
341 </span></dt>
342 <dd><p>
343 the domain name for the query
344 </p></dd>
345 </dl></div>
346 </div>
347 <div class="sect3" lang="en">
348 <div class="titlepage"><div><div><h4 class="title">
349 <a name="id2612775"></a>sample-gai: getaddrinfo() and getnameinfo() test code</h4></div></div></div>
351 This is a test program
352 to check getaddrinfo() and getnameinfo() behavior. It takes a
353 host name as an argument, calls getaddrinfo() with the given host
354 name, and calls getnameinfo() with the resulting IP addresses
355 returned by getaddrinfo(). If the dns.conf file exists and
356 defines a trust anchor, the underlying resolver will act as a
357 validating resolver, and getaddrinfo()/getnameinfo() will fail
358 with an EAI_INSECUREDATA error when DNSSEC validation fails.
359 </p>
361 Usage: sample-gai hostname
362 </p>
363 </div>
364 <div class="sect3" lang="en">
365 <div class="titlepage"><div><div><h4 class="title">
366 <a name="id2612790"></a>sample-update: a simple dynamic update client program</h4></div></div></div>
368 It accepts a single update command as a
369 command-line argument, sends an update request message to the
370 authoritative server, and shows the response from the server. In
371 other words, this is a simplified <span><strong class="command">nsupdate</strong></span>.
372 </p>
374 Usage: sample-update [options] (add|delete) "update data"
375 </p>
377 Options and Arguments:
378 </p>
379 <div class="variablelist"><dl>
380 <dt><span class="term">
381 -a auth_server
382 </span></dt>
383 <dd><p>
384 An IP address of the authoritative server that has authority
385 for the zone containing the update name. This should normally
386 be the primary authoritative server that accepts dynamic
387 updates. It can also be a secondary server that is configured
388 to forward update requests to the primary server.
389 </p></dd>
390 <dt><span class="term">
391 -k keyfile
392 </span></dt>
393 <dd><p>
394 A TSIG key file to secure the update transaction. The keyfile
395 format is the same as that for the nsupdate utility.
396 </p></dd>
397 <dt><span class="term">
398 -p prerequisite
399 </span></dt>
400 <dd><p>
401 A prerequisite for the update (only one prerequisite can be
402 specified). The prerequisite format is the same as that is
403 accepted by the nsupdate utility.
404 </p></dd>
405 <dt><span class="term">
406 -r recursive_server
407 </span></dt>
408 <dd><p>
409 An IP address of a recursive server that this utility will
410 use. A recursive server may be necessary to identify the
411 authoritative server address to which the update request is
412 sent.
413 </p></dd>
414 <dt><span class="term">
415 -z zonename
416 </span></dt>
417 <dd><p>
418 The domain name of the zone that contains
419 </p></dd>
420 <dt><span class="term">
421 (add|delete)
422 </span></dt>
423 <dd><p>
424 Specify the type of update operation. Either "add" or "delete"
425 must be specified.
426 </p></dd>
427 <dt><span class="term">
428 "update data"
429 </span></dt>
430 <dd><p>
431 Specify the data to be updated. A typical example of the data
432 would look like "name TTL RRtype RDATA".
433 </p></dd>
434 </dl></div>
435 <div class="note" style="margin-left: 0.5in; margin-right: 0.5in;">
436 <h3 class="title">Note</h3>In practice, either -a or -r must be specified. Others can
437 be optional; the underlying library routine tries to identify the
438 appropriate server and the zone name for the update.</div>
440 Examples: assuming the primary authoritative server of the
441 dynamic.example.com zone has an IPv6 address 2001:db8::1234,
442 </p>
443 <pre class="screen">
444 $ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key add "foo.dynamic.example.com 30 IN A 192.168.2.1"</code></strong></pre>
446 adds an A RR for foo.dynamic.example.com using the given key.
447 </p>
448 <pre class="screen">
449 $ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com 30 IN A"</code></strong></pre>
451 removes all A RRs for foo.dynamic.example.com using the given key.
452 </p>
453 <pre class="screen">
454 $ <strong class="userinput"><code>sample-update -a sample-update -k Kxxx.+nnn+mmmm.key delete "foo.dynamic.example.com"</code></strong></pre>
456 removes all RRs for foo.dynamic.example.com using the given key.
457 </p>
458 </div>
459 <div class="sect3" lang="en">
460 <div class="titlepage"><div><div><h4 class="title">
461 <a name="id2613536"></a>nsprobe: domain/name server checker in terms of RFC 4074</h4></div></div></div>
463 It checks a set
464 of domains to see the name servers of the domains behave
465 correctly in terms of RFC 4074. This is included in the set of
466 sample programs to show how the export library can be used in a
467 DNS-related application.
468 </p>
470 Usage: nsprobe [-d] [-v [-v...]] [-c cache_address] [input_file]
471 </p>
473 Options
474 </p>
475 <div class="variablelist"><dl>
476 <dt><span class="term">
478 </span></dt>
479 <dd><p>
480 run in the "debug" mode. with this option nsprobe will dump
481 every RRs it receives.
482 </p></dd>
483 <dt><span class="term">
485 </span></dt>
486 <dd><p>
487 increase verbosity of other normal log messages. This can be
488 specified multiple times
489 </p></dd>
490 <dt><span class="term">
491 -c cache_address
492 </span></dt>
493 <dd><p>
494 specify an IP address of a recursive (caching) name server.
495 nsprobe uses this server to get the NS RRset of each domain and
496 the A and/or AAAA RRsets for the name servers. The default
497 value is 127.0.0.1.
498 </p></dd>
499 <dt><span class="term">
500 input_file
501 </span></dt>
502 <dd><p>
503 a file name containing a list of domain (zone) names to be
504 probed. when omitted the standard input will be used. Each
505 line of the input file specifies a single domain name such as
506 "example.com". In general this domain name must be the apex
507 name of some DNS zone (unlike normal "host names" such as
508 "www.example.com"). nsprobe first identifies the NS RRsets for
509 the given domain name, and sends A and AAAA queries to these
510 servers for some "widely used" names under the zone;
511 specifically, adding "www" and "ftp" to the zone name.
512 </p></dd>
513 </dl></div>
514 </div>
515 </div>
516 <div class="sect2" lang="en">
517 <div class="titlepage"><div><div><h3 class="title">
518 <a name="id2613600"></a>Library References</h3></div></div></div>
519 <p>As of this writing, there is no formal "manual" of the
520 libraries, except this document, header files (some of them
521 provide pretty detailed explanations), and sample application
522 programs.</p>
523 </div>
524 </div>
525 </div>
526 <div class="navfooter">
527 <hr>
528 <table width="100%" summary="Navigation footer">
529 <tr>
530 <td width="40%" align="left">
531 <a accesskey="p" href="Bv9ARM.ch11.html">Prev</a> </td>
532 <td width="20%" align="center"> </td>
533 <td width="40%" align="right"> <a accesskey="n" href="Bv9ARM.ch13.html">Next</a>
534 </td>
535 </tr>
536 <tr>
537 <td width="40%" align="left" valign="top">Appendix C. General <acronym class="acronym">DNS</acronym> Reference Information </td>
538 <td width="20%" align="center"><a accesskey="h" href="Bv9ARM.html">Home</a></td>
539 <td width="40%" align="right" valign="top"> Manual pages</td>
540 </tr>
541 </table>
542 </div>
543 <p style="text-align: center;">BIND 9.10.2-P4</p>
544 </body>
545 </html>