3 .\" Copyright (C) 2004, 2005, 2007, 2009 Internet Systems Consortium, Inc. ("ISC")
4 .\" Copyright (C) 2001, 2003 Internet Software Consortium.
6 .\" Permission to use, copy, modify, and/or distribute this software for any
7 .\" purpose with or without fee is hereby granted, provided that the above
8 .\" copyright notice and this permission notice appear in all copies.
10 .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
11 .\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
12 .\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
13 .\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
14 .\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
15 .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
16 .\" PERFORMANCE OF THIS SOFTWARE.
18 .\" Id: rndc-confgen.8,v 1.7 2009/07/11 01:12:45 tbox Exp
22 .\" Title: rndc\-confgen
24 .\" Generator: DocBook XSL Stylesheets v1.71.1 <http://docbook.sf.net/>
25 .\" Date: Aug 27, 2001
29 .TH "RNDC\-CONFGEN" "8" "Aug 27, 2001" "BIND9" "BIND9"
30 .\" disable hyphenation
32 .\" disable justification (adjust text to left margin only)
35 rndc\-confgen \- rndc key generation tool
38 \fBrndc\-confgen\fR [\fB\-a\fR] [\fB\-b\ \fR\fB\fIkeysize\fR\fR] [\fB\-c\ \fR\fB\fIkeyfile\fR\fR] [\fB\-h\fR] [\fB\-k\ \fR\fB\fIkeyname\fR\fR] [\fB\-p\ \fR\fB\fIport\fR\fR] [\fB\-r\ \fR\fB\fIrandomfile\fR\fR] [\fB\-s\ \fR\fB\fIaddress\fR\fR] [\fB\-t\ \fR\fB\fIchrootdir\fR\fR] [\fB\-u\ \fR\fB\fIuser\fR\fR]
42 generates configuration files for
43 \fBrndc\fR. It can be used as a convenient alternative to writing the
45 file and the corresponding
51 by hand. Alternatively, it can be run with the
55 file and avoid the need for a
66 configuration. This creates a file
74 was built) that is read by both
80 file defines a default command channel and authentication key allowing
84 on the local host with no further configuration.
87 \fBrndc\-confgen \-a\fR
90 to be used as drop\-in replacements for BIND 8 and
91 \fBndc\fR, with no changes to the existing BIND 8
95 If a more elaborate configuration than that generated by
96 \fBrndc\-confgen \-a\fR
97 is required, for example if rndc is to be used remotely, you should run
110 Specifies the size of the authentication key in bits. Must be between 1 and 512 bits; the default is 128.
117 option to specify an alternate location for
123 Prints a short summary of the options and arguments to
129 Specifies the key name of the rndc authentication key. This must be a valid domain name. The default is
135 Specifies the command channel port where
137 listens for connections from
138 \fBrndc\fR. The default is 953.
143 Specifies a source of random data for generating the authorization. If the operating system does not provide a
145 or equivalent device, the default source of randomness is keyboard input.
147 specifies the name of a character device or file containing random data to be used instead of the default. The special value
149 indicates that keyboard input should be used.
154 Specifies the IP address where
156 listens for command channel connections from
157 \fBrndc\fR. The default is the loopback address 127.0.0.1.
164 option to specify a directory where
166 will run chrooted. An additional copy of the
168 will be written relative to this directory so that it will be found by the chrooted
176 option to set the owner of the
180 is also specified only the file in the chroot area has its owner changed.
186 to be used with no manual configuration, run
188 \fBrndc\-confgen \-a\fR
192 file and corresponding
196 statements to be manually inserted into
197 \fInamed.conf\fR, run
205 BIND 9 Administrator Reference Manual.
208 Internet Systems Consortium
210 Copyright \(co 2004, 2005, 2007, 2009 Internet Systems Consortium, Inc. ("ISC")
212 Copyright \(co 2001, 2003 Internet Software Consortium.