3 .\" Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
5 .\" Permission to use, copy, modify, and/or distribute this software for any
6 .\" purpose with or without fee is hereby granted, provided that the above
7 .\" copyright notice and this permission notice appear in all copies.
9 .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 .\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 .\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 .\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 .\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 .\" PERFORMANCE OF THIS SOFTWARE.
17 .\" Id: ddns-confgen.8,v 1.10 2009/09/19 01:14:52 tbox Exp
21 .\" Title: ddns\-confgen
23 .\" Generator: DocBook XSL Stylesheets v1.71.1 <http://docbook.sf.net/>
24 .\" Date: Jan 29, 2009
28 .TH "DDNS\-CONFGEN" "8" "Jan 29, 2009" "BIND9" "BIND9"
29 .\" disable hyphenation
31 .\" disable justification (adjust text to left margin only)
34 ddns\-confgen \- ddns key generation tool
37 \fBddns\-confgen\fR [\fB\-a\ \fR\fB\fIalgorithm\fR\fR] [\fB\-h\fR] [\fB\-k\ \fR\fB\fIkeyname\fR\fR] [\fB\-r\ \fR\fB\fIrandomfile\fR\fR] [\-s\ \fIname\fR | \-z\ \fIzone\fR] [\fB\-q\fR] [name]
41 generates a key for use by
44 \fBnamed\fR. It simplifies configuration of dynamic zones by generating a key and providing the
48 syntax that will be needed to use it, including an example
52 If a domain name is specified on the command line, it will be used in the name of the generated key and in the sample
55 \fBddns\-confgen example.com\fR
56 would generate a key called "ddns\-key.example.com", and sample
58 command that could be used in the zone definition for "example.com".
62 itself can configure a local DDNS key for use with
65 is only needed when a more elaborate configuration is required: for instance, if
67 is to be used from a remote system.
72 Specifies the algorithm to use for the TSIG key. Available choices are: hmac\-md5, hmac\-sha1, hmac\-sha224, hmac\-sha256, hmac\-sha384 and hmac\-sha512. The default is hmac\-sha256.
77 Prints a short summary of the options and arguments to
83 Specifies the key name of the DDNS authentication key. The default is
89 option is specified; otherwise, the default is
91 as a separate label followed by the argument of the option, e.g.,
92 \fBddns\-key.example.com.\fR
93 The key name must have the format of a valid domain name, consisting of letters, digits, hyphens and periods.
98 Quiet mode: Print only the key, with no explanatory text or usage examples.
103 Specifies a source of random data for generating the authorization. If the operating system does not provide a
105 or equivalent device, the default source of randomness is keyboard input.
107 specifies the name of a character device or file containing random data to be used instead of the default. The special value
109 indicates that keyboard input should be used.
114 Single host mode: The example
116 text shows how to set an update policy for the specified
118 using the "name" nametype. The default key name is ddns\-key.\fIname\fR. Note that the "self" nametype cannot be used, since the name to be updated may differ from the key name. This option cannot be used with the
125 zone mode: The example
127 text shows how to set an update policy for the specified
129 using the "zonesub" nametype, allowing updates to all subdomain names within that
130 \fIzone\fR. This option cannot be used with the
139 BIND 9 Administrator Reference Manual.
142 Internet Systems Consortium
144 Copyright \(co 2009 Internet Systems Consortium, Inc. ("ISC")