📄 options
字号:
OPTIONS Original: Paul Vixie, 28Mar92 Revised: $Id: OPTIONS,v 4.9.1.8 1993/11/03 12:25:50 vixie Exp $Options available in this version of BIND are controlled by conf/options.h,rather than by $(DEFS) in the Makefile. The options are:DEBUG (origin: U C Berkeley) enables the -d command line option, and allows SIGUSR1 to incrementand SIGUSR2 to decrement the internal variable "debug", which in turn controlshundreds of fprintf()'s out to /usr/tmp/named.run. you probably want this. it makes the binary bigger but not slower (orat least not much slower), but SIGUSR[12] are the only way you'll track downmisconfigured name servers that hose you down with billions of bogus requests.ALLOW_T_UNSPEC (origin: MIT Project Athena) enables the "unspec" RR type for ancient athena software that does notknow about TXT RR's. you probably do not care about this.ALLOW_UPDATES (origin: Mike Schwartz, University of Washington) enables "dynamic updates", described in "doc/DynamicUpdate". this letsyou update named's in-memory database on the fly if you have the right client.there is absolutely no security around this; if you enable it, anyone who canreach your server can update your database. you probably do not want to enable this.INVQ (origin: U C Berkeley, with #ifdef's by Paul Vixie) enables "inverse queries", which in all of the internet only one clientever uses: ancient nslookup. if you build named with INVQ defined as "1",you get the time-honored behaviour of supporting this whole class ofqueries for no real purpose other than to waste a few hundred kilobytes ofyour memory and about 3% of named's total CPU time. if you build withINVQ set to "0", old nslookups will not be able to reach your server in theirstartup phase, and you will have to use the "server" command after it failsover to some other server. you probably want this.DSTORAGE (origin: U C Berkeley, with #ifdef's by Paul Vixie) enables a malloc-debugger that checks for overruns on both ends ofeach allocated block of memory. used when debugging since C has no boundsor type checking. you probably do not want this.DMALLOC (origin: Paul Vixie of Digital) enables a malloc-debugger that traces all allocated blocks of memorysuch that SIGIOT's output (see STATS, above) includes a list of all malloc'sin the program, how many times each has been called, how many blocks of memoryallocated by that malloc are not yet free, and how many bytes they use up.under each one will be a list of each free/realloc that has deallocated a blockof that malloc's memory, and how many times it has done so. this is extremely helpful for finding memory leaks. as such, youprobably do not want this unless you are debugging named.CRED (origin: Paul Vixie of Digital) enables a system of "credibility checking" on all data in the memory-resident database. every RR that comes in will be tagged with a credibilityindex with zone files being highest, followed by authoritative answers, thennon-authoritative answers, then finally by additional data. when any RR isbeing added to a node ("name") in the database, all RR's of that type with alower credibility index will be flushed. this tends to do away with additionaldata, which is one of the greatest sources of database pollution in the DNS.data that comes in with lower credibility than what we already have is ignored. with CRED enabled, additional data is deprecated such that everytime an additional-data RR is used, its Time To Live (TTL) is multiplied by0.95, effectively lowering it by 5% of its current value. this causesadditional data to be timed out rather quickly, and as soon as it timesout, a sysquery() will be sent to some authoritative server, which in turnresults in a real live answer which tends to lock out future additionaldata on that <name,type> tuple. due to source dependencies, CRED also controls a bug fix that keepsall sysquery() responses from being entered into the "root cache". you cansee the effect of this by dumping your database to disk with SIGINT andlooking at the bottom of the file. try it with and without CRED, letting afew million queries through first. without CRED, you'll see a bunch ofnon-root junk in the section of the dump that is reserved for the "hints". you probably want this.XFRNETS (origin: Paul Vixie of Digital) enables the "xfrnets" command in named.boot. this has the samesyntax as "forwarders" and "sortlist" -- that is, a list of dotted quads.each one is a network (16.0.0.0 and 130.180.0.0 are examples) or a host.if you put any xfrnets commands into your named.boot, then zone transferswill only be honored if they come from inside one of the specifiednetworks. this is very useful if you want to keep people outside frombeing able to trivially map your entire network, but it doesn't stop themfrom iterating so it's more annoying than secure. this feature was once called "tcplist" out of ignorance on my part,but with advice from phil almquist i decided to rename it "xfrnets" and makeit only control zone transfers -- previously it controlled all TCP connectionswhich made certain TCP-only resolvers unable to use our servers. the "tcplist"syntax still works; it is a synonym for "xfrnets". you probably do not care about this.PID_FIX (origin: Don Lewis of Harris) tells named that if it starts up but can't keep going because anothernameserver is already running (and sitting on the server port), it shouldput the /etc/named.pid (/var/run/named.pid) file back the way it found it. you probably want this.FWD_LOOP (origin: Don Lewis of Harris) tells named that if you list any of your own IP addresses in a"forwarders" command in your named.boot file, you should be scolded. you probably want this.NO_GLUE (origin: Don Lewis of Harris, and Andrew Partan of UUNET) tells named-xfer that incoming zone transfers should be checkedfor "glue" that comes from a zone outside the zone being transferred, andcomment this garbage out in the zone file so that when named reads in thezone file after named-xfer exits, the garbage will not be entered into thememory-resident database. also tells named that when it is performing an outgoing zonetransfer, it should not send any of these "glue" records. you definitely want this.BOGUSNS (origin: Piet Beertema of EUNet) enables the "bogusns" command in named.boot. this has the samesyntax as forwarders and sortlist. any NS RR's that come in whose addressesare on the list of "bogusns" addresses will be ignored. this is the lastresort when someone is bogusly advertising themselves as a root server. you probably want this, just in case, though you won't use it often.QRYLOG (origin: Bryan Beecher of UMich) enables "query logging", such that SIGWINCH toggles tracing of allincoming queries. the trace is sent to syslog, and is huge, but when youneed this you will need it bad and it does not slow named down or make itlarger. If you define QRYLOG you may also start up named in query loggingmode by using the -q flag. If you do so you will probably want to analyzethe logs produced, the dnsstats and lamers scrips (in the contrib/umichdirectory) will do it for you. you probably want this.LOGFAC (origin: various people) If you start up named with the -q flag you will be logginglarge amounts of data, and probably will not want them logged to thedefault logging facility, which is LOG_DAEMON. You will want toredefine LOGFAC, presumably to LOC_LOCALn (0 <= n <= 7). Remember tomodify /etc/syslog.conf appropriately. This only works on a system with a modern syslogd.YPKLUDGE (origin: Piet Beertema of EUNet) certain versions of NIS/YP are capable of using the DNS for namesthat cannot be found in the YP servers. of these, certain versions can'ttell the difference between a dotted quad and a domain name, and they sendqueries to the DNS for dotted quads as if they were domain names. if yournamed does not do anything special with these queries, they will end upgetting forwarded to other servers, effectively hosing all of you down withendless useless network traffic. YPKLUDGE enables some checking in namedthat lets it catch these bogus queries and send back immediate errors. If you run "ypserv -i" you definitely want this, as a malconfiguredNIS server can cause DNS "flood" queries otherwise. Trust me.TRACEROOT (origin: pma@cnd.hp.com and Bryan Beecher of UMich) enables some checking in named for bogus root nameservers. Thiscode has been in use at U-M for years, so it is pretty well tested, plus wehave never been burned by the "bogus root NS scares" that have plagued theDNS off and on. this is a feature that people will very much want to use.LOCALDOM (origin: Berkeley) if set, the "domain" directive is recognized in the named.boot file.this causes us to retry queries with the specified domain appended to thename if the first lookup fails. this is a very bad idea since a given nameserver will often be used by clients in more than one domain -- a name servershould _not_ make any presumptions as to the "home domain" of a requestor.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -