head 1.2; access; symbols RELENG_5_5_0_RELEASE:1.1.1.5.8.1 RELENG_5_5:1.1.1.5.8.1.0.6 RELENG_5_5_BP:1.1.1.5.8.1 RELENG_5_4_0_RELEASE:1.1.1.5.8.1 RELENG_5_4:1.1.1.5.8.1.0.4 RELENG_5_4_BP:1.1.1.5.8.1 RELENG_4_11_0_RELEASE:1.1.1.2.2.3 RELENG_4_11:1.1.1.2.2.3.0.10 RELENG_4_11_BP:1.1.1.2.2.3 RELENG_5_3_0_RELEASE:1.1.1.5.8.1 RELENG_5_3:1.1.1.5.8.1.0.2 RELENG_5_3_BP:1.1.1.5.8.1 RELENG_5:1.1.1.5.0.8 RELENG_5_BP:1.1.1.5 RELENG_4_10_0_RELEASE:1.1.1.2.2.3 RELENG_4_10:1.1.1.2.2.3.0.8 RELENG_4_10_BP:1.1.1.2.2.3 RELENG_5_2_1_RELEASE:1.1.1.5 RELENG_5_2_0_RELEASE:1.1.1.5 RELENG_5_2:1.1.1.5.0.6 RELENG_5_2_BP:1.1.1.5 v8_3_7:1.1.1.5 RELENG_4_9_0_RELEASE:1.1.1.2.2.3 RELENG_4_9:1.1.1.2.2.3.0.6 RELENG_4_9_BP:1.1.1.2.2.3 v8_3_6:1.1.1.5 RELENG_5_1_0_RELEASE:1.1.1.5 RELENG_5_1:1.1.1.5.0.4 RELENG_5_1_BP:1.1.1.5 RELENG_4_8_0_RELEASE:1.1.1.2.2.3 RELENG_4_8:1.1.1.2.2.3.0.4 RELENG_4_8_BP:1.1.1.2.2.3 v8_3_4:1.1.1.5 RELENG_5_0_0_RELEASE:1.1.1.5 RELENG_5_0:1.1.1.5.0.2 RELENG_5_0_BP:1.1.1.5 RELENG_4_7_0_RELEASE:1.1.1.2.2.3 RELENG_4_7:1.1.1.2.2.3.0.2 RELENG_4_7_BP:1.1.1.2.2.3 RELENG_4_6_2_RELEASE:1.1.1.2.2.2.2.1 RELENG_4_6_1_RELEASE:1.1.1.2.2.2.2.1 v8_3_3:1.1.1.5 RELENG_4_6_0_RELEASE:1.1.1.2.2.2 RELENG_4_6:1.1.1.2.2.2.0.2 RELENG_4_6_BP:1.1.1.2.2.2 v8_3_2_t1b:1.1.1.4 RELENG_4_5_0_RELEASE:1.1.1.2.2.1 RELENG_4_5:1.1.1.2.2.1.0.6 RELENG_4_5_BP:1.1.1.2.2.1 RELENG_4_4_0_RELEASE:1.1.1.2.2.1 RELENG_4_4:1.1.1.2.2.1.0.4 RELENG_4_4_BP:1.1.1.2.2.1 v8_2_4:1.1.1.3 RELENG_4_3_0_RELEASE:1.1.1.2.2.1 RELENG_4_3:1.1.1.2.2.1.0.2 RELENG_4_3_BP:1.1.1.2.2.1 v8_2_3:1.1.1.3 RELENG_4_2_0_RELEASE:1.1.1.2 v8_2_3_t6b:1.1.1.2 RELENG_4_1_1_RELEASE:1.1.1.2 PRE_SMPNG:1.1.1.2 RELENG_4_1_0_RELEASE:1.1.1.2 RELENG_3_5_0_RELEASE:1.1.1.1.2.1 RELENG_4_0_0_RELEASE:1.1.1.2 RELENG_4:1.1.1.2.0.2 RELENG_4_BP:1.1.1.2 RELENG_3_4_0_RELEASE:1.1.1.1.2.1 v8_2_2_p5:1.1.1.2 RELENG_3_3_0_RELEASE:1.1.1.1 RELENG_3_2_PAO:1.1.1.1.0.4 RELENG_3_2_PAO_BP:1.1.1.1 RELENG_3_2_0_RELEASE:1.1.1.1 RELENG_3_1_0_RELEASE:1.1.1.1 RELENG_3:1.1.1.1.0.2 RELENG_3_BP:1.1.1.1 RELENG_3_0_0_RELEASE:1.1.1.1 v8_1_2:1.1.1.1 bind_8_1_2_t3b:1.1.1.1 ISC:1.1.1; locks; strict; comment @# @; 1.2 date 2004.09.24.19.48.40; author des; state dead; branches; next 1.1; 1.1 date 98.05.03.04.11.32; author peter; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 98.05.03.04.11.32; author peter; state Exp; branches 1.1.1.1.2.1; next 1.1.1.2; 1.1.1.2 date 99.11.30.02.41.50; author peter; state Exp; branches 1.1.1.2.2.1; next 1.1.1.3; 1.1.1.3 date 2001.02.17.15.48.22; author asmodai; state Exp; branches; next 1.1.1.4; 1.1.1.4 date 2002.05.13.19.33.57; author nectar; state Exp; branches; next 1.1.1.5; 1.1.1.5 date 2002.07.01.01.07.40; author dougb; state Exp; branches 1.1.1.5.8.1; next ; 1.1.1.5.8.1 date 2004.09.26.03.09.22; author des; state dead; branches; next ; 1.1.1.2.2.1 date 2001.02.27.09.42.16; author asmodai; state Exp; branches 1.1.1.2.2.1.4.1 1.1.1.2.2.1.6.1; next 1.1.1.2.2.2; 1.1.1.2.2.2 date 2002.05.15.19.51.23; author nectar; state Exp; branches 1.1.1.2.2.2.2.1; next 1.1.1.2.2.3; 1.1.1.2.2.3 date 2002.07.07.08.19.16; author dougb; state Exp; branches; next ; 1.1.1.2.2.2.2.1 date 2002.07.15.07.51.15; author dougb; state Exp; branches; next ; 1.1.1.2.2.1.4.1 date 2002.07.15.08.01.41; author dougb; state Exp; branches; next ; 1.1.1.2.2.1.6.1 date 2002.07.15.07.55.56; author dougb; state Exp; branches; next ; 1.1.1.1.2.1 date 99.12.13.15.05.40; author peter; state Exp; branches; next 1.1.1.1.2.2; 1.1.1.1.2.2 date 2001.02.27.10.01.29; author asmodai; state Exp; branches; next ; desc @@ 1.2 log @Retire the BIND 8 sources. @ text @
server
Statementserver ip_addr { [ bogus yes_or_no; ] [ transfers number; ] [ transfer-format ( one-answer | many-answers ); ] [ keys { key_id [key_id ... ] }; ] };
The server statement defines the characteristics to be associated with a remote name server.
If you discover that a server is giving out bad data, marking it as
bogus
will prevent further queries to it. The default value of
bogus
is no
.
The server supports two zone transfer methods. The first,
one-answer
, uses one DNS message per resource record
transferred. many-answers
packs as many resource records
as possible into a message. many-answers
is more
efficient, but is only known to be understood by BIND 8.1 and patched
versions of BIND 4.9.5. You can specify which method to use for a
server with the transfer-format
option. If
transfer-format
is not specified, the transfer-format
specified by the options
statement will be used.
The transfers
will be used in a future release of the server
to limit the number of concurrent in-bound zone transfers from the specified
server. It is checked for syntax but is otherwise ignored.
The keys
statement is intended for future use by the
server. It is checked for syntax but is otherwise ignored.
[ BIND Config. File | BIND Home | ISC ]
The keys
clause is used to identify a
key_id defined by the key
statement, to be
used for transaction security when talking to the remote server.
The key
statememnt must come before the server
statement that references it. When a request is sent to the remote server,
a request signature will be generated using the key specified here and
appended to the message. A request originating from the remote server is not
required to be signed by this key.
d54 2
a55 2
| BIND Home
| ISC ]
bogus
is no
. Marking a server as bogus
will mark all other addresses for that server as bogus
when
a match is made when looking up a server's address by name.
d66 1
a66 1
Last Updated: $Id: server.html,v 1.11 2000/11/08 04:15:07 marka Exp $
@
1.1.1.2
log
@Import bind v8.2.2.p5, minus the crypto for the time being. The bind
package does have BXA export approval, but the licensing strings on the
dnssafe code are a bit unpleasant. The crypto is easy to restore and bind
will run without it - just without full dnssec support.
Obtained from: The Internet Software Consortium (www.isc.org)
@
text
@a16 1
[ support-ixfr yes_or_no; ]
d48 2
a49 8
The keys
clause is used to identify a
key_id defined by the key
statement, to be
used for transaction security when talking to the remote server.
The key
statememnt must come before the server
statement that references it. When a request is sent to the remote server,
a request signature will be generated using the key specified here and
appended to the message. A request originating from the remote server is not
required to be signed by this key.
d54 2
a55 2
| BIND Home
| ISC ]
bogus
is no
. Marking a server as bogus
will mark all other addresses for that server as bogus
when
a match is made when looking up a server's address by name.
d66 1
a66 1
Last Updated: $Id: server.html,v 1.11 2000/11/08 04:15:07 marka Exp $
@
1.1.1.2.2.1.4.1
log
@Upgrade to version 8.3.3.
Approved by: security-officer
@
text
@a15 1
[ edns yes_or_no; ]
a30 4
If you discover that a server does not support EDNS you can prevent
named making EDNS queries to it by specifying edns no;
.
The default value of edns
is yes
.
a36 4
If the server supports IXFR you can tell named to attempt to perform a
IXFR style zone transfer by specifing support-ixfr yes
.
The default value of support-ixfr
is no
.
d68 1
a68 1
Last Updated: $Id: server.html,v 1.13 2002/05/24 03:04:51 marka Exp $
@
1.1.1.2.2.1.6.1
log
@Upgrade to version 8.3.3.
Approved by: security-officer
@
text
@a15 1
[ edns yes_or_no; ]
a30 4
If you discover that a server does not support EDNS you can prevent
named making EDNS queries to it by specifying edns no;
.
The default value of edns
is yes
.
a36 4
If the server supports IXFR you can tell named to attempt to perform a
IXFR style zone transfer by specifing support-ixfr yes
.
The default value of support-ixfr
is no
.
d68 1
a68 1
Last Updated: $Id: server.html,v 1.13 2002/05/24 03:04:51 marka Exp $
@
1.1.1.2.2.2
log
@MFC: Import of ISC BIND 8.3.2-T1B.
Approved by: brian (re)
@
text
@a36 4
If the server supports IXFR you can tell named to attempt to perform a
IXFR style zone transfer by specifing support-ixfr yes
.
The default value of support-ixfr
is no
.
d68 1
a68 1
Last Updated: $Id: server.html,v 1.12 2001/08/10 05:12:29 marka Exp $
@
1.1.1.2.2.2.2.1
log
@Upgrade BIND to version 8.3.3.
Approved by: security-officer
@
text
@a15 1
[ edns yes_or_no; ]
a30 4
If you discover that a server does not support EDNS you can prevent
named making EDNS queries to it by specifying edns no;
.
The default value of edns
is yes
.
d72 1
a72 1
Last Updated: $Id: server.html,v 1.13 2002/05/24 03:04:51 marka Exp $
@
1.1.1.2.2.3
log
@MFC of version 8.3.3 import
@
text
@a15 1
[ edns yes_or_no; ]
a30 4
If you discover that a server does not support EDNS you can prevent
named making EDNS queries to it by specifying edns no;
.
The default value of edns
is yes
.
d72 1
a72 1
Last Updated: $Id: server.html,v 1.13 2002/05/24 03:04:51 marka Exp $
@
1.1.1.3
log
@Virgin import of ISC BIND v8.2.3-REL docs
@
text
@d33 1
a33 3
bogus
is no
. Marking a server as bogus
will mark all other addresses for that server as bogus
when
a match is made when looking up a server's address by name.
d66 1
a66 1
Last Updated: $Id: server.html,v 1.11 2000/11/08 04:15:07 marka Exp $
@
1.1.1.4
log
@Import of ISC BIND 8.3.2-T1B documentation.
@
text
@a36 4
If the server supports IXFR you can tell named to attempt to perform a
IXFR style zone transfer by specifing support-ixfr yes
.
The default value of support-ixfr
is no
.
d68 1
a68 1
Last Updated: $Id: server.html,v 1.12 2001/08/10 05:12:29 marka Exp $
@
1.1.1.5
log
@Import of ISC BIND version 8.3.3
@
text
@a15 1
[ edns yes_or_no; ]
a30 4
If you discover that a server does not support EDNS you can prevent
named making EDNS queries to it by specifying edns no;
.
The default value of edns
is yes
.
d72 1
a72 1
Last Updated: $Id: server.html,v 1.13 2002/05/24 03:04:51 marka Exp $
@
1.1.1.5.8.1
log
@MFC: BIND 9 and related bits.
Approved by: re
@
text
@@