--- Begin Message ---
Package: bind9
Version: 1:9.2.4-1
Severity: wishlist
Tags: patch
In a UTF-8 locale, "-" characters in a man page display as the
slightly different "‐" character. You have to specify "\-" if you want
an actual ASCII hyphen. This causes problems for program names,
options, etc; they don't cut-and-paste properly, and searching for them
is fruitless. Please apply the included patch, which changes "-" into
"\-" in the appropriate places in bind9's various man pages.
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.8.1+mppe
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8
diff -ur bind9-9.2.4-orig/bin/check/named-checkconf.8
bind9-9.2.4/bin/check/named-checkconf.8
--- bind9-9.2.4-orig/bin/check/named-checkconf.8 2004-06-03
01:21:07.000000000 -0400
+++ bind9-9.2.4/bin/check/named-checkconf.8 2004-10-18 18:14:52.000000000
-0400
@@ -17,23 +17,23 @@
.\"
.TH "NAMED-CHECKCONF" "8" "June 14, 2000" "BIND9" ""
.SH NAME
-named-checkconf \- named configuration file syntax checking tool
+named\-checkconf \- named configuration file syntax checking tool
.SH SYNOPSIS
.sp
-\fBnamed-checkconf\fR [ \fB-v\fR ] [ \fB-t \fIdirectory\fB\fR ]
\fBfilename\fR
+\fBnamed\-checkconf\fR [ \fB\-v\fR ] [ \fB\-t \fIdirectory\fB\fR ]
\fBfilename\fR
.SH "DESCRIPTION"
.PP
-\fBnamed-checkconf\fR checks the syntax, but not
+\fBnamed\-checkconf\fR checks the syntax, but not
the semantics, of a named configuration file.
.SH "OPTIONS"
.TP
-\fB-t \fIdirectory\fB\fR
+\fB\-t \fIdirectory\fB\fR
chroot to \fIdirectory\fR so that include
directives in the configuration file are processed as if
run by a similarly chrooted named.
.TP
-\fB-v\fR
-Print the version of the \fBnamed-checkconf\fR
+\fB\-v\fR
+Print the version of the \fBnamed\-checkconf\fR
program and exit.
.TP
\fBfilename\fR
@@ -41,7 +41,7 @@
specified, it defaults to \fI/etc/named.conf\fR.
.SH "RETURN VALUES"
.PP
-\fBnamed-checkconf\fR returns an exit status of 1 if
+\fBnamed\-checkconf\fR returns an exit status of 1 if
errors were detected and 0 otherwise.
.SH "SEE ALSO"
.PP
Only in bind9-9.2.4/bin/check: named-checkconf.8~
diff -ur bind9-9.2.4-orig/bin/check/named-checkzone.8
bind9-9.2.4/bin/check/named-checkzone.8
--- bind9-9.2.4-orig/bin/check/named-checkzone.8 2004-06-03
01:21:08.000000000 -0400
+++ bind9-9.2.4/bin/check/named-checkzone.8 2004-10-19 16:24:32.000000000
-0400
@@ -17,33 +17,33 @@
.\"
.TH "NAMED-CHECKZONE" "8" "June 13, 2000" "BIND9" ""
.SH NAME
-named-checkzone \- zone file validity checking tool
+named\-checkzone \- zone file validity checking tool
.SH SYNOPSIS
.sp
-\fBnamed-checkzone\fR [ \fB-d\fR ] [ \fB-j\fR ] [ \fB-q\fR ] [ \fB-v\fR ]
[ \fB-c \fIclass\fB\fR ] \fBzonename\fR \fBfilename\fR
+\fBnamed\-checkzone\fR [ \fB\-d\fR ] [ \fB\-j\fR ] [ \fB\-q\fR ] [
\fB\-v\fR ] [ \fB\-c \fIclass\fB\fR ] \fBzonename\fR \fBfilename\fR
.SH "DESCRIPTION"
.PP
-\fBnamed-checkzone\fR checks the syntax and integrity of
+\fBnamed\-checkzone\fR checks the syntax and integrity of
a zone file. It performs the same checks as \fBnamed\fR
does when loading a zone. This makes
-\fBnamed-checkzone\fR useful for checking zone
+\fBnamed\-checkzone\fR useful for checking zone
files before configuring them into a name server.
.SH "OPTIONS"
.TP
-\fB-d\fR
+\fB\-d\fR
Enable debugging.
.TP
-\fB-q\fR
+\fB\-q\fR
Quiet mode - exit code only.
.TP
-\fB-v\fR
-Print the version of the \fBnamed-checkzone\fR
+\fB\-v\fR
+Print the version of the \fBnamed\-checkzone\fR
program and exit.
.TP
-\fB-j\fR
+\fB\-j\fR
When loading the zone file read the journal if it exists.
.TP
-\fB-c \fIclass\fB\fR
+\fB\-c \fIclass\fB\fR
Specify the class of the zone. If not specified "IN" is assumed.
.TP
\fBzonename\fR
@@ -53,7 +53,7 @@
The name of the zone file.
.SH "RETURN VALUES"
.PP
-\fBnamed-checkzone\fR returns an exit status of 1 if
+\fBnamed\-checkzone\fR returns an exit status of 1 if
errors were detected and 0 otherwise.
.SH "SEE ALSO"
.PP
Only in bind9-9.2.4/bin/check: named-checkzone.8~
Only in bind9-9.2.4/bin/dig: dig.1~
diff -ur bind9-9.2.4-orig/bin/dig/host.1 bind9-9.2.4/bin/dig/host.1
--- bind9-9.2.4-orig/bin/dig/host.1 2004-03-14 23:44:38.000000000 -0500
+++ bind9-9.2.4/bin/dig/host.1 2004-10-19 16:25:23.000000000 -0400
@@ -20,7 +20,7 @@
host \- DNS lookup utility
.SH SYNOPSIS
.sp
-\fBhost\fR [ \fB-aCdlnrTwv\fR ] [ \fB-c \fIclass\fB\fR ] [ \fB-N
\fIndots\fB\fR ] [ \fB-R \fInumber\fB\fR ] [ \fB-t \fItype\fB\fR ] [ \fB-W
\fIwait\fB\fR ] \fBname\fR [ \fBserver\fR ]
+\fBhost\fR [ \fB\-aCdlnrTwv\fR ] [ \fB\-c \fIclass\fB\fR ] [ \fB\-N
\fIndots\fB\fR ] [ \fB\-R \fInumber\fB\fR ] [ \fB\-t \fItype\fB\fR ] [
\fB\-W \fIwait\fB\fR ] \fBname\fR [ \fBserver\fR ]
.SH "DESCRIPTION"
.PP
\fBhost\fR
@@ -39,39 +39,39 @@
should query instead of the server or servers listed in
\fI/etc/resolv.conf\fR.
.PP
-The \fB-a\fR (all) option is equivalent to setting the
-\fB-v\fR option and asking \fBhost\fR to make
+The \fB\-a\fR (all) option is equivalent to setting the
+\fB\-v\fR option and asking \fBhost\fR to make
a query of type ANY.
.PP
-When the \fB-C\fR option is used, \fBhost\fR
+When the \fB\-C\fR option is used, \fBhost\fR
will attempt to display the SOA records for zone
\fIname\fR from all the listed authoritative name
servers for that zone. The list of name servers is defined by the NS
records that are found for the zone.
.PP
-The \fB-c\fR option instructs to make a DNS query of class
+The \fB\-c\fR option instructs to make a DNS query of class
\fIclass\fR. This can be used to lookup Hesiod or
Chaosnet class resource records. The default class is IN (Internet).
.PP
Verbose output is generated by \fBhost\fR when the
-\fB-d\fR or \fB-v\fR option is used. The two
+\fB\-d\fR or \fB\-v\fR option is used. The two
options are equivalent. They have been provided for backwards
-compatibility. In previous versions, the \fB-d\fR option
-switched on debugging traces and \fB-v\fR enabled verbose
+compatibility. In previous versions, the \fB\-d\fR option
+switched on debugging traces and \fB\-v\fR enabled verbose
output.
.PP
-List mode is selected by the \fB-l\fR option. This makes
+List mode is selected by the \fB\-l\fR option. This makes
\fBhost\fR perform a zone transfer for zone
\fIname\fR. The argument is provided for
compatibility with older implementations. This option is equivalent
to making a query of type AXFR.
.PP
-The \fB-n\fR
+The \fB\-n\fR
option specifies that reverse lookups of IPv6 addresses should
use the IP6.INT domain and "nibble" labels as defined in RFC1886.
The default is to use IP6.ARPA and binary labels as defined in RFC2874.
.PP
-The \fB-N\fR option sets the number of dots that have to be
+The \fB\-N\fR option sets the number of dots that have to be
in \fIname\fR for it to be considered absolute. The
default value is that defined using the ndots statement in
\fI/etc/resolv.conf\fR, or 1 if no ndots statement is
@@ -81,43 +81,43 @@
\fI/etc/resolv.conf\fR.
.PP
The number of UDP retries for a lookup can be changed with the
-\fB-R\fR option. \fInumber\fR indicates
+\fB\-R\fR option. \fInumber\fR indicates
how many times \fBhost\fR will repeat a query that does
not get answered. The default number of retries is 1. If
\fInumber\fR is negative or zero, the number of
retries will default to 1.
.PP
-Non-recursive queries can be made via the \fB-r\fR option.
+Non-recursive queries can be made via the \fB\-r\fR option.
Setting this option clears the \fBRD\fR \(em recursion
desired \(em bit in the query which \fBhost\fR makes.
This should mean that the name server receiving the query will not
attempt to resolve \fIname\fR. The
-\fB-r\fR option enables \fBhost\fR to mimic
+\fB\-r\fR option enables \fBhost\fR to mimic
the behaviour of a name server by making non-recursive queries and
expecting to receive answers to those queries that are usually
referrals to other name servers.
.PP
By default \fBhost\fR uses UDP when making queries. The
-\fB-T\fR option makes it use a TCP connection when querying
+\fB\-T\fR option makes it use a TCP connection when querying
the name server. TCP will be automatically selected for queries that
require it, such as zone transfer (AXFR) requests.
.PP
-The \fB-t\fR option is used to select the query type.
+The \fB\-t\fR option is used to select the query type.
\fItype\fR can be any recognised query type: CNAME,
NS, SOA, SIG, KEY, AXFR, etc. When no query type is specified,
\fBhost\fR automatically selects an appropriate query
type. By default it looks for A records, but if the
-\fB-C\fR option was given, queries will be made for SOA
+\fB\-C\fR option was given, queries will be made for SOA
records, and if \fIname\fR is a dotted-decimal IPv4
address or colon-delimited IPv6 address, \fBhost\fR will
query for PTR records.
.PP
The time to wait for a reply can be controlled through the
-\fB-W\fR and \fB-w\fR options. The
-\fB-W\fR option makes \fBhost\fR wait for
+\fB\-W\fR and \fB\-w\fR options. The
+\fB\-W\fR option makes \fBhost\fR wait for
\fIwait\fR seconds. If \fIwait\fR
is less than one, the wait interval is set to one second. When the
-\fB-w\fR option is used, \fBhost\fR will
+\fB\-w\fR option is used, \fBhost\fR will
effectively wait forever for a reply. The time to wait for a response
will be set to the number of seconds given by the hardware's maximum
value for an integer quantity.
Only in bind9-9.2.4/bin/dig: host.1~
diff -ur bind9-9.2.4-orig/bin/dig/nslookup.1 bind9-9.2.4/bin/dig/nslookup.1
--- bind9-9.2.4-orig/bin/dig/nslookup.1 2004-08-18 22:15:24.000000000 -0400
+++ bind9-9.2.4/bin/dig/nslookup.1 2004-10-19 16:24:08.000000000 -0400
@@ -19,7 +19,7 @@
nslookup \- query Internet name servers interactively
.SH SYNOPSIS
.sp
-\fBnslookup\fR [ \fB-option\fR ] [ \fBname | -\fR ] [ \fBserver\fR ]
+\fBnslookup\fR [ \fB-option\fR ] [ \fBname | \-\fR ] [ \fBserver\fR ]
.SH "DESCRIPTION"
.PP
\fBNslookup\fR
@@ -35,7 +35,7 @@
.IP 1.
when no arguments are given (the default name server will be used)
.IP 2.
-when the first argument is a hyphen (-) and the second argument is
+when the first argument is a hyphen (\-) and the second argument is
the host name or Internet address of a name server.
.PP
Non-interactive mode is used when the name or Internet address of the
@@ -48,7 +48,7 @@
.PP
.sp
.nf
-nslookup -query=hinfo -timeout=10
+nslookup \-query=hinfo \-timeout=10
.sp
.fi
.SH "INTERACTIVE COMMANDS"
Only in bind9-9.2.4/bin/dig: nslookup.1~
diff -ur bind9-9.2.4-orig/bin/dnssec/dnssec-keygen.8
bind9-9.2.4/bin/dnssec/dnssec-keygen.8
--- bind9-9.2.4-orig/bin/dnssec/dnssec-keygen.8 2004-06-03 01:21:09.000000000
-0400
+++ bind9-9.2.4/bin/dnssec/dnssec-keygen.8 2004-10-19 17:55:31.000000000
-0400
@@ -17,67 +17,67 @@
.\"
.TH "DNSSEC-KEYGEN" "8" "June 30, 2000" "BIND9" ""
.SH NAME
-dnssec-keygen \- DNSSEC key generation tool
+dnssec\-keygen \- DNSSEC key generation tool
.SH SYNOPSIS
.sp
-\fBdnssec-keygen\fR \fB-a \fIalgorithm\fB\fR \fB-b \fIkeysize\fB\fR \fB-n
\fInametype\fB\fR [ \fB-c \fIclass\fB\fR ] [ \fB-e\fR ] [ \fB-g
\fIgenerator\fB\fR ] [ \fB-h\fR ] [ \fB-p \fIprotocol\fB\fR ] [ \fB-r
\fIrandomdev\fB\fR ] [ \fB-s \fIstrength\fB\fR ] [ \fB-t \fItype\fB\fR ] [
\fB-v \fIlevel\fB\fR ] \fBname\fR
+\fBdnssec\-keygen\fR \fB\-a \fIalgorithm\fB\fR \fB\-b \fIkeysize\fB\fR \fB\-n
\fInametype\fB\fR [ \fB\-c \fIclass\fB\fR ] [ \fB\-e\fR ] [ \fB\-g
\fIgenerator\fB\fR ] [ \fB\-h\fR ] [ \fB\-p \fIprotocol\fB\fR ] [ \fB\-r
\fIrandomdev\fB\fR ] [ \fB\-s \fIstrength\fB\fR ] [ \fB\-t \fItype\fB\fR ] [
\fB\-v \fIlevel\fB\fR ] \fBname\fR
.SH "DESCRIPTION"
.PP
-\fBdnssec-keygen\fR generates keys for DNSSEC
+\fBdnssec\-keygen\fR generates keys for DNSSEC
(Secure DNS), as defined in RFC 2535. It can also generate
keys for use with TSIG (Transaction Signatures), as
defined in RFC 2845.
.SH "OPTIONS"
.TP
-\fB-a \fIalgorithm\fB\fR
+\fB\-a \fIalgorithm\fB\fR
Selects the cryptographic algorithm. The value of
\fBalgorithm\fR must be one of RSAMD5 or RSA,
-DSA, DH (Diffie Hellman), or HMAC-MD5. These values
+DSA, DH (Diffie Hellman), or HMAC\-MD5. These values
are case insensitive.
Note that for DNSSEC, DSA is a mandatory to implement algorithm,
-and RSA is recommended. For TSIG, HMAC-MD5 is mandatory.
+and RSA is recommended. For TSIG, HMAC\-MD5 is mandatory.
.TP
-\fB-b \fIkeysize\fB\fR
+\fB\-b \fIkeysize\fB\fR
Specifies the number of bits in the key. The choice of key
size depends on the algorithm used. RSA keys must be between
512 and 2048 bits. Diffie Hellman keys must be between
128 and 4096 bits. DSA keys must be between 512 and 1024
-bits and an exact multiple of 64. HMAC-MD5 keys must be
+bits and an exact multiple of 64. HMAC\-MD5 keys must be
between 1 and 512 bits.
.TP
-\fB-n \fInametype\fB\fR
+\fB\-n \fInametype\fB\fR
Specifies the owner type of the key. The value of
\fBnametype\fR must either be ZONE (for a DNSSEC
zone key), HOST or ENTITY (for a key associated with a host),
or USER (for a key associated with a user). These values are
case insensitive.
.TP
-\fB-c \fIclass\fB\fR
+\fB\-c \fIclass\fB\fR
Indicates that the DNS record containing the key should have
the specified class. If not specified, class IN is used.
.TP
-\fB-e\fR
+\fB\-e\fR
If generating an RSA key, use a large exponent.
.TP
-\fB-g \fIgenerator\fB\fR
+\fB\-g \fIgenerator\fB\fR
If generating a Diffie Hellman key, use this generator.
Allowed values are 2 and 5. If no generator
is specified, a known prime from RFC 2539 will be used
if possible; otherwise the default is 2.
.TP
-\fB-h\fR
+\fB\-h\fR
Prints a short summary of the options and arguments to
-\fBdnssec-keygen\fR.
+\fBdnssec\-keygen\fR.
.TP
-\fB-p \fIprotocol\fB\fR
+\fB\-p \fIprotocol\fB\fR
Sets the protocol value for the generated key. The protocol
is a number between 0 and 255. The default is 2 (email) for
keys of type USER and 3 (DNSSEC) for all other key types.
Other possible values for this argument are listed in
RFC 2535 and its successors.
.TP
-\fB-r \fIrandomdev\fB\fR
+\fB\-r \fIrandomdev\fB\fR
Specifies the source of randomness. If the operating
system does not provide a \fI/dev/random\fR
or equivalent device, the default source of randomness
@@ -87,26 +87,26 @@
\fIkeyboard\fR indicates that keyboard
input should be used.
.TP
-\fB-s \fIstrength\fB\fR
+\fB\-s \fIstrength\fB\fR
Specifies the strength value of the key. The strength is
a number between 0 and 15, and currently has no defined
purpose in DNSSEC.
.TP
-\fB-t \fItype\fB\fR
+\fB\-t \fItype\fB\fR
Indicates the use of the key. \fBtype\fR must be
one of AUTHCONF, NOAUTHCONF, NOAUTH, or NOCONF. The default
is AUTHCONF. AUTH refers to the ability to authenticate
data, and CONF the ability to encrypt data.
.TP
-\fB-v \fIlevel\fB\fR
+\fB\-v \fIlevel\fB\fR
Sets the debugging level.
.SH "GENERATED KEYS"
.PP
-When \fBdnssec-keygen\fR completes successfully,
+When \fBdnssec\-keygen\fR completes successfully,
it prints a string of the form \fIKnnnn.+aaa+iiiii\fR
to the standard output. This is an identification string for
the key it has generated. These strings can be used as arguments
-to \fBdnssec-makekeyset\fR.
+to \fBdnssec\-makekeyset\fR.
.TP 0.2i
\(bu
\fInnnn\fR is the key name.
@@ -118,7 +118,7 @@
\(bu
\fIiiiii\fR is the key identifier (or footprint).
.PP
-\fBdnssec-keygen\fR creates two file, with names based
+\fBdnssec\-keygen\fR creates two file, with names based
on the printed string. \fIKnnnn.+aaa+iiiii.key\fR
contains the public key, and
\fIKnnnn.+aaa+iiiii.private\fR contains the private
@@ -137,7 +137,7 @@
.PP
Both \fI.key\fR and \fI.private\fR
files are generated for symmetric encryption algorithm such as
-HMAC-MD5, even though the public and private key are equivalent.
+HMAC\-MD5, even though the public and private key are equivalent.
.PP
.SH "EXAMPLE"
.PP
@@ -145,20 +145,20 @@
\fBexample.com\fR, the following command would be
issued:
.PP
-\fBdnssec-keygen -a DSA -b 768 -n ZONE example.com\fR
+\fBdnssec\-keygen \-a DSA \-b 768 \-n ZONE example.com\fR
.PP
The command would print a string of the form:
.PP
\fBKexample.com.+003+26160\fR
.PP
-In this example, \fBdnssec-keygen\fR creates
+In this example, \fBdnssec\-keygen\fR creates
the files \fIKexample.com.+003+26160.key\fR and
\fIKexample.com.+003+26160.private\fR
.SH "SEE ALSO"
.PP
-\fBdnssec-makekeyset\fR(8),
-\fBdnssec-signkey\fR(8),
-\fBdnssec-signzone\fR(8),
+\fBdnssec\-makekeyset\fR(8),
+\fBdnssec\-signkey\fR(8),
+\fBdnssec\-signzone\fR(8),
\fIBIND 9 Administrator Reference Manual\fR,
\fIRFC 2535\fR,
\fIRFC 2845\fR,
Only in bind9-9.2.4/bin/dnssec: dnssec-keygen.8~
diff -ur bind9-9.2.4-orig/bin/dnssec/dnssec-makekeyset.8
bind9-9.2.4/bin/dnssec/dnssec-makekeyset.8
--- bind9-9.2.4-orig/bin/dnssec/dnssec-makekeyset.8 2004-06-03
01:21:10.000000000 -0400
+++ bind9-9.2.4/bin/dnssec/dnssec-makekeyset.8 2004-10-19 17:54:40.000000000
-0400
@@ -17,24 +17,24 @@
.\"
.TH "DNSSEC-MAKEKEYSET" "8" "June 30, 2000" "BIND9" ""
.SH NAME
-dnssec-makekeyset \- DNSSEC zone signing tool
+dnssec\-makekeyset \- DNSSEC zone signing tool
.SH SYNOPSIS
.sp
-\fBdnssec-makekeyset\fR [ \fB-a\fR ] [ \fB-s \fIstart-time\fB\fR ] [ \fB-e
\fIend-time\fB\fR ] [ \fB-h\fR ] [ \fB-p\fR ] [ \fB-r \fIrandomdev\fB\fR ]
[ \fB-t\fIttl\fB\fR ] [ \fB-v \fIlevel\fB\fR ] \fBkey\fR\fI...\fR
+\fBdnssec\-makekeyset\fR [ \fB\-a\fR ] [ \fB\-s \fIstart-time\fB\fR ] [
\fB\-e \fIend-time\fB\fR ] [ \fB\-h\fR ] [ \fB\-p\fR ] [ \fB\-r
\fIrandomdev\fB\fR ] [ \fB\-t\fIttl\fB\fR ] [ \fB\-v \fIlevel\fB\fR ]
\fBkey\fR\fI...\fR
.SH "DESCRIPTION"
.PP
-\fBdnssec-makekeyset\fR generates a key set from one
-or more keys created by \fBdnssec-keygen\fR. It creates
+\fBdnssec\-makekeyset\fR generates a key set from one
+or more keys created by \fBdnssec\-keygen\fR. It creates
a file containing a KEY record for each key, and self-signs the key
set with each zone key. The output file is of the form
-\fIkeyset-nnnn.\fR, where \fInnnn\fR
+\fIkeyset\-nnnn.\fR, where \fInnnn\fR
is the zone name.
.SH "OPTIONS"
.TP
-\fB-a\fR
+\fB\-a\fR
Verify all generated signatures.
.TP
-\fB-s \fIstart-time\fB\fR
+\fB\-s \fIstart-time\fB\fR
Specify the date and time when the generated SIG records
become valid. This can be either an absolute or relative
time. An absolute start time is indicated by a number
@@ -44,7 +44,7 @@
If no \fBstart-time\fR is specified, the current
time is used.
.TP
-\fB-e \fIend-time\fB\fR
+\fB\-e \fIend-time\fB\fR
Specify the date and time when the generated SIG records
expire. As with \fBstart-time\fR, an absolute
time is indicated in YYYYMMDDHHMMSS notation. A time relative
@@ -53,17 +53,17 @@
indicated with now+N. If no \fBend-time\fR is
specified, 30 days from the start time is used as a default.
.TP
-\fB-h\fR
+\fB\-h\fR
Prints a short summary of the options and arguments to
-\fBdnssec-makekeyset\fR.
+\fBdnssec\-makekeyset\fR.
.TP
-\fB-p\fR
+\fB\-p\fR
Use pseudo-random data when signing the zone. This is faster,
but less secure, than using real random data. This option
may be useful when signing large zones or when the entropy
source is limited.
.TP
-\fB-r \fIrandomdev\fB\fR
+\fB\-r \fIrandomdev\fB\fR
Specifies the source of randomness. If the operating
system does not provide a \fI/dev/random\fR
or equivalent device, the default source of randomness
@@ -73,39 +73,39 @@
\fIkeyboard\fR indicates that keyboard
input should be used.
.TP
-\fB-t \fIttl\fB\fR
+\fB\-t \fIttl\fB\fR
Specify the TTL (time to live) of the KEY and SIG records.
The default is 3600 seconds.
.TP
-\fB-v \fIlevel\fB\fR
+\fB\-v \fIlevel\fB\fR
Sets the debugging level.
.TP
\fBkey\fR
The list of keys to be included in the keyset file. These keys
are expressed in the form \fIKnnnn.+aaa+iiiii\fR
-as generated by \fBdnssec-keygen\fR.
+as generated by \fBdnssec\-keygen\fR.
.SH "EXAMPLE"
.PP
The following command generates a keyset containing the DSA key for
\fBexample.com\fR generated in the
-\fBdnssec-keygen\fR man page.
+\fBdnssec\-keygen\fR man page.
.PP
-\fBdnssec-makekeyset -t 86400 -s 20000701120000 -e +2592000
Kexample.com.+003+26160\fR
+\fBdnssec\-makekeyset \-t 86400 \-s 20000701120000 \-e +2592000
Kexample.com.+003+26160\fR
.PP
-In this example, \fBdnssec-makekeyset\fR creates
-the file \fIkeyset-example.com.\fR. This file
+In this example, \fBdnssec\-makekeyset\fR creates
+the file \fIkeyset\-example.com.\fR. This file
contains the specified key and a self-generated signature.
.PP
The DNS administrator for \fBexample.com\fR could
-send \fIkeyset-example.com.\fR to the DNS
+send \fIkeyset\-example.com.\fR to the DNS
administrator for \fB.com\fR for signing, if the
\&.com zone is DNSSEC-aware and the administrators of the two zones
have some mechanism for authenticating each other and exchanging
the keys and signatures securely.
.SH "SEE ALSO"
.PP
-\fBdnssec-keygen\fR(8),
-\fBdnssec-signkey\fR(8),
+\fBdnssec\-keygen\fR(8),
+\fBdnssec\-signkey\fR(8),
\fIBIND 9 Administrator Reference Manual\fR,
\fIRFC 2535\fR.
.SH "AUTHOR"
Only in bind9-9.2.4/bin/dnssec: dnssec-makekeyset.8~
diff -ur bind9-9.2.4-orig/bin/dnssec/dnssec-signkey.8
bind9-9.2.4/bin/dnssec/dnssec-signkey.8
--- bind9-9.2.4-orig/bin/dnssec/dnssec-signkey.8 2004-06-03
01:21:11.000000000 -0400
+++ bind9-9.2.4/bin/dnssec/dnssec-signkey.8 2004-10-18 18:34:00.000000000
-0400
@@ -17,27 +17,27 @@
.\"
.TH "DNSSEC-SIGNKEY" "8" "June 30, 2000" "BIND9" ""
.SH NAME
-dnssec-signkey \- DNSSEC key set signing tool
+dnssec\-signkey \- DNSSEC key set signing tool
.SH SYNOPSIS
.sp
-\fBdnssec-signkey\fR [ \fB-a\fR ] [ \fB-c \fIclass\fB\fR ] [ \fB-s
\fIstart-time\fB\fR ] [ \fB-e \fIend-time\fB\fR ] [ \fB-h\fR ] [ \fB-p\fR ]
[ \fB-r \fIrandomdev\fB\fR ] [ \fB-v \fIlevel\fB\fR ] \fBkeyset\fR
\fBkey\fR\fI...\fR
+\fBdnssec\-signkey\fR [ \fB\-a\fR ] [ \fB\-c \fIclass\fB\fR ] [ \fB\-s
\fIstart\-time\fB\fR ] [ \fB\-e \fIend-time\fB\fR ] [ \fB\-h\fR ] [
\fB\-p\fR ] [ \fB\-r \fIrandomdev\fB\fR ] [ \fB\-v \fIlevel\fB\fR ]
\fBkeyset\fR \fBkey\fR\fI...\fR
.SH "DESCRIPTION"
.PP
-\fBdnssec-signkey\fR signs a keyset. Typically
+\fBdnssec\-signkey\fR signs a keyset. Typically
the keyset will be for a child zone, and will have been generated
-by \fBdnssec-makekeyset\fR. The child zone's keyset
+by \fBdnssec\-makekeyset\fR. The child zone's keyset
is signed with the zone keys for its parent zone. The output file
-is of the form \fIsignedkey-nnnn.\fR, where
+is of the form \fIsignedkey\-nnnn.\fR, where
\fInnnn\fR is the zone name.
.SH "OPTIONS"
.TP
-\fB-a\fR
+\fB\-a\fR
Verify all generated signatures.
.TP
-\fB-c \fIclass\fB\fR
+\fB\-c \fIclass\fB\fR
Specifies the DNS class of the key sets.
.TP
-\fB-s \fIstart-time\fB\fR
+\fB\-s \fIstart-time\fB\fR
Specify the date and time when the generated SIG records
become valid. This can be either an absolute or relative
time. An absolute start time is indicated by a number
@@ -47,7 +47,7 @@
If no \fBstart-time\fR is specified, the current
time is used.
.TP
-\fB-e \fIend-time\fB\fR
+\fB\-e \fIend-time\fB\fR
Specify the date and time when the generated SIG records
expire. As with \fBstart-time\fR, an absolute
time is indicated in YYYYMMDDHHMMSS notation. A time relative
@@ -56,17 +56,17 @@
indicated with now+N. If no \fBend-time\fR is
specified, 30 days from the start time is used as a default.
.TP
-\fB-h\fR
+\fB\-h\fR
Prints a short summary of the options and arguments to
-\fBdnssec-signkey\fR.
+\fBdnssec\-signkey\fR.
.TP
-\fB-p\fR
+\fB\-p\fR
Use pseudo-random data when signing the zone. This is faster,
but less secure, than using real random data. This option
may be useful when signing large zones or when the entropy
source is limited.
.TP
-\fB-r \fIrandomdev\fB\fR
+\fB\-r \fIrandomdev\fB\fR
Specifies the source of randomness. If the operating
system does not provide a \fI/dev/random\fR
or equivalent device, the default source of randomness
@@ -76,7 +76,7 @@
\fIkeyboard\fR indicates that keyboard
input should be used.
.TP
-\fB-v \fIlevel\fB\fR
+\fB\-v \fIlevel\fB\fR
Sets the debugging level.
.TP
\fBkeyset\fR
@@ -89,20 +89,20 @@
The DNS administrator for a DNSSEC-aware \fB.com\fR
zone would use the following command to sign the
\fIkeyset\fR file for \fBexample.com\fR
-created by \fBdnssec-makekeyset\fR with a key generated
-by \fBdnssec-keygen\fR:
+created by \fBdnssec\-makekeyset\fR with a key generated
+by \fBdnssec\-keygen\fR:
.PP
-\fBdnssec-signkey keyset-example.com. Kcom.+003+51944\fR
+\fBdnssec\-signkey keyset\-example.com. Kcom.+003+51944\fR
.PP
-In this example, \fBdnssec-signkey\fR creates
-the file \fIsignedkey-example.com.\fR, which
+In this example, \fBdnssec\-signkey\fR creates
+the file \fIsignedkey\-example.com.\fR, which
contains the \fBexample.com\fR keys and the
signatures by the \fB.com\fR keys.
.SH "SEE ALSO"
.PP
-\fBdnssec-keygen\fR(8),
-\fBdnssec-makekeyset\fR(8),
-\fBdnssec-signzone\fR(8).
+\fBdnssec\-keygen\fR(8),
+\fBdnssec\-makekeyset\fR(8),
+\fBdnssec\-signzone\fR(8).
.SH "AUTHOR"
.PP
Internet Systems Consortium
Only in bind9-9.2.4/bin/dnssec: dnssec-signkey.8~
diff -ur bind9-9.2.4-orig/bin/dnssec/dnssec-signzone.8
bind9-9.2.4/bin/dnssec/dnssec-signzone.8
--- bind9-9.2.4-orig/bin/dnssec/dnssec-signzone.8 2004-06-03
01:21:12.000000000 -0400
+++ bind9-9.2.4/bin/dnssec/dnssec-signzone.8 2004-10-18 18:33:17.000000000
-0400
@@ -17,13 +17,13 @@
.\"
.TH "DNSSEC-SIGNZONE" "8" "June 30, 2000" "BIND9" ""
.SH NAME
-dnssec-signzone \- DNSSEC zone signing tool
+dnssec\-signzone \- DNSSEC zone signing tool
.SH SYNOPSIS
.sp
-\fBdnssec-signzone\fR [ \fB-a\fR ] [ \fB-c \fIclass\fB\fR ] [ \fB-d
\fIdirectory\fB\fR ] [ \fB-s \fIstart-time\fB\fR ] [ \fB-e \fIend-time\fB\fR
] [ \fB-f \fIoutput-file\fB\fR ] [ \fB-h\fR ] [ \fB-i \fIinterval\fB\fR ] [
\fB-n \fInthreads\fB\fR ] [ \fB-o \fIorigin\fB\fR ] [ \fB-p\fR ] [ \fB-r
\fIrandomdev\fB\fR ] [ \fB-t\fR ] [ \fB-v \fIlevel\fB\fR ] \fBzonefile\fR [
\fBkey\fR\fI...\fR ]
+\fBdnssec\-signzone\fR [ \fB\-a\fR ] [ \fB\-c \fIclass\fB\fR ] [ \fB\-d
\fIdirectory\fB\fR ] [ \fB\-s \fIstart-time\fB\fR ] [ \fB\-e
\fIend-time\fB\fR ] [ \fB\-f \fIoutput-file\fB\fR ] [ \fB\-h\fR ] [ \fB\-i
\fIinterval\fB\fR ] [ \fB\-n \fInthreads\fB\fR ] [ \fB\-o \fIorigin\fB\fR ]
[ \fB\-p\fR ] [ \fB\-r \fIrandomdev\fB\fR ] [ \fB\-t\fR ] [ \fB\-v
\fIlevel\fB\fR ] \fBzonefile\fR [ \fBkey\fR\fI...\fR ]
.SH "DESCRIPTION"
.PP
-\fBdnssec-signzone\fR signs a zone. It generates NXT
+\fBdnssec\-signzone\fR signs a zone. It generates NXT
and SIG records and produces a signed version of the zone. If there
is a \fIsignedkey\fR file from the zone's parent,
the parent's signatures will be incorporated into the generated
@@ -33,17 +33,17 @@
\fIsignedkey\fR file for each child zone.
.SH "OPTIONS"
.TP
-\fB-a\fR
+\fB\-a\fR
Verify all generated signatures.
.TP
-\fB-c \fIclass\fB\fR
+\fB\-c \fIclass\fB\fR
Specifies the DNS class of the zone.
.TP
-\fB-d \fIdirectory\fB\fR
+\fB\-d \fIdirectory\fB\fR
Look for \fIsignedkey\fR files in
\fBdirectory\fR as the directory
.TP
-\fB-s \fIstart-time\fB\fR
+\fB\-s \fIstart-time\fB\fR
Specify the date and time when the generated SIG records
become valid. This can be either an absolute or relative
time. An absolute start time is indicated by a number
@@ -53,7 +53,7 @@
If no \fBstart-time\fR is specified, the current
time is used.
.TP
-\fB-e \fIend-time\fB\fR
+\fB\-e \fIend-time\fB\fR
Specify the date and time when the generated SIG records
expire. As with \fBstart-time\fR, an absolute
time is indicated in YYYYMMDDHHMMSS notation. A time relative
@@ -62,16 +62,16 @@
indicated with now+N. If no \fBend-time\fR is
specified, 30 days from the start time is used as a default.
.TP
-\fB-f \fIoutput-file\fB\fR
+\fB\-f \fIoutput-file\fB\fR
The name of the output file containing the signed zone. The
default is to append \fI.signed\fR to the
input file.
.TP
-\fB-h\fR
+\fB\-h\fR
Prints a short summary of the options and arguments to
-\fBdnssec-signzone\fR.
+\fBdnssec\-signzone\fR.
.TP
-\fB-i \fIinterval\fB\fR
+\fB\-i \fIinterval\fB\fR
When a previously signed zone is passed as input, records
may be resigned. The \fBinterval\fR option
specifies the cycle interval as an offset from the current
@@ -82,27 +82,27 @@
The default cycle interval is one quarter of the difference
between the signature end and start times. So if neither
\fBend-time\fR or \fBstart-time\fR
-are specified, \fBdnssec-signzone\fR generates
+are specified, \fBdnssec\-signzone\fR generates
signatures that are valid for 30 days, with a cycle
interval of 7.5 days. Therefore, if any existing SIG records
are due to expire in less than 7.5 days, they would be
replaced.
.TP
-\fB-n \fIncpus\fB\fR
+\fB\-n \fIncpus\fB\fR
Specifies the number of threads to use. By default, one
thread is started for each detected CPU.
.TP
-\fB-o \fIorigin\fB\fR
+\fB\-o \fIorigin\fB\fR
The zone origin. If not specified, the name of the zone file
is assumed to be the origin.
.TP
-\fB-p\fR
+\fB\-p\fR
Use pseudo-random data when signing the zone. This is faster,
but less secure, than using real random data. This option
may be useful when signing large zones or when the entropy
source is limited.
.TP
-\fB-r \fIrandomdev\fB\fR
+\fB\-r \fIrandomdev\fB\fR
Specifies the source of randomness. If the operating
system does not provide a \fI/dev/random\fR
or equivalent device, the default source of randomness
@@ -112,10 +112,10 @@
\fIkeyboard\fR indicates that keyboard
input should be used.
.TP
-\fB-t\fR
+\fB\-t\fR
Print statistics at completion.
.TP
-\fB-v \fIlevel\fB\fR
+\fB\-v \fIlevel\fB\fR
Sets the debugging level.
.TP
\fBzonefile\fR
@@ -129,25 +129,25 @@
.SH "EXAMPLE"
.PP
The following command signs the \fBexample.com\fR
-zone with the DSA key generated in the \fBdnssec-keygen\fR
+zone with the DSA key generated in the \fBdnssec\-keygen\fR
man page. The zone's keys must be in the zone. If there are
\fIsignedkey\fR files associated with this zone
or any child zones, they must be in the current directory.
\fBexample.com\fR, the following command would be
issued:
.PP
-\fBdnssec-signzone -o example.com db.example.com Kexample.com.+003+26160\fR
+\fBdnssec\-signzone \-o example.com db.example.com Kexample.com.+003+26160\fR
.PP
The command would print a string of the form:
.PP
-In this example, \fBdnssec-signzone\fR creates
+In this example, \fBdnssec\-signzone\fR creates
the file \fIdb.example.com.signed\fR. This file
should be referenced in a zone statement in a
\fInamed.conf\fR file.
.SH "SEE ALSO"
.PP
-\fBdnssec-keygen\fR(8),
-\fBdnssec-signkey\fR(8),
+\fBdnssec\-keygen\fR(8),
+\fBdnssec\-signkey\fR(8),
\fIBIND 9 Administrator Reference Manual\fR,
\fIRFC 2535\fR.
.SH "AUTHOR"
Only in bind9-9.2.4/bin/dnssec: dnssec-signzone.8~
diff -ur bind9-9.2.4-orig/bin/named/lwresd.8 bind9-9.2.4/bin/named/lwresd.8
--- bind9-9.2.4-orig/bin/named/lwresd.8 2004-06-03 01:21:13.000000000 -0400
+++ bind9-9.2.4/bin/named/lwresd.8 2004-10-18 18:32:14.000000000 -0400
@@ -20,7 +20,7 @@
lwresd \- lightweight resolver daemon
.SH SYNOPSIS
.sp
-\fBlwresd\fR [ \fB-C \fIconfig-file\fB\fR ] [ \fB-d \fIdebug-level\fB\fR ] [
\fB-f\fR ] [ \fB-g\fR ] [ \fB-i \fIpid-file\fB\fR ] [ \fB-n \fI#cpus\fB\fR ]
[ \fB-P \fIport\fB\fR ] [ \fB-p \fIport\fB\fR ] [ \fB-s\fR ] [ \fB-t
\fIdirectory\fB\fR ] [ \fB-u \fIuser\fB\fR ] [ \fB-v\fR ]
+\fBlwresd\fR [ \fB\-C \fIconfig-file\fB\fR ] [ \fB\-d \fIdebug-level\fB\fR ]
[ \fB\-f\fR ] [ \fB\-g\fR ] [ \fB\-i \fIpid-file\fB\fR ] [ \fB\-n
\fI#cpus\fB\fR ] [ \fB\-P \fIport\fB\fR ] [ \fB\-p \fIport\fB\fR ] [
\fB\-s\fR ] [ \fB\-t \fIdirectory\fB\fR ] [ \fB\-u \fIuser\fB\fR ] [
\fB\-v\fR ]
.SH "DESCRIPTION"
.PP
\fBlwresd\fR is the daemon providing name lookup
@@ -52,24 +52,24 @@
a built-in list of root server hints.
.SH "OPTIONS"
.TP
-\fB-C \fIconfig-file\fB\fR
+\fB\-C \fIconfig-file\fB\fR
Use \fIconfig-file\fR as the
configuration file instead of the default,
\fI/etc/resolv.conf\fR.
.TP
-\fB-d \fIdebug-level\fB\fR
+\fB\-d \fIdebug-level\fB\fR
Set the daemon's debug level to \fIdebug-level\fR.
Debugging traces from \fBlwresd\fR become
more verbose as the debug level increases.
.TP
-\fB-f\fR
+\fB\-f\fR
Run the server in the foreground (i.e. do not daemonize).
.TP
-\fB-g\fR
+\fB\-g\fR
Run the server in the foreground and force all logging
to \fIstderr\fR.
.TP
-\fB-n \fI#cpus\fB\fR
+\fB\-n \fI#cpus\fB\fR
Create \fI#cpus\fR worker threads
to take advantage of multiple CPUs. If not specified,
\fBlwresd\fR will try to determine the
@@ -77,19 +77,19 @@
If it is unable to determine the number of CPUs, a
single worker thread will be created.
.TP
-\fB-P \fIport\fB\fR
+\fB\-P \fIport\fB\fR
Listen for lightweight resolver queries on port
\fIport\fR. If
not specified, the default is port 921.
.TP
-\fB-p \fIport\fB\fR
+\fB\-p \fIport\fB\fR
Send DNS lookups to port \fIport\fR. If not
specified, the default is port 53. This provides a
way of testing the lightweight resolver daemon with a
name server that listens for queries on a non-standard
port number.
.TP
-\fB-s\fR
+\fB\-s\fR
Write memory usage statistics to \fIstdout\fR
on exit.
.sp
@@ -100,7 +100,7 @@
.RE
.sp
.TP
-\fB-t \fIdirectory\fB\fR
+\fB\-t \fIdirectory\fB\fR
\fBchroot()\fR to \fIdirectory\fR after
processing the command line arguments, but before
reading the configuration file.
@@ -108,7 +108,7 @@
.RS
.B "Warning:"
This option should be used in conjunction with the
-\fB-u\fR option, as chrooting a process
+\fB\-u\fR option, as chrooting a process
running as root doesn't enhance security on most
systems; the way \fBchroot()\fR is
defined allows a process with root privileges to
@@ -116,12 +116,12 @@
.RE
.sp
.TP
-\fB-u \fIuser\fB\fR
+\fB\-u \fIuser\fB\fR
\fBsetuid()\fR to \fIuser\fR after completing
privileged operations, such as creating sockets that
listen on privileged ports.
.TP
-\fB-v\fR
+\fB\-v\fR
Report the version number and exit.
.SH "FILES"
.TP
Only in bind9-9.2.4/bin/named: lwresd.8~
diff -ur bind9-9.2.4-orig/bin/named/named.8 bind9-9.2.4/bin/named/named.8
--- bind9-9.2.4-orig/bin/named/named.8 2004-10-18 15:11:39.000000000 -0400
+++ bind9-9.2.4/bin/named/named.8 2004-10-18 18:31:35.000000000 -0400
@@ -20,7 +20,7 @@
named \- Internet domain name server
.SH SYNOPSIS
.sp
-\fBnamed\fR [ \fB-c \fIconfig-file\fB\fR ] [ \fB-d \fIdebug-level\fB\fR ] [
\fB-f\fR ] [ \fB-g\fR ] [ \fB-n \fI#cpus\fB\fR ] [ \fB-p \fIport\fB\fR ] [
\fB-s\fR ] [ \fB-t \fIdirectory\fB\fR ] [ \fB-u \fIuser\fB\fR ] [ \fB-v\fR ]
[ \fB-x \fIcache-file\fB\fR ]
+\fBnamed\fR [ \fB\-c \fIconfig-file\fB\fR ] [ \fB\-d \fIdebug-level\fB\fR ]
[ \fB\-f\fR ] [ \fB\-g\fR ] [ \fB\-n \fI#cpus\fB\fR ] [ \fB\-p \fIport\fB\fR
] [ \fB\-s\fR ] [ \fB\-t \fIdirectory\fB\fR ] [ \fB\-u \fIuser\fB\fR ] [
\fB\-v\fR ] [ \fB\-x \fIcache-file\fB\fR ]
.SH "DESCRIPTION"
.PP
\fBnamed\fR is a Domain Name System (DNS) server,
@@ -33,7 +33,7 @@
data, and listen for queries.
.SH "OPTIONS"
.TP
-\fB-c \fIconfig-file\fB\fR
+\fB\-c \fIconfig-file\fB\fR
Use \fIconfig-file\fR as the
configuration file instead of the default,
\fI/etc/bind/named.conf\fR. To
@@ -44,19 +44,19 @@
file, \fIconfig-file\fR should be
an absolute pathname.
.TP
-\fB-d \fIdebug-level\fB\fR
+\fB\-d \fIdebug-level\fB\fR
Set the daemon's debug level to \fIdebug-level\fR.
Debugging traces from \fBnamed\fR become
more verbose as the debug level increases.
.TP
-\fB-f\fR
+\fB\-f\fR
Run the server in the foreground (i.e. do not daemonize).
.TP
-\fB-g\fR
+\fB\-g\fR
Run the server in the foreground and force all logging
to \fIstderr\fR.
.TP
-\fB-n \fI#cpus\fB\fR
+\fB\-n \fI#cpus\fB\fR
Create \fI#cpus\fR worker threads
to take advantage of multiple CPUs. If not specified,
\fBnamed\fR will try to determine the
@@ -64,11 +64,11 @@
If it is unable to determine the number of CPUs, a
single worker thread will be created.
.TP
-\fB-p \fIport\fB\fR
+\fB\-p \fIport\fB\fR
Listen for queries on port \fIport\fR. If not
specified, the default is port 53.
.TP
-\fB-s\fR
+\fB\-s\fR
Write memory usage statistics to \fIstdout\fR on exit.
.sp
.RS
@@ -78,7 +78,7 @@
.RE
.sp
.TP
-\fB-t \fIdirectory\fB\fR
+\fB\-t \fIdirectory\fB\fR
\fBchroot()\fR to \fIdirectory\fR after
processing the command line arguments, but before
reading the configuration file.
@@ -86,7 +86,7 @@
.RS
.B "Warning:"
This option should be used in conjunction with the
-\fB-u\fR option, as chrooting a process
+\fB\-u\fR option, as chrooting a process
running as root doesn't enhance security on most
systems; the way \fBchroot()\fR is
defined allows a process with root privileges to
@@ -94,7 +94,7 @@
.RE
.sp
.TP
-\fB-u \fIuser\fB\fR
+\fB\-u \fIuser\fB\fR
\fBsetuid()\fR to \fIuser\fR after completing
privileged operations, such as creating sockets that
listen on privileged ports.
@@ -105,18 +105,18 @@
capability mechanism to drop all root privileges
except the ability to \fBbind()\fR to a
privileged port and set process resource limits.
-Unfortunately, this means that the \fB-u\fR
+Unfortunately, this means that the \fB\-u\fR
option only works when \fBnamed\fR is run
-on kernel 2.2.18 or later, or kernel 2.3.99-pre3 or
+on kernel 2.2.18 or later, or kernel 2.3.99\-pre3 or
later, since previous kernels did not allow privileges
to be retained after \fBsetuid()\fR.
.RE
.sp
.TP
-\fB-v\fR
+\fB\-v\fR
Report the version number and exit.
.TP
-\fB-x \fIcache-file\fB\fR
+\fB\-x \fIcache-file\fB\fR
Load data from \fIcache-file\fR into the
cache of the default view.
.sp
Only in bind9-9.2.4/bin/named: named.8~
diff -ur bind9-9.2.4-orig/bin/named/named.conf.5
bind9-9.2.4/bin/named/named.conf.5
--- bind9-9.2.4-orig/bin/named/named.conf.5 2004-08-22 19:35:44.000000000
-0400
+++ bind9-9.2.4/bin/named/named.conf.5 2004-10-18 18:30:37.000000000 -0400
@@ -54,24 +54,24 @@
server ( \fIipv4_address\fR | \fIipv6_address\fR ) {
bogus \fIboolean\fR;
edns \fIboolean\fR;
- provide-ixfr \fIboolean\fR;
- request-ixfr \fIboolean\fR;
+ provide\-ixfr \fIboolean\fR;
+ request\-ixfr \fIboolean\fR;
keys \fIserver_key\fR;
transfers \fIinteger\fR;
- transfer-format ( many-answers | one-answer );
- transfer-source ( \fIipv4_address\fR | * )
+ transfer\-format ( many\-answers | one\-answer );
+ transfer\-source ( \fIipv4_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- transfer-source-v6 ( \fIipv6_address\fR | * )
+ transfer\-source\-v6 ( \fIipv6_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- support-ixfr \fIboolean\fR; // obsolete
+ support\-ixfr \fIboolean\fR; // obsolete
};
.sp
.fi
.SH "TRUSTED-KEYS"
.sp
.nf
-trusted-keys {
+trusted\-keys {
\fIdomain_name\fR \fIflags\fR \fIprotocol\fR \fIalgorithm\fR \fIkey\fR;
...
};
.sp
@@ -98,9 +98,9 @@
null;
stderr;
severity \fIlog_severity\fR;
- print-time \fIboolean\fR;
- print-severity \fIboolean\fR;
- print-category \fIboolean\fR;
+ print\-time \fIboolean\fR;
+ print\-severity \fIboolean\fR;
+ print\-category \fIboolean\fR;
};
category \fIstring\fR { \fIstring\fR; ... };
};
@@ -110,7 +110,7 @@
.sp
.nf
lwres {
- listen-on [ port \fIinteger\fR ] {
+ listen\-on [ port \fIinteger\fR ] {
( \fIipv4_address\fR | \fIipv6_address\fR ) [ port
\fIinteger\fR ]; ...
};
view \fIstring\fR \fIoptional_class\fR;
@@ -127,108 +127,108 @@
coresize \fIsize\fR;
datasize \fIsize\fR;
directory \fIquoted_string\fR;
- dump-file \fIquoted_string\fR;
+ dump\-file \fIquoted_string\fR;
files \fIsize\fR;
- heartbeat-interval \fIinteger\fR;
- host-statistics \fIboolean\fR; // not implemented
- interface-interval \fIinteger\fR;
- listen-on [ port \fIinteger\fR ] { \fIaddress_match_element\fR; ... };
- listen-on-v6 [ port \fIinteger\fR ] { \fIaddress_match_element\fR; ...
};
- match-mapped-addresses \fIboolean\fR;
- memstatistics-file \fIquoted_string\fR; // not implemented
- pid-file \fIquoted_string\fR;
+ heartbeat\-interval \fIinteger\fR;
+ host\-statistics \fIboolean\fR; // not implemented
+ interface\-interval \fIinteger\fR;
+ listen\-on [ port \fIinteger\fR ] { \fIaddress_match_element\fR; ... };
+ listen\-on\-v6 [ port \fIinteger\fR ] { \fIaddress_match_element\fR;
... };
+ match\-mapped\-addresses \fIboolean\fR;
+ memstatistics\-file \fIquoted_string\fR; // not implemented
+ pid\-file \fIquoted_string\fR;
port \fIinteger\fR;
- random-device \fIquoted_string\fR;
- recursive-clients \fIinteger\fR;
- serial-query-rate \fIinteger\fR;
+ random\-device \fIquoted_string\fR;
+ recursive\-clients \fIinteger\fR;
+ serial\-query\-rate \fIinteger\fR;
stacksize \fIsize\fR;
- statistics-file \fIquoted_string\fR;
- statistics-interval \fIinteger\fR; // not yet implemented
- tcp-clients \fIinteger\fR;
- tkey-dhkey \fIquoted_string\fR \fIinteger\fR;
- tkey-gssapi-credential \fIquoted_string\fR;
- tkey-domain \fIquoted_string\fR;
- transfers-per-ns \fIinteger\fR;
- transfers-in \fIinteger\fR;
- transfers-out \fIinteger\fR;
- use-ixfr \fIboolean\fR;
+ statistics\-file \fIquoted_string\fR;
+ statistics\-interval \fIinteger\fR; // not yet implemented
+ tcp\-clients \fIinteger\fR;
+ tkey\-dhkey \fIquoted_string\fR \fIinteger\fR;
+ tkey\-gssapi\-credential \fIquoted_string\fR;
+ tkey\-domain \fIquoted_string\fR;
+ transfers\-per\-ns \fIinteger\fR;
+ transfers\-in \fIinteger\fR;
+ transfers\-out \fIinteger\fR;
+ use\-ixfr \fIboolean\fR;
version \fIquoted_string\fR;
- allow-recursion { \fIaddress_match_element\fR; ... };
+ allow\-recursion { \fIaddress_match_element\fR; ... };
sortlist { \fIaddress_match_element\fR; ... };
topology { \fIaddress_match_element\fR; ... }; // not implemented
- auth-nxdomain \fIboolean\fR; // default changed
- minimal-responses \fIboolean\fR;
+ auth\-nxdomain \fIboolean\fR; // default changed
+ minimal\-responses \fIboolean\fR;
recursion \fIboolean\fR;
- rrset-order {
+ rrset\-order {
[ class \fIstring\fR ] [ type \fIstring\fR ]
[ name \fIquoted_string\fR ] \fIstring\fR \fIstring\fR; ...
}; // not implemented
- provide-ixfr \fIboolean\fR;
- request-ixfr \fIboolean\fR;
- rfc2308-type1 \fIboolean\fR; // not yet implemented
- additional-from-auth \fIboolean\fR;
- additional-from-cache \fIboolean\fR;
- query-source \fIquerysource4\fR;
- query-source-v6 \fIquerysource6\fR;
- cleaning-interval \fIinteger\fR;
- min-roots \fIinteger\fR; // not implemented
- lame-ttl \fIinteger\fR;
- max-ncache-ttl \fIinteger\fR;
- max-cache-ttl \fIinteger\fR;
- transfer-format ( many-answers | one-answer );
- max-cache-size \fIsize_no_default\fR;
- check-names ( master | slave | response )
+ provide\-ixfr \fIboolean\fR;
+ request\-ixfr \fIboolean\fR;
+ rfc2308\-type1 \fIboolean\fR; // not yet implemented
+ additional\-from\-auth \fIboolean\fR;
+ additional\-from\-cache \fIboolean\fR;
+ query\-source \fIquerysource4\fR;
+ query\-source\-v6 \fIquerysource6\fR;
+ cleaning\-interval \fIinteger\fR;
+ min\-roots \fIinteger\fR; // not implemented
+ lame\-ttl \fIinteger\fR;
+ max\-ncache\-ttl \fIinteger\fR;
+ max\-cache\-ttl \fIinteger\fR;
+ transfer\-format ( many\-answers | one\-answer );
+ max\-cache\-size \fIsize_no_default\fR;
+ check\-names ( master | slave | response )
( fail | warn | ignore ); // not implemented
- cache-file \fIquoted_string\fR;
- root-delegation-only [ exclude { \fIquoted_string\fR; ... } ];
+ cache\-file \fIquoted_string\fR;
+ root\-delegation\-only [ exclude { \fIquoted_string\fR; ... } ];
dialup \fIdialuptype\fR;
- allow-query { \fIaddress_match_element\fR; ... };
- allow-transfer { \fIaddress_match_element\fR; ... };
- allow-update-forwarding { \fIaddress_match_element\fR; ... };
+ allow\-query { \fIaddress_match_element\fR; ... };
+ allow\-transfer { \fIaddress_match_element\fR; ... };
+ allow\-update\-forwarding { \fIaddress_match_element\fR; ... };
notify \fInotifytype\fR;
- notify-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ];
- notify-source-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | *
) ];
- also-notify [ port \fIinteger\fR ] { ( \fIipv4_address\fR |
\fIipv6_address\fR )
+ notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * )
];
+ notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR |
* ) ];
+ also\-notify [ port \fIinteger\fR ] { ( \fIipv4_address\fR |
\fIipv6_address\fR )
[ port \fIinteger\fR ]; ... };
- allow-notify { \fIaddress_match_element\fR; ... };
+ allow\-notify { \fIaddress_match_element\fR; ... };
forward ( first | only );
forwarders [ port \fIinteger\fR ] {
( \fIipv4_address\fR | \fIipv6_address\fR ) [ port
\fIinteger\fR ]; ...
};
- max-transfer-time-in \fIinteger\fR;
- max-transfer-time-out \fIinteger\fR;
- max-transfer-idle-in \fIinteger\fR;
- max-transfer-idle-out \fIinteger\fR;
- max-retry-time \fIinteger\fR;
- min-retry-time \fIinteger\fR;
- max-refresh-time \fIinteger\fR;
- min-refresh-time \fIinteger\fR;
- sig-validity-interval \fIinteger\fR;
+ max\-transfer\-time\-in \fIinteger\fR;
+ max\-transfer\-time\-out \fIinteger\fR;
+ max\-transfer\-idle\-in \fIinteger\fR;
+ max\-transfer\-idle\-out \fIinteger\fR;
+ max\-retry\-time \fIinteger\fR;
+ min\-retry\-time \fIinteger\fR;
+ max\-refresh\-time \fIinteger\fR;
+ min\-refresh\-time \fIinteger\fR;
+ sig\-validity\-interval \fIinteger\fR;
- transfer-source ( \fIipv4_address\fR | * )
+ transfer\-source ( \fIipv4_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- transfer-source-v6 ( \fIipv6_address\fR | * )
+ transfer\-source\-v6 ( \fIipv6_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- zone-statistics \fIboolean\fR;
+ zone\-statistics \fIboolean\fR;
- allow-v6-synthesis { \fIaddress_match_element\fR; ... };
- deallocate-on-exit \fIboolean\fR; // obsolete
- fake-iquery \fIboolean\fR; // obsolete
- fetch-glue \fIboolean\fR; // obsolete
- has-old-clients \fIboolean\fR; // obsolete
- maintain-ixfr-base \fIboolean\fR; // obsolete
- max-ixfr-log-size \fIsize\fR; // obsolete
- multiple-cnames \fIboolean\fR; // obsolete
- named-xfer \fIquoted_string\fR; // obsolete
- serial-queries \fIinteger\fR; // obsolete
- treat-cr-as-space \fIboolean\fR; // obsolete
- use-id-pool \fIboolean\fR; // obsolete
+ allow\-v6\-synthesis { \fIaddress_match_element\fR; ... };
+ deallocate\-on\-exit \fIboolean\fR; // obsolete
+ fake\-iquery \fIboolean\fR; // obsolete
+ fetch\-glue \fIboolean\fR; // obsolete
+ has\-old\-clients \fIboolean\fR; // obsolete
+ maintain\-ixfr\-base \fIboolean\fR; // obsolete
+ max\-ixfr\-log\-size \fIsize\fR; // obsolete
+ multiple\-cnames \fIboolean\fR; // obsolete
+ named\-xfer \fIquoted_string\fR; // obsolete
+ serial\-queries \fIinteger\fR; // obsolete
+ treat\-cr\-as\-space \fIboolean\fR; // obsolete
+ use\-id\-pool \fIboolean\fR; // obsolete
};
.sp
.fi
@@ -236,9 +236,9 @@
.sp
.nf
view \fIstring\fR \fIoptional_class\fR {
- match-clients { \fIaddress_match_element\fR; ... };
- match-destinations { \fIaddress_match_element\fR; ... };
- match-recursive-only \fIboolean\fR;
+ match\-clients { \fIaddress_match_element\fR; ... };
+ match\-destinations { \fIaddress_match_element\fR; ... };
+ match\-recursive\-only \fIboolean\fR;
key \fIstring\fR {
algorithm \fIstring\fR;
@@ -253,79 +253,79 @@
...
};
- trusted-keys {
+ trusted\-keys {
\fIstring\fR \fIinteger\fR \fIinteger\fR \fIinteger\fR
\fIquoted_string\fR; ...
};
- allow-recursion { \fIaddress_match_element\fR; ... };
+ allow\-recursion { \fIaddress_match_element\fR; ... };
sortlist { \fIaddress_match_element\fR; ... };
topology { \fIaddress_match_element\fR; ... }; // not implemented
- auth-nxdomain \fIboolean\fR; // default changed
- minimal-responses \fIboolean\fR;
+ auth\-nxdomain \fIboolean\fR; // default changed
+ minimal\-responses \fIboolean\fR;
recursion \fIboolean\fR;
- rrset-order {
+ rrset\-order {
[ class \fIstring\fR ] [ type \fIstring\fR ]
[ name \fIquoted_string\fR ] \fIstring\fR \fIstring\fR; ...
}; // not implemented
- provide-ixfr \fIboolean\fR;
- request-ixfr \fIboolean\fR;
- rfc2308-type1 \fIboolean\fR; // not yet implemented
- additional-from-auth \fIboolean\fR;
- additional-from-cache \fIboolean\fR;
- query-source \fIquerysource4\fR;
- query-source-v6 \fIquerysource6\fR;
- cleaning-interval \fIinteger\fR;
- min-roots \fIinteger\fR; // not implemented
- lame-ttl \fIinteger\fR;
- max-ncache-ttl \fIinteger\fR;
- max-cache-ttl \fIinteger\fR;
- transfer-format ( many-answers | one-answer );
- max-cache-size \fIsize_no_default\fR;
- check-names ( master | slave | response )
+ provide\-ixfr \fIboolean\fR;
+ request\-ixfr \fIboolean\fR;
+ rfc2308\-type1 \fIboolean\fR; // not yet implemented
+ additional\-from\-auth \fIboolean\fR;
+ additional\-from\-cache \fIboolean\fR;
+ query\-source \fIquerysource4\fR;
+ query\-source\-v6 \fIquerysource6\fR;
+ cleaning\-interval \fIinteger\fR;
+ min\-roots \fIinteger\fR; // not implemented
+ lame\-ttl \fIinteger\fR;
+ max\-ncache\-ttl \fIinteger\fR;
+ max\-cache\-ttl \fIinteger\fR;
+ transfer\-format ( many\-answers | one\-answer );
+ max\-cache\-size \fIsize_no_default\fR;
+ check\-names ( master | slave | response )
( fail | warn | ignore );
- cache-file \fIquoted_string\fR;
- suppress-initial-notify \fIboolean\fR; // not yet implemented
- root-delegation-only [ exclude { \fIquoted_string\fR; ... } ];
+ cache\-file \fIquoted_string\fR;
+ suppress\-initial\-notify \fIboolean\fR; // not yet implemented
+ root\-delegation\-only [ exclude { \fIquoted_string\fR; ... } ];
dialup \fIdialuptype\fR;
- allow-query { \fIaddress_match_element\fR; ... };
- allow-transfer { \fIaddress_match_element\fR; ... };
- allow-update-forwarding { \fIaddress_match_element\fR; ... };
+ allow\-query { \fIaddress_match_element\fR; ... };
+ allow\-transfer { \fIaddress_match_element\fR; ... };
+ allow\-update\-forwarding { \fIaddress_match_element\fR; ... };
notify \fInotifytype\fR;
- notify-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ];
- notify-source-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | *
) ];
- also-notify [ port \fIinteger\fR ] { ( \fIipv4_address\fR |
\fIipv6_address\fR )
+ notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * )
];
+ notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR |
* ) ];
+ also\-notify [ port \fIinteger\fR ] { ( \fIipv4_address\fR |
\fIipv6_address\fR )
[ port \fIinteger\fR ]; ... };
- allow-notify { \fIaddress_match_element\fR; ... };
+ allow\-notify { \fIaddress_match_element\fR; ... };
forward ( first | only );
forwarders [ port \fIinteger\fR ] {
( \fIipv4_address\fR | \fIipv6_address\fR ) [ port
\fIinteger\fR ]; ...
};
- max-transfer-time-in \fIinteger\fR;
- max-transfer-time-out \fIinteger\fR;
- max-transfer-idle-in \fIinteger\fR;
- max-transfer-idle-out \fIinteger\fR;
- max-retry-time \fIinteger\fR;
- min-retry-time \fIinteger\fR;
- max-refresh-time \fIinteger\fR;
- min-refresh-time \fIinteger\fR;
- sig-validity-interval \fIinteger\fR;
+ max\-transfer\-time\-in \fIinteger\fR;
+ max\-transfer\-time\-out \fIinteger\fR;
+ max\-transfer\-idle\-in \fIinteger\fR;
+ max\-transfer\-idle\-out \fIinteger\fR;
+ max\-retry\-time \fIinteger\fR;
+ min\-retry\-time \fIinteger\fR;
+ max\-refresh\-time \fIinteger\fR;
+ min\-refresh\-time \fIinteger\fR;
+ sig\-validity\-interval \fIinteger\fR;
- transfer-source ( \fIipv4_address\fR | * )
+ transfer\-source ( \fIipv4_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- transfer-source-v6 ( \fIipv6_address\fR | * )
+ transfer\-source\-v6 ( \fIipv6_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- zone-statistics \fIboolean\fR;
+ zone\-statistics \fIboolean\fR;
- allow-v6-synthesis { \fIaddress_match_element\fR; ... }; // obsolete
- fetch-glue \fIboolean\fR; // obsolete
- maintain-ixfr-base \fIboolean\fR; // obsolete
- max-ixfr-log-size \fIsize\fR; // obsolete
+ allow\-v6\-synthesis { \fIaddress_match_element\fR; ... }; // obsolete
+ fetch\-glue \fIboolean\fR; // obsolete
+ maintain\-ixfr\-base \fIboolean\fR; // obsolete
+ max\-ixfr\-log\-size \fIsize\fR; // obsolete
};
.sp
.fi
@@ -334,7 +334,7 @@
.nf
zone \fIstring\fR \fIoptional_class\fR {
type ( master | slave | stub | hint |
- forward | delegation-only );
+ forward | delegation\-only );
file \fIquoted_string\fR;
masters [ port \fIinteger\fR ] {
@@ -343,53 +343,53 @@
};
database \fIstring\fR;
- delegation-only \fIboolean\fR;
- check-names ( fail | warn | ignore );
+ delegation\-only \fIboolean\fR;
+ check\-names ( fail | warn | ignore );
dialup \fIdialuptype\fR;
- allow-query { \fIaddress_match_element\fR; ... };
- allow-transfer { \fIaddress_match_element\fR; ... };
- allow-update { \fIaddress_match_element\fR; ... };
- allow-update-forwarding { \fIaddress_match_element\fR; ... };
- update-policy {
+ allow\-query { \fIaddress_match_element\fR; ... };
+ allow\-transfer { \fIaddress_match_element\fR; ... };
+ allow\-update { \fIaddress_match_element\fR; ... };
+ allow\-update\-forwarding { \fIaddress_match_element\fR; ... };
+ update\-policy {
( grant | deny ) \fIstring\fR
( name | subdomain | wildcard | self ) \fIstring\fR
\fIrrtypelist\fR; ...
};
notify \fInotifytype\fR;
- notify-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * ) ];
- notify-source-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR | *
) ];
- also-notify [ port \fIinteger\fR ] { ( \fIipv4_address\fR |
\fIipv6_address\fR )
+ notify\-source ( \fIipv4_address\fR | * ) [ port ( \fIinteger\fR | * )
];
+ notify\-source\-v6 ( \fIipv6_address\fR | * ) [ port ( \fIinteger\fR |
* ) ];
+ also\-notify [ port \fIinteger\fR ] { ( \fIipv4_address\fR |
\fIipv6_address\fR )
[ port \fIinteger\fR ]; ... };
- allow-notify { \fIaddress_match_element\fR; ... };
+ allow\-notify { \fIaddress_match_element\fR; ... };
forward ( first | only );
forwarders [ port \fIinteger\fR ] {
( \fIipv4_address\fR | \fIipv6_address\fR ) [ port
\fIinteger\fR ]; ...
};
- max-transfer-time-in \fIinteger\fR;
- max-transfer-time-out \fIinteger\fR;
- max-transfer-idle-in \fIinteger\fR;
- max-transfer-idle-out \fIinteger\fR;
- max-retry-time \fIinteger\fR;
- min-retry-time \fIinteger\fR;
- max-refresh-time \fIinteger\fR;
- min-refresh-time \fIinteger\fR;
- sig-validity-interval \fIinteger\fR;
+ max\-transfer\-time\-in \fIinteger\fR;
+ max\-transfer\-time\-out \fIinteger\fR;
+ max\-transfer\-idle\-in \fIinteger\fR;
+ max\-transfer\-idle\-out \fIinteger\fR;
+ max\-retry\-time \fIinteger\fR;
+ min\-retry\-time \fIinteger\fR;
+ max\-refresh\-time \fIinteger\fR;
+ min\-refresh\-time \fIinteger\fR;
+ sig\-validity\-interval \fIinteger\fR;
- transfer-source ( \fIipv4_address\fR | * )
+ transfer\-source ( \fIipv4_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- transfer-source-v6 ( \fIipv6_address\fR | * )
+ transfer\-source\-v6 ( \fIipv6_address\fR | * )
[ port ( \fIinteger\fR | * ) ];
- zone-statistics \fIboolean\fR;
+ zone\-statistics \fIboolean\fR;
- ixfr-base \fIquoted_string\fR; // obsolete
- ixfr-tmp-file \fIquoted_string\fR; // obsolete
- maintain-ixfr-base \fIboolean\fR; // obsolete
- max-ixfr-log-size \fIsize\fR; // obsolete
+ ixfr\-base \fIquoted_string\fR; // obsolete
+ ixfr\-tmp\-file \fIquoted_string\fR; // obsolete
+ maintain\-ixfr\-base \fIboolean\fR; // obsolete
+ max\-ixfr\-log\-size \fIsize\fR; // obsolete
pubkey \fIinteger\fR \fIinteger\fR \fIinteger\fR \fIquoted_string\fR;
// obsolete
};
.sp
Only in bind9-9.2.4/bin/named: named.conf.5~
diff -ur bind9-9.2.4-orig/bin/nsupdate/nsupdate.8
bind9-9.2.4/bin/nsupdate/nsupdate.8
--- bind9-9.2.4-orig/bin/nsupdate/nsupdate.8 2004-03-14 23:44:41.000000000
-0500
+++ bind9-9.2.4/bin/nsupdate/nsupdate.8 2004-10-18 18:29:06.000000000 -0400
@@ -20,7 +20,7 @@
nsupdate \- Dynamic DNS update utility
.SH SYNOPSIS
.sp
-\fBnsupdate\fR [ \fB-d\fR ] [ \fB [ -y \fIkeyname:secret\fB ] [ -k
\fIkeyfile\fB ] \fR ] [ \fB-v\fR ] [ \fBfilename\fR ]
+\fBnsupdate\fR [ \fB\-d\fR ] [ \fB [ \-y \fIkeyname:secret\fB ] [ \-k
\fIkeyfile\fB ] \fR ] [ \fB\-v\fR ] [ \fBfilename\fR ]
.SH "DESCRIPTION"
.PP
\fBnsupdate\fR
@@ -44,7 +44,7 @@
This is identified by the MNAME field of the zone's SOA record.
.PP
The
-\fB-d\fR
+\fB\-d\fR
option makes
\fBnsupdate\fR
operate in debug mode.
@@ -58,7 +58,7 @@
\fBnsupdate\fR
and the name server.
Currently, the only supported encryption algorithm for TSIG is
-HMAC-MD5, which is defined in RFC 2104.
+HMAC\-MD5, which is defined in RFC 2104.
Once other algorithms are defined for TSIG, applications will need to
ensure they select the appropriate algorithm as well as the key when
authenticating each other.
@@ -77,14 +77,14 @@
.PP
\fBnsupdate\fR
uses the
-\fB-y\fR
+\fB\-y\fR
or
-\fB-k\fR
+\fB\-k\fR
option to provide the shared secret needed to generate a TSIG record
for authenticating Dynamic DNS update requests.
These options are mutually exclusive.
With the
-\fB-k\fR
+\fB\-k\fR
option,
\fBnsupdate\fR
reads the shared secret from the file
@@ -95,7 +95,7 @@
reasons, the file
\fIK{name}.+157.+{random}.key\fR
must also be present. When the
-\fB-y\fR
+\fB\-y\fR
option is used, a signature is generated from
\fIkeyname:secret.\fR
\fIkeyname\fR
@@ -104,7 +104,7 @@
\fIsecret\fR
is the base64 encoded shared secret.
Use of the
-\fB-y\fR
+\fB\-y\fR
option is discouraged because the shared secret is supplied as a command
line argument in clear text.
This may be visible in the output from
@@ -115,7 +115,7 @@
\fBnsupdate\fR
uses UDP to send update requests to the name server.
The
-\fB-v\fR
+\fB\-v\fR
option makes
\fBnsupdate\fR
use a TCP connection.
@@ -189,7 +189,7 @@
\fIkeyname\fR \fIkeysecret\fR pair.
The \fBkey\fR command
overrides any key specified on the command line via
-\fB-y\fR or \fB-k\fR.
+\fB\-y\fR or \fB\-k\fR.
.TP
\fBprereq nxdomain domain-name\fR
Requires that no resource record of any type exists with name
@@ -324,11 +324,11 @@
.TP
\fBK{name}.+157.+{random}.key\fR
base-64 encoding of HMAC-MD5 key created by
-\fBdnssec-keygen\fR(8).
+\fBdnssec\-keygen\fR(8).
.TP
\fBK{name}.+157.+{random}.private\fR
base-64 encoding of HMAC-MD5 key created by
-\fBdnssec-keygen\fR(8).
+\fBdnssec\-keygen\fR(8).
.SH "SEE ALSO"
.PP
\fBRFC2136\fR,
@@ -338,7 +338,7 @@
\fBRFC1034\fR,
\fBRFC2535\fR,
\fBnamed\fR(8),
-\fBdnssec-keygen\fR(8).
+\fBdnssec\-keygen\fR(8).
.SH "BUGS"
.PP
The TSIG key is redundantly stored in two separate files.
Only in bind9-9.2.4/bin/nsupdate: nsupdate.8~
diff -ur bind9-9.2.4-orig/bin/rndc/rndc.8 bind9-9.2.4/bin/rndc/rndc.8
--- bind9-9.2.4-orig/bin/rndc/rndc.8 2004-10-18 15:11:39.000000000 -0400
+++ bind9-9.2.4/bin/rndc/rndc.8 2004-10-18 18:27:20.000000000 -0400
@@ -20,7 +20,7 @@
rndc \- name server control utility
.SH SYNOPSIS
.sp
-\fBrndc\fR [ \fB-c \fIconfig-file\fB\fR ] [ \fB-k \fIkey-file\fB\fR ] [
\fB-s \fIserver\fB\fR ] [ \fB-p \fIport\fB\fR ] [ \fB-V\fR ] [ \fB-y
\fIkey_id\fB\fR ] \fBcommand\fR
+\fBrndc\fR [ \fB\-c \fIconfig-file\fB\fR ] [ \fB\-k \fIkey-file\fB\fR ] [
\fB\-s \fIserver\fB\fR ] [ \fB\-p \fIport\fB\fR ] [ \fB\-V\fR ] [ \fB\-y
\fIkey_id\fB\fR ] \fBcommand\fR
.SH "DESCRIPTION"
.PP
\fBrndc\fR controls the operation of a name
@@ -35,7 +35,7 @@
over a TCP connection, sending commands authenticated with
digital signatures. In the current versions of
\fBrndc\fR and \fBnamed\fR,
-the only supported authentication algorithm is HMAC-MD5,
+the only supported authentication algorithm is HMAC\-MD5,
which uses a shared secret on each end of the connection.
This provides TSIG-style authentication for the command
request and the name server's response. All commands sent
@@ -47,12 +47,12 @@
algorithm and key it should use.
.SH "OPTIONS"
.TP
-\fB-c \fIconfig-file\fB\fR
+\fB\-c \fIconfig-file\fB\fR
Use \fIconfig-file\fR
as the configuration file instead of the default,
\fI/etc/bind/rndc.conf\fR.
.TP
-\fB-k \fIkey-file\fB\fR
+\fB\-k \fIkey-file\fB\fR
Use \fIkey-file\fR
as the key file instead of the default,
\fI/etc/rndc.key\fR. The key in
@@ -60,24 +60,24 @@
commands sent to the server if the \fIconfig-file\fR
does not exist.
.TP
-\fB-s \fIserver\fB\fR
+\fB\-s \fIserver\fB\fR
\fIserver\fR is
the name or address of the server which matches a
server statement in the configuration file for
\fBrndc\fR. If no server is supplied on the
-command line, the host named by the default-server clause
+command line, the host named by the default\-server clause
in the option statement of the configuration file will be
used.
.TP
-\fB-p \fIport\fB\fR
+\fB\-p \fIport\fB\fR
Send commands to TCP port
\fIport\fR instead
of BIND 9's default control channel port, 953.
.TP
-\fB-V\fR
+\fB\-V\fR
Enable verbose logging.
.TP
-\fB-y \fIkeyid\fB\fR
+\fB\-y \fIkeyid\fB\fR
Use the key \fIkeyid\fR
from the configuration file.
\fIkeyid\fR must be
@@ -87,7 +87,7 @@
is specified, \fBrndc\fR will first look
for a key clause in the server statement of the server
being used, or if no server statement is present for that
-host, then the default-key clause of the options statement.
+host, then the default\-key clause of the options statement.
Note that the configuration file contains shared secrets
which are used to send authenticated control commands
to name servers. It should therefore not have general read
Only in bind9-9.2.4/bin/rndc: rndc.8~
diff -ur bind9-9.2.4-orig/bin/rndc/rndc.conf.5 bind9-9.2.4/bin/rndc/rndc.conf.5
--- bind9-9.2.4-orig/bin/rndc/rndc.conf.5 2004-06-03 01:21:15.000000000
-0400
+++ bind9-9.2.4/bin/rndc/rndc.conf.5 2004-10-18 18:26:26.000000000 -0400
@@ -43,17 +43,17 @@
and a key statement.
.PP
The \fBoptions\fR statement contains three clauses.
-The \fBdefault-server\fR clause is followed by the
+The \fBdefault\-server\fR clause is followed by the
name or address of a name server. This host will be used when
no name server is given as an argument to
-\fBrndc\fR. The \fBdefault-key\fR
+\fBrndc\fR. The \fBdefault\-key\fR
clause is followed by the name of a key which is identified by
a \fBkey\fR statement. If no
\fBkeyid\fR is provided on the rndc command line,
and no \fBkey\fR clause is found in a matching
\fBserver\fR statement, this default key will be
used to authenticate the server's commands and responses. The
-\fBdefault-port\fR clause is followed by the port
+\fBdefault\-port\fR clause is followed by the port
to connect to on the remote name server. If no
\fBport\fR option is provided on the rndc command
line, and no \fBport\fR clause is found in a
@@ -70,13 +70,13 @@
The \fBkey\fR statement begins with an identifying
string, the name of the key. The statement has two clauses.
\fBalgorithm\fR identifies the encryption algorithm
-for \fBrndc\fR to use; currently only HMAC-MD5 is
+for \fBrndc\fR to use; currently only HMAC\-MD5 is
supported. This is followed by a secret clause which contains
the base-64 encoding of the algorithm's encryption key. The
base-64 string is enclosed in double quotes.
.PP
There are two common ways to generate the base-64 string for the
-secret. The BIND 9 program \fBrndc-confgen\fR can
+secret. The BIND 9 program \fBrndc\-confgen\fR can
be used to generate a random key, or the
\fBmmencode\fR program, also known as
\fBmimencode\fR, can be used to generate a base-64
@@ -87,8 +87,8 @@
.sp
.nf
options {
- default-server localhost;
- default-key samplekey;
+ default\-server localhost;
+ default\-key samplekey;
};
server localhost {
@@ -96,7 +96,7 @@
};
key samplekey {
- algorithm hmac-md5;
+ algorithm hmac\-md5;
secret
"c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K";
};
@@ -108,12 +108,12 @@
Commands to the localhost server will use the samplekey key, which
must also be defined in the server's configuration file with the
same name and secret. The key statement indicates that samplekey
-uses the HMAC-MD5 algorithm and its secret clause contains the
-base-64 encoding of the HMAC-MD5 secret enclosed in double quotes.
+uses the HMAC\-MD5 algorithm and its secret clause contains the
+base-64 encoding of the HMAC\-MD5 secret enclosed in double quotes.
.PP
-To generate a random secret with \fBrndc-confgen\fR:
+To generate a random secret with \fBrndc\-confgen\fR:
.PP
-\fBrndc-confgen\fR
+\fBrndc\-confgen\fR
.PP
A complete \fIrndc.conf\fR file, including the
randomly generated key, will be written to the standard
@@ -134,7 +134,7 @@
.SH "SEE ALSO"
.PP
\fBrndc\fR(8),
-\fBrndc-confgen\fR(8),
+\fBrndc\-confgen\fR(8),
\fBmmencode\fR(1),
\fIBIND 9 Administrator Reference Manual\fR.
.SH "AUTHOR"
Only in bind9-9.2.4/bin/rndc: rndc.conf.5~
diff -ur bind9-9.2.4-orig/bin/rndc/rndc-confgen.8
bind9-9.2.4/bin/rndc/rndc-confgen.8
--- bind9-9.2.4-orig/bin/rndc/rndc-confgen.8 2004-06-03 01:21:14.000000000
-0400
+++ bind9-9.2.4/bin/rndc/rndc-confgen.8 2004-10-18 18:28:07.000000000 -0400
@@ -17,26 +17,26 @@
.\"
.TH "RNDC-CONFGEN" "8" "Aug 27, 2001" "BIND9" ""
.SH NAME
-rndc-confgen \- rndc key generation tool
+rndc\-confgen \- rndc key generation tool
.SH SYNOPSIS
.sp
-\fBrndc-confgen\fR [ \fB-a\fR ] [ \fB-b \fIkeysize\fB\fR ] [ \fB-c
\fIkeyfile\fB\fR ] [ \fB-h\fR ] [ \fB-k \fIkeyname\fB\fR ] [ \fB-p
\fIport\fB\fR ] [ \fB-r \fIrandomfile\fB\fR ] [ \fB-s \fIaddress\fB\fR ] [
\fB-t \fIchrootdir\fB\fR ] [ \fB-u \fIuser\fB\fR ]
+\fBrndc\-confgen\fR [ \fB\-a\fR ] [ \fB\-b \fIkeysize\fB\fR ] [ \fB\-c
\fIkeyfile\fB\fR ] [ \fB\-h\fR ] [ \fB\-k \fIkeyname\fB\fR ] [ \fB\-p
\fIport\fB\fR ] [ \fB\-r \fIrandomfile\fB\fR ] [ \fB\-s \fIaddress\fB\fR ] [
\fB\-t \fIchrootdir\fB\fR ] [ \fB\-u \fIuser\fB\fR ]
.SH "DESCRIPTION"
.PP
-\fBrndc-confgen\fR generates configuration files
+\fBrndc\-confgen\fR generates configuration files
for \fBrndc\fR. It can be used as a
convenient alternative to writing the
\fIrndc.conf\fR file
and the corresponding \fBcontrols\fR
and \fBkey\fR
statements in \fInamed.conf\fR by hand.
-Alternatively, it can be run with the \fB-a\fR
+Alternatively, it can be run with the \fB\-a\fR
option to set up a \fIrndc.key\fR file and
avoid the need for a \fIrndc.conf\fR file
and a \fBcontrols\fR statement altogether.
.SH "OPTIONS"
.TP
-\fB-a\fR
+\fB\-a\fR
Do automatic \fBrndc\fR configuration.
This creates a file \fIrndc.key\fR
in \fI/etc\fR (or whatever
@@ -49,35 +49,35 @@
\fBrndc\fR to communicate with
\fBnamed\fR with no further configuration.
-Running \fBrndc-confgen -a\fR allows
+Running \fBrndc\-confgen \-a\fR allows
BIND 9 and \fBrndc\fR to be used as drop-in
replacements for BIND 8 and \fBndc\fR,
with no changes to the existing BIND 8
\fInamed.conf\fR file.
.TP
-\fB-b \fIkeysize\fB\fR
+\fB\-b \fIkeysize\fB\fR
Specifies the size of the authentication key in bits.
Must be between 1 and 512 bits; the default is 128.
.TP
-\fB-c \fIkeyfile\fB\fR
-Used with the \fB-a\fR option to specify
+\fB\-c \fIkeyfile\fB\fR
+Used with the \fB\-a\fR option to specify
an alternate location for \fIrndc.key\fR.
.TP
-\fB-h\fR
+\fB\-h\fR
Prints a short summary of the options and arguments to
-\fBrndc-confgen\fR.
+\fBrndc\-confgen\fR.
.TP
-\fB-k \fIkeyname\fB\fR
+\fB\-k \fIkeyname\fB\fR
Specifies the key name of the rndc authentication key.
This must be a valid domain name.
-The default is rndc-key.
+The default is rndc\-key.
.TP
-\fB-p \fIport\fB\fR
+\fB\-p \fIport\fB\fR
Specifies the command channel port where \fBnamed\fR
listens for connections from \fBrndc\fR.
The default is 953.
.TP
-\fB-r \fIrandomfile\fB\fR
+\fB\-r \fIrandomfile\fB\fR
Specifies a source of random data for generating the
authorization. If the operating
system does not provide a \fI/dev/random\fR
@@ -88,37 +88,37 @@
\fIkeyboard\fR indicates that keyboard
input should be used.
.TP
-\fB-s \fIaddress\fB\fR
+\fB\-s \fIaddress\fB\fR
Specifies the IP address where \fBnamed\fR
listens for command channel connections from
\fBrndc\fR. The default is the loopback
address 127.0.0.1.
.TP
-\fB-t \fIchrootdir\fB\fR
-Used with the \fB-a\fR option to specify
+\fB\-t \fIchrootdir\fB\fR
+Used with the \fB\-a\fR option to specify
a directory where \fBnamed\fR will run
chrooted. An additional copy of the \fIrndc.key\fR
will be written relative to this directory so that
it will be found by the chrooted \fBnamed\fR.
.TP
-\fB-u \fIuser\fB\fR
-Used with the \fB-a\fR option to set the owner
+\fB\-u \fIuser\fB\fR
+Used with the \fB\-a\fR option to set the owner
of the \fIrndc.key\fR file generated. If
-\fB-t\fR is also specified only the file in
+\fB\-t\fR is also specified only the file in
the chroot area has its owner changed.
.SH "EXAMPLES"
.PP
To allow \fBrndc\fR to be used with
no manual configuration, run
.PP
-\fBrndc-confgen -a\fR
+\fBrndc\-confgen \-a\fR
.PP
To print a sample \fIrndc.conf\fR file and
corresponding \fBcontrols\fR and \fBkey\fR
statements to be manually inserted into \fInamed.conf\fR,
run
.PP
-\fBrndc-confgen\fR
+\fBrndc\-confgen\fR
.SH "SEE ALSO"
.PP
\fBrndc\fR(8),
Only in bind9-9.2.4/bin/rndc: rndc-confgen.8~
diff -ur bind9-9.2.4-orig/contrib/idn/idnkit-1.0-src/tools/idnconv/idnconv.1
bind9-9.2.4/contrib/idn/idnkit-1.0-src/tools/idnconv/idnconv.1
--- bind9-9.2.4-orig/contrib/idn/idnkit-1.0-src/tools/idnconv/idnconv.1
2003-06-03 20:27:10.000000000 -0400
+++ bind9-9.2.4/contrib/idn/idnkit-1.0-src/tools/idnconv/idnconv.1
2004-10-18 18:25:46.000000000 -0400
@@ -103,7 +103,7 @@
.IP "\(bu" 2
\f(CWPunycode\fR
.IP "\(bu" 2
-\f(CWUTF-8\fR
+\f(CWUTF\-8\fR
.IP "\(bu" 2
Any alias names for the above, defined by the codeset alias file.
.RE
@@ -111,14 +111,14 @@
If this option is not specified, the default codeset is determined
from the locale in normal conversion mode.
In reverse conversion mode, the default codeset is the IDN encoding
-specified by the configuration file (``idn-encoding'' entry).
+specified by the configuration file (``idn\-encoding'' entry).
.TP 4
\fB\-out\fP \fIout-code\fP, \fB\-o\fP \fIout-code\fP
Specify the codeset name of the output text. \fIout-code\fP can be any
codeset name that can be specified for \fB\-in\fR option.
.IP "" 4
If this option is not specified, the default is the IDN encoding
-specified by the configuration file (``idn-encoding'' entry) in
+specified by the configuration file (``idn\-encoding'' entry) in
normal conversion mode.
In reverse conversion mode, the default codeset is determined from
the locale.
@@ -142,13 +142,13 @@
.RS 4
.IP \f(CWRFC3491\fR 4
Perform NAMEPREP according to the RFC3491
-``rfc-3491.txt''.
+``rfc\-3491.txt''.
.RE
.TP 4
\fB\-nonameprep\fR, \fB\-N\fR
Specify to skip NAMEPREP process (or NAMEPREP verification process
in the reverse conversion mode).
-This option implies -nounassigncheck and -nobidicheck.
+This option implies \-nounassigncheck and \-nobidicheck.
.TP 4
\fB\-localmap\fR \fImap\fR
Specify the name of local mapping rule.
@@ -349,10 +349,10 @@
\&.SUFFIXES: .lc .ace
\&.lc.ace:
- idnconv -in $(LOCALCODE) -out $(IDNCODE) \\
+ idnconv \-in $(LOCALCODE) \-out $(IDNCODE) \\
$(IDNCONVOPT) $< > $@
-LOCALCODE = EUC-JP
+LOCALCODE = EUC\-JP
IDNCODE = Punycode
IDNCONVOPT =
Only in bind9-9.2.4/contrib/idn/idnkit-1.0-src/tools/idnconv: idnconv.1~
diff -ur bind9-9.2.4-orig/contrib/idn/idnkit-1.0-src/tools/runidn/runidn.1
bind9-9.2.4/contrib/idn/idnkit-1.0-src/tools/runidn/runidn.1
--- bind9-9.2.4-orig/contrib/idn/idnkit-1.0-src/tools/runidn/runidn.1
2003-06-03 20:27:14.000000000 -0400
+++ bind9-9.2.4/contrib/idn/idnkit-1.0-src/tools/runidn/runidn.1
2004-10-18 18:23:02.000000000 -0400
@@ -47,7 +47,7 @@
runidn \- A script to allow applications to use internationalized domain names.
.\"
.SH SYNOPSIS
-\fBrunidn\fP [\fB-e\fP \fIlocal-codeset\fP] \fIprogram-name\fP [\fIargs..\fP]
+\fBrunidn\fP [\fB\-e\fP \fIlocal-codeset\fP] \fIprogram-name\fP [\fIargs..\fP]
.\"
.SH DESCRIPTION
\fBrunidn\fP enables applications to use internationalized domain names
Only in bind9-9.2.4/contrib/idn/idnkit-1.0-src/tools/runidn: runidn.1~
diff -ur bind9-9.2.4-orig/contrib/nslint-2.1a3/nslint.8
bind9-9.2.4/contrib/nslint-2.1a3/nslint.8
--- bind9-9.2.4-orig/contrib/nslint-2.1a3/nslint.8 2001-12-20
23:12:03.000000000 -0500
+++ bind9-9.2.4/contrib/nslint-2.1a3/nslint.8 2004-10-18 18:21:18.000000000
-0400
@@ -27,23 +27,23 @@
.SH SYNOPSIS
.B nslint
[
-.B -d
+.B \-d
] [
-.B -b
+.B \-b
.I named.boot
] [
-.B -B
+.B \-B
.I nslint.boot
]
.br
.B nslint
[
-.B -d
+.B \-d
] [
-.B -c
+.B \-c
.I named.conf
] [
-.B -C
+.B \-C
.I nslint.conf
]
.SH DESCRIPTION
@@ -97,20 +97,20 @@
.LP
.SH OPTIONS
.TP
-.B -b
+.B \-b
Specify an alternate
.I named.boot
file. The default is
.IR /etc/named.boot .
.TP
.TP
-.B -c
+.B \-c
Specify an alternate
.I named.conf
file. The default is
.IR /etc/named.conf .
.TP
-.B -B
+.B \-B
Specify an alternate
.I nslint.boot
file. The default is
@@ -131,7 +131,7 @@
records that point outside the domains listed in
.IR named.boot .
.TP
-.B -C
+.B \-C
Specify an alternate
.I nslint.conf
file. The default is
@@ -144,7 +144,7 @@
This file is processed like a second
.IR named.conf .
.TP
-.B -d
+.B \-d
Raise the debugging level. Debugging information is
displayed on
.IR stdout .
@@ -293,7 +293,7 @@
.nf
.sp .5
primary lbl.gov nslint.lbl.gov
-primary 0.128.in-addr.arpa nslint.128.0.rev
+primary 0.128.in\-addr.arpa nslint.128.0.rev
.sp .5
.fi
.RE
Only in bind9-9.2.4/contrib/nslint-2.1a3: nslint.8~
diff -ur bind9-9.2.4-orig/contrib/sdb/ldap/zone2ldap.1
bind9-9.2.4/contrib/sdb/ldap/zone2ldap.1
--- bind9-9.2.4-orig/contrib/sdb/ldap/zone2ldap.1 2002-07-02
00:45:48.000000000 -0400
+++ bind9-9.2.4/contrib/sdb/ldap/zone2ldap.1 2004-10-18 18:22:02.000000000
-0400
@@ -2,7 +2,7 @@
.SH NAME
zone2ldap /- Load BIND 9 Zone files into LDAP Directory
.SH SYNOPSIS
-zone2ldap [-D Bind DN] [-w Bind Password] [-b Base DN] [-z Zone] [-f Zone
File ] [-h Ldap Host] [-cd] [-v]
+zone2ldap [\-D Bind DN] [\-w Bind Password] [\-b Base DN] [\-z Zone] [\-f
Zone File ] [\-h Ldap Host] [\-cd] [\-v]
.SH DESCRIPTION
zone2ldap will parse a complete BIND 9 format DNS zone file, and load
the contents into an LDAP directory, for use with the LDAP sdb back-end.
@@ -12,53 +12,53 @@
.SS Options
.TP
--b
+\-b
LDAP Base DN. LDAP systems require a "base dn", which is generally considered
the LDAP Directory root.
If the zone you are loading is different from the base, then you will need to
tell zone2ldap what your LDAP
base is.
.TP
--v
+\-v
Print version information, and immediatly exit.
.TP
--f
+\-f
Zone file. Bind 9.1 compatible zone file, from which zone information will be
read.
.TP
--d
+\-d
Dump debug information to standard out.
.TP
--w
-LDAP Bind password, corresponding the the value of "-b".
+\-w
+LDAP Bind password, corresponding the the value of "\-b".
.TP
--h
+\-h
LDAP Directory host. This is the hostname of the LDAP system you wish to store
zone information on.
An LDAP server should be listening on port 389 of the target system. This may
be ommited, and will default
to "localhost".
.TP
--c
+\-c
This will create the zone portion of the DN you are importing. For instance,
if you are creating a domain.com zone,
zone2ldap should first create "dc=domain,dc=com". This is useful if you are
creating multiple domains.
.TP
--z
+\-z
This is the name of the zone specified in the SOA record.
.SH EXAMPLES
Following are brief examples of how to import a zone file into your LDAP DIT.
.SS Loading zone domain.com, with an LDAP Base DN of dc=domain,dc=com
-zone2ldap -D dc=root -w secret -h localhost -z domain.com -f domain.com.zone
+zone2ldap \-D dc=root \-w secret \-h localhost \-z domain.com \-f
domain.com.zone
This will add Resource Records into an ALREADY EXISTING dc=domain,dc=com. The
final SOA DN in this case, will be
dc=@,dc=domain,dc=com
.SS Loading customer.com, if your LDAP Base DN is dc=provider,dc=net.
-zone2ldap -D dc=root -w secret -h localhost -z customer.com -b
dc=provider,dc=net -f customer.com.zone -c
+zone2ldap \-D dc=root \-w secret \-h localhost \-z customer.com \-b
dc=provider,dc=net \-f customer.com.zone \-c
This will create dc=customer,dc=com under dc=provider,dc=net, and add all
necessary Resource Records. The final
root DN to the SOA will be dc=@,dc=customer,dc=com,dc=provider,dc=net.
.SH "SEE ALSO"
named(8) ldap(3)
-http://www.venaas.no/ldap/bind-sdb/
+http://www.venaas.no/ldap/bind\-sdb/
.SH "BUGS"
-Send all bug reports to Jeff McNeil <[email protected]>
+Send all bug reports to Jeff McNeil <[email protected]\-rock.net>
.SH AUTHOR
-Jeff McNeil <[email protected]>
+Jeff McNeil <[email protected]\-rock.net>
Only in bind9-9.2.4/contrib/sdb/ldap: zone2ldap.1~
diff -ur bind9-9.2.4-orig/debian/nslookup.1 bind9-9.2.4/debian/nslookup.1
--- bind9-9.2.4-orig/debian/nslookup.1 2004-10-18 15:11:39.000000000 -0400
+++ bind9-9.2.4/debian/nslookup.1 2004-10-19 16:16:28.000000000 -0400
@@ -80,7 +80,7 @@
.It a)
when no arguments are given (the default name server will be used),
.It b)
-when the first argument is a hyphen (-) and the second argument
+when the first argument is a hyphen (\-) and the second argument
is the host name or Internet address of a name server.
.El
.Pp
@@ -100,7 +100,7 @@
a hyphen. For example, to change the default query type to host information,
and the initial timeout to 10 seconds, type:
.Bd -literal -offset indent
- nslookup -query=hinfo -timeout=10
+ nslookup \-query=hinfo \-timeout=10
.Ed
.Sh INTERACTIVE COMMANDS
Commands may be interrupted at any time by typing a control-C.
@@ -192,7 +192,7 @@
The default output contains host names and their Internet addresses.
.Ar Option
can be one of the following:
-.Bl -tag -width "-a "
+.Bl -tag -width "\-a "
.It Fl t Ar querytype
lists all records of the specified type (see
.Ar querytype
Only in bind9-9.2.4/debian: nslookup.1~
diff -ur bind9-9.2.4-orig/lib/lwres/man/lwres_getnameinfo.3
bind9-9.2.4/lib/lwres/man/lwres_getnameinfo.3
--- bind9-9.2.4-orig/lib/lwres/man/lwres_getnameinfo.3 2004-03-14
23:45:02.000000000 -0500
+++ bind9-9.2.4/lib/lwres/man/lwres_getnameinfo.3 2004-10-18
18:18:35.000000000 -0400
@@ -39,7 +39,7 @@
The name of the service associated with the port number in
\fIsa\fR is returned in \fI*serv.\fR
It is \fIservlen\fR bytes long. The maximum length
-of the service name is NI_MAXSERV - 32 bytes.
+of the service name is NI_MAXSERV \- 32 bytes.
.PP
The \fIflags\fR argument sets the following
bits:
Only in bind9-9.2.4/lib/lwres/man: lwres_getnameinfo.3~
diff -ur bind9-9.2.4-orig/lib/lwres/man/lwres_resutil.3
bind9-9.2.4/lib/lwres/man/lwres_resutil.3
--- bind9-9.2.4-orig/lib/lwres/man/lwres_resutil.3 2004-03-14
23:45:05.000000000 -0500
+++ bind9-9.2.4/lib/lwres/man/lwres_resutil.3 2004-10-18 18:17:04.000000000
-0400
@@ -45,7 +45,7 @@
.PP
\fBlwres_string_parse()\fR retrieves a DNS-encoded
string starting the current pointer of lightweight resolver buffer
-\fIb\fR: i.e. b->current.
+\fIb\fR: i.e. b\->current.
When the function returns, the address of the first byte of the
encoded string is returned via \fI*c\fR and the
length of that string is given by \fI*len\fR. The
@@ -55,12 +55,12 @@
.PP
\fBlwres_addr_parse()\fR extracts an address from the
buffer \fIb\fR. The buffer's current pointer
-b->current is presumed to point at an encoded
+b\->current is presumed to point at an encoded
address: the address preceded by a 32-bit protocol family identifier
and a 16-bit length field. The encoded address is copied to
-addr->address and
-addr->length indicates the size in bytes of
-the address that was copied. b->current is
+addr\->address and
+addr\->length indicates the size in bytes of
+the address that was copied. b\->current is
advanced to point at the next byte of available data in the buffer
following the encoded address.
.PP
Only in bind9-9.2.4/lib/lwres/man: lwres_resutil.3~
--- End Message ---