the Delphinus DNS daemon
delphinusdnsd is the daemon that runs
The options are as follows:
- address Adds an address that
delphinusdnsdshould bind(2) to. This option can be repeated multiple times to add more. May not be used in conjunction with
- Turn on debug mode.
delphinusdnsddoes not fork into the background with this. Messages are printed in the foreground.
- file The configuration file to be used is found at file.
- identstring Allows the operator to specify an
identification string to reflect in the process listing and subsequent
start/stop/restart commands. This helps identifying the processes when
delphinusdnsdrun in a system. May not be used in conjunction with
- interface The particular
delphinusdnsdshould listen on. This option can be specified multiple times. May not be used in conjunction with
- Turn logging of queries on.
- instances is the number of instances plus one that
should be forked for
delphinusdnsd. This may be good for multi-cpu/core boxes.
- port Specifies the port that
delphinusdnsdshould listen on.
- path Specifies the socket path to use with
dddctl(8). May not be
used in conjunction with
- Be more verbose in debug mode. This shows configfile parsing logic.
delphinusdnsd is an authoritative DNS
server. It can run as primary or replicant. When new configfiles are written
it must be restarted. For replicants that receive notifies or timeout on the
refresh or retry SOA values the daemon is restarted automatically.
It should be noted that
a forwarding mode since version 1.5. This mode should be treated as
- default replicant directory for AXFR zones
P. Mockapetris, DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION, RFC 1035, November 1987.
P. Vixie, A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY), RFC 1996, August 1996.
S. Thomson, C. Huitema, V. Ksinant, and M. Souissi, DNS Extensions to Support IP Version 6, RFC 3596, October 2003.
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, Resource Records for the DNS Security Extensions, RFC 4034, March 2005.
B. Laurie, G. Sisson, R. Arends, and D. Blacka, DNS Security (DNSSEC) Hashed Authenticated Denial of Existence, RFC 5155, March 2008.
J. Damas, M. Graff, and P. Vixie, Extension Mechanisms for DNS (EDNS(0)), RFC 6891, April 2013.
J. Dickinson, S. Dickinson, R. Bellis, A. Mankin, and D. Wessels, DNS Transport over TCP - Implementation Requirements, RFC 7766, March 2016.
F. Dupont, S. Morris, P. Vixie, D. Eastlake 3rd, O. Gudmundsson, and B. Wellington, Secret Key Transaction Authentication for DNS (TSIG), RFC 8945, November 2020.
O. Sury, W. Toorop, D. Eastlake 3rd, and M. Andrews, Interoperable Domain Name System (DNS) Server Cookies, RFC 9018, April 2021.
This software was written by Peter J. Philipp ⟨firstname.lastname@example.org⟩